Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    146s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    20/06/2024, 13:17

General

  • Target

    0656636bc8e31de48665ae6ae8598d4a_JaffaCakes118.exe

  • Size

    296KB

  • MD5

    0656636bc8e31de48665ae6ae8598d4a

  • SHA1

    4afcc2c0d94d9d3c3672ee8f53e1feb3df19e2fa

  • SHA256

    56f21c70f75e7123314f3e0a873fab218e9c03c7a09bf905e60fc5e3bf191742

  • SHA512

    7c9971fb8868ea4fe20819289722796132fbe0eb0dd32e7f5343b940ae8f32ceda6a94633fd1ece983da748a60330e50797e4f2777ae878836e36fcad849d747

  • SSDEEP

    6144:POpslFlq9hdBCkWYxuukP1pjSKSNVkq/MVJb6:PwslGTBd47GLRMTb6

Malware Config

Extracted

Family

cybergate

Version

v1.07.5

Botnet

ameen

C2

mameen.no-ip.org:8080

Mutex

44577RJ4FK3748

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    WinDir

  • install_file

    Svchost.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    tagtag

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Signatures

  • CyberGate, Rebhip

    CyberGate is a lightweight remote administration tool with a wide array of functionalities.

  • Adds policy Run key to start application 2 TTPs 4 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in System32 directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1208
      • C:\Users\Admin\AppData\Local\Temp\0656636bc8e31de48665ae6ae8598d4a_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\0656636bc8e31de48665ae6ae8598d4a_JaffaCakes118.exe"
        2⤵
        • Adds policy Run key to start application
        • Boot or Logon Autostart Execution: Active Setup
        • Loads dropped DLL
        • Adds Run key to start application
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:2176
        • C:\Windows\SysWOW64\explorer.exe
          explorer.exe
          3⤵
          • Boot or Logon Autostart Execution: Active Setup
          • Suspicious use of AdjustPrivilegeToken
          PID:2292
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe"
          3⤵
            PID:1920
          • C:\Users\Admin\AppData\Local\Temp\0656636bc8e31de48665ae6ae8598d4a_JaffaCakes118.exe
            "C:\Users\Admin\AppData\Local\Temp\0656636bc8e31de48665ae6ae8598d4a_JaffaCakes118.exe"
            3⤵
            • Loads dropped DLL
            • Drops file in System32 directory
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of AdjustPrivilegeToken
            PID:476
            • C:\Windows\SysWOW64\WinDir\Svchost.exe
              "C:\Windows\system32\WinDir\Svchost.exe"
              4⤵
              • Executes dropped EXE
              PID:2268
          • C:\Windows\SysWOW64\WinDir\Svchost.exe
            "C:\Windows\system32\WinDir\Svchost.exe"
            3⤵
            • Executes dropped EXE
            PID:1620

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\Admin2.txt

        Filesize

        224KB

        MD5

        7a2368042074aaa645a82fb2d8748b9a

        SHA1

        5134ca341d70558b76d88ae5141ef6dea5ad684b

        SHA256

        946365bffd1ca860d9ed9dfaba14bc8956f51050bfaa3c7f910577c3bd086665

        SHA512

        0987e078595f7368b1716fa0cd9beecf7ec0d8f121fefa172cac29c26e3fa8bce5d2ab4ba8291742f1e54ac8e08f88e000881f3e4f255c40314cdcf2071832d4

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        8267f35e9ce5102f93bff3c9e5a1ad76

        SHA1

        87efb63ce4b3762fc7465983cfd7bb2b54dceb2d

        SHA256

        dab2b15bfe95c8361b086ab6c9298147ae5dca3f4b95b05b869bc40788ac7e3e

        SHA512

        dd5e19e2b09074a8e60067cf0230248ef9eae0c6138f6e389baa32254aefcb107491df64262ed2e96e3ce1143677aaee09daa68d7e9ee98e1c2453771999793e

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        1c25990f54a4f6e78b2f4adfc28ce6b2

        SHA1

        1443cef4f28d1a6c8e0d8d3d5f9134b59e0480ae

        SHA256

        23fe10e9ae1c82efb4639c7e28efd4c14e360846a250ddaafb67c0b198f14251

        SHA512

        6dd28d4e2f8529a69b443d73102538e34e2a93e7637aadffbb841af2d65f925092a4ebd0d8f9cdc8ed0677e08fc5d3ca6cb9ddb467a6a06ce2e8c2024faa0ea9

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        de1387a01ba850fa7a5c2e7d28219c90

        SHA1

        bbf23abd600aa259df674fd1f3bcfa3f8209cf91

        SHA256

        988fbee24dffabc4c03bb06805070b565d0a6ed4c54e2ea9903080dc4fcb9c39

        SHA512

        4d3efea6cec23172ca102e76734904b810599220462e8c35a370207bc6a229a25f2ed78623a1299d9c9666b3962574c2580c62bba057f85b2692bbed0233136a

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        bccec7449c2108ce9393ba2bfe851462

