Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-01-2025 22:11
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_3d551eb09d98f9ece23e7c04db325e97.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
JaffaCakes118_3d551eb09d98f9ece23e7c04db325e97.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_3d551eb09d98f9ece23e7c04db325e97.exe
-
Size
388KB
-
MD5
3d551eb09d98f9ece23e7c04db325e97
-
SHA1
c0221f283d861e1441d5ddc6a1ea5eb1964a674f
-
SHA256
0ed5ea819c1689aaf3017800c99b59c8b10e66cc49ada9b428676348a5c18b18
-
SHA512
a43c7985ffb604fb74674018ede02d74cf0b8620dba63d94a7f85c8eab075d7a4d3ff2bd4324bb2da5fc3651ff5e582fa4bf99263a99c821d66b75cd8f6f3ba2
-
SSDEEP
6144:2dTfwYDTggRO4bLVyEOkW6igrunVW9mcvPD93S3yxAv77ykGRDDFa:275LVyEG6i5nVW9D3D93S3yxu75GRd
Malware Config
Extracted
gcleaner
ppp-gl.biz
45.9.20.13
Signatures
-
Gcleaner family
-
OnlyLogger
A tiny loader that uses IPLogger to get its payload.
-
Onlylogger family
-
OnlyLogger payload 5 IoCs
resource yara_rule behavioral2/memory/3780-2-0x0000000002500000-0x000000000252F000-memory.dmp family_onlylogger behavioral2/memory/3780-3-0x0000000000400000-0x0000000000431000-memory.dmp family_onlylogger behavioral2/memory/3780-6-0x0000000002500000-0x000000000252F000-memory.dmp family_onlylogger behavioral2/memory/3780-5-0x0000000000400000-0x0000000000793000-memory.dmp family_onlylogger behavioral2/memory/3780-7-0x0000000000400000-0x0000000000431000-memory.dmp family_onlylogger -
Program crash 10 IoCs
pid pid_target Process procid_target 1736 3780 WerFault.exe 81 2544 3780 WerFault.exe 81 2452 3780 WerFault.exe 81 936 3780 WerFault.exe 81 1776 3780 WerFault.exe 81 3036 3780 WerFault.exe 81 3132 3780 WerFault.exe 81 2388 3780 WerFault.exe 81 520 3780 WerFault.exe 81 556 3780 WerFault.exe 81 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_3d551eb09d98f9ece23e7c04db325e97.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3d551eb09d98f9ece23e7c04db325e97.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3d551eb09d98f9ece23e7c04db325e97.exe"1⤵
- System Location Discovery: System Language Discovery
PID:3780 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3780 -s 4562⤵
- Program crash
PID:1736
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3780 -s 6402⤵
- Program crash
PID:2544
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3780 -s 6682⤵
- Program crash
PID:2452
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3780 -s 7842⤵
- Program crash
PID:936
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3780 -s 8602⤵
- Program crash
PID:1776
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3780 -s 10562⤵
- Program crash
PID:3036
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3780 -s 12162⤵
- Program crash
PID:3132
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3780 -s 12882⤵
- Program crash
PID:2388
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3780 -s 8442⤵
- Program crash
PID:520
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3780 -s 12122⤵
- Program crash
PID:556
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3780 -ip 37801⤵PID:1512
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3780 -ip 37801⤵PID:2224
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 3780 -ip 37801⤵PID:3464
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 3780 -ip 37801⤵PID:1060
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 3780 -ip 37801⤵PID:1388
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 3780 -ip 37801⤵PID:4944
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 3780 -ip 37801⤵PID:1572
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 3780 -ip 37801⤵PID:1772
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 3780 -ip 37801⤵PID:956
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 3780 -ip 37801⤵PID:444