Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
04/07/2024, 07:38
Static task
static1
Behavioral task
behavioral1
Sample
25238a8577ad44e90326bde38973a3f7_JaffaCakes118.exe
Resource
win7-20240611-en
General
-
Target
25238a8577ad44e90326bde38973a3f7_JaffaCakes118.exe
-
Size
712KB
-
MD5
25238a8577ad44e90326bde38973a3f7
-
SHA1
fb420a3aee3694ed2e4ecd2d17f6677d542e58d1
-
SHA256
8576ebf013306fd6a915242854898262031ec36ee0704ab7054decfdd2fada91
-
SHA512
c7307e4eef00f86ce2eca8bcea9443b9083b384a31b9166b4cbc566802732f2af09661e685053b8e3c66022c84ab78c3dce2fc0cece17dee2918ce7a4fdd1226
-
SSDEEP
12288:krsE2WKX7bN4hJ57YTcuWqjyGGBGxezkeq/OOscTUxtVtTjnfp2Udo2kJld0:krsE2WKX7R4mAnGoTpq/f5Uxt3fjdo2H
Malware Config
Extracted
cybergate
v1.07.5
Cyber
rageg0b.no-ip.org:100
rageg0b.no-ip.org:1604
BLU26370IVTJQ7
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
install
-
install_file
server.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
123456
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Signatures
-
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\install\\server.exe" svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\install\\server.exe" svchost.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run svchost.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{ASG865OC-S4J2-KMF6-6XGA-W8R2Q4RMQW33} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{ASG865OC-S4J2-KMF6-6XGA-W8R2Q4RMQW33}\StubPath = "C:\\Windows\\system32\\install\\server.exe" explorer.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{ASG865OC-S4J2-KMF6-6XGA-W8R2Q4RMQW33} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{ASG865OC-S4J2-KMF6-6XGA-W8R2Q4RMQW33}\StubPath = "C:\\Windows\\system32\\install\\server.exe Restart" svchost.exe -
Executes dropped EXE 3 IoCs
pid Process 2628 svchost.exe 2632 svchost.exe 980 server.exe -
Loads dropped DLL 3 IoCs
pid Process 1044 25238a8577ad44e90326bde38973a3f7_JaffaCakes118.exe 2628 svchost.exe 2632 svchost.exe -
resource yara_rule behavioral1/memory/2628-27-0x0000000010410000-0x0000000010475000-memory.dmp upx behavioral1/memory/1776-578-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral1/memory/1776-1941-0x0000000010480000-0x00000000104E5000-memory.dmp upx -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Windows\CurrentVersion\Run\Service = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Service.exe" 25238a8577ad44e90326bde38973a3f7_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\system32\\install\\server.exe" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\system32\\install\\server.exe" svchost.