Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    04/07/2024, 07:38

General

  • Target

    25238a8577ad44e90326bde38973a3f7_JaffaCakes118.exe

  • Size

    712KB

  • MD5

    25238a8577ad44e90326bde38973a3f7

  • SHA1

    fb420a3aee3694ed2e4ecd2d17f6677d542e58d1

  • SHA256

    8576ebf013306fd6a915242854898262031ec36ee0704ab7054decfdd2fada91

  • SHA512

    c7307e4eef00f86ce2eca8bcea9443b9083b384a31b9166b4cbc566802732f2af09661e685053b8e3c66022c84ab78c3dce2fc0cece17dee2918ce7a4fdd1226

  • SSDEEP

    12288:krsE2WKX7bN4hJ57YTcuWqjyGGBGxezkeq/OOscTUxtVtTjnfp2Udo2kJld0:krsE2WKX7R4mAnGoTpq/f5Uxt3fjdo2H

Malware Config

Extracted

Family

cybergate

Version

v1.07.5

Botnet

Cyber

C2

rageg0b.no-ip.org:100

rageg0b.no-ip.org:1604

Mutex

BLU26370IVTJQ7

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    install

  • install_file

    server.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    123456

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Signatures

  • CyberGate, Rebhip

    CyberGate is a lightweight remote administration tool with a wide array of functionalities.

  • Adds policy Run key to start application 2 TTPs 4 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 3 IoCs
  • Drops file in System32 directory 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1288
      • C:\Users\Admin\AppData\Local\Temp\25238a8577ad44e90326bde38973a3f7_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\25238a8577ad44e90326bde38973a3f7_JaffaCakes118.exe"
        2⤵
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1044
        • C:\Users\Admin\AppData\Local\Temp\svchost.exe
          C:\Users\Admin\AppData\Local\Temp\svchost.exe
          3⤵
          • Adds policy Run key to start application
          • Boot or Logon Autostart Execution: Active Setup
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Drops file in System32 directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:2628
          • C:\Windows\SysWOW64\explorer.exe
            explorer.exe
            4⤵
            • Boot or Logon Autostart Execution: Active Setup
            • Suspicious use of AdjustPrivilegeToken
            PID:1776
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            4⤵
              PID:2192
            • C:\Users\Admin\AppData\Local\Temp\svchost.exe
              "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
              4⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Drops file in System32 directory
              • Suspicious behavior: GetForegroundWindowSpam
              • Suspicious use of AdjustPrivilegeToken
              PID:2632
              • C:\Windows\SysWOW64\install\server.exe
                "C:\Windows\system32\install\server.exe"
                5⤵
                • Executes dropped EXE
                PID:980

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\Admin2.txt

        Filesize

        224KB

        MD5

        076498d9057301cb72d75ff5bb0e7ec7

        SHA1

        2ea69c09f568e723e5547afa065a55ee0d4766f1

        SHA256

        4a6b145a831719ebed62183edf5650f28222ffd3a2cd1e6b01e3917d32ce4351

        SHA512

        86ac6d296db18ab9c618f7e3555760f86ccf14c123d6d4ab4187abf36b52713313e1d8200ede032ae29d936a6e3f512c7538cc7a4a4fa9d3e9140c273fdc37d7

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        4084cb8ee37a8eb462177c7d44c62beb

        SHA1

        54381af6b5a6c1101add9222b570d04e0c453e4c

        SHA256

        0446b83bb7305ed1e4984561a9e8029fcd21dca8836900dd1a80505d3bb8e824

        SHA512

        070a334fbb57dd72e4627a1cd55825cb3b87e0b898f403029cd2183c52509c77a0162aff34729f61660c89359b34bd6ce6f15531b1e17a4c763cd2d727e8e1a5

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        8be629a2ad17dec16299243cffd4fb3e