        SHA1

        aee0ffb257e09e2674b63c084c2aec8706ca1a4b

        SHA256

        7fd9e518df9b355f1ad6dc9dac0c6716dbe1498883f3e4a50cbf83a9ef2b797b

        SHA512

        042a77c95ffcca674b8fdaf9603bf86fd19b5d8f6b30e5d3ceb8907701d9aaa031cf488b6a57df24ac9378cff7899019d451245619b2dc86bfc5e7a3ba529ed7

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        4131e028586b25992f0ef2da75587004

        SHA1

        8fac4bd01412df7fdc40e4bee7ae609fd67f1ffc

        SHA256

        5b59ecf7837bf404821a9ff890a2a9847e3a79e291c47066fff7d01a0951a981

        SHA512

        8c7bd842ce1d46c70aaf43ff54df9b7f8ba6d1513482b07e599477a56a484a580b76638f0297b3f86d671a298b6173718a2abdd4f641dfc17c6667dcda230d74

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        26e37cf1c9867e631a1866afc32f76d3

        SHA1

        1468eb9571af5bbcc56ba2ac0b9f1d506f571690

        SHA256

        5dffbf32a7dea98d03f558b15e8bbe89b65ae1ba6857ef6a312e582205a9a10e

        SHA512

        fd280178b282d26e9693037370684972bee06cdc8c1950c7324da4df54300b4fabc46631ad824bed69771ccaddc510c777f1fda9c308ce96c5618b039e7615cd

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        2d11469dddc14a07e0fa0ab884e7b176

        SHA1

        a11bc4a1b21a252ed849c39da401debac6e59eba

        SHA256

        307e054a254b8ba5fc106916e9989ca7ac39397825981899b26db1175b550213

        SHA512

        ca6cf720c4092cf29b966730de644a8971a38bef27983ea19961d650bf774e7f8279b5482dec4d65a8ba5e132c147bc3379aa8a37057adea7a9ac8be26f42a6e

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        89a63b0251ec5854cd351c7018e065e9

        SHA1

        f1bd6ea673b6ecbbfc4414c5cabd8f339f0aa967

        SHA256

        273f0fc188827d17f744c00b06a3a220d40289de4629776a5207ec05c9db6c87

        SHA512

        bb793e92cd78da4880a9ae4b88c63fee5e73780e06fd79c89419d627d64ae2a5045394e26614e7e77f74463e9c9c4bc94304936440be42588b365f23c422d1d0

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        ec43d54a2ec9227b47fdfc8ff7a882ff

        SHA1

        19b83de78cd72715bba4e368c329a63f17a1e545

        SHA256

        94677bbbddc234ca2fa5f156c4a826757e7db52610c0f0dbc8d86d0321157036

        SHA512

        5bd88dd7f0dce36ce79e02edb54cd4fc3230f321166c0e72356fb87247023e4ecd140ac4a02dba073724029881ea538b28e2dda5749fe7767d1edda75fc7d4cd

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        c3b63c00ccffadabb969e0c4b06c5a0f

        SHA1

        81d3495c5854bbadd3aba1ce98e6441fffe59ecf

        SHA256

        85a37a9b434699e87369b5d7d265899c53cae1817909e8cc0ad45221aef342d4

        SHA512

        1f73226b28ce4860dbfe148d9e58a0d37c1416575dba6f8dce2f32fffbecdb9894c4829c4f91726f6e37052e58298e0afeff909505c30042b05e1275267f3e61

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        fc7356cd85c864b1b6707e363f781370

        SHA1

        1488ff270fcf0bb2c82f957479d44769a734f29b

        SHA256

        cb3d717a310f9afd8236f6b6c370ff2ad9606d55850f8786817c2571787f16d8

        SHA512

        4b8c35dd03ed2e79bc531d22ee353957dfe0c6064ee0bdaefe12830a15a5c603955232d827dc9f3799adf469c0281f41eb2e8d00d4fb0a903572c55aefb8e09d

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        1fd693aaa559736a7721235e26ccc9e4

        SHA1

        2bd21fc811a4ac27989d8c780d613373716923f0

        SHA256

        8c13526924e1a1e6603c6383f4c1c728622949fc1f4f15c77fe2a41407fb4948

        SHA512

        1c68de2c2ef6079cb889da8c9f11cbcf72205a90727d4f16cf216349509cea13073ce733444a6b21f5fd1d354c5b26997fd804899dd77aa51fb3127d4769bcec

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        61f94e3f4b6579adc774cd300faf4a4d

        SHA1

        bf127a36359336fb19c91f5f3911c1d3b993f329

        SHA256

        37929b177d196ada86426210fff7955ebc5da209adc0e30b7c690b30497775dd

        SHA512

        e603d1aec0c9588d091532f755c363095bb4e0cef89d926244528e3a2ed0c65974654b36f8956f1c5d6cf1bb1685cc89908e277c7167f849e371ab165cc4816e

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        b41a35f8b80b239cac5644637f598a39