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\install\ svchost.exe File created C:\Windows\SysWOW64\install\server.exe svchost.exe File opened for modification C:\Windows\SysWOW64\install\server.exe svchost.exe File opened for modification C:\Windows\SysWOW64\install\server.exe svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1044 set thread context of 2628 1044 25238a8577ad44e90326bde38973a3f7_JaffaCakes118.exe 28 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2628 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2632 svchost.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeBackupPrivilege 1776 explorer.exe Token: SeRestorePrivilege 1776 explorer.exe Token: SeBackupPrivilege 2632 svchost.exe Token: SeRestorePrivilege 2632 svchost.exe Token: SeDebugPrivilege 2632 svchost.exe Token: SeDebugPrivilege 2632 svchost.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2628 svchost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1044 wrote to memory of 2628 1044 25238a8577ad44e90326bde38973a3f7_JaffaCakes118.exe 28 PID 1044 wrote to memory of 2628 1044 25238a8577ad44e90326bde38973a3f7_JaffaCakes118.exe 28 PID 1044 wrote to memory of 2628 1044 25238a8577ad44e90326bde38973a3f7_JaffaCakes118.exe 28 PID 1044 wrote to memory of 2628 1044 25238a8577ad44e90326bde38973a3f7_JaffaCakes118.exe 28 PID 1044 wrote to memory of 2628 1044 25238a8577ad44e90326bde38973a3f7_JaffaCakes118.exe 28 PID 1044 wrote to memory of 2628 1044 25238a8577ad44e90326bde38973a3f7_JaffaCakes118.exe 28 PID 1044 wrote to memory of 2628 1044 25238a8577ad44e90326bde38973a3f7_JaffaCakes118.exe 28 PID 1044 wrote to memory of 2628 1044 25238a8577ad44e90326bde38973a3f7_JaffaCakes118.exe 28 PID 1044 wrote to memory of 2628 1044 25238a8577ad44e90326bde38973a3f7_JaffaCakes118.exe 28 PID 1044 wrote to memory of 2628 1044 25238a8577ad44e90326bde38973a3f7_JaffaCakes118.exe 28 PID 1044 wrote to memory of 2628 1044 25238a8577ad44e90326bde38973a3f7_JaffaCakes118.exe 28 PID 1044 wrote to memory of 2628 1044 25238a8577ad44e90326bde38973a3f7_JaffaCakes118.exe 28 PID 2628 wrote to memory of 1288 2628 svchost.exe 21 PID 2628 wrote to memory of 1288 2628 svchost.exe 21 PID 2628 wrote to memory of 1288 2628 svchost.exe 21 PID 2628 wrote to memory of 1288 2628 svchost.exe 21 PID 2628 wrote to memory of 1288 2628 svchost.exe 21 PID 2628 wrote to memory of 1288 2628 svchost.exe 21 PID 2628 wrote to memory of 1288 2628 svchost.exe 21 PID 2628 wrote to memory of 1288 2628 svchost.exe 21 PID 2628 wrote to memory of 1288 2628 svchost.exe 21 PID 2628 wrote to memory of 1288 2628 svchost.exe 21 PID 2628 wrote to memory of 1288 2628 svchost.exe 21 PID 2628 wrote to memory of 1288 2628 svchost.exe 21 PID 2628 wrote to memory of 1288 2628 svchost.exe 21 PID 2628 wrote to memory of 1288 2628 svchost.exe 21 PID 2628 wrote to memory of 1288 2628 svchost.exe 21 PID 2628 wrote to memory of 1288 2628 svchost.exe 21 PID 2628 wrote to memory of 1288 2628 svchost.exe 21 PID 2628 wrote to memory of 1288 2628 svchost.exe 21 PID 2628 wrote to memory of 1288 2628 svchost.exe 