        SHA1

        0f5dd082efac93f80a6f7d4daaf810ce5c3a607a

        SHA256

        a5293bce0c166d6d4e0c8900812672ec41341560a9caaf94eb8ae75a53c8e75c

        SHA512

        52a113ec99c33abf552a4ca298189c55ba6ca0de67b456842d8440f785539534eb5820aa127df89e59634c98776f3773d4675ec6ecf1838da82590dda9f4237f

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        9bfbf8882ff2b7fca66ac3953cc07978

        SHA1

        b242fd291ca0102948f689f8050c35d65f14c05e

        SHA256

        38b78c55986d9a38ff3e43e2e1e79c5b0385f9d7e17e3879c9cdedb12bcf4e71

        SHA512

        06e8b9699d45194e078e55d093046745f470b02b14f4617ef4387ae4452348637806385db87bf3d4d688ca0cb11ea9ef8e9851689435ed89ec92fad6e4335bc2

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        dcdf7ceb6b764bb804417a7293a75476

        SHA1

        075e55ede21311865f310905a32412deaede8b61

        SHA256

        3c8257c66d9c1153e14a6e0afd1dc622f9276eb5f3ba3d407c3a70ec4317fe7e

        SHA512

        d021bacd68b1e11cae744647b2a52108a0ff63f787dc90cd7e08eb0225a538bbfff565d7b793f8b9b00aa7cc192a0292aa77c0829f3155ffba45c8c5ec984e2d

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        7948018903cdcf9d89d1229d7e5e318c

        SHA1

        809cc1d91778d4a4711cd223817aaee65e55e24d

        SHA256

        be2c87018a508f0a5f110127eaf62ca10be597ee6cd6e541caace1bc356364c7

        SHA512

        e1387f56ef70f81007a5b9b3eaa2ae6eedb5e090a1b98528d34ac87e6895a8aa59c7b86ac8e8c37541991f15a24ff0fe9bfb5f54b164acf79e5f67968c2fc24a

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        6b28d05211c89d5efed5bdef9cedb53b

        SHA1

        064f407c12b7a92552f391454edda24242131fe7

        SHA256

        deb917b4fd7fff94102a83f7e7526a27d848f0508a083fd9249b1e189309a438

        SHA512

        7177d9cd806fbf6219cfc60080b004211bfc8d2a12073902436a9a2f7a762b3c9fa874582110f9ba91695473bfb53f6c9fbc899ba7b9adffef3a49e8cf1e411d

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        1aa82ef6607c86bb5d49bfdc363e9749

        SHA1

        157a44be4ddda99fa64e98ea518eb2500d3ed484

        SHA256

        9e04c24ee3745b129b1574b3776be959e8e680c239247737ccb449ee4f5633ef

        SHA512

        d52a5f01e46fb65dc57a497363f5927e4624a8c7f645c931811a86effa0f648ccd45656fc0296016c6412cb33ce2e653b06bf0e44c7c8b34942d11091121f565

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        f84ef8533765896dc8eee0b8d2885cde

        SHA1

        9a60dc94210268c5bd9377b6a1197ed3644a37c2

        SHA256

        b95d0ae84a6f894350119b14df98360b22072d525e03eb16b55f282caf062a68

        SHA512

        64666429f715e34b287ee702d0d34a619f038d45b36824714f178cb864700bee71c07ca25e6913e03fa02c63cccb74d91afe1267919837bcda56b0a707cdc203

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        c6dda21c339d5db76c1b71e4512a0524

        SHA1

        59edea9af36d022a9147c420a6c88c704748815f

        SHA256

        00f56276b1124f0b01f062b389506797fb9625aba8f9f5d2388bf31a715a2100

        SHA512

        5a811dafde9c1027821308073818e2b0d576b4b32c622a118373412bf2edfe24593a7dc11268d1760606a0b57319fd91c423cbbce4557c444906fb3770ac7efd

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        3202dedca48968f6d2afd6af52815883

