Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    07/07/2024, 02:49

General

  • Target

    29aee678b3d57f86e1b1159db1ed51af_JaffaCakes118.exe

  • Size

    380KB

  • MD5

    29aee678b3d57f86e1b1159db1ed51af

  • SHA1

    f9c23af90a1b846cf39ceeb2776a042dad56f241

  • SHA256

    e9a2460d4e14afd61345adcf91f287a791a8218d3b1e3093b62a815212b62126

  • SHA512

    7f9e63fc0863c626d8889f069bb2c53be1f040e77a1212c3a90be5836729fd41df699893c380747ff3cd0be24d59851d6f80450f5b8aceb310345f89d2223324

  • SSDEEP

    6144:4F9hZfp08E2mUz2mGzTtP/k04YMCUCMYDClf/2dZz3CHPwoLZp68:47hZR089DDGzTpbHJMYeIdlCHIoLZ48

Malware Config

Extracted

Family

cybergate

Version

v1.07.5

Botnet

orea

C2

hack789456.no-ip.org:81

Mutex

P34DLX2HD6F5G0

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    WinDir

  • install_file

    Svchost.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    WoE has been installed in your OT

  • message_box_title

    War Of Emperium

  • password

    789456

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Signatures

  • CyberGate, Rebhip

    CyberGate is a lightweight remote administration tool with a wide array of functionalities.

  • Adds policy Run key to start application 2 TTPs 4 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in System32 directory 5 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1204
      • C:\Users\Admin\AppData\Local\Temp\29aee678b3d57f86e1b1159db1ed51af_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\29aee678b3d57f86e1b1159db1ed51af_JaffaCakes118.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2120
        • C:\Users\Admin\AppData\Local\Temp\29aee678b3d57f86e1b1159db1ed51af_JaffaCakes118.exe
          "C:\Users\Admin\AppData\Local\Temp\29aee678b3d57f86e1b1159db1ed51af_JaffaCakes118.exe"
          3⤵
          • Adds policy Run key to start application
          • Boot or Logon Autostart Execution: Active Setup
          • Adds Run key to start application
          • Drops file in System32 directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:2392
          • C:\Windows\SysWOW64\explorer.exe
            explorer.exe
            4⤵
            • Boot or Logon Autostart Execution: Active Setup
            • Suspicious use of AdjustPrivilegeToken
            PID:2972
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            4⤵
              PID:2260
            • C:\Users\Admin\AppData\Local\Temp\29aee678b3d57f86e1b1159db1ed51af_JaffaCakes118.exe
              "C:\Users\Admin\AppData\Local\Temp\29aee678b3d57f86e1b1159db1ed51af_JaffaCakes118.exe"
              4⤵
              • Loads dropped DLL
              • Drops file in System32 directory
              • Suspicious behavior: GetForegroundWindowSpam
              • Suspicious use of AdjustPrivilegeToken
              PID:1116
              • C:\Windows\SysWOW64\WinDir\Svchost.exe
                "C:\Windows\system32\WinDir\Svchost.exe"
                5⤵
                • Executes dropped EXE
                • Drops file in System32 directory
                • Suspicious use of SetThreadContext
                • Suspicious use of SetWindowsHookEx
                PID:2992
                • C:\Windows\SysWOW64\WinDir\Svchost.exe
                  "C:\Windows\SysWOW64\WinDir\Svchost.exe"
                  6⤵
                  • Executes dropped EXE
                  PID:1828

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\Admin2.txt

        Filesize

        224KB

        MD5

        10cc45396df4d31284e0c01ed0da6349

        SHA1

        71e7772142e1dedd58675400cf6869d1122bef84

        SHA256

        6409095e7ef588eebe521da094b952ec2c1ac6028ece41f4d101b2e695084899

        SHA512

        eb5323a64cf730a0977824ea331ba172376d3caeb090d32ce6987ece5762eab1e13b3194f6441945774ec44ee797d0cc73d89af57f408012f4bf2525d13af226