21 PID 2628 wrote to memory of 1288 2628 svchost.exe 21 PID 2628 wrote to memory of 1288 2628 svchost.exe 21 PID 2628 wrote to memory of 1288 2628 svchost.exe 21 PID 2628 wrote to memory of 1288 2628 svchost.exe 21 PID 2628 wrote to memory of 1288 2628 svchost.exe 21 PID 2628 wrote to memory of 1288 2628 svchost.exe 21 PID 2628 wrote to memory of 1288 2628 svchost.exe 21 PID 2628 wrote to memory of 1288 2628 svchost.exe 21 PID 2628 wrote to memory of 1288 2628 svchost.exe 21 PID 2628 wrote to memory of 1288 2628 svchost.exe 21 PID 2628 wrote to memory of 1288 2628 svchost.exe 21 PID 2628 wrote to memory of 1288 2628 svchost.exe 21 PID 2628 wrote to memory of 1288 2628 svchost.exe 21 PID 2628 wrote to memory of 1288 2628 svchost.exe 21 PID 2628 wrote to memory of 1288 2628 svchost.exe 21 PID 2628 wrote to memory of 1288 2628 svchost.exe 21 PID 2628 wrote to memory of 1288 2628 svchost.exe 21 PID 2628 wrote to memory of 1288 2628 svchost.exe 21 PID 2628 wrote to memory of 1288 2628 svchost.exe 21 PID 2628 wrote to memory of 1288 2628 svchost.exe 21 PID 2628 wrote to memory of 1288 2628 svchost.exe 21 PID 2628 wrote to memory of 1288 2628 svchost.exe 21 PID 2628 wrote to memory of 1288 2628 svchost.exe 21 PID 2628 wrote to memory of 1288 2628 svchost.exe 21 PID 2628 wrote to memory of 1288 2628 svchost.exe 21 PID 2628 wrote to memory of 1288 2628 svchost.exe 21 PID 2628 wrote to memory of 1288 2628 svchost.exe 21 PID 2628 wrote to memory of 1288 2628 svchost.exe 21 PID 2628 wrote to memory of 1288 2628 svchost.exe 21 PID 2628 wrote to memory of 1288 2628 svchost.exe 21 PID 2628 wrote to memory of 1288 2628 svchost.exe 21 PID 2628 wrote to memory of 1288 2628 svchost.exe 21 PID 2628 wrote to memory of 1288 2628 svchost.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1288
-
C:\Users\Admin\AppData\Local\Temp\25238a8577ad44e90326bde38973a3f7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\25238a8577ad44e90326bde38973a3f7_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Users\Admin\AppData\Local\Temp\svchost.exeC:\Users\Admin\AppData\Local\Temp\svchost.exe3⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Suspicious use of AdjustPrivilegeToken
PID:1776
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2192
-
-
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2632 -
C:\Windows\SysWOW64\install\server.exe"C:\Windows\system32\install\server.exe"5⤵
- Executes dropped EXE
PID:980
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD5076498d9057301cb72d75ff5bb0e7ec7
SHA12ea69c09f568e723e5547afa065a55ee0d4766f1
SHA2564a6b145a831719ebed62183edf5650f28222ffd3a2cd1e6b01e3917d32ce4351
SHA51286ac6d296db18ab9c618f7e3555760f86ccf14c123d6d4ab4187abf36b52713313e1d8200ede032ae29d936a6e3f512c7538cc7a4a4fa9d3e9140c273fdc37d7
-
Filesize
8B
MD54084cb8ee37a8eb462177c7d44c62beb
