Analysis
-
max time kernel
93s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-01-2025 10:53
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_1f6f848957120d740d39b860f479e8b9.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_1f6f848957120d740d39b860f479e8b9.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_1f6f848957120d740d39b860f479e8b9.exe
-
Size
439KB
-
MD5
1f6f848957120d740d39b860f479e8b9
-
SHA1
8dbccfed0281d7fbb896b48cbc8ee739612bfab7
-
SHA256
946bb6d961cc5cdd58e3772c695fcaf967a68fd83ed8b6bd43029f3fb90c69a0
-
SHA512
23920af4b22bb89fc2265063fdd5d097be26fc28b78baac199d0b91424d58a7be3fc358518b0ba8ed871cc07bcb6034bec8e26716602ffb7bdbadcdafc127d8f
-
SSDEEP
6144:oYO/gkYrO+hEaDW9FU6oHZxfQ9+GX/QIQq0qop+Lv7sBuzJWQs0d7:HDkYr9GOo8ZmoU/QIKqo+L8uzJP9d
Malware Config
Extracted
gcleaner
ggg-cl.biz
45.9.20.13
Signatures
-
Gcleaner family
-
OnlyLogger
A tiny loader that uses IPLogger to get its payload.
-
Onlylogger family
-
OnlyLogger payload 5 IoCs
resource yara_rule behavioral2/memory/1116-2-0x0000000003430000-0x0000000003478000-memory.dmp family_onlylogger behavioral2/memory/1116-3-0x0000000000400000-0x000000000044C000-memory.dmp family_onlylogger behavioral2/memory/1116-6-0x0000000000400000-0x000000000044C000-memory.dmp family_onlylogger behavioral2/memory/1116-5-0x0000000003430000-0x0000000003478000-memory.dmp family_onlylogger behavioral2/memory/1116-4-0x0000000000400000-0x00000000016E1000-memory.dmp family_onlylogger -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation JaffaCakes118_1f6f848957120d740d39b860f479e8b9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 7 IoCs
pid pid_target Process procid_target 3956 1116 WerFault.exe 83 4384 1116 WerFault.exe 83 3164 1116 WerFault.exe 83 4416 1116 WerFault.exe 83 5012 1116 WerFault.exe 83 2436 1116 WerFault.exe 83 4992 1116 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_1f6f848957120d740d39b860f479e8b9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Kills process with taskkill 1 IoCs
pid Process 1320 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1320 taskkill.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1116 wrote to memory of 4000 1116 JaffaCakes118_1f6f848957120d740d39b860f479e8b9.exe 97 PID 1116 wrote to memory of 4000 1116 JaffaCakes118_1f6f848957120d740d39b860f479e8b9.exe 97 PID 1116 wrote to memory of 4000 1116 JaffaCakes118_1f6f848957120d740d39b860f479e8b9.exe 97 PID 4000 wrote to memory of 1320 4000 cmd.exe 101 PID 4000 wrote to memory of 1320 4000 cmd.exe 101 PID 4000 wrote to memory of 1320 4000 cmd.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1f6f848957120d740d39b860f479e8b9.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1f6f848957120d740d39b860f479e8b9.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1116 -s 7202⤵
- Program crash
PID:3956
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1116 -s 7842⤵
- Program crash
PID:4384
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1116 -s 9202⤵
- Program crash
PID:3164
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1116 -s 7922⤵
- Program crash
PID:4416
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1116 -s 9242⤵
- Program crash
PID:5012
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1116 -s 9482⤵
- Program crash
PID:2436
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "JaffaCakes118_1f6f848957120d740d39b860f479e8b9.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1f6f848957120d740d39b860f479e8b9.exe" & exit2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im "JaffaCakes118_1f6f848957120d740d39b860f479e8b9.exe" /f3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1320
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1116 -s 10722⤵
- Program crash
PID:4992
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 1116 -ip 11161⤵PID:4952
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 1116 -ip 11161⤵PID:3996
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1116 -ip 11161⤵PID:3240
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 1116 -ip 11161⤵PID:3584
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 1116 -ip 11161⤵PID:1076
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 1116 -ip 11161⤵PID:4976
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 1116 -ip 11161⤵PID:2152