Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-12-2024 19:32
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_dd2834b25829a26134eca7d52e85a3b2a755278615e95f171697d38fd7811212.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_dd2834b25829a26134eca7d52e85a3b2a755278615e95f171697d38fd7811212.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_dd2834b25829a26134eca7d52e85a3b2a755278615e95f171697d38fd7811212.exe
-
Size
292KB
-
MD5
24676b75ae396cd2e4126febb9f1fff4
-
SHA1
c744ac9f1d59a25316f5891c898fbc54c02b8947
-
SHA256
dd2834b25829a26134eca7d52e85a3b2a755278615e95f171697d38fd7811212
-
SHA512
9522a4f38ccec7322868f761f8c28ec12332385ac79991080dd9e593f1b3dc7b9c2ee11bbe49dfd189da081325f3911d4b22cd37e313d1de808a7443febb3996
-
SSDEEP
3072:W/r5cRoyOg9E13LUjMR80A/iFFjC/RndHrTAOvX0Pt6wOdCeX09qT1tv7b/hWHAe:WVgy1UjRuFj+dLTAIat6wvl9qr7O
Malware Config
Signatures
-
OnlyLogger
A tiny loader that uses IPLogger to get its payload.
-
Onlylogger family
-
OnlyLogger payload 4 IoCs
resource yara_rule behavioral1/memory/2648-2-0x0000000000400000-0x0000000000418000-memory.dmp family_onlylogger behavioral1/memory/2648-3-0x0000000000400000-0x00000000004CA000-memory.dmp family_onlylogger behavioral1/memory/2648-4-0x0000000000400000-0x00000000004CA000-memory.dmp family_onlylogger behavioral1/memory/2648-5-0x0000000000400000-0x0000000000418000-memory.dmp family_onlylogger -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 2 iplogger.org 4 iplogger.org -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_dd2834b25829a26134eca7d52e85a3b2a755278615e95f171697d38fd7811212.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_dd2834b25829a26134eca7d52e85a3b2a755278615e95f171697d38fd7811212.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_dd2834b25829a26134eca7d52e85a3b2a755278615e95f171697d38fd7811212.exe"1⤵
- System Location Discovery: System Language Discovery
PID:2648