Analysis

  • max time kernel
    149s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    18/08/2024, 14:58

General

  • Target

    a719b99600f4380f0324409d69626167_JaffaCakes118.exe

  • Size

    1.2MB

  • MD5

    a719b99600f4380f0324409d69626167

  • SHA1

    564928648c3626fd81ef77b4ef27280122803f70

  • SHA256

    376e51cda8b8bbe9c58bbce5456ec6dd49461a77038b1d1d6b1d3a72290d2741

  • SHA512

    025fac508ba91876f4598786c6e7ffc9ecbe4dab84238d19a0ef949fdfa128fb1cb25900d9c0233f3ffb13bcfb03dcc64a2e4442afe90341bec53f225bcf1f43

  • SSDEEP

    24576:KOwDwQfz+8MHUxym1+RAPxMVpP1NBOaB2j3LGGt6tmt8fIN:KRlfcH7mPPxcU6cpWg8fA

Malware Config

Extracted

Family

cybergate

Version

2.7 Final

Botnet

Vectiiiiim

C2

mixlolz.no-ip.biz:81

127.0.0.1:82

Mutex

***MUTEX***

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    install

  • install_file

    iexplorer.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    texto da mensagem

  • message_box_title

    título da mensagem

  • password

    abcd1234

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Signatures

  • CyberGate, Rebhip

    CyberGate is a lightweight remote administration tool with a wide array of functionalities.

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a719b99600f4380f0324409d69626167_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\a719b99600f4380f0324409d69626167_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:408
    • C:\Users\Admin\AppData\Local\Temp\a719b99600f4380f0324409d69626167_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\a719b99600f4380f0324409d69626167_JaffaCakes118.exe
      2⤵
      • Boot or Logon Autostart Execution: Active Setup
      • Adds Run key to start application
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2280
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe"
        3⤵
          PID:2796
        • C:\Users\Admin\AppData\Local\Temp\a719b99600f4380f0324409d69626167_JaffaCakes118.exe
          "C:\Users\Admin\AppData\Local\Temp\a719b99600f4380f0324409d69626167_JaffaCakes118.exe"
          3⤵
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of AdjustPrivilegeToken
          PID:2956
          • C:\Windows\install\iexplorer.exe
            "C:\Windows\install\iexplorer.exe"
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            PID:5800
            • C:\Windows\install\iexplorer.exe
              C:\Windows\install\iexplorer.exe
              5⤵
              • Executes dropped EXE
              PID:5892

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\XX--XX--XX.txt

            Filesize

            588KB

            MD5

            047b869d4c4d61de1fe7cab04fb1be15

            SHA1

            0df3e0237664dc71519d876ea315c95d4c804eb3

            SHA256

            dc13fcf878537ebe960721a15ef4d5fd9c7c728b19aef5558de43dbea7e5aa21

            SHA512

            a27a99f5446f5a6d1feda7ce5f0df8278a6cdf3682372574cbb4c3bf454aba3d3b73f0f96d52155cb21d162cbbed60eb029eb4fcec3cc57cafab15f8a07f362a

          • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

            Filesize

            8B

            MD5

            ea6e6f8d3f1bdbf0156025a877961c5a

            SHA1

            a181a90fd8c1c32852c9d81d16b4671730c8b014

            SHA256

            5bbd776a6d8a27bb2bccfe0c2abfca826a0c1a24bf2e0a51c2cea78f28b0c17e

            SHA512

            6c425db8c023b41304034b51b9191f185b572f3e42ac31fe8700e6606b3009b39f9f8f69a833be66fa4ec40d539e227949cd59d52e52ba2818af285d7dcc0517

          • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

            Filesize

            8B

            MD5

            72413845ef470ac7cd1122627676f1eb

            SHA1

            ac64ce8249145dda0d97763c130052504814a310

            SHA256

            1dc26c44d6e9b84f10722edaadbe5d7f503da3e8a88bd21a0438928b7f2d32d0

            SHA512

            a5d36124404741b4afd3648cbbbf2e17492035ba43375c9d8c74b73b3aa177be1b328e2a652573b2121332057b55b64dbb6a8f4e6fb2f46b0d3082b837ed8abc

          • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

            Filesize

            8B

            MD5

            8bae9bd5fa6235fefa465728e24a0a21

            SHA1

            1bb8c9ae6a6fa25463c16cdec51f282c04ac417c

            SHA256

            8ee1eaaa38af2b603222a3012f95eb9fc214cc10c39b157e6a4301fe0cb9f16c

            SHA512

            2a3ef5d16245a467240357d009ce0c428846f9512d429814a07b853f1fffd5efd5790586c1365b45efd5a5df25484833f40b66b103f658358fea12af25c79371

          • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

            Filesize

            8B

            MD5

            651a219c6024bb41e8b603d90fb3aa1a

            SHA1

            7aa0e8a1c36c8dfeee2c941e4639a602eb4664ba

            SHA256

            d8465a6e95d6b29aae98694b0aae61b99805204020c114f1ba647328012811cb

            SHA512

            fdff09a158654b9cb3df80934a10317fea90352550b794ac53a64ae970cc1694d97cdf44f36cb275e1701ec698c26f3b1eb19f81c014d8017ff9e582f94c41a3

          • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

            Filesize

            8B

            MD5

            0ae03bed90922415c528011a7e6da8f0

            SHA1

            1197ad2fb8fbbcddb596c5cf7c5bd61d0a2e3705

            SHA256

            0d0cb76735909854ba3039f2b8bd363c0eb29e088fc69fee9d7606a62d43c38e

            SHA512

            d6e0590faca896ddec8064886336607bb93ad0cdfa30d62768d4a75d05337a279b46f4e54ed0bba1fb1295ed4fbce067ebbac4be451b6ab7dc055e5b79bb844a

          • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

            Filesize

            8B

            MD5

            0f6688330c40f743744a48721d20c687

            SHA1

            ccd06fc3703a5446ea629cfacccc310b5f351084

            SHA256

            034321cfbe552ebdd98c3f2e24921ab46f8ff21dac8960c95444e0330c62ad63

            SHA512

            769b3991fc8e7fb1611d9784df7a59bb1780502f61d3fdfaace2c22f1ac74249a6e83f9517b3794c85c24aaf0c7cc432311e3d346952202129c4d4c45a132502

          • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

            Filesize

            8B

            MD5

            211d48c204df164353d7a6e1e401a719

            SHA1

            868544656329d6d589ec79d64477d1e5c8735f89

            SHA256

            de518006a746b72a904695771bf58831bcffc18ff0e8f12df21dd320e49fe950

            SHA512

            eeaa45e170b30c632ce58ce316c2e11b00871071d6979f380be8a65f490ea6d0c376169192fc10c1d3b82a3eec328dcf2aae09890ed76eb5ef55b1bfbe53582c

          • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

            Filesize

            8B

            MD5

            7be3eb80f01a05d1278f63e760b79ee6

            SHA1

            3ca1f9db86a419b5b07491094bfb80c7e292ca06

            SHA256

            f94c6e3979342e5eaf54d808b95d4f8ca4780b63792754e334dbeeb49c3f7162

            SHA512

            6c23083f8ba8c5fb01a499c071966cf7600f61b90552d7b02a6847493f814dcaeddae8bcdf588f93070b56f38ff4cd1eca4ecbd71c3919f2402cc2c63714dfbe

          • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

            Filesize

            8B

            MD5

            648969846d39df28b206d7e39b282310

            SHA1

            66857c8ea5d5cc247145326e204c0d31ef3d619f

            SHA256

            f35aafb3fc2d00de9b3cca0464ae114a9627d6136b4c0aa2c1b5343d766a9e75

            SHA512

            4d1219103c77ea4ad1aae50a5faeae9313b9d9b25b705ba0dc5e02bd988bc4b89707fd64873dd78c991df91161f3768656da67d9c546ac4ae1f55121c21db1e6

          • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

            Filesize

            8B

            MD5

            18d8e40b1649dd7cd1c363771d750533

            SHA1

            202f213c7271d56ae730916690400c073affa424

            SHA256

            d5991c7fd0a4daeb01575572d5274d0f6898c9401544924749fd631d7d966fdd

            SHA512

            f719772ab700b5b8437c74fa4a39b47380c35750e8ffae2ac3ec8c8249b5c3814c94337cf2f67c8e85b716d54e6a1f5aaecfcb02700933582046389ec43d9169

          • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

            Filesize

            8B

            MD5

            f4a6a4f5ad36a6940bea292cf09deefd

            SHA1

            2287be54d64c13316d99958cbb84b09ef2b4c37c

            SHA256

            1bf39c30e8e95d139ff95fc75570bca9017dcc14d8f37e3d39f1c151fdea7c73

            SHA512

            ca00898fae45a4b5fe22811485509df172f64e1846f2f8289bd6eed69a65da8e1b60df07fe666ac69c9312643e4e346f014d26663996cdd688ad9750de40dbdc

          • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

            Filesize

            8B

            MD5

            2b26888fb3a65babf6c32b382bd76fa3

            SHA1

            644017f8fae0800ca7b56145531198d3dc03bc73

            SHA256

            2ba8231a67a6327db69d55c9508cd5091b722771e8da5c083e1c477f00425878

            SHA512

            555f821b61f35656d967cc2a2741a0f19bc3992d49575fd65e9108a9e517655373312f5bbdb66954c8ef7ee4afb46b86aa41d287f45fe8a1538241fa33e94287

          • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

            Filesize

            8B

            MD5

            cb590eb4405b15ffc28854100db7d6e4

            SHA1

            a9a16a46a33149fd85ae594d1a997935d4d04671

            SHA256

            7ebe4f1f1f57af75b019fc4378f4047c7cd267368f15af7f62d7b915352b065d

            SHA512

            96a1d5a42051fd896a861920e803fa03fc7c6ffe82fefcdcfdff75166510a2f4821dc7c6d75fc94d4be61c8357bbd0d4f1f1c41645b06ee069621a18b47dcc48

          • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

            Filesize

            8B

            MD5

            dd5aa5913a750dc44a5d730042036848

            SHA1

            59299c6a52335a94c770b2cfd70b0469aee6ce99

            SHA256

            b08922e0fc695cf3697763263294ca8902e2908364c48e6d409dcbe46a320046

            SHA512

            d82026ce55086ed9a8b48e37cfd8c57c72eceb730fe6541dc89f99b490d28dee325051e0bf87656e83f6842e1fa02e41fb9e244104fc9caf65f587e885178805

          • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

            Filesize

            8B

            MD5

            ad96123c3e8cbc0811567eb83cc3e4e6

            SHA1

            d541cdd4cbc79934845575156f21b261746f5936

            SHA256

            791d15b965be0f31311be1a714ce80fe4f9ff5d49215d5e3c7330ca789bbd09a

            SHA512

            cb8c6d15c711da56b5f6141ef6a332d02bca4edfe11b50395e5dbc70f7fff69779330153d26ce568f1305c2f1427837f7b3e1c7414552da3cbae8cc7b2dcb017

          • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

            Filesize

            8B

            MD5

            062b81f1fcd2841130f81eb5e11b1b97

            SHA1

            affdb69a6e69dbace9eb757dcf5c36127491868f

            SHA256

            15d951b5bb64e2b16ace8a9656091118da7e83a2c07e648c813085015a92b3a9

            SHA512

            ab1daaae74c0b04ec937b51391e9bc7c00d79f145170d3a44631269e7f2e8fe749b9bc8f1695308a870874ab531a0c5876f3804ca63f2f392e7f596fbb22d7f6

          • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

            Filesize

            8B

            MD5

            4c46b146bcbad78b44b73810f8415506

            SHA1

            a116d5fb270477f2775b200c2d7a2a80f6625fcc

            SHA256

            591895947479611074122b5bd3210891ed1e0bd0a8579da89298dcd6a948b3cd

            SHA512

            3004d35dbd0522296df9c9a7b91d4d47513badff8b5e70e2cb18fd9d2404dca85abeb959e3a4e54fabaa45c400a8e3d894a24fcafea58e6dbb497738113404d0

          • C:\Users\Admin\AppData\Roaming\logs.dat

            Filesize

            15B

            MD5

            bf3dba41023802cf6d3f8c5fd683a0c7

            SHA1

            466530987a347b68ef28faad238d7b50db8656a5

            SHA256

            4a8e75390856bf822f492f7f605ca0c21f1905172f6d3ef610162533c140507d

            SHA512

            fec60f447dcc90753d693014135e24814f6e8294f6c0f436bc59d892b24e91552108dba6cf5a6fa7c0421f6d290d1bafee9f9f2d95ea8c4c05c2ad0f7c1bb314

