Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08/09/2024, 22:39
Static task
static1
Behavioral task
behavioral1
Sample
d5370a01303e0afce725c9834e632233_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
d5370a01303e0afce725c9834e632233_JaffaCakes118.exe
-
Size
315KB
-
MD5
d5370a01303e0afce725c9834e632233
-
SHA1
1e7ed2fb9dacf927cc2f5228ec3268398b56cbf7
-
SHA256
e9f8c9f2e06ec57ba035788b663be0d6f4daa84fcdaae6f7404ec32018a3dbb6
-
SHA512
55435ae0d5f83abb9ff4fc1ae2f97d1d5b67ba5a4b8e27338219d0e84a8146d9746903ddf5b9c2e1c36d6ea3c506d4e19775dd29b1c0ea27f636d22b4ae0abe8
-
SSDEEP
6144:GBXrokILZ3azkm07MfhJo+kzo0PKTN7vb2wJdR/:GXw3axaMfPP0PKTBviil
Malware Config
Extracted
cybergate
v1.07.5
remote
acebomber.no-ip.info:100
acebomber.no-ip.info:8080
QD13I0IE20373F
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
install
-
install_file
svchost.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
123456
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Signatures
-
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run vbc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\install\\svchost.exe" vbc.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run vbc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\install\\svchost.exe" vbc.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{52H57FY5-1751-M040-OW46-N2177HNQFOG7} vbc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{52H57FY5-1751-M040-OW46-N2177HNQFOG7}\StubPath = "C:\\Windows\\system32\\install\\svchost.exe Restart" vbc.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation vbc.exe -
Executes dropped EXE 2 IoCs
pid Process 264 vbc.exe 3220 svchost.exe -
Loads dropped DLL 1 IoCs
pid Process 4596 vbc.exe -
resource yara_rule behavioral2/memory/264-15-0x0000000010410000-0x0000000010475000-memory.dmp upx behavioral2/memory/264-19-0x0000000010480000-0x00000000104E5000-memory.dmp upx -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\system32\\install\\svchost.exe" vbc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\system32\\install\\svchost.exe" vbc.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\install\svchost.exe vbc.exe File opened for modification C:\Windows\SysWOW64\install\svchost.exe vbc.exe File opened for modification C:\Windows\SysWOW64\install\svchost.exe vbc.exe File opened for modification C:\Windows\SysWOW64\install\ vbc.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2588 set thread context of 264 2588 d5370a01303e0afce725c9834e632233_JaffaCakes118.exe 84 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d5370a01303e0afce725c9834e632233_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ vbc.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 264 vbc.exe 264 vbc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4596 vbc.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeBackupPrivilege 4596 vbc.exe Token: SeRestorePrivilege 4596 vbc.exe Token: SeDebugPrivilege 4596 vbc.exe Token: SeDebugPrivilege 4596 vbc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2588 wrote to memory of 264 2588 d5370a01303e0afce725c9834e632233_JaffaCakes118.exe 84 PID 2588 wrote to memory of 264 2588 d5370a01303e0afce725c9834e632233_JaffaCakes118.exe 84 PID 2588 wrote to memory of 264 2588 d5370a01303e0afce725c9834e632233_JaffaCakes118.exe 84 PID 2588 wrote to memory of 264 2588 