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        f1917931c6b567aa8cf602e3c2ed90c8

        SHA1

        43e5454dd7f9739dc50e23e59692ef7703b38f8f

        SHA256

        bb06bfff708618ecc8f0848f73a631df897f7c0ba2794fed638c3417ba10c0d2

        SHA512

        e44cd44a9590f147a511363bb2f4f8d97a083260ca836dbbdc7785045a4016e4312d8e494c42a841393218bd5cdd6e12ffb3f92cb18b6b66c1409e31206c012c

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        f918c784c9c6b285b305836d2a85ac51

        SHA1

        a6d941b99a7fc21c3242d9369172ca7404b30902

        SHA256

        d2bf2fe19b3f6aea8c18c6589080457df8101029e2d61de3d543722c76793a17

        SHA512

        bc70c4756b24d5f7dec683d9361a980326c085dbc074d1414272178d8266cf5f3db4e24accadcabd0d4891e06c0633b78dd09d668ebd832693ee67c38903021e

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        0ed498a5aa30e91983de1beb21d4e1f1

        SHA1

        e8f50e553ee7601f9aed2e26e3284c5592b352cb

        SHA256

        a126ca6a4d9d81a576963dfea30ca45e2c8a4c0b8dcebc86dd1127b03c6d1b3c

        SHA512

        df6a70adf33543d55c92813acbb91ba0e5740e4c668b3698223f2da18766fb0f5f4b1f13067d4289186c1e6b02abe3f298a7b6b1fdc992df074f356bcb78b36a

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        dfc1a0d8733f1d35f1e61a1d3baa03c0

        SHA1

        738fbccc0678420a4f120f1d75c228625d77b5ca

        SHA256

        53cfe8af8761f31c4c27504135e4cf3101dcf55c8331bb7241067f6acf2d4201

        SHA512

        991cc2c6b082ec74285737a0ba75ece0c70daea89c7c3d10b9bddc2505619d155ec6002e54c216b25c075f496d04a411fb8e0f2de08a6808aa8f4fd574ef0cc2

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        1f3ac32171bfb881b7558fa09fa09e87

        SHA1

        53a5a37a8d9868a506a2ff19c722ebe9c0043a79

        SHA256

        b04db782bc24347d6679439e026279844ebfff3fcad1dffca9c5db7b11209491

        SHA512

        0dd19db51e5345b1f0bba55689c403bb4b39a861f7f90cd096f6082878afc67ed51cef2f9c29cd84c2c668fb8a100677509753a81bb1d86c3ba99fc666c770e9

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        fe8de2a043930a195a4ae01844aa6f1e

        SHA1

        736ecddaa90c58c0c6fe24fcc2f7835c46aa9c85

        SHA256

        0e0ec57c4870a747f7851706d7b0f756d61a4383ddbdf141d0392d76dea7bedb

        SHA512

        4f315dd57b175df7b2d03aae34bb0d53138164b7104380099ff8ba04014df5be11539ebbc8065cbeb8aeb975eab62819149e9e26224a9c173dd32f0b3bb92814

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        cfbd964b0d337eb3665ae74389e4cfb1

        SHA1

        128dc859e4bb09d77f67c8e6839de40197ed8181

        SHA256

        c65da69d7caf4d3177b3bbf480507e388379f7bb48267ae3c8f4d65c7201a372

        SHA512

        3ff3a55bdab398581c8c1b8429ffe07e2d3e9a957ab805c7bc4af14feb88922b586e4bbf00648a6673cb6776e22759bf505df40baa2519e06f71b354c92c8023

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        41981f4454296a68199eb024a7eeda83

        SHA1

        bd31e30da328308ca42c54db262a61bc7ec934a6

        SHA256

        c29b67186ad72eaeb9afac5c01df80cd0ec37db61ee36723d8c00c344b207d7b

        SHA512

        acba6307a22b905276f686ab31eee639ae63f917b2b31e828de3729df22fa855f2deb492032a6faa52f8bb4da34113c31cb4c74f1e109fe8ff2d68e7d30b8e45

