Analysis
-
max time kernel
1s -
max time network
12s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/08/2024, 08:03
Static task
static1
Behavioral task
behavioral1
Sample
899d71edfd93b02874bfe620736d4480_JaffaCakes118.exe
Resource
win7-20240729-en
Errors
General
-
Target
899d71edfd93b02874bfe620736d4480_JaffaCakes118.exe
-
Size
355KB
-
MD5
899d71edfd93b02874bfe620736d4480
-
SHA1
7f6a382da4b34f5d3b5da63f3b21416bd2f19a9a
-
SHA256
c89232b9392166c2c29424ac0129238f6557cbf42a69f60ebae473bf785e975a
-
SHA512
b2d99b1377f5a3c878b563142565338c38c8318a8d16d2d8aea6f74275c505a28427c3ba212216b515422fbcda383e61ecefb513fce1a738eb35cb33e0450b51
-
SSDEEP
6144:49BHmtW3dfReDKodfut+fRI1iAFNjKYU5M9GFfMvmCCzhoy88F:4eWtfaCVPTjKn5M4pC2hoI
Malware Config
Extracted
cybergate
v1.07.5
Cyber
46.37.180.197:2300
M2PUXL8BFYT2U7
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
install
-
install_file
server.exe
-
install_flag
false
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
123456
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation 899d71edfd93b02874bfe620736d4480_JaffaCakes118.exe -
resource yara_rule behavioral2/memory/1480-13-0x0000000010410000-0x0000000010475000-memory.dmp upx behavioral2/memory/1480-17-0x0000000010480000-0x00000000104E5000-memory.dmp upx -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winupdate = "\"C:\\Users\\Admin\\AppData\\Roaming\\winupdate.exe\"" 899d71edfd93b02874bfe620736d4480_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3504 set thread context of 1480 3504 899d71edfd93b02874bfe620736d4480_JaffaCakes118.exe 84 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 899d71edfd93b02874bfe620736d4480_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings 899d71edfd93b02874bfe620736d4480_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3504 899d71edfd93b02874bfe620736d4480_JaffaCakes118.exe 3504 899d71edfd93b02874bfe620736d4480_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3504 899d71edfd93b02874bfe620736d4480_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 3504 wrote to memory of 1480 3504 899d71edfd93b02874bfe620736d4480_JaffaCakes118.exe 84 PID 3504 wrote to memory of 1480 3504 899d71edfd93b02874bfe620736d4480_JaffaCakes118.exe 84 PID 3504 wrote to memory of 1480 3504 899d71edfd93b02874bfe620736d4480_JaffaCakes118.exe 84 PID 3504 wrote to memory of 1480 3504 899d71edfd93b02874bfe620736d4480_JaffaCakes118.exe 84 PID 3504 wrote to memory of 1480 3504 899d71edfd93b02874bfe620736d4480_JaffaCakes118.exe 84 PID 3504 wrote to memory of 1480 3504 899d71edfd93b02874bfe620736d4480_JaffaCakes118.exe 84 PID 3504 wrote to memory of 1480 3504 899d71edfd93b02874bfe620736d4480_JaffaCakes118.exe 84 PID 3504 wrote to memory of 1480 3504 899d71edfd93b02874bfe620736d4480_JaffaCakes118.exe 84 PID 3504 wrote to memory of 1480 3504 899d71edfd93b02874bfe620736d4480_JaffaCakes118.exe 84 PID 3504 wrote to memory of 1480 3504 899d71edfd93b02874bfe620736d4480_JaffaCakes118.exe 84 PID 3504 wrote to memory of 1480 3504 899d71edfd93b02874bfe620736d4480_JaffaCakes118.exe 84 PID 3504 wrote to memory of 1480 3504 899d71edfd93b02874bfe620736d4480_JaffaCakes118.exe 84 PID 3504 wrote to memory of 1480 3504 899d71edfd93b02874bfe620736d4480_JaffaCakes118.exe 84 PID 3504 wrote to memory of 2364 3504 899d71edfd93b02874bfe620736d4480_JaffaCakes118.exe 86 PID 3504 wrote to memory of 2364 3504 899d71edfd93b02874bfe620736d4480_JaffaCakes118.exe 86 PID 3504 wrote to memory of 2364 3504 899d71edfd93b02874bfe620736d4480_JaffaCakes118.exe 86 PID 1480 wrote to memory of 3536 1480 vbc.exe 89 PID 1480 wrote to memory of 3536 1480 vbc.exe 89 PID 1480 wrote to memory of 3536 1480 vbc.exe 89 PID 1480 wrote to memory of 3536 1480 vbc.exe 89 PID 1480 wrote to memory of 3536 1480 vbc.exe 89 PID 1480 wrote to memory of 3536 1480 vbc.exe 89 PID 1480 wrote to memory of 3536 1480 vbc.exe 89 PID 1480 wrote to memory of 3536 1480 vbc.exe 89 PID 1480 wrote to memory of 3536 1480 vbc.exe 89 PID 1480 wrote to memory of 3536 1480 vbc.exe 89 PID 1480 wrote to memory of 3536 1480 vbc.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\899d71edfd93b02874bfe620736d4480_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\899d71edfd93b02874bfe620736d4480_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3504 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:3536
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"3⤵PID:5036
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\s4c.vbs"2⤵
- System Location Discovery: System Language Discovery
PID:2364
-