Analysis
-
max time kernel
140s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-01-2025 08:32
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_97d32591342b217475d97f573fce9b4c.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_97d32591342b217475d97f573fce9b4c.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_97d32591342b217475d97f573fce9b4c.exe
-
Size
382KB
-
MD5
97d32591342b217475d97f573fce9b4c
-
SHA1
eae87d5a63f830f4418ab18df3d77ac76ea77583
-
SHA256
22ce5c4c7ac68256b9aa6805a89c2e8a91124929183e8428cd87d8faa6cef1cd
-
SHA512
0dc436b7e6fda187f65b4cbbdb5f93842a2b54d72fa7eaf3e484e58d01818221a5df009721a679a1af0b305cce2d371c9a977d15d63f328c8ad0dc1574bc0b4d
-
SSDEEP
6144:oZxtEtOv2Lk4dWzch7Q5GdATqyOFG/d5KnRn0XcBLj+/d6:Cv2Lk4dWzk7QU2TqyOodIRn0Xmn46
Malware Config
Extracted
gcleaner
ggg-cl.biz
45.9.20.13
Signatures
-
Gcleaner family
-
OnlyLogger
A tiny loader that uses IPLogger to get its payload.
-
Onlylogger family
-
OnlyLogger payload 5 IoCs
resource yara_rule behavioral2/memory/2040-2-0x0000000001880000-0x00000000018AF000-memory.dmp family_onlylogger behavioral2/memory/2040-3-0x0000000000400000-0x0000000000431000-memory.dmp family_onlylogger behavioral2/memory/2040-6-0x0000000001880000-0x00000000018AF000-memory.dmp family_onlylogger behavioral2/memory/2040-5-0x0000000000400000-0x00000000016D3000-memory.dmp family_onlylogger behavioral2/memory/2040-7-0x0000000000400000-0x0000000000431000-memory.dmp family_onlylogger -
Program crash 8 IoCs
pid pid_target Process procid_target 4324 2040 WerFault.exe 81 1072 2040 WerFault.exe 81 2676 2040 WerFault.exe 81 4792 2040 WerFault.exe 81 848 2040 WerFault.exe 81 1000 2040 WerFault.exe 81 2028 2040 WerFault.exe 81 3700 2040 WerFault.exe 81 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_97d32591342b217475d97f573fce9b4c.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_97d32591342b217475d97f573fce9b4c.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_97d32591342b217475d97f573fce9b4c.exe"1⤵
- System Location Discovery: System Language Discovery
PID:2040 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2040 -s 6202⤵
- Program crash
PID:4324
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2040 -s 6402⤵
- Program crash
PID:1072
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2040 -s 7442⤵
- Program crash
PID:2676
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2040 -s 7642⤵
- Program crash
PID:4792
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2040 -s 8562⤵
- Program crash
PID:848
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2040 -s 10162⤵
- Program crash
PID:1000
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2040 -s 10442⤵
- Program crash
PID:2028
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2040 -s 10202⤵
- Program crash
PID:3700
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2040 -ip 20401⤵PID:4148
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2040 -ip 20401⤵PID:3232
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 372 -p 2040 -ip 20401⤵PID:2756
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 2040 -ip 20401⤵PID:4956
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 2040 -ip 20401⤵PID:3700
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 208 -p 2040 -ip 20401⤵PID:460
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 2040 -ip 20401⤵PID:1744
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2040 -ip 20401⤵PID:4796