Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-12-2024 09:43
Static task
static1
Behavioral task
behavioral1
Sample
ff5d698fad039b90eec648304353d037_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ff5d698fad039b90eec648304353d037_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
ff5d698fad039b90eec648304353d037_JaffaCakes118.exe
-
Size
384KB
-
MD5
ff5d698fad039b90eec648304353d037
-
SHA1
3370709a2a74e0e33163391751fdce1b81c365dd
-
SHA256
845641edc3a511126a17a1f0b733232a8f9752bde7a0b8190dffa3e387251456
-
SHA512
6b78ea59bbc37fcd66557287e91cf06dbc21794eb41626a6248306c06cfa441a313ce2a9af811744e2c65e81eef563a24baaba04650dcee2ff54f42671b5c4b3
-
SSDEEP
6144:jclHzEKDMiOiXTteyPYzdRTNHdLYGvRDQMhLns5LiNLnRq:QT/3OiXTteyERTNqYJVscNt
Malware Config
Extracted
gcleaner
gc-prtnrs.top
gcc-prtnrs.top
Signatures
-
Gcleaner family
-
OnlyLogger
A tiny loader that uses IPLogger to get its payload.
-
Onlylogger family
-
OnlyLogger payload 5 IoCs
resource yara_rule behavioral2/memory/1116-2-0x0000000004E70000-0x0000000004E9E000-memory.dmp family_onlylogger behavioral2/memory/1116-3-0x0000000000400000-0x0000000000431000-memory.dmp family_onlylogger behavioral2/memory/1116-6-0x0000000004E70000-0x0000000004E9E000-memory.dmp family_onlylogger behavioral2/memory/1116-5-0x0000000000400000-0x000000000325B000-memory.dmp family_onlylogger behavioral2/memory/1116-7-0x0000000000400000-0x0000000000431000-memory.dmp family_onlylogger -
Program crash 9 IoCs
pid pid_target Process procid_target 404 1116 WerFault.exe 82 4432 1116 WerFault.exe 82 3476 1116 WerFault.exe 82 3836 1116 WerFault.exe 82 1636 1116 WerFault.exe 82 2428 1116 WerFault.exe 82 3216 1116 WerFault.exe 82 5024 1116 WerFault.exe 82 3568 1116 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ff5d698fad039b90eec648304353d037_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ff5d698fad039b90eec648304353d037_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ff5d698fad039b90eec648304353d037_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
PID:1116 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1116 -s 6202⤵
- Program crash
PID:404
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1116 -s 6402⤵
- Program crash
PID:4432
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1116 -s 7442⤵
- Program crash
PID:3476
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1116 -s 7642⤵
- Program crash
PID:3836
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1116 -s 8562⤵
- Program crash
PID:1636
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1116 -s 10162⤵
- Program crash
PID:2428
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1116 -s 10722⤵
- Program crash
PID:3216
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1116 -s 17282⤵
- Program crash
PID:5024
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1116 -s 10202⤵
- Program crash
PID:3568
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1116 -ip 11161⤵PID:3840
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1116 -ip 11161⤵PID:4556
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 1116 -ip 11161⤵PID:3972
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 1116 -ip 11161⤵PID:4244
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 1116 -ip 11161⤵PID:652
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 1116 -ip 11161⤵PID:2056
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 1116 -ip 11161⤵PID:1932
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 1116 -ip 11161⤵PID:1460
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 1116 -ip 11161⤵PID:1860