          • C:\Windows\install\iexplorer.exe

            Filesize

            1.2MB

            MD5

            a719b99600f4380f0324409d69626167

            SHA1

            564928648c3626fd81ef77b4ef27280122803f70

            SHA256

            376e51cda8b8bbe9c58bbce5456ec6dd49461a77038b1d1d6b1d3a72290d2741

            SHA512

            025fac508ba91876f4598786c6e7ffc9ecbe4dab84238d19a0ef949fdfa128fb1cb25900d9c0233f3ffb13bcfb03dcc64a2e4442afe90341bec53f225bcf1f43

          • \??\c:\users\admin\appdata\local\temp\15C03DB0

            Filesize

            14B

            MD5

            d975505d64330419813fbd2e2782dfcd

            SHA1

            cf307e67396fdb89f6fff614a419efad9e8422e0

            SHA256

            6fe3409a30a3aa66f4efb5984f72ecbe8fa1c654a9a84d5233591d367828faae

            SHA512

            a11c603278c1084666f501642cf8a32f4e27df1d6b2dbd43a92975841e0eb2db33472d017feb85840308c370e5777f13ea80743dcf29ceff51a49529de2eb946

          • memory/408-9-0x0000000000400000-0x00000000007AA000-memory.dmp

            Filesize

            3.7MB

          • memory/408-6-0x0000000003C40000-0x0000000003FEA000-memory.dmp

            Filesize

            3.7MB

          • memory/408-0-0x0000000000400000-0x00000000007AA000-memory.dmp

            Filesize

            3.7MB

          • memory/2280-14-0x0000000010410000-0x000000001046C000-memory.dmp

            Filesize

            368KB

          • memory/2280-13-0x0000000010410000-0x000000001046C000-memory.dmp

            Filesize

            368KB

          • memory/2280-40-0x0000000001EE0000-0x000000000228A000-memory.dmp

            Filesize

            3.7MB

          • memory/2280-4-0x0000000000400000-0x00000000004AA000-memory.dmp

            Filesize

            680KB

          • memory/2280-20-0x0000000010470000-0x00000000104CC000-memory.dmp

            Filesize

            368KB

          • memory/2280-8-0x0000000000400000-0x00000000004AA000-memory.dmp

            Filesize

            680KB

          • memory/2280-10-0x0000000000400000-0x00000000004AA000-memory.dmp

            Filesize

            680KB

          • memory/2280-3368-0x0000000000400000-0x00000000004AA000-memory.dmp

            Filesize

            680KB

          • memory/2280-5-0x0000000000400000-0x00000000004AA000-memory.dmp

            Filesize

            680KB

          • memory/2956-27-0x00000000001D0000-0x00000000001D1000-memory.dmp

            Filesize

            4KB

          • memory/2956-3409-0x000000000B350000-0x000000000B6FA000-memory.dmp

            Filesize

            3.7MB

          • memory/2956-3408-0x000000000B350000-0x000000000B6FA000-memory.dmp

            Filesize

            3.7MB

          • memory/2956-3392-0x000000000B350000-0x000000000B6FA000-memory.dmp

            Filesize

            3.7MB

          • memory/2956-3393-0x000000000B350000-0x000000000B6FA000-memory.dmp

            Filesize

            3.7MB

          • memory/2956-41-0x0000000000400000-0x00000000007AA000-memory.dmp

            Filesize

            3.7MB

          • memory/2956-21-0x00000000001B0000-0x00000000001B1000-memory.dmp

            Filesize

            4KB

          • memory/2956-33-0x0000000000350000-0x0000000000351000-memory.dmp

            Filesize

            4KB

          • memory/5800-3404-0x0000000003D00000-0x00000000040AA000-memory.dmp

            Filesize

            3.7MB

          • memory/5800-3405-0x0000000000400000-0x00000000007AA000-memory.dmp

            Filesize

            3.7MB

          • memory/5800-3394-0x0000000000400000-0x00000000007AA000-memory.dmp

            Filesize

            3.7MB