Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-04-2024 10:14

General

  • Target

    ed2da68e28594d135d1d50f1be586a6c_JaffaCakes118.exe

  • Size

    524KB

  • MD5

    ed2da68e28594d135d1d50f1be586a6c

  • SHA1

    54c4e40e6c25c91d277fc21784f8405aba4e3c56

  • SHA256

    d67f2cfb48f83bb34a78ec2403b1a9de14351511cacaeb69b7539784042fc4f9

  • SHA512

    a9043a70c05977f53abcdcc98fba52ca9912323ab94e235468117a56046507ed3b529438d41b84cecbcb66bda6c73597ce03789bf2ebb2ef34b9269809c5b951

  • SSDEEP

    12288:UkdztRkp33eVbM/XFZk5Cfw2+nJN9mAOHmXnmCP9LCgrV8jkiDEwKzPxzOjm+F4J:8KNnLPVCQVnEH/t

Malware Config

Extracted

Family

cybergate

Version

v1.07.5

Botnet

Cyber

C2

corehacker.no-ip.biz:100

Mutex

10617TU3P1C2EL

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    WinDir

  • install_file

    Svchost.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    123456

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Signatures

  • CyberGate, Rebhip

    CyberGate is a lightweight remote administration tool with a wide array of functionalities.

  • Adds policy Run key to start application 2 TTPs 4 IoCs
  • Modifies Installed Components in the registry 2 TTPs 4 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in System32 directory 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3460
      • C:\Users\Admin\AppData\Local\Temp\ed2da68e28594d135d1d50f1be586a6c_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\ed2da68e28594d135d1d50f1be586a6c_JaffaCakes118.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2952
        • C:\Users\Admin\AppData\Local\Temp\vbc.exe
          C:\Users\Admin\AppData\Local\Temp\vbc.exe
          3⤵
          • Adds policy Run key to start application
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in System32 directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:5092
          • C:\Windows\SysWOW64\explorer.exe
            explorer.exe
            4⤵
            • Modifies Installed Components in the registry
            • Suspicious use of AdjustPrivilegeToken
            PID:4788
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            4⤵
              PID:3656
            • C:\Users\Admin\AppData\Local\Temp\vbc.exe
              "C:\Users\Admin\AppData\Local\Temp\vbc.exe"
              4⤵
              • Checks computer location settings
              • Executes dropped EXE
              • Drops file in System32 directory
              • Modifies registry class
              • Suspicious behavior: GetForegroundWindowSpam
              • Suspicious use of AdjustPrivilegeToken
              PID:3680
              • C:\Windows\SysWOW64\WinDir\Svchost.exe
                "C:\Windows\system32\WinDir\Svchost.exe"
                5⤵
                • Executes dropped EXE
                PID:3220

      Network

      MITRE ATT&CK Matrix ATT&CK v13

      Execution

      Scripting

      1
      T1064

      Persistence

      Boot or Logon Autostart Execution

      3
      T1547

      Registry Run Keys / Startup Folder

      3
      T1547.001

      Privilege Escalation

      Boot or Logon Autostart Execution

      3
      T1547

      Registry Run Keys / Startup Folder

      3
      T1547.001

      Defense Evasion

      Modify Registry

      3
      T1112

      Scripting

      1
      T1064

      Discovery

      Query Registry

      1
      T1012

      System Information Discovery

      2
      T1082

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\Admin2.txt
        Filesize

        224KB

        MD5

        d410baaec6f27f06a7e0aa8ea7478905

        SHA1

        276125317eb9476078f6f8b82b31ac66a55f1be3

        SHA256

        569e5ae5f1cf40713f43262fb7fc20a17a1acdce49b024dd1c0b5545f9bb84a6

        SHA512

        c35394f05c0301ec2769e936a0bb98e49552a07acf9a6e8ea9ba60dccfe4a46ef9d042401599889b4b3bc6a5824ce276ba589bb5454e4dcdab5d9b1e71a51fe9

      • C:\Users\Admin\AppData\Local\Temp\Admin7
        Filesize

        8B

        MD5

        35021ea8131be124a2baa656b3c76fab

        SHA1

        ff6f8bfd9b28dca04c8f7e243ef6617d8ea24764

        SHA256

        3fb3f07e220112bd34a4368f2dd17a0b765044afc52335f10aa86519c3fa7277

        SHA512

        6bfe34577e7d62f03aeae84fed51441d5f13c08a0c5afb35cc299bc3afce3a52fa4dac292e93d8b45e31a92a18f51c0bc184d6d4ebc01af5daeafba511fc0072