d5370a01303e0afce725c9834e632233_JaffaCakes118.exe 84 PID 2588 wrote to memory of 264 2588 d5370a01303e0afce725c9834e632233_JaffaCakes118.exe 84 PID 2588 wrote to memory of 264 2588 d5370a01303e0afce725c9834e632233_JaffaCakes118.exe 84 PID 2588 wrote to memory of 264 2588 d5370a01303e0afce725c9834e632233_JaffaCakes118.exe 84 PID 2588 wrote to memory of 264 2588 d5370a01303e0afce725c9834e632233_JaffaCakes118.exe 84 PID 2588 wrote to memory of 264 2588 d5370a01303e0afce725c9834e632233_JaffaCakes118.exe 84 PID 2588 wrote to memory of 264 2588 d5370a01303e0afce725c9834e632233_JaffaCakes118.exe 84 PID 2588 wrote to memory of 264 2588 d5370a01303e0afce725c9834e632233_JaffaCakes118.exe 84 PID 2588 wrote to memory of 264 2588 d5370a01303e0afce725c9834e632233_JaffaCakes118.exe 84 PID 2588 wrote to memory of 264 2588 d5370a01303e0afce725c9834e632233_JaffaCakes118.exe 84 PID 264 wrote to memory of 4484 264 vbc.exe 87 PID 264 wrote to memory of 4484 264 vbc.exe 87 PID 264 wrote to memory of 4484 264 vbc.exe 87 PID 264 wrote to memory of 4484 264 vbc.exe 87 PID 264 wrote to memory of 4484 264 vbc.exe 87 PID 264 wrote to memory of 4484 264 vbc.exe 87 PID 264 wrote to memory of 4484 264 vbc.exe 87 PID 264 wrote to memory of 4484 264 vbc.exe 87 PID 264 wrote to memory of 4484 264 vbc.exe 87 PID 264 wrote to memory of 4484 264 vbc.exe 87 PID 264 wrote to memory of 4484 264 vbc.exe 87 PID 264 wrote to memory of 4484 264 vbc.exe 87 PID 264 wrote to memory of 4484 264 vbc.exe 87 PID 264 wrote to memory of 4484 264 vbc.exe 87 PID 264 wrote to memory of 4484 264 vbc.exe 87 PID 264 wrote to memory of 4484 264 vbc.exe 87 PID 264 wrote to memory of 4484 264 vbc.exe 87 PID 264 wrote to memory of 4484 264 vbc.exe 87 PID 264 wrote to memory of 4484 264 vbc.exe 87 PID 264 wrote to memory of 4484 264 vbc.exe 87 PID 264 wrote to memory of 4484 264 vbc.exe 87 PID 264 wrote to memory of 4484 264 vbc.exe 87 PID 264 wrote to memory of 4484 264 vbc.exe 87 PID 264 wrote to memory of 4484 264 vbc.exe 87 PID 264 wrote to memory of 4484 264 vbc.exe 87 PID 264 wrote to memory of 4484 264 vbc.exe 87 PID 264 wrote to memory of 4484 264 vbc.exe 87 PID 264 wrote to memory of 4484 264 vbc.exe 87 PID 264 wrote to memory of 4484 264 vbc.exe 87 PID 264 wrote to memory of 4484 264 vbc.exe 87 PID 264 wrote to memory of 4484 264 vbc.exe 87 PID 264 wrote to memory of 4484 264 vbc.exe 87 PID 264 wrote to memory of 4484 264 vbc.exe 87 PID 264 wrote to memory of 4484 264 vbc.exe 87 PID 264 wrote to memory of 4484 264 vbc.exe 87 PID 264 wrote to memory of 4484 264 vbc.exe 87 PID 264 wrote to memory of 4484 264 vbc.exe 87 PID 264 wrote to memory of 4484 264 vbc.exe 87 PID 264 wrote to memory of 4484 264 vbc.exe 87 PID 264 wrote to memory of 4484 264 vbc.exe 87 PID 264 wrote to memory of 4484 264 vbc.exe 87 PID 264 wrote to memory of 4484 264 vbc.exe 87 PID 264 wrote to memory of 4484 264 vbc.exe 87 PID 264 wrote to memory of 4484 264 vbc.exe 87 PID 264 wrote to memory of 4484 264 vbc.exe 87 PID 264 wrote to memory of 4484 264 vbc.exe 87 PID 264 wrote to memory of 4484 264 vbc.exe 87 PID 264 wrote to memory of 4484 264 vbc.exe 87 PID 264 wrote to memory of 4484 264 vbc.exe 87 PID 264 wrote to memory of 4484 264 vbc.exe 87 PID 264 wrote to memory of 4484 264 vbc.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\d5370a01303e0afce725c9834e632233_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d5370a01303e0afce725c9834e632233_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Users\Admin\AppData\Local\Temp\vbc.exeC:\Users\Admin\AppData\Local\Temp\vbc.exe2⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:264 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:4484