SHA154381af6b5a6c1101add9222b570d04e0c453e4c
SHA2560446b83bb7305ed1e4984561a9e8029fcd21dca8836900dd1a80505d3bb8e824
SHA512070a334fbb57dd72e4627a1cd55825cb3b87e0b898f403029cd2183c52509c77a0162aff34729f61660c89359b34bd6ce6f15531b1e17a4c763cd2d727e8e1a5
-
Filesize
8B
MD58be629a2ad17dec16299243cffd4fb3e
SHA10f5dd082efac93f80a6f7d4daaf810ce5c3a607a
SHA256a5293bce0c166d6d4e0c8900812672ec41341560a9caaf94eb8ae75a53c8e75c
SHA51252a113ec99c33abf552a4ca298189c55ba6ca0de67b456842d8440f785539534eb5820aa127df89e59634c98776f3773d4675ec6ecf1838da82590dda9f4237f
-
Filesize
8B
MD59bfbf8882ff2b7fca66ac3953cc07978
SHA1b242fd291ca0102948f689f8050c35d65f14c05e
SHA25638b78c55986d9a38ff3e43e2e1e79c5b0385f9d7e17e3879c9cdedb12bcf4e71
SHA51206e8b9699d45194e078e55d093046745f470b02b14f4617ef4387ae4452348637806385db87bf3d4d688ca0cb11ea9ef8e9851689435ed89ec92fad6e4335bc2
-
Filesize
8B
MD5dcdf7ceb6b764bb804417a7293a75476
SHA1075e55ede21311865f310905a32412deaede8b61
SHA2563c8257c66d9c1153e14a6e0afd1dc622f9276eb5f3ba3d407c3a70ec4317fe7e
SHA512d021bacd68b1e11cae744647b2a52108a0ff63f787dc90cd7e08eb0225a538bbfff565d7b793f8b9b00aa7cc192a0292aa77c0829f3155ffba45c8c5ec984e2d
-
Filesize
8B
MD57948018903cdcf9d89d1229d7e5e318c
SHA1809cc1d91778d4a4711cd223817aaee65e55e24d
SHA256be2c87018a508f0a5f110127eaf62ca10be597ee6cd6e541caace1bc356364c7
SHA512e1387f56ef70f81007a5b9b3eaa2ae6eedb5e090a1b98528d34ac87e6895a8aa59c7b86ac8e8c37541991f15a24ff0fe9bfb5f54b164acf79e5f67968c2fc24a
-
Filesize
8B
MD56b28d05211c89d5efed5bdef9cedb53b
SHA1064f407c12b7a92552f391454edda24242131fe7
SHA256deb917b4fd7fff94102a83f7e7526a27d848f0508a083fd9249b1e189309a438
SHA5127177d9cd806fbf6219cfc60080b004211bfc8d2a12073902436a9a2f7a762b3c9fa874582110f9ba91695473bfb53f6c9fbc899ba7b9adffef3a49e8cf1e411d
-
Filesize
8B
MD51aa82ef6607c86bb5d49bfdc363e9749
SHA1157a44be4ddda99fa64e98ea518eb2500d3ed484
SHA2569e04c24ee3745b129b1574b3776be959e8e680c239247737ccb449ee4f5633ef
SHA512d52a5f01e46fb65dc57a497363f5927e4624a8c7f645c931811a86effa0f648ccd45656fc0296016c6412cb33ce2e653b06bf0e44c7c8b34942d11091121f565
-
Filesize
8B
MD5f84ef8533765896dc8eee0b8d2885cde
SHA19a60dc94210268c5bd9377b6a1197ed3644a37c2
SHA256b95d0ae84a6f894350119b14df98360b22072d525e03eb16b55f282caf062a68
SHA51264666429f715e34b287ee702d0d34a619f038d45b36824714f178cb864700bee71c07ca25e6913e03fa02c63cccb74d91afe1267919837bcda56b0a707cdc203
-
Filesize
8B
MD5c6dda21c339d5db76c1b71e4512a0524
SHA159edea9af36d022a9147c420a6c88c704748815f
SHA25600f56276b1124f0b01f062b389506797fb9625aba8f9f5d2388bf31a715a2100
SHA5125a811dafde9c1027821308073818e2b0d576b4b32c622a118373412bf2edfe24593a7dc11268d1760606a0b57319fd91c423cbbce4557c444906fb3770ac7efd
-
Filesize
8B
MD53202dedca48968f6d2afd6af52815883
SHA18f5d88efb2d5d0b15a36a1c494b7d2de0bbdc964
SHA2568f2c1fab0598bd473d0b4b634f6a00e3ee2a3033d59626612bd245ff2246cf42