        SHA1

        8f5d88efb2d5d0b15a36a1c494b7d2de0bbdc964

        SHA256

        8f2c1fab0598bd473d0b4b634f6a00e3ee2a3033d59626612bd245ff2246cf42

        SHA512

        10d4f8b1f9ca4f5be8ffe5973e6805f488fd9c9a11e845e90cde62ea01bf8c6e9344ee1fb2a4166347451da2a488ee0088644342b532cbc44ae3947b27388498

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        39d283fb51b594c65102c9a024f11b31

        SHA1

        a9ed7b43d91a72fecf354ffadbb5082796053064

        SHA256

        f803f8a444fcde1daf0c0d7ecb84ecff68423aa54fb09881e3201a7e84d8882a

        SHA512

        443ccacebaf815aac7b289a268eefbcff96923a5b4e7ae678d0d8d3aa6e69e956d730acf8899d7e8b7c40dade30dac3af2674175b882e4fbfae6c84236c1bd92

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        8c7d8e3d52f8e302833b95ee03f4ff8d

        SHA1

        e50cb217757db449909d63386e1d1c4f64bf00b4

        SHA256

        55ff194c8ab8a7ba483ad56911ce1a6b88ffb8bd2ea3c709703122271ee7e30a

        SHA512

        e0366e01f63d9bd0d5be900077a896385596b40c067d6c3cc50a45b864ba2cc45d9ccfd184365c6fd6d831ad689bf271f843a7f5522e2faeb9ba12374503c81c

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        9c598c93dad8947f0b873eea039305c2

        SHA1

        d1dfaa870453f3b563110bc6726dc3fab3993483

        SHA256

        3459552cfcf9a54113be2e1fedecc58166d19f34afc3353db1d0ac52da34be7f

        SHA512

        9033b63b57bd46f6223487a71ed98b844a1aff55175a597e26554a0b669c93fc7126cb8b9c4cc59dfd4ef17bfd35196fd701593ee830d2c5c3f45f677e71f106

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        31b347529502da3c05fc2d10b543821e

        SHA1

        bdade852ab83a4c12aa039ebd42beb07d56e059f

        SHA256

        5c7f68f4b849b2f2f062f8e63e51f722fd2a30490047d36f29591fcaf3ed608a

        SHA512

        6bbbd65e734fb368838ca3cc15c2e4f94125eeca5c2c16ec083f7708ab25754c9adf4ec18e474e157d0aad741917ca24eb0dcc57aa885d886dd0ded0dd7d57c7

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        692c06c1de49c1121f85e0db13dcc8b3

        SHA1

        8622a8039b72498abbb4cb4a4e5ba86985ec44a5

        SHA256

        2142a86d1e8a6a2bce707c589dcec2c03a7433ccfab123b95a046128584c1130

        SHA512

        8d89ac83164d09dd88ca42b04dd01a40cdf8db369923d8bf837115270104f3a1b781c9db1b80bed85735d63cc492728786f396eee0263109b1ff38cd668c95d3

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        8b35247c57ca4727636eaa0d9cd32a2b

        SHA1

        47a3dd5c9f76d893c44f764516ce076d9fe21fdc

        SHA256

        1107f6c31869b275fd3d2c4a49e8576d421462c5d4290471aa8be8aac05540e0

        SHA512

        a6baefc1f1e68f4fcd4d30a5adb49a99b0187a9e3002283a13e9a635f2cf5a7802eadb490d13bc6f09b8d76f03de7c88699091351708bd4783fec6318d23335f

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        c82623ce7512ccd44bb47951b9114d39

        SHA1

        0fb1a6256d0ca8da12940e2f25ea4f72f548cb62

        SHA256

        03a0a3cf61260fdd09058ee724cfc76f24e6735911e5d35a2e3d4b0684c6afb8

        SHA512

        4ab2c1fd734104627bdb743f24ca93077dda8abd376105f3547da48501afc03bd46cbc72f725d823ca0657590fe3cf331d3144c74b72510c9d9397f4cc299620