        SHA1

        160672fa19b862c2f4a155bf367d394da2625c51

        SHA256

        1131d1f708b0edd6618a8ca953cc110bd2fbe0ffcdbd5d53d978b75b7adb817e

        SHA512

        90812f5e717d13a61e78b5adee3e4bb819d6a68ca3c729c1ec0628a256af7a0667d12dc2721e712cc730a3a6d63cf3f035774fe68fb21a73c204151ef30859db

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        5750d705fe8afa49d917529e96dfd17b

        SHA1

        f383bc4f785146b10bc799adaaa37ff169b85774

        SHA256

        68e6fe8d063dab18f30318666e773312694da0bfa58749a85a53f61e8ff7e84e

        SHA512

        cf9e326d480fb764b7d03c6828f17a4fd7e045b431d430c35e91049cbbf5d7d8a1474c141c99482129953295ba495b4cb988fd408b91ad581de0234b500afc61

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        a5f5847685fbc380717e616ea0c3958c

        SHA1

        5ca89d787a33f253f2992436c2d6f6246d44ae78

        SHA256

        de999597213e1a3946e121eef7d82e21b1a6df725b7f6d6fbb1409e9faf27942

        SHA512

        ca196e9be839323e6d87a61a4cc1f36886782fecfbf76aabfb4fb51d584e8ca9abd0f970112561be81144c6fae602ae8eec0700ee80540d1cf5ba2fc2d71edab

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        476e25be2024951451cb70ecb71f6f6c

        SHA1

        cc12436d654b2485ac229ad2eddb1d16168890fb

        SHA256

        484f5c0a6f327f138466f3e0a1346657eae93e13f0c7d87316d671077647817f

        SHA512

        5d6d2e2fb521c2a6b11fb51a1697b52bfe51d305d0b83c887580331fc3ce37582ba89d63142dfe5b26b6f7d38512119e7a4f6358fa9a71667d3a5563345f4675

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        50491734d48a5c3179c1e9415308c15b

        SHA1

        299fdf177940ab48003715a386ba191c1ed2c74d

        SHA256

        8e1187c5ca7bb1495d4d3e211d6cfa6225adbfb6ce5aad13ef0d03d83dec9cb3

        SHA512

        ae87c7888a241b3113bb3e2ff7c9901c5665f98adf657b16a468348ef0672c8aab889fea04d55582b7be974f2883058cf86e479b551f94f9e4e9051d56db49f2

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        3830e1cf4d89be01420f274d485c5de8

        SHA1

        d224112522be7ac8deb71eff14e5d7e7a6f9a05e

        SHA256

        6a3a606c5c1c5add6a3b83ddc5b71c8a50676b9fad1860b413838d7154cffeed

        SHA512

        e2e5f904b9d47d256a6849619fe60908dfbb86e5623cd23efcbff3fdafb3d176c87d236eb90eef167c67cba4aa473ab659757ffb9f63bdfd4009cab6160a0a51

      • C:\Users\Admin\AppData\Roaming\Adminlog.dat

        Filesize

        15B

        MD5

        bf3dba41023802cf6d3f8c5fd683a0c7

        SHA1

        466530987a347b68ef28faad238d7b50db8656a5

        SHA256

        4a8e75390856bf822f492f7f605ca0c21f1905172f6d3ef610162533c140507d

        SHA512

        fec60f447dcc90753d693014135e24814f6e8294f6c0f436bc59d892b24e91552108dba6cf5a6fa7c0421f6d290d1bafee9f9f2d95ea8c4c05c2ad0f7c1bb314

      • C:\Windows\SysWOW64\WinDir\Svchost.exe

        Filesize

        296KB

        MD5

        0656636bc8e31de48665ae6ae8598d4a

        SHA1

        4afcc2c0d94d9d3c3672ee8f53e1feb3df19e2fa

        SHA256

        56f21c70f75e7123314f3e0a873fab218e9c03c7a09bf905e60fc5e3bf191742

        SHA512

        7c9971fb8868ea4fe20819289722796132fbe0eb0dd32e7f5343b940ae8f32ceda6a94633fd1ece983da748a60330e50797e4f2777ae878836e36fcad849d747

      • memory/476-860-0x0000000010560000-0x00000000105C5000-memory.dmp

        Filesize

        404KB

      • memory/476-1728-0x0000000010560000-0x00000000105C5000-memory.dmp

        Filesize

        404KB

      • memory/1208-3-0x0000000002570000-0x0000000002571000-memory.dmp

        Filesize

        4KB

      • memory/2176-2-0x0000000010410000-0x0000000010475000-memory.dmp

        Filesize

        404KB

      • memory/2292-1570-0x0000000010480000-0x00000000104E5000-memory.dmp

        Filesize

        404KB

      • memory/2292-530-0x0000000010480000-0x00000000104E5000-memory.dmp

        Filesize

        404KB

      • memory/2292-297-0x00000000000E0000-0x00000000000E1000-memory.dmp

        Filesize

        4KB

      • memory/2292-246-0x00000000000A0000-0x00000000000A1000-memory.dmp

        Filesize

        4KB