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        42e93ce4ee0d031200a066a65c8170bc

        SHA1

        d32df87596d8a4f381fad8477242e2ef0156441b

        SHA256

        5bbf7b3a33b7c13250dd6763c9ce57b2e0567165211ec353f76bb7eccae6cd90

        SHA512

        e6c1819b1fcb8e82cc7ac1e87b294cb0e4c84e16d754e4543510b170c3984f0a7d05c966487589b46b19c7b579db1e1af08aef33993c75d1243cd1e57a3345d7

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        a577284b3f3fd2661b1202399a0341c9

        SHA1

        d3a7621621693b16b6873c52fed74ad5936ffc5c

        SHA256

        e1113d943a16f188d60b4ac768f000c859b2c813bdb5bb7ce936130a71a8a76a

        SHA512

        49d8b6d66472d96ad699b5c79bea0ffc1900379f056cd6e2c7ed090c1403101820e4a1b473e67c27d4917d2f71fbfaffcc933f7faba15e52b26ca7ec3455fd50

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        0147eb6c66b69be8eaa83421380546c5

        SHA1

        193e7518a598c54af0b6839965ba2424b46968fb

        SHA256

        130cdac644baef2a701ccf09b2c9239b493b24333c2f4aaaf59fa93170c78f0b

        SHA512

        55df736a49849916a569b191b3841eb5b1c7f31f9352cb0261b53310a92340c5c4b7311c88748c8bc011ba91f998088d92f1fdb3f733b8d3551ae641adc1ef6c

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        780233acb719f5abd06878b89e1523ff

        SHA1

        171c9830c1a51d72778c19e827fefc51fb9dce2d

        SHA256

        b0b1d61061442171e73dd32725c5cfe6ea7054ae935536766ac53254ef8340d2

        SHA512

        5ac2488ba536510000cd933dbaa8a35adf64ad9ee09b6acbeb5db944dcad9ca2c942763ddcd48f4321531f228b602683630c9752713fe03398ae936e8ed6f960

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        40f323ac0be9d6b0883604b2de95e24b

        SHA1

        95657e057fd95bf9d06b59ad3b5e7e6bd8684691

        SHA256

        e86f3782d3ae4da7df2e7a11ae45f5e4759b4029d4c07cf9049755ad08e532b6

        SHA512

        0d0efabea42de034c261cb0edcb23a9793822a4193085b0d4014d61e1174288bb7b922fd513e914ad6519b13dadcc987bcc405d51e5967db2b55b2dc748718fa

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        5339eda9d0afe92c7f43a1d7ea5e83e5

        SHA1

        6a5c75598fa6b845009f6b0f99ceb072cfedd69d

        SHA256

        2b673c603cd134029e01c1acb74c46a839bf84e189d84732e043b17db1adf592

        SHA512

        3d5fbf2ed59d646551cb69afd6c3b349fa4a560c2e6d92bb690920ef6baa6cd264419d5ee8fa08900f5fa84a0df0806f72f3efadcf486791aea4f1a1c1e92989

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        f369dc0366f1372a012e4756d80a4903

        SHA1

        ee9eda9a685f8762dc8f5f1f6793fc17b7a2829d

        SHA256

        563077d36908a789955f9528b40decc4a05e238c1d5a4259c45df11de9e83150

        SHA512

        e2aab35c19ac1c74930072b4767aeddfdfc8412f45866745b6a8ea8a253c530f8d6092e7944c487d1ca0479d7cccb1328f77bd20fb199ea58fab7c759e78c4e4

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        a1cc1551871773489cf02774b49cf73f

        SHA1

        c38348bdd6d521b583e0fc9da7677db91e5ef417

        SHA256

        a16e7c518f01865dde7f09116510a85724826e9d2dae9b60a96245c95afc2c28

        SHA512

        926298fa77a87546571df8ec19941d1366307cfd9727e3ea29ab7155c7b5fa89b86b07da4fe6293cb2fe9adb7f7480ead1945c8c918ce1b7d6d97d053875bbe8