SHA51210d4f8b1f9ca4f5be8ffe5973e6805f488fd9c9a11e845e90cde62ea01bf8c6e9344ee1fb2a4166347451da2a488ee0088644342b532cbc44ae3947b27388498
-
Filesize
8B
MD539d283fb51b594c65102c9a024f11b31
SHA1a9ed7b43d91a72fecf354ffadbb5082796053064
SHA256f803f8a444fcde1daf0c0d7ecb84ecff68423aa54fb09881e3201a7e84d8882a
SHA512443ccacebaf815aac7b289a268eefbcff96923a5b4e7ae678d0d8d3aa6e69e956d730acf8899d7e8b7c40dade30dac3af2674175b882e4fbfae6c84236c1bd92
-
Filesize
8B
MD58c7d8e3d52f8e302833b95ee03f4ff8d
SHA1e50cb217757db449909d63386e1d1c4f64bf00b4
SHA25655ff194c8ab8a7ba483ad56911ce1a6b88ffb8bd2ea3c709703122271ee7e30a
SHA512e0366e01f63d9bd0d5be900077a896385596b40c067d6c3cc50a45b864ba2cc45d9ccfd184365c6fd6d831ad689bf271f843a7f5522e2faeb9ba12374503c81c
-
Filesize
8B
MD59c598c93dad8947f0b873eea039305c2
SHA1d1dfaa870453f3b563110bc6726dc3fab3993483
SHA2563459552cfcf9a54113be2e1fedecc58166d19f34afc3353db1d0ac52da34be7f
SHA5129033b63b57bd46f6223487a71ed98b844a1aff55175a597e26554a0b669c93fc7126cb8b9c4cc59dfd4ef17bfd35196fd701593ee830d2c5c3f45f677e71f106
-
Filesize
8B
MD531b347529502da3c05fc2d10b543821e
SHA1bdade852ab83a4c12aa039ebd42beb07d56e059f
SHA2565c7f68f4b849b2f2f062f8e63e51f722fd2a30490047d36f29591fcaf3ed608a
SHA5126bbbd65e734fb368838ca3cc15c2e4f94125eeca5c2c16ec083f7708ab25754c9adf4ec18e474e157d0aad741917ca24eb0dcc57aa885d886dd0ded0dd7d57c7
-
Filesize
8B
MD5692c06c1de49c1121f85e0db13dcc8b3
SHA18622a8039b72498abbb4cb4a4e5ba86985ec44a5
SHA2562142a86d1e8a6a2bce707c589dcec2c03a7433ccfab123b95a046128584c1130
SHA5128d89ac83164d09dd88ca42b04dd01a40cdf8db369923d8bf837115270104f3a1b781c9db1b80bed85735d63cc492728786f396eee0263109b1ff38cd668c95d3
-
Filesize
8B
MD58b35247c57ca4727636eaa0d9cd32a2b
SHA147a3dd5c9f76d893c44f764516ce076d9fe21fdc
SHA2561107f6c31869b275fd3d2c4a49e8576d421462c5d4290471aa8be8aac05540e0
SHA512a6baefc1f1e68f4fcd4d30a5adb49a99b0187a9e3002283a13e9a635f2cf5a7802eadb490d13bc6f09b8d76f03de7c88699091351708bd4783fec6318d23335f
-
Filesize
8B
MD5c82623ce7512ccd44bb47951b9114d39
SHA10fb1a6256d0ca8da12940e2f25ea4f72f548cb62
SHA25603a0a3cf61260fdd09058ee724cfc76f24e6735911e5d35a2e3d4b0684c6afb8
SHA5124ab2c1fd734104627bdb743f24ca93077dda8abd376105f3547da48501afc03bd46cbc72f725d823ca0657590fe3cf331d3144c74b72510c9d9397f4cc299620
-
Filesize
15B
MD5bf3dba41023802cf6d3f8c5fd683a0c7
SHA1466530987a347b68ef28faad238d7b50db8656a5
SHA2564a8e75390856bf822f492f7f605ca0c21f1905172f6d3ef610162533c140507d
SHA512fec60f447dcc90753d693014135e24814f6e8294f6c0f436bc59d892b24e91552108dba6cf5a6fa7c0421f6d290d1bafee9f9f2d95ea8c4c05c2ad0f7c1bb314
-
Filesize
1.1MB
MD534aa912defa18c2c129f1e09d75c1d7e
SHA19c3046324657505a30ecd9b1fdb46c05bde7d470
SHA2566df94b7fa33f1b87142adc39b3db0613fc520d9e7a5fd6a5301dd7f51f8d0386
SHA512d1ea9368f5d7166180612fd763c87afb647d088498887961f5e7fb0a10f4a808bd5928e8a3666d70ff794093c51ecca8816f75dd47652fd4eb23dce7f9aa1f98