-
-
C:\Users\Admin\AppData\Local\Temp\vbc.exe"C:\Users\Admin\AppData\Local\Temp\vbc.exe"3⤵
- Checks computer location settings
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:4596 -
C:\Windows\SysWOW64\install\svchost.exe"C:\Windows\system32\install\svchost.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3220
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD54ad8fa33ef9412e122d585d603eace5a
SHA1fdc8ea181390e90da0125389edaa96f95ab653d8
SHA256c92f16b24915720788b178dde4451e337c4b590e2e499af24e34a87c9dace088
SHA51226dc6ecdeb87e2646d1556ccdd875151dbf7588b14f7213843dff7f04f77ab591c363c2d8ad520a3b60f3fc1799e7aa703065adf03df817f6eef9cb8ef42bdca
-
Filesize
8B
MD52987ce8f4c9d35e10541f3c8e5e93fe8
SHA13b4796feb35e47e3b84c7f4baf2acb88cb26740c
SHA256b77e4101f4d47142277dd0df33a8d80084cec7c4cd67f4b94ebed819936f5bb5
SHA512224770b4b830ed27fac257c9cbcefeae52befb94cb1b49f8329ae63104911897ef66fd04887d6c5842cd83ec8b687bb6b7cd30465e6db3303d56434b26fe33b3
-
Filesize
8B
MD5ba51d969b5b3645d8aea59e492658efe
SHA1ce52d2cf2243dfbf5a6603618b73ca4e44c18b60
SHA2568dc0bb155e771fb86168c4b307f629fc57a7ba633b37fb7e4babf8ca46219b06
SHA512567ab983eaac8a5a99fb11fbfbc5e51b51a0aeb9b19d9f48b1ce02b5ebf289273d1bfe92b5d00ebe969be12f1b7ac32c55b7bcf0f6d57663853adce430e03737
-
Filesize
8B
MD5a76ab98beca27344431053e7e579786d
SHA1ef61edc420b3d3136ee8233420cfacddae938981
SHA25617537f665f00dc4a82a3f21373a67702e4be838e0c4d63767549753d7519f08a
SHA51258fd569f95a547ca115ad821ed38ec89d7c62d4cc78bbd75a3c6f62ac034e77d9e57bc379684d99d36292120ea91b8ed9060ce368992c9f57469e51f11237f61
-
Filesize
8B
MD57387a06d95d12dc35030337a680ef140
SHA15299e03b6d869f6da07af12eb4eb6f7d02cf8b21
SHA256c8ab9326e39847041511d5d5274b528fa28bd39f4183da11c60f27c2722d6759
SHA512b64bd2fbcf694d72b4a4691d6de3e1e35994d29ff10fe298092272a5f4bc3db7009c704f7951d41e2504f5ea50aa63e5279ce25bf3c8cc35d9aee06c9ee12fc5
-
Filesize
8B
MD56c1763df77694201001a1db5b5b633d7
SHA126f3a8657c8dacc0571bd3d2f663a3529ba82fe1
SHA25638a29a1623d0f73d494dad1dbaf5fe1a78a7db409e0f2fab5d252bf4ec985378
SHA5128cbb26afef2d3181046b7af5d300cb2955c7c9dd9efae8a4d28d63d7321ce5174be476957d2c3a73135d243358b6486d46e4bd575b8f7d0d6c5319a3d5920410
-
Filesize
8B
MD5f6710b198f400272885b3bbb572d610d
SHA194fe6099381694b8398d37eb98cd33d78b176cad
SHA256e5f6e6a1a2804bc29fd63d3cda512c11959b6880f861a72c42114ffcbf59c18d
SHA512621dc1a7b944f75488d030cd0d50427beabfd66c0258fe8e344104536001d34b9509dcdb52adde20d59b27471671ea2a7777187af5b2079e58ec719b3a1e9133
-
Filesize
8B
MD509a685f06a57ad3909a426675f3ab66d
SHA12f8722fa86379bf020ca4d4cc013b0bb37c035d6
SHA256f10c76ed10eb7b16276ee8088359a8018ae1041252a513425447aa60e8d40e62
SHA512a7c6d7435800e66cff79c00108511167ffe258fd62e596508ba9c11669f08b07e73f214a6d6fbc3a61ebcea95a4bd1e02f16dc58293b6f005747ba8c793307c8
-
Filesize
8B
MD590223706be0e74657bf2c11d547e6ca2
SHA12c17644bbda5d3d8b9894ab26703039398d1289e
SHA256104c5cd843afd8780babe6a2666b8b997eeedd7d86b6790f8c8c239e9bf1157f
SHA512122f9d34d01493c1ad6ee367df51855135ac7fb001ff6344cccd3e8648557f686cc69583e2f8e19b5e29ceacbccba889c40c3b3f63019ff94ad7b5067a83e46c