      • C:\Users\Admin\AppData\Local\Temp\Admin7
        Filesize

        8B

        MD5

        5d98f39740cf21a8bb0e88dcf01067cc

        SHA1

        b58ff502db99e7bedfeb1e0f904ad532e45688ab

        SHA256

        1b2fbeaef7872bae9d756d21d8a4f0e3cf0909f8a1d078c4b0aee4f3938eed6c

        SHA512

        5d5d54687e6a0069d7a11439907e0e16434699cf26f8930d4b7e957df69820e625949e4791867d806523c69795a034be3a7d79c4e8dca18de0b6e837c3821a59

      • C:\Users\Admin\AppData\Local\Temp\Admin7
        Filesize

        8B

        MD5

        f656709d33c1c183674becaae874caa6

        SHA1

        45056ac3f82e0d73b0e7684cea6bebf24e14c129

        SHA256

        eb12576004e83f86d83332b11e0617e0f976678a778469f613d34d485eaae55a

        SHA512

        3bfd7be02bcd89d1e5a8c47f43d2bd6c6f9623c3579465f7b288ad71b8e9346e852c9faf292640a73058ebf179487974ccab075bbf75a5536e0434c4e04ee269

      • C:\Users\Admin\AppData\Local\Temp\Admin7
        Filesize

        8B

        MD5

        ceaa81dfc994477efe6842b3ce314cbe

        SHA1

        6a2390a6c776563ef7e3bff6b460847c9c2a678b

        SHA256

        f8a79c91c0e62ec9e3e379af71e4694693714f8add99e3d8447c0b76b31bb428

        SHA512

        673d68fd79af5e8a8d3def1c213f282356b929a2e3e11efe30106b15544da22b20de06bb6291ba3e4e2f55e41a26806f9ac5f807f99e92d59e255122c011c2d1

      • C:\Users\Admin\AppData\Local\Temp\Admin7
        Filesize

        8B

        MD5

        14027c6c67d975b5a978fc51781f3647

        SHA1

        bbe95b507073ec271a7c73adb904de71842ff551

        SHA256

        206a1c48d1ee603208d06b9bdad5acfc7a4bec7a4b6bdc6261afe7b00c4e4fa9

        SHA512

        c4423b521a15cb428d0bff813bd4780431761a3da3ede3ee2e061e7b9a391a0aeb70588515aa75863432d891cd2d67b67fcd943f1da8459c10788fc11f906332

      • C:\Users\Admin\AppData\Local\Temp\Admin7
        Filesize

        8B

        MD5

        c25ed528e6e124058c3594dcb145f685

        SHA1

        6dd805e19c99e73ef24b0673b2cd5899b339d307

        SHA256

        3a2046f5c8f240aa68a36a7d07c24ea89aabe263f9bfb11c28825f97228dcb36

        SHA512

        e8233295d66117a48712cc2b355a2f26304e9285624ba66fc13972c4f3675e442e9ff4833b0f781d5d294bdfe7e5fcaa9057e6fdd0c13647631ef3eb7b33faf3

      • C:\Users\Admin\AppData\Local\Temp\Admin7
        Filesize

        8B

        MD5

        4b2ac3ff83fbb92084552d23c9bd2a9e

        SHA1

        07ef00fa9444bab9a0949f48ec0aeea8635b5f8d

        SHA256

        c01a5d1fb15bbd1332a6ac8873122ef3d1fc5c0e85439110ee3b3b54e331f440

        SHA512

        769312a9cfa0f12ef82899b41f8c825e4c4ab07523505136781410099852cf02beacaa0013d96150f241097ab21eeb08f7bbdbf8e71b3ae798680a70e3ed1187

      • C:\Users\Admin\AppData\Local\Temp\Admin7
        Filesize

        8B

        MD5

        74096849c8ed94b2e16973578ab4790f

        SHA1

        7719f8197fed121b7619e23d25094e24cfed337c

        SHA256

        a2ccebfc203e7cab8e45b409e8eaf3d56f4dd51b379d007a147f17aab3f08a70

        SHA512

        0627fbe4afef41cf96f9d64120a2f42c7120607f6f60240d5b33f07beb099a909f79fd53687e56a4b7c6cda662211f642888ff05e937d3e06caef45169101796

