Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-01-2025 10:53
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_1f6f848957120d740d39b860f479e8b9.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_1f6f848957120d740d39b860f479e8b9.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_1f6f848957120d740d39b860f479e8b9.exe
-
Size
439KB
-
MD5
1f6f848957120d740d39b860f479e8b9
-
SHA1
8dbccfed0281d7fbb896b48cbc8ee739612bfab7
-
SHA256
946bb6d961cc5cdd58e3772c695fcaf967a68fd83ed8b6bd43029f3fb90c69a0
-
SHA512
23920af4b22bb89fc2265063fdd5d097be26fc28b78baac199d0b91424d58a7be3fc358518b0ba8ed871cc07bcb6034bec8e26716602ffb7bdbadcdafc127d8f
-
SSDEEP
6144:oYO/gkYrO+hEaDW9FU6oHZxfQ9+GX/QIQq0qop+Lv7sBuzJWQs0d7:HDkYr9GOo8ZmoU/QIKqo+L8uzJP9d
Malware Config
Extracted
gcleaner
ggg-cl.biz
45.9.20.13
Signatures
-
Gcleaner family
-
OnlyLogger
A tiny loader that uses IPLogger to get its payload.
-
Onlylogger family
-
OnlyLogger payload 5 IoCs
resource yara_rule behavioral1/memory/1704-2-0x00000000002A0000-0x00000000002E8000-memory.dmp family_onlylogger behavioral1/memory/1704-3-0x0000000000400000-0x000000000044C000-memory.dmp family_onlylogger behavioral1/memory/1704-4-0x0000000000400000-0x00000000016E1000-memory.dmp family_onlylogger behavioral1/memory/1704-6-0x0000000000400000-0x000000000044C000-memory.dmp family_onlylogger behavioral1/memory/1704-5-0x00000000002A0000-0x00000000002E8000-memory.dmp family_onlylogger -
Deletes itself 1 IoCs
pid Process 1696 cmd.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_1f6f848957120d740d39b860f479e8b9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Kills process with taskkill 1 IoCs
pid Process 1712 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1712 taskkill.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1704 wrote to memory of 1696 1704 JaffaCakes118_1f6f848957120d740d39b860f479e8b9.exe 31 PID 1704 wrote to memory of 1696 1704 JaffaCakes118_1f6f848957120d740d39b860f479e8b9.exe 31 PID 1704 wrote to memory of 1696 1704 JaffaCakes118_1f6f848957120d740d39b860f479e8b9.exe 31 PID 1704 wrote to memory of 1696 1704 JaffaCakes118_1f6f848957120d740d39b860f479e8b9.exe 31 PID 1696 wrote to memory of 1712 1696 cmd.exe 33 PID 1696 wrote to memory of 1712 1696 cmd.exe 33 PID 1696 wrote to memory of 1712 1696 cmd.exe 33 PID 1696 wrote to memory of 1712 1696 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1f6f848957120d740d39b860f479e8b9.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1f6f848957120d740d39b860f479e8b9.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "JaffaCakes118_1f6f848957120d740d39b860f479e8b9.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1f6f848957120d740d39b860f479e8b9.exe" & exit2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im "JaffaCakes118_1f6f848957120d740d39b860f479e8b9.exe" /f3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1712
-
-