Analysis
-
max time kernel
93s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-01-2025 13:38
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_660f957f13470d2f9c34713c192920b2.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_660f957f13470d2f9c34713c192920b2.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_660f957f13470d2f9c34713c192920b2.exe
-
Size
434KB
-
MD5
660f957f13470d2f9c34713c192920b2
-
SHA1
07998033267d6a0c8cc6a562c78d9caadaafa918
-
SHA256
3d3747aa4e6eb4782c1ae5bcb22b736cce54a41a810cd571f9b7eaa34896e9dd
-
SHA512
7c09911d02ad0d8e05615b80cf228c186b319177beea26e899d5e054f2f35c42187f37b7a5a3d567e3663505aae39f1de274b3be86b1ccf22df2df168ac162cd
-
SSDEEP
12288:sAo36NmWywy2hqZkuR2eNNhcXwxI7kYEKJFw:sDimTZHcwe7kDqFw
Malware Config
Extracted
gcleaner
gcl-gb.biz
45.9.20.13
Signatures
-
Gcleaner family
-
OnlyLogger
A tiny loader that uses IPLogger to get its payload.
-
Onlylogger family
-
OnlyLogger payload 5 IoCs
resource yara_rule behavioral2/memory/628-2-0x0000000000A90000-0x0000000000AD9000-memory.dmp family_onlylogger behavioral2/memory/628-3-0x0000000000400000-0x000000000044C000-memory.dmp family_onlylogger behavioral2/memory/628-6-0x0000000000400000-0x000000000044C000-memory.dmp family_onlylogger behavioral2/memory/628-5-0x0000000000A90000-0x0000000000AD9000-memory.dmp family_onlylogger behavioral2/memory/628-4-0x0000000000400000-0x000000000089C000-memory.dmp family_onlylogger -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation JaffaCakes118_660f957f13470d2f9c34713c192920b2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 7 IoCs
pid pid_target Process procid_target 1260 628 WerFault.exe 83 2384 628 WerFault.exe 83 3260 628 WerFault.exe 83 3388 628 WerFault.exe 83 4320 628 WerFault.exe 83 5084 628 WerFault.exe 83 3060 628 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_660f957f13470d2f9c34713c192920b2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Kills process with taskkill 1 IoCs
pid Process 1932 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1932 taskkill.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 628 wrote to memory of 1960 628 JaffaCakes118_660f957f13470d2f9c34713c192920b2.exe 97 PID 628 wrote to memory of 1960 628 JaffaCakes118_660f957f13470d2f9c34713c192920b2.exe 97 PID 628 wrote to memory of 1960 628 JaffaCakes118_660f957f13470d2f9c34713c192920b2.exe 97 PID 1960 wrote to memory of 1932 1960 cmd.exe 101 PID 1960 wrote to memory of 1932 1960 cmd.exe 101 PID 1960 wrote to memory of 1932 1960 cmd.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_660f957f13470d2f9c34713c192920b2.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_660f957f13470d2f9c34713c192920b2.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 628 -s 7122⤵
- Program crash
PID:1260
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 628 -s 7842⤵
- Program crash
PID:2384
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 628 -s 7922⤵
- Program crash
PID:3260
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 628 -s 9362⤵
- Program crash
PID:3388
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 628 -s 9402⤵
- Program crash
PID:4320
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 628 -s 9482⤵
- Program crash
PID:5084
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "JaffaCakes118_660f957f13470d2f9c34713c192920b2.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_660f957f13470d2f9c34713c192920b2.exe" & exit2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im "JaffaCakes118_660f957f13470d2f9c34713c192920b2.exe" /f3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1932
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 628 -s 9802⤵
- Program crash
PID:3060
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 628 -ip 6281⤵PID:4588
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 628 -ip 6281⤵PID:1828
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 628 -ip 6281⤵PID:2868
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 628 -ip 6281⤵PID:4348
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 628 -ip 6281⤵PID:4064
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 628 -ip 6281⤵PID:4584
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 628 -ip 6281⤵PID:2032