      • C:\Users\Admin\AppData\Local\Temp\Admin7
        Filesize

        8B

        MD5

        ab46084335359f7e3c17cb3102daab5a

        SHA1

        b47812a9a08dbc4606acb3ad2c004e8d4449bea9

        SHA256

        103e25025bfc0d509e2622737efeb5bd466c7adbcb2e78987f52cb58224fefa6

        SHA512

        0efc0ebc53614fae50b49661e75d1463fe7a5fad9b6c926839f34c595216f0b9e340df5729de78ffdaed838da04d1e07bb4713c8a1576305eba9f21fb98c49c7

      • C:\Users\Admin\AppData\Local\Temp\Admin7
        Filesize

        8B

        MD5

        f5d6c640e648e809f14dd3fc130e97ec

        SHA1

        fab8384a96d2fdcef7a0c1078546c73b75916a46

        SHA256

        aeb88923c1f4213b0ca5ea7d131ccf566cc88ab3a7ecc530f8685719ac7c92d8

        SHA512

        3ff44bb942afabcf80d1c6611c8ac743c739ab6e81f74921184f25fc51c9c08f0e07655c18f7c3704bb31f4c2a36672073923ee9e4176d04d31ba5a961252135

      • C:\Users\Admin\AppData\Local\Temp\Admin7
        Filesize

        8B

        MD5

        35f198b79152e3d18ac3fb2451a3789e

        SHA1

        6cc43aff1b04269585594b0b0f1b872f82caaa0c

        SHA256

        e73434dd87442a7bf635fdbf47890132efc4125cb76c3f8275019abffbf1fd8b

        SHA512

        8da1c2f89a52ed857c12e342a5df5d4a007bced56f6354a8fc037fe342ddeeb0cfe6ce4db54669f3b77d524443bbb98fbb495afc3baffd29a41a91a964231883

      • C:\Users\Admin\AppData\Local\Temp\Admin7
        Filesize

        8B

        MD5

        7df372b93fa5bf43f6c6f50627127b25

        SHA1

        abe0b726df2943618e739c5a057842b76a335f53

        SHA256

        57991b84c99e80ddc0c02db8d7d5a8d16945d4222dca69f500ccedcfee2fbad5

        SHA512

        96eb9cae10f6d5534681b85f637c3e45648166bc7478fa80ec4d7c477aa840668e3738bf574a647ffb90c5fa5b58cb020389a277a7b3e8625479026fe71fbfa5

      • C:\Users\Admin\AppData\Local\Temp\Admin7
        Filesize

        8B

        MD5

        c1c9d3efa30aa0b9869de19af5aca2f2

        SHA1

        4fadb1a239cafef48ae029ea865a5cd8690e557f

        SHA256

        cd66f78fb17d93f66db1f0064aeda06971e90ec324662c007bffc0d8359590b9

        SHA512

        4704ec45e1be41da6befd99011f52798079a36f3ec47093291f0139d45bbe78edbe00062f4ecfb9315dde59b3c8d0a6cf1fa6d6bb92e4aff49b21794ba3d1ee5

      • C:\Users\Admin\AppData\Local\Temp\Admin7
        Filesize

        8B

        MD5

        cc619e137e994db2389f515af8cefb97

        SHA1

        e5ff3b2fe76a6301a3b5ff73f788becb8047d3f6

        SHA256

        b285e721465f68c62641f91fd316d1b047c571b1b673118a4a6a3eead30f18fd

        SHA512

        aea76b40b1a74a01584ad75bd81231bda9f87093265bf13f957dcd2f4dcff7bb729dbc070ae652e2e16b6124ad09ad8ee43cd7505aa94378d9e9cd87950270dd

      • C:\Users\Admin\AppData\Local\Temp\Admin7
        Filesize

        8B

        MD5

        5d22089236a71e1a1e2a916dae86f06c

        SHA1

        66bd219aabbf7079492af7b806a1adb12d3d1c19

        SHA256

        11357b2f3c1046cb113ca967b51d80363ffb4e5e1270e3670a4f39563860bc61

        SHA512

        b2a8086e1f5b7d937385a1c081b9301eaa1130e9a0d20b2160667a3576224916a3809d07ac7feb0fa74075af7b618e869222d70f3a41db381abd10c6383454c7

      • C:\Users\Admin\AppData\Local\Temp\Admin7
        Filesize

        8B

        MD5

        bd3a8ff09e874b0128e6fabc127349ae

        SHA1

        ee3ee7304026f6301641d50ecf7f385f96a0da4f

        SHA256

        de958eddd91915941d9d6fda914f948b597bae28f1f77840bd94c4a3d6ca1d25

        SHA512

        3ed895fdd201a78ced47898a3096c864321725f155b030556a1857a2a436dfc5a5c63b25d7d188739914c262f6e1f39bbfdc0a4483c1faec61b44c65788f56ef