-
Filesize
8B
MD5485647b21ab314e8662f64dee9e415cf
SHA1dd161d7bccfc9cb209158666b8b2a4002abcc7c6
SHA256abf01141053b25c71f60ca64ec84529602ee0e1607cbb3be2a0549e79431b9f5
SHA512ecdb00adc8834e2b9c07af7efd6b9ed1971f21dab8e2471bf514a831a161ccaa3aa44bf4f29e3760cd05eb85c19e281938b8faeb634108d3f666529bea3914cf
-
Filesize
8B
MD51b77491b531785cc4906f6a11cdcc15a
SHA15b6a4ad5e5372fd3051ced5f0693f956b802874f
SHA2561cc178036a881149395356694b3a398659386aef39bf9f5c52714e0750e8663b
SHA512a055121258076f39cc4d9c4c8d5a8b5b323666eccddd2521f19a8563983fbfe6124f46d9ca7c57ddf1771b7b2e82a9a788e9eb8fb86fd80a7c85f121a98dff51
-
Filesize
8B
MD5502b0c689a13bfddb32d086f1a902003
SHA175a06d71bc1b6f3c5ffc2bc68bf6ded66ddb0014
SHA256417f47243e4aa81233b3a3c0865acfa72b40e0253c5737cfa2f2cd6ff7b90209
SHA5122115542dc612131e8f177cccd24ab38f6cbe79e37d0cef4665eb88aea3b5c0d6887ca494d590fae689316bbf704b08fc7d8b5a05a4899536e310dbac143b8764
-
Filesize
8B
MD501adea81cf6f49992255dc13292b8af2
SHA1fb0fa0e0f609cc57ecc7f654aa9143a4f52181c3
SHA256e2789edd50f101bc9cce146788863c804552893cd33b82a0f704c14eb3346d69
SHA512b441cd39c2f6942b5a3a9d5af0e1f64ac355d90977f69e888603b477cda4bc0764c9f1884a8b39717f4ebbb47879baf9dafdc67bb9b864d02710f7d46d1a1abe
-
Filesize
8B
MD5e6b4573a07f8c8d2cfb83662bf3aab67
SHA1a6579f60e17d594918d38e12011b1fcd1b1e8362
SHA256a2917adf0ee9ced5c497fcd3f1fa21934a24924d4f6f2ed1610488f395632bba
SHA5124907d5aec8f8001600b5b30f740f51d1aeb693c28c523d851cd12f2d37c4c0882eea175ae8b4acfd4b621f5f7021f0f67d4ef1f0bd4a9ea035e955a528f9fa14
-
Filesize
8B
MD57cc8654337260869aea3f5a451c76f41
SHA11d2b4df67815d2f4fc05581869300eefdb704f4c
SHA256805e7ac2444dec9eacdd94c516abf243cc71edb56697c5c949afbb01cc258762
SHA5126139b0cfa408fa3759528d89a1b0f1742004dfc4be6dc703470543b3d70707fd3c6f6e95c7455a1a7eed1e3e2eecbf42096208aa727347c055a41bd850a5f7a7
-
Filesize
8B
MD51749a63008dfb099bbdb7723b31da6dd
SHA1e279fb662bca26071553c21d39705c75cc8ab3c9
SHA2564e05bb839bd30d105f26cff6531b6eabb1866a39a198f11fcc7b62bf3518b1d7
SHA512554275b22dea39ca25df0fceecf81ec4d1e70be4bcec7c4cfe20989f268aafc2dc150f2dd2364405c41c6e1b30e692d800248146ae216dc4594fe49e69e320a1
-
Filesize
8B
MD51197cbd100786e4481b4ed00623733e2
SHA1d96eb8456f7d984aa0e2e0cee0faa7ca2e52a526
SHA256b76a3268845536e8831db921eab0121c05b2bf755cec2abd9f6bea9bc966a755
SHA51293e762fde260025e4eac5a2c605c841898de1410af45a8f34d6a96084652643813d1f0e755a3979bc4baeed3d7cc1b5cdbff3a06701da7ec5bdccdd29107f693
-
Filesize
8B
MD57ad78b4fb04755be4ec8f94d082eea5e
SHA1645232d70fddfa16cd1556a65bbf9a2fcc75818d
SHA2562c385c24a36900dce4fac09963dbd08ca1958d5c58116c5a07d2e873724125a3
SHA512d81150e1d9066fcfc078f130748649f713007ba0d37a024ab8be9d794ab82870e7110c521082d304f9b5788ff9e0761d4aadb1f1c23495ba7fa7d1405c43f2f6
-
Filesize
1.1MB
MD5d881de17aa8f2e2c08cbb7b265f928f9
SHA108936aebc87decf0af6e8eada191062b5e65ac2a
SHA256b3a37093609f9a20ad60b85a9fa9de2ba674cba9b5bd687729440c70ba619ca0
SHA5125f23bfb1b8740247b36ed0ab741738c7d4c949736129e767213e321607d1ccd3e3a8428e4ba44bd28a275b5e3f6206285b1a522514b7ef7ea5e698d90a713d34
-
Filesize
15B
MD5bf3dba41023802cf6d3f8c5fd683a0c7
SHA1466530987a347b68ef28faad238d7b50db8656a5
SHA2564a8e75390856bf822f492f7f605ca0c21f1905172f6d3ef610162533c140507d
SHA512fec60f447dcc90753d693014135e24814f6e8294f6c0f436bc59d892b24e91552108dba6cf5a6fa7c0421f6d290d1bafee9f9f2d95ea8c4c05c2ad0f7c1bb314