Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15-12-2024 20:01
Static task
static1
Behavioral task
behavioral1
Sample
f5881584c73a9416a65cbc5ca849f5bb_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f5881584c73a9416a65cbc5ca849f5bb_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
f5881584c73a9416a65cbc5ca849f5bb_JaffaCakes118.exe
-
Size
406KB
-
MD5
f5881584c73a9416a65cbc5ca849f5bb
-
SHA1
e50f322a92332202299fbd9b38e0ccd793058133
-
SHA256
fe5254468c8a6c7a17dc11f3e85b00db1b5b2b3c26919bdefb8d917ce35cb4d5
-
SHA512
4e608be3de18065f89ae0144ccb46378a26cf15e61f739a338bf5f544b1060a8c800549256d17bb741c140dd68b0fc0c8bbc1c392b4824524dbfb7409bc2b168
-
SSDEEP
6144:/w93IXt3CxKqTlV+eAX25kXliWRi2HCZ0wVAqfMcbFqf55oV7RHoL:xXtyZieAX2ElJRi1ax5M
Malware Config
Extracted
gcleaner
ggc-partners.in
Signatures
-
Gcleaner family
-
OnlyLogger
A tiny loader that uses IPLogger to get its payload.
-
Onlylogger family
-
OnlyLogger payload 5 IoCs
resource yara_rule behavioral2/memory/4736-2-0x00000000001C0000-0x00000000001EE000-memory.dmp family_onlylogger behavioral2/memory/4736-3-0x0000000000400000-0x0000000000431000-memory.dmp family_onlylogger behavioral2/memory/4736-5-0x00000000001C0000-0x00000000001EE000-memory.dmp family_onlylogger behavioral2/memory/4736-7-0x0000000000400000-0x0000000000431000-memory.dmp family_onlylogger behavioral2/memory/4736-6-0x0000000000400000-0x0000000003302000-memory.dmp family_onlylogger -
Program crash 9 IoCs
pid pid_target Process procid_target 4312 4736 WerFault.exe 81 3156 4736 WerFault.exe 81 3764 4736 WerFault.exe 81 2724 4736 WerFault.exe 81 1916 4736 WerFault.exe 81 4260 4736 WerFault.exe 81 2560 4736 WerFault.exe 81 4984 4736 WerFault.exe 81 4268 4736 WerFault.exe 81 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f5881584c73a9416a65cbc5ca849f5bb_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f5881584c73a9416a65cbc5ca849f5bb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f5881584c73a9416a65cbc5ca849f5bb_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
PID:4736 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4736 -s 6202⤵
- Program crash
PID:4312
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4736 -s 6602⤵
- Program crash
PID:3156
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4736 -s 7442⤵
- Program crash
PID:3764
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4736 -s 7642⤵
- Program crash
PID:2724
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4736 -s 8882⤵
- Program crash
PID:1916
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4736 -s 10722⤵
- Program crash
PID:4260
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4736 -s 11402⤵
- Program crash
PID:2560
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4736 -s 16762⤵
- Program crash
PID:4984
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4736 -s 10762⤵
- Program crash
PID:4268
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4736 -ip 47361⤵PID:3048
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4736 -ip 47361⤵PID:4788
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4736 -ip 47361⤵PID:2176
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4736 -ip 47361⤵PID:60
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4736 -ip 47361⤵PID:4856
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4736 -ip 47361⤵PID:1596
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4736 -ip 47361⤵PID:4140
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4736 -ip 47361⤵PID:2044
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4736 -ip 47361⤵PID:4288