Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-12-2024 15:04
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_169d86c395ce48edc63e30c4dfeb29163be409f0930e864064e8ae0136d85d3c.exe
Resource
win7-20241023-en
General
-
Target
JaffaCakes118_169d86c395ce48edc63e30c4dfeb29163be409f0930e864064e8ae0136d85d3c.exe
-
Size
329KB
-
MD5
7aad48f2bac376c5f34c024fec4ae2f1
-
SHA1
b02b3579b96086291471c639b0fe038ca3037ee8
-
SHA256
169d86c395ce48edc63e30c4dfeb29163be409f0930e864064e8ae0136d85d3c
-
SHA512
220b4241f7551e601274bb48fd7242dc8bb9b542bf31a4e4272a85d1b9269c34eaead136b5793cb4aab30e1623f3e69ebea187cdfdcc49b48e2cfe5d406b6ce3
-
SSDEEP
6144:F+3xT6k6zkQczNNFCpRJVjXWSJIvwLk0:FMxT6k6z3czNNgbPj31
Malware Config
Extracted
gcleaner
45.139.105.171
85.31.46.167
107.182.129.235
171.22.30.106
-
url_path
....!..../software.php
....!..../software.php
Signatures
-
Gcleaner family
-
Program crash 8 IoCs
pid pid_target Process procid_target 4688 4912 WerFault.exe 81 4052 4912 WerFault.exe 81 4124 4912 WerFault.exe 81 3880 4912 WerFault.exe 81 3784 4912 WerFault.exe 81 5020 4912 WerFault.exe 81 2940 4912 WerFault.exe 81 2388 4912 WerFault.exe 81 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_169d86c395ce48edc63e30c4dfeb29163be409f0930e864064e8ae0136d85d3c.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4912 JaffaCakes118_169d86c395ce48edc63e30c4dfeb29163be409f0930e864064e8ae0136d85d3c.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_169d86c395ce48edc63e30c4dfeb29163be409f0930e864064e8ae0136d85d3c.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_169d86c395ce48edc63e30c4dfeb29163be409f0930e864064e8ae0136d85d3c.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:4912 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4912 -s 4402⤵
- Program crash
PID:4688
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4912 -s 7642⤵
- Program crash
PID:4052
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4912 -s 8042⤵
- Program crash
PID:4124
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4912 -s 8442⤵
- Program crash
PID:3880
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4912 -s 8802⤵
- Program crash
PID:3784
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4912 -s 9282⤵
- Program crash
PID:5020
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4912 -s 10202⤵
- Program crash
PID:2940
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4912 -s 7682⤵
- Program crash
PID:2388
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4912 -ip 49121⤵PID:3988
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 204 -p 4912 -ip 49121⤵PID:3416
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4912 -ip 49121⤵PID:4808
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4912 -ip 49121⤵PID:3620
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4912 -ip 49121⤵PID:3656
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4912 -ip 49121⤵PID:4280
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4912 -ip 49121⤵PID:1056
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 4912 -ip 49121⤵PID:652