Analysis
-
max time kernel
140s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-12-2024 19:31
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_db153845e52a1f2ed5bde74cdfc0f8e785de696925666dfbaaa6f2732ce3d288.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_db153845e52a1f2ed5bde74cdfc0f8e785de696925666dfbaaa6f2732ce3d288.exe
-
Size
324KB
-
MD5
d6fb857fefec0224cb78881f07cb9add
-
SHA1
7cca7137939e790f68837a53ef743f8da6845956
-
SHA256
db153845e52a1f2ed5bde74cdfc0f8e785de696925666dfbaaa6f2732ce3d288
-
SHA512
b0c42f463dcb8edbd11bf6ef0bdb811f6a4709ada108706bbb3465f28df4eb3b2e988ac969b1f767be465392e699ac4bc541bf6a2ddab2317a2f46a6b71c9882
-
SSDEEP
6144:08joYyr3zVjrmnfhK5bvKHQESIdI6oBiDSSay:08jwr3zJMWKHQUmXyn
Malware Config
Extracted
gcleaner
45.139.105.171
85.31.46.167
107.182.129.235
171.22.30.106
-
url_path
....!..../software.php
....!..../software.php
Signatures
-
Gcleaner family
-
Program crash 9 IoCs
pid pid_target Process procid_target 4312 920 WerFault.exe 82 4160 920 WerFault.exe 82 4716 920 WerFault.exe 82 3616 920 WerFault.exe 82 3656 920 WerFault.exe 82 4504 920 WerFault.exe 82 2268 920 WerFault.exe 82 3240 920 WerFault.exe 82 3448 920 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_db153845e52a1f2ed5bde74cdfc0f8e785de696925666dfbaaa6f2732ce3d288.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 920 JaffaCakes118_db153845e52a1f2ed5bde74cdfc0f8e785de696925666dfbaaa6f2732ce3d288.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_db153845e52a1f2ed5bde74cdfc0f8e785de696925666dfbaaa6f2732ce3d288.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_db153845e52a1f2ed5bde74cdfc0f8e785de696925666dfbaaa6f2732ce3d288.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:920 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 920 -s 4562⤵
- Program crash
PID:4312
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 920 -s 7642⤵
- Program crash
PID:4160
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 920 -s 7722⤵
- Program crash
PID:4716
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 920 -s 7722⤵
- Program crash
PID:3616
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 920 -s 8442⤵
- Program crash
PID:3656
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 920 -s 9282⤵
- Program crash
PID:4504
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 920 -s 10202⤵
- Program crash
PID:2268
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 920 -s 10882⤵
- Program crash
PID:3240
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 920 -s 8082⤵
- Program crash
PID:3448
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 920 -ip 9201⤵PID:1068
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 920 -ip 9201⤵PID:2316
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 920 -ip 9201⤵PID:4652
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 920 -ip 9201⤵PID:8
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 920 -ip 9201⤵PID:4468
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 920 -ip 9201⤵PID:2612
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 920 -ip 9201⤵PID:4568
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 920 -ip 9201⤵PID:2888
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 204 -p 920 -ip 9201⤵PID:372