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        49ca30c044ec60f01b2a00a8d391ad3e

        SHA1

        4b705459e7b64a10a84acfee0ee8ba751e0e327e

        SHA256

        b491b6b970df60e53e07a90df938315effa8a0e47e12a8b488da20f5e5aacbe3

        SHA512

        c20e2d5606f3c379dbe426cbc8ef7a1d7d50799abfb6b0f978d476b26ce5681e5716f4b6b65c6998a44f3d5a95db8eaabfe90d8de47b7fc86f6404b2740d6a7e

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        cdb04e7447be7320509f9de2b243d647

        SHA1

        f6a6787b9641e6f50b29c76a525d9343c05da51e

        SHA256

        18dfc57baa12c85c1634b1a31e31a2ccceeb4b29266c87c799dd5340034ba1f8

        SHA512

        bdf3df5c9835687e913e936281cb1f716f10e04eb5082e13b2107106e10a48a762142cde9c69042d0d54f6e4bc05013b283e34833f183fc441ada6a48a0560c8

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        2f07a1938202c1d88ff476f34e539881

        SHA1

        9d9d358ef8ac2945055ff66ddbbdffc73d0bd53d

        SHA256

        9cbab7e8e3a388c91719c5bb9544b1455ee2c33944b6b06090ff29811db319c8

        SHA512

        482e306e1aa3f933c2c0bf53ced862795cdbbf2ff0504b348991a6771d384844941ee5c6bf6978f7259678c55cc09eb31de96e05eed1dcbc963641c5fe5fa65e

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        2281d439dba34f8eadf0339294092b3a

        SHA1

        a49e7696ed5798cfbc43aec966da2649cc88b9ed

        SHA256

        00c458408d8b34235f8dadd27d55d37430f6d3447d2f3c87167a22b00d5b3521

        SHA512

        6f560950d459e3a4118af106607d6cd42b8e9013c85080e6469515460f8f12c8a420e9697471dc28541404909f78ec9b84fae9f9e5979b5418878b89359f5a3b

      • C:\Users\Admin\AppData\Roaming\Adminlog.dat

        Filesize

        15B

        MD5

        bf3dba41023802cf6d3f8c5fd683a0c7

        SHA1

        466530987a347b68ef28faad238d7b50db8656a5

        SHA256

        4a8e75390856bf822f492f7f605ca0c21f1905172f6d3ef610162533c140507d

        SHA512

        fec60f447dcc90753d693014135e24814f6e8294f6c0f436bc59d892b24e91552108dba6cf5a6fa7c0421f6d290d1bafee9f9f2d95ea8c4c05c2ad0f7c1bb314

      • C:\Windows\SysWOW64\WinDir\Svchost.exe

        Filesize

        380KB

        MD5

        29aee678b3d57f86e1b1159db1ed51af

        SHA1

        f9c23af90a1b846cf39ceeb2776a042dad56f241

        SHA256

        e9a2460d4e14afd61345adcf91f287a791a8218d3b1e3093b62a815212b62126

        SHA512

        7f9e63fc0863c626d8889f069bb2c53be1f040e77a1212c3a90be5836729fd41df699893c380747ff3cd0be24d59851d6f80450f5b8aceb310345f89d2223324

