Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-01-2025 17:19
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_304a8ac0b594f92c321faf971a86673a.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_304a8ac0b594f92c321faf971a86673a.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_304a8ac0b594f92c321faf971a86673a.exe
-
Size
389KB
-
MD5
304a8ac0b594f92c321faf971a86673a
-
SHA1
ab8e54e84d6a34138f30aa8cf0b3f3706da52c7b
-
SHA256
4451f8b77053fc5a95e678582a2711b13e82be6d3132c858f36db5e0d016f251
-
SHA512
f674a3deac2fac5a507a3c4ee956bf1379854a6baf0beda604f39254a931cc09b15993df0761deb2ccf3550a03b53e4db8ab261456c6ec44da19a7e526e89a64
-
SSDEEP
12288:qEdSgZ7OTgrxuwUkpH6HmCagSdgC9eWD9RqXn:qgFjRUHHagC9PD
Malware Config
Extracted
gcleaner
gcl-gb.biz
45.9.20.13
Signatures
-
Gcleaner family
-
OnlyLogger
A tiny loader that uses IPLogger to get its payload.
-
Onlylogger family
-
OnlyLogger payload 5 IoCs
resource yara_rule behavioral2/memory/1396-2-0x00000000008C0000-0x00000000008EF000-memory.dmp family_onlylogger behavioral2/memory/1396-3-0x0000000000400000-0x0000000000431000-memory.dmp family_onlylogger behavioral2/memory/1396-5-0x00000000008C0000-0x00000000008EF000-memory.dmp family_onlylogger behavioral2/memory/1396-7-0x0000000000400000-0x0000000000431000-memory.dmp family_onlylogger behavioral2/memory/1396-6-0x0000000000400000-0x0000000000890000-memory.dmp family_onlylogger -
Program crash 8 IoCs
pid pid_target Process procid_target 2064 1396 WerFault.exe 81 4328 1396 WerFault.exe 81 1788 1396 WerFault.exe 81 4048 1396 WerFault.exe 81 1160 1396 WerFault.exe 81 3616 1396 WerFault.exe 81 5040 1396 WerFault.exe 81 1440 1396 WerFault.exe 81 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_304a8ac0b594f92c321faf971a86673a.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_304a8ac0b594f92c321faf971a86673a.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_304a8ac0b594f92c321faf971a86673a.exe"1⤵
- System Location Discovery: System Language Discovery
PID:1396 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1396 -s 6202⤵
- Program crash
PID:2064
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1396 -s 6402⤵
- Program crash
PID:4328
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1396 -s 7642⤵
- Program crash
PID:1788
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1396 -s 8122⤵
- Program crash
PID:4048
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1396 -s 8922⤵
- Program crash
PID:1160
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1396 -s 10202⤵
- Program crash
PID:3616
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1396 -s 10842⤵
- Program crash
PID:5040
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1396 -s 10282⤵
- Program crash
PID:1440
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 1396 -ip 13961⤵PID:3940
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1396 -ip 13961⤵PID:4436
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 1396 -ip 13961⤵PID:3500
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 1396 -ip 13961⤵PID:4944
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 1396 -ip 13961⤵PID:2868
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 1396 -ip 13961⤵PID:2140
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 1396 -ip 13961⤵PID:1764
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1396 -ip 13961⤵PID:440