Analysis
-
max time kernel
133s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
17-08-2024 08:07
Behavioral task
behavioral1
Sample
a1c761b9023eaa9a2a001903be9a5377_JaffaCakes118.exe
Resource
win7-20240729-en
General
-
Target
a1c761b9023eaa9a2a001903be9a5377_JaffaCakes118.exe
-
Size
275KB
-
MD5
a1c761b9023eaa9a2a001903be9a5377
-
SHA1
00a840a763ee6fb790f4d65d44332863a02c9b6a
-
SHA256
569ce2484a7e42e1acf130e9196e0b77f27e9ecf5c4a1cd0ac587b2030226832
-
SHA512
ecda6df47c9ed66441c6e13cd8db575e55ee94e874520431268dd598265d7cf6bff4c08f9513aecfc6a701d4db584825a9ef877027a6ea8ca2289cd46bab2285
-
SSDEEP
6144:uACkBq0MctXdWGPoA4vwesaO/p/tQPwkfDPXK1nGAS+ad78mfrVx5H:vJM+kGPoAaDy/WP9fDiBK7njpH
Malware Config
Extracted
cybergate
v1.02.1
HacKeD
by-brunix.no-ip.org:1995
brunix-by.no-ip.biz:1995
192.168.1.13:1995
Pluguin
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
Microsoft
-
install_file
System32.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
VOCÊ FOI HACKEADO ...SEU SISTEMA SERÁ FORMATADO.
-
message_box_title
LAMMER
-
password
123
-
regkey_hkcu
Win32
-
regkey_hklm
Win32
Signatures
-
resource yara_rule behavioral2/memory/4008-0-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral2/memory/4008-1-0x0000000000400000-0x0000000000457000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a1c761b9023eaa9a2a001903be9a5377_JaffaCakes118.exe