Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-12-2024 11:44
Static task
static1
Behavioral task
behavioral1
Sample
f8db76628f58ae7d66a95d134c04895f_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
f8db76628f58ae7d66a95d134c04895f_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
f8db76628f58ae7d66a95d134c04895f_JaffaCakes118.exe
-
Size
379KB
-
MD5
f8db76628f58ae7d66a95d134c04895f
-
SHA1
484b08726669838820e166d7621559e1bec8c3a1
-
SHA256
4272379ced0fed89dfc74a080cd17269b34bef293cbfe4bd424abd500bf367fa
-
SHA512
77cca8a8565d7e84a2dbc88814eec3f52b2fcce88fcd56f791c25b2fe7bd0e213b7ce0f8cf987fb69306924831b02aa87076656b1845870dfb53c89f2254ffca
-
SSDEEP
6144:MmgDbiuBekKbKkNas2pevng1KuizqZhaNyG0Sbz:CauBekVkNas2Pgui+hu
Malware Config
Extracted
gcleaner
gc-prtnrs.top
gcc-prtnrs.top
Signatures
-
Gcleaner family
-
OnlyLogger
A tiny loader that uses IPLogger to get its payload.
-
Onlylogger family
-
OnlyLogger payload 5 IoCs
resource yara_rule behavioral2/memory/3232-2-0x0000000004FC0000-0x0000000004FEE000-memory.dmp family_onlylogger behavioral2/memory/3232-3-0x0000000000400000-0x0000000000431000-memory.dmp family_onlylogger behavioral2/memory/3232-6-0x0000000004FC0000-0x0000000004FEE000-memory.dmp family_onlylogger behavioral2/memory/3232-5-0x0000000000400000-0x000000000325A000-memory.dmp family_onlylogger behavioral2/memory/3232-7-0x0000000000400000-0x0000000000431000-memory.dmp family_onlylogger -
Program crash 9 IoCs
pid pid_target Process procid_target 2248 3232 WerFault.exe 82 1204 3232 WerFault.exe 82 1000 3232 WerFault.exe 82 684 3232 WerFault.exe 82 4764 3232 WerFault.exe 82 388 3232 WerFault.exe 82 1748 3232 WerFault.exe 82 4576 3232 WerFault.exe 82 2760 3232 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f8db76628f58ae7d66a95d134c04895f_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f8db76628f58ae7d66a95d134c04895f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f8db76628f58ae7d66a95d134c04895f_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
PID:3232 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3232 -s 6202⤵
- Program crash
PID:2248
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3232 -s 6562⤵
- Program crash
PID:1204
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3232 -s 7202⤵
- Program crash
PID:1000
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3232 -s 7642⤵
- Program crash
PID:684
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3232 -s 8242⤵
- Program crash
PID:4764
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3232 -s 10322⤵
- Program crash
PID:388
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3232 -s 11082⤵
- Program crash
PID:1748
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3232 -s 15962⤵
- Program crash
PID:4576
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3232 -s 10362⤵
- Program crash
PID:2760
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3232 -ip 32321⤵PID:2900
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3232 -ip 32321⤵PID:5076
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 3232 -ip 32321⤵PID:1452
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 3232 -ip 32321⤵PID:1516
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 3232 -ip 32321⤵PID:3980
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3232 -ip 32321⤵PID:3984
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 3232 -ip 32321⤵PID:1664
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 3232 -ip 32321⤵PID:3364
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3232 -ip 32321⤵PID:1516