      • C:\Users\Admin\AppData\Roaming\Adminlog.dat

        Filesize

        15B

        MD5

        bf3dba41023802cf6d3f8c5fd683a0c7

        SHA1

        466530987a347b68ef28faad238d7b50db8656a5

        SHA256

        4a8e75390856bf822f492f7f605ca0c21f1905172f6d3ef610162533c140507d

        SHA512

        fec60f447dcc90753d693014135e24814f6e8294f6c0f436bc59d892b24e91552108dba6cf5a6fa7c0421f6d290d1bafee9f9f2d95ea8c4c05c2ad0f7c1bb314

      • \Users\Admin\AppData\Local\Temp\svchost.exe

        Filesize

        1.1MB

        MD5

        34aa912defa18c2c129f1e09d75c1d7e

        SHA1

        9c3046324657505a30ecd9b1fdb46c05bde7d470

        SHA256

        6df94b7fa33f1b87142adc39b3db0613fc520d9e7a5fd6a5301dd7f51f8d0386

        SHA512

        d1ea9368f5d7166180612fd763c87afb647d088498887961f5e7fb0a10f4a808bd5928e8a3666d70ff794093c51ecca8816f75dd47652fd4eb23dce7f9aa1f98

      • memory/1044-21-0x0000000074590000-0x0000000074B3B000-memory.dmp

        Filesize

        5.7MB

      • memory/1044-0-0x0000000074591000-0x0000000074592000-memory.dmp

        Filesize

        4KB

      • memory/1044-2-0x0000000074590000-0x0000000074B3B000-memory.dmp

        Filesize

        5.7MB

      • memory/1044-1-0x0000000074590000-0x0000000074B3B000-memory.dmp

        Filesize

        5.7MB

      • memory/1288-28-0x0000000001DC0000-0x0000000001DC1000-memory.dmp

        Filesize

        4KB

      • memory/1776-273-0x0000000000160000-0x0000000000161000-memory.dmp

        Filesize

        4KB

      • memory/1776-1941-0x0000000010480000-0x00000000104E5000-memory.dmp

        Filesize

        404KB

      • memory/1776-578-0x0000000010480000-0x00000000104E5000-memory.dmp

        Filesize

        404KB

      • memory/1776-272-0x00000000000E0000-0x00000000000E1000-memory.dmp

        Filesize

        4KB

      • memory/2628-20-0x0000000000400000-0x0000000000450000-memory.dmp

        Filesize

        320KB

      • memory/2628-12-0x0000000000400000-0x0000000000450000-memory.dmp

        Filesize

        320KB

      • memory/2628-23-0x0000000000400000-0x0000000000450000-memory.dmp

        Filesize

        320KB

      • memory/2628-22-0x0000000000400000-0x0000000000450000-memory.dmp

        Filesize

        320KB

      • memory/2628-9-0x0000000000400000-0x0000000000450000-memory.dmp

        Filesize

        320KB

      • memory/2628-911-0x0000000000400000-0x0000000000450000-memory.dmp

        Filesize

        320KB

      • memory/2628-10-0x0000000000400000-0x0000000000450000-memory.dmp

        Filesize

        320KB

      • memory/2628-11-0x0000000000400000-0x0000000000450000-memory.dmp

        Filesize

        320KB

      • memory/2628-27-0x0000000010410000-0x0000000010475000-memory.dmp

        Filesize

        404KB

      • memory/2628-14-0x0000000000400000-0x0000000000450000-memory.dmp

        Filesize

        320KB

      • memory/2628-15-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

        Filesize

        4KB

      • memory/2628-17-0x0000000000400000-0x0000000000450000-memory.dmp

        Filesize

        320KB

      • memory/2628-13-0x0000000000400000-0x0000000000450000-memory.dmp

        Filesize

        320KB

      • memory/2628-8-0x0000000000400000-0x0000000000450000-memory.dmp

        Filesize

        320KB