      • memory/1116-1657-0x0000000010560000-0x00000000105C5000-memory.dmp

        Filesize

        404KB

      • memory/1116-635-0x0000000000400000-0x000000000040F000-memory.dmp

        Filesize

        60KB

      • memory/1116-907-0x0000000005B20000-0x0000000005B2F000-memory.dmp

        Filesize

        60KB

      • memory/1116-910-0x0000000005B20000-0x0000000005B2F000-memory.dmp

        Filesize

        60KB

      • memory/1116-888-0x0000000010560000-0x00000000105C5000-memory.dmp

        Filesize

        404KB

      • memory/1204-29-0x0000000002D60000-0x0000000002D61000-memory.dmp

        Filesize

        4KB

      • memory/2120-2-0x0000000000230000-0x0000000000240000-memory.dmp

        Filesize

        64KB

      • memory/2120-10-0x0000000000300000-0x0000000000310000-memory.dmp

        Filesize

        64KB

      • memory/2120-3-0x0000000000240000-0x0000000000250000-memory.dmp

        Filesize

        64KB

      • memory/2120-0-0x0000000000400000-0x000000000040F000-memory.dmp

        Filesize

        60KB

      • memory/2120-13-0x00000000003C0000-0x00000000003D0000-memory.dmp

        Filesize

        64KB

      • memory/2120-8-0x00000000002E0000-0x00000000002F0000-memory.dmp

        Filesize

        64KB

      • memory/2120-23-0x0000000000400000-0x000000000040F000-memory.dmp

        Filesize

        60KB

      • memory/2120-12-0x00000000003B0000-0x00000000003C0000-memory.dmp

        Filesize

        64KB

      • memory/2120-9-0x00000000002F0000-0x0000000000300000-memory.dmp

        Filesize

        64KB

      • memory/2120-4-0x0000000000250000-0x0000000000260000-memory.dmp

        Filesize

        64KB

      • memory/2120-15-0x00000000003E0000-0x00000000003F0000-memory.dmp

        Filesize

        64KB

      • memory/2120-17-0x0000000000410000-0x0000000000420000-memory.dmp

        Filesize

        64KB

      • memory/2120-16-0x00000000003F0000-0x0000000000400000-memory.dmp

        Filesize

        64KB

      • memory/2120-14-0x00000000003D0000-0x00000000003E0000-memory.dmp

        Filesize

        64KB

      • memory/2120-7-0x0000000000290000-0x00000000002A0000-memory.dmp

        Filesize

        64KB

      • memory/2120-5-0x0000000000260000-0x0000000000270000-memory.dmp

        Filesize

        64KB

      • memory/2120-6-0x0000000000280000-0x0000000000290000-memory.dmp

        Filesize

        64KB

      • memory/2120-20-0x0000000000450000-0x000000000045F000-memory.dmp

        Filesize

        60KB

      • memory/2120-1-0x0000000000220000-0x0000000000230000-memory.dmp

        Filesize

        64KB

      • memory/2120-11-0x00000000003A0000-0x00000000003B0000-memory.dmp

        Filesize

        64KB

      • memory/2392-886-0x0000000000400000-0x0000000000451000-memory.dmp

        Filesize

        324KB

      • memory/2392-25-0x0000000000400000-0x0000000000451000-memory.dmp

        Filesize

        324KB

      • memory/2392-28-0x0000000010410000-0x0000000010475000-memory.dmp

        Filesize

        404KB

      • memory/2392-22-0x0000000000400000-0x0000000000451000-memory.dmp

        Filesize

        324KB

      • memory/2392-21-0x0000000000400000-0x0000000000451000-memory.dmp

        Filesize

        324KB

      • memory/2392-562-0x00000000001B0000-0x00000000001BF000-memory.dmp

        Filesize

        60KB

      • memory/2392-24-0x0000000000400000-0x0000000000451000-memory.dmp

        Filesize

        324KB

      • memory/2972-1086-0x0000000010480000-0x00000000104E5000-memory.dmp

        Filesize

        404KB

      • memory/2972-554-0x0000000010480000-0x00000000104E5000-memory.dmp

        Filesize

        404KB

      • memory/2972-326-0x00000000000E0000-0x00000000000E1000-memory.dmp

        Filesize

        4KB

      • memory/2972-272-0x00000000000A0000-0x00000000000A1000-memory.dmp

        Filesize

        4KB

      • memory/2992-934-0x0000000000400000-0x000000000040F000-memory.dmp

        Filesize

        60KB

      • memory/2992-911-0x0000000000400000-0x000000000040F000-memory.dmp

        Filesize

        60KB