Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
25/07/2024, 15:26
Behavioral task
behavioral1
Sample
70294789b7707965ad5a6f425405939c_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
70294789b7707965ad5a6f425405939c_JaffaCakes118.exe
-
Size
296KB
-
MD5
70294789b7707965ad5a6f425405939c
-
SHA1
5d52ff5ece8ecc66f957c711150cdc19831c22fa
-
SHA256
c90159e02b038e0f12e19440a8652fc00c97e7a90f96aa9ebd26ed05ffaad8b2
-
SHA512
80f729063d0f31c5e3737830e2558bbe4065b2dde402f1ae28c1113659a932e7eec0b1c51d12bb49b69bfa27d11480759907a8f0e177a4af30f9aead6c50c9c5
-
SSDEEP
6144:xvWCo27XKrNz92aIP4KHeJpgmIcYdX6nnHMwbPPFb9VnyeR7ZCYqkw:xvvd7iZ2a1SeJzIcYgnswzPF3rl4ww
Malware Config
Extracted
cybergate
2.6
QTEL
lun420.no-ip.info:85
***MUTEX***
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
Svchost
-
install_file
Svchost.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
texto da mensagem
-
message_box_title
título da mensagem
-
password
abcd1234
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Signatures
-
resource yara_rule behavioral2/memory/892-0-0x0000000000400000-0x0000000000465000-memory.dmp upx behavioral2/memory/892-1-0x0000000000400000-0x0000000000465000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 70294789b7707965ad5a6f425405939c_JaffaCakes118.exe