      • C:\Users\Admin\AppData\Local\Temp\Admin7
        Filesize

        8B

        MD5

        a84c165ce0b250148dad739f7fd0ae46

        SHA1

        d99c9c85d77c369526512591e06788c7fcd20514

        SHA256

        306cf7ebea1eb3457ebad8c6b90e852354abaa98c556508a4c524ba1c155a765

        SHA512

        399d51ff0a453849283fb81400e954cda9e9a169f02978cf89c20e20920d541c33d7eb593e4389db237d4098d14e2d631c1b797768109402ad992e22d279b19a

      • C:\Users\Admin\AppData\Local\Temp\Admin7
        Filesize

        8B

        MD5

        d5349614684e929ec948c8aee969799c

        SHA1

        a54e4ad8e6ec242f0c1d56e38bf8f4bdaaf4c9a4

        SHA256

        be80bce8de7edb553baa24bb0a305ff9693b19b5d7b0e60c37d1822abc20ad50

        SHA512

        54b1bf0482c31c2923773d86c22462e5d44ac8ff5e44ae5aad600b3dbb6821e304bc7cff5782b9301bd8c0f5f8f133a5a85e9f362d1c1ca1442ade09514bbdf0

      • C:\Users\Admin\AppData\Local\Temp\vbc.exe
        Filesize

        1.1MB

        MD5

        d881de17aa8f2e2c08cbb7b265f928f9

        SHA1

        08936aebc87decf0af6e8eada191062b5e65ac2a

        SHA256

        b3a37093609f9a20ad60b85a9fa9de2ba674cba9b5bd687729440c70ba619ca0

        SHA512

        5f23bfb1b8740247b36ed0ab741738c7d4c949736129e767213e321607d1ccd3e3a8428e4ba44bd28a275b5e3f6206285b1a522514b7ef7ea5e698d90a713d34

      • C:\Users\Admin\AppData\Roaming\Adminlog.dat
        Filesize

        15B

        MD5

        bf3dba41023802cf6d3f8c5fd683a0c7

        SHA1

        466530987a347b68ef28faad238d7b50db8656a5

        SHA256

        4a8e75390856bf822f492f7f605ca0c21f1905172f6d3ef610162533c140507d

        SHA512

        fec60f447dcc90753d693014135e24814f6e8294f6c0f436bc59d892b24e91552108dba6cf5a6fa7c0421f6d290d1bafee9f9f2d95ea8c4c05c2ad0f7c1bb314

      • memory/2952-0-0x0000000075260000-0x0000000075811000-memory.dmp
        Filesize

        5.7MB

      • memory/2952-12-0x0000000075260000-0x0000000075811000-memory.dmp
        Filesize

        5.7MB

      • memory/2952-1-0x0000000075260000-0x0000000075811000-memory.dmp
        Filesize

        5.7MB

      • memory/2952-2-0x0000000001950000-0x0000000001960000-memory.dmp
        Filesize

        64KB

      • memory/3680-1443-0x0000000010560000-0x00000000105C5000-memory.dmp
        Filesize

        404KB

      • memory/3680-153-0x0000000010560000-0x00000000105C5000-memory.dmp
        Filesize

        404KB

      • memory/4788-20-0x0000000000D40000-0x0000000000D41000-memory.dmp
        Filesize

        4KB

      • memory/4788-539-0x0000000010480000-0x00000000104E5000-memory.dmp
        Filesize

        404KB

      • memory/4788-21-0x0000000001000000-0x0000000001001000-memory.dmp
        Filesize

        4KB

      • memory/4788-81-0x0000000010480000-0x00000000104E5000-memory.dmp
        Filesize

        404KB

      • memory/5092-11-0x0000000000400000-0x0000000000451000-memory.dmp
        Filesize

        324KB

      • memory/5092-16-0x0000000010410000-0x0000000010475000-memory.dmp
        Filesize

        404KB

      • memory/5092-154-0x0000000000400000-0x0000000000451000-memory.dmp
        Filesize

        324KB

      • memory/5092-5-0x0000000000400000-0x0000000000451000-memory.dmp
        Filesize

        324KB

      • memory/5092-8-0x0000000000400000-0x0000000000451000-memory.dmp
        Filesize

        324KB

      • memory/5092-76-0x0000000010480000-0x00000000104E5000-memory.dmp
        Filesize

        404KB

      • memory/5092-10-0x0000000000400000-0x0000000000451000-memory.dmp
        Filesize

        324KB