Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-01-2025 02:11
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_84cb0a7a8906d09895f74d59950cf353.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
JaffaCakes118_84cb0a7a8906d09895f74d59950cf353.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_84cb0a7a8906d09895f74d59950cf353.exe
-
Size
287KB
-
MD5
84cb0a7a8906d09895f74d59950cf353
-
SHA1
8007fe05481049da7c8d1174c4c6896ea03c9c28
-
SHA256
8a4d537fe2f4024f45528827497f246b85a568ee6c5b3799736dc4b1d754c87b
-
SHA512
643fe18d51278b9dae1ffbb4d6e93b0078c0c787aac1ff9994f2eb9f465e5c4a1047863dc79eff1879e544ec1232a79802a4eb05890b8ef019743c648b5f9e22
-
SSDEEP
6144:X74paROBGiovQXL2X2rYIlMNjgVx98aC3QD:r8akX5bbH8n
Malware Config
Extracted
gcleaner
ppp-gl.biz
45.9.20.13
Signatures
-
Gcleaner family
-
OnlyLogger
A tiny loader that uses IPLogger to get its payload.
-
Onlylogger family
-
OnlyLogger payload 5 IoCs
resource yara_rule behavioral2/memory/2348-2-0x00000000001C0000-0x00000000001EF000-memory.dmp family_onlylogger behavioral2/memory/2348-3-0x0000000000400000-0x0000000000432000-memory.dmp family_onlylogger behavioral2/memory/2348-5-0x0000000000400000-0x00000000004BA000-memory.dmp family_onlylogger behavioral2/memory/2348-6-0x00000000001C0000-0x00000000001EF000-memory.dmp family_onlylogger behavioral2/memory/2348-7-0x0000000000400000-0x0000000000432000-memory.dmp family_onlylogger -
Program crash 8 IoCs
pid pid_target Process procid_target 2424 2348 WerFault.exe 82 4584 2348 WerFault.exe 82 4224 2348 WerFault.exe 82 2160 2348 WerFault.exe 82 2608 2348 WerFault.exe 82 4784 2348 WerFault.exe 82 432 2348 WerFault.exe 82 2648 2348 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_84cb0a7a8906d09895f74d59950cf353.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_84cb0a7a8906d09895f74d59950cf353.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_84cb0a7a8906d09895f74d59950cf353.exe"1⤵
- System Location Discovery: System Language Discovery
PID:2348 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2348 -s 6202⤵
- Program crash
PID:2424
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2348 -s 6402⤵
- Program crash
PID:4584
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2348 -s 7442⤵
- Program crash
PID:4224
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2348 -s 7842⤵
- Program crash
PID:2160
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2348 -s 10602⤵
- Program crash
PID:2608
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2348 -s 10682⤵
- Program crash
PID:4784
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2348 -s 13442⤵
- Program crash
PID:432
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2348 -s 11162⤵
- Program crash
PID:2648
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 2348 -ip 23481⤵PID:2964
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 2348 -ip 23481⤵PID:1808
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2348 -ip 23481⤵PID:4656
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 2348 -ip 23481⤵PID:3164
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 2348 -ip 23481⤵PID:2564
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 2348 -ip 23481⤵PID:5076
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 2348 -ip 23481⤵PID:2448
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 2348 -ip 23481⤵PID:3076