Analysis

  • max time kernel
    121s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    21-04-2024 02:15

General

  • Target

    fe322d3f592d0d527909c78b19c9723c_JaffaCakes118.exe

  • Size

    391KB

  • MD5

    fe322d3f592d0d527909c78b19c9723c

  • SHA1

    2fae891f918e284aecdd819200eb3c1feeb1cd93

  • SHA256

    e7c017101889f4560a4762d9d8ec6d52df0fd547cc304789c8ecdfb585a52fac

  • SHA512

    f59fec44cbc1f24176688cfd502e72252309f71b762e57ab832e0aed43adfc54e3524363fa65c586c845d985192e7c46e4371890639373b7e05ef2aa86e3b9a0

  • SSDEEP

    6144:Gq/xcx8J5uybal9C1cgeKtXvVBuUBOML+NgHUP4OWQj69Me/U8Nn:lqxKMybQgvtXvVB7OHgHEwQjyp/U8Nn

Malware Config

Extracted

Family

cybergate

Version

2.6

Botnet

Chrome

C2

kamikazgang.zapto.org:83

Mutex

***Chrome***

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_file

    Chrome.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    texto da mensagem

  • message_box_title

    título da mensagem

  • password

    reckless321

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Signatures

  • CyberGate, Rebhip

    CyberGate is a lightweight remote administration tool with a wide array of functionalities.

  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Modifies Installed Components in the registry 2 TTPs 2 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fe322d3f592d0d527909c78b19c9723c_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\fe322d3f592d0d527909c78b19c9723c_JaffaCakes118.exe"
    1⤵
    • Adds policy Run key to start application
    • Modifies Installed Components in the registry
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    PID:2756

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

3
T1547

Registry Run Keys / Startup Folder

3
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

3
T1547

Registry Run Keys / Startup Folder

3
T1547.001

Defense Evasion

Modify Registry

3
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2756-0-0x0000000000400000-0x0000000000459000-memory.dmp
    Filesize

    356KB

  • memory/2756-1-0x00000000003B0000-0x00000000003B4000-memory.dmp
    Filesize

    16KB

  • memory/2756-3-0x0000000001F60000-0x0000000001F70000-memory.dmp
    Filesize

    64KB

  • memory/2756-4-0x00000000775B0000-0x00000000775B1000-memory.dmp
    Filesize

    4KB

  • memory/2756-2-0x00000000005F0000-0x0000000000615000-memory.dmp
    Filesize

    148KB

  • memory/2756-5-0x00000000775AF000-0x00000000775B0000-memory.dmp
    Filesize

    4KB

  • memory/2756-7-0x00000000775B1000-0x00000000775B2000-memory.dmp
    Filesize

    4KB

  • memory/2756-8-0x0000000001F10000-0x0000000001F20000-memory.dmp
    Filesize

    64KB

  • memory/2756-6-0x0000000000800000-0x0000000000810000-memory.dmp
    Filesize

    64KB

  • memory/2756-9-0x0000000000400000-0x0000000000459000-memory.dmp
    Filesize

    356KB

  • memory/2756-12-0x00000000005F0000-0x0000000000615000-memory.dmp
    Filesize

    148KB

  • memory/2756-11-0x0000000000400000-0x0000000000459000-memory.dmp
    Filesize

    356KB