Analysis

  • max time kernel
    147s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/09/2024, 07:08

General

  • Target

    d5d70a81365d1eefa7fa8808a11df978_JaffaCakes118.exe

  • Size

    327KB

  • MD5

    d5d70a81365d1eefa7fa8808a11df978

  • SHA1

    4d79a486c1b876e6eabc6b6a1bba3d4867508ce0

  • SHA256

    f8bfda68d8ea4464d45cb842459ce621925a5b6168362c622d5439738677f861

  • SHA512

    e6e36731bed38cfd1d7d3c57dfead562548d7f43762a7bf915e46dba3f512f37bf31707fe3055dd0455d457bc11e6d0023c37eaee208e8e9c036cfb2483aef08

  • SSDEEP

    6144:wd9LSM4Ov8ecATQmsPAa3AfPLYK3N56nUtdfQHaMWl4Z:wTLT4OUehTQmAwTYK36Ut6HaMI4Z

Malware Config

Signatures

  • CyberGate, Rebhip

    CyberGate is a lightweight remote administration tool with a wide array of functionalities.

  • Adds policy Run key to start application 2 TTPs 4 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in System32 directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3380
      • C:\Users\Admin\AppData\Local\Temp\d5d70a81365d1eefa7fa8808a11df978_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\d5d70a81365d1eefa7fa8808a11df978_JaffaCakes118.exe"
        2⤵
        • Checks computer location settings
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:684
        • C:\Users\Admin\AppData\Local\Temp\Decrypted.exe
          "C:\Users\Admin\AppData\Local\Temp\Decrypted.exe"
          3⤵
          • Adds policy Run key to start application
          • Boot or Logon Autostart Execution: Active Setup
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:4616
          • C:\Windows\SysWOW64\explorer.exe
            explorer.exe
            4⤵
            • Boot or Logon Autostart Execution: Active Setup
            • System Location Discovery: System Language Discovery
            PID:1608
          • C:\Users\Admin\AppData\Local\Temp\Decrypted.exe
            "C:\Users\Admin\AppData\Local\Temp\Decrypted.exe"
            4⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Drops file in System32 directory
            • System Location Discovery: System Language Discovery
            • Modifies registry class
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of AdjustPrivilegeToken
            PID:1460
            • C:\Users\Admin\AppData\Local\Temp\Beta.exe
              "C:\Users\Admin\AppData\Local\Temp\Beta.exe"
              5⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of SetWindowsHookEx
              PID:2860
            • C:\Windows\SysWOW64\install\jqsr.exe
              "C:\Windows\system32\install\jqsr.exe"
              5⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:4740
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 4740 -s 564
                6⤵
                • Program crash
                PID:1292
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4740 -ip 4740
      1⤵
        PID:2820

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\Beta.exe

              Filesize

              20KB

              MD5

              93a6830aa312d0034585c6eef6c2df15

              SHA1

              495bb0e0236d9ad559c3cfaa6d6d189303b6b958

              SHA256

              5d5e554651a0ee564e1e70d6ac214e47169cc35671ae1bf6b1f75719669d0b85

              SHA512

              b0ab24c681fc59ce830b19a3db61b75f1c5fabb0c1cb27408e84b99cd2c5012ce0275b2b7a9760c476727b0da7602dfe49a7547daa8a5ac5c7ba68c65a9bd7d0

            • C:\Users\Admin\AppData\Local\Temp\Decrypted.exe

              Filesize

              303KB

              MD5

              e2ed5666eadc46d5855db7dc3cabbea7

              SHA1

              3600bfaed14bac5e5c12004d69de9a01f0b7976a

              SHA256

              84f6758ea0223af0be9e067c222038a4338d9e91b1b4863c555b72579289b826

              SHA512

              8ca8a1a72c142938a5f49fb6af8f335050d29f9f85e45193726bc2d4b962ce1dcadc1c861e14964509a1ed7bfdb27c4560ef4f4c026694094f780449634673e3

            • C:\Users\Admin\AppData\Local\Temp\XX--XX--XX.txt

              Filesize

              249KB

              MD5

              1fd7d62fba9d1a1d3454c0ea05f34153

              SHA1

              d25c5ac76f3e835b8bad03f8fa3404ad1f4fe921

              SHA256

              1acee16ecbce93518c6d325e6220a2100a5a973a634b80726f7d8e1ed227421b

              SHA512

              3a92336de04fd939b81a739673ea0b946bdc0c915cde7b1119bed536d4eb230f942e7c096f9ce530c20a067cc77be1025ea25a8aab8c4e07db8103306be7413b

            • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

              Filesize

              8B

              MD5

              ac7df2bd8004f3c21c74681fed995f73

              SHA1

              1f1eaf7b90a6c5edaf589671d7da0428fb9ae283

              SHA256

              b8281ec6454a967726e2f58fca6a74e8fcabdd0f6d33bdfd9482fd1f0d6c94c4

              SHA512

              bc21f65cf8e4930dc675d51467e10de827eb25f07ec32de700743ae3cb6b0076bb74ce0a563d2e16acc3f188a75f89ae13374a406e9b2a048d312e83da60690d

            • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

              Filesize

              8B

              MD5

              8a0fc23a449f13f3fbe2b264ee4b9602

              SHA1

              b534fcbc61836f99c8f73af1c669276d1e139d33

              SHA256

              57e9c2e0ff8e51b40a9c49281758d00dddd9cd110acbf34956be163a0d7815bb

              SHA512

              bc1a178cccd049e8f3768252a06087aa61b1ae5c5780ca704b3d9b10088aab22e4dcc4d51471fd0f83016ee7f661acad4ef257f5adb627ae4170b7910c857adc

            • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

              Filesize

              8B

              MD5

              71f0fd7afe68342378a77b391e84df6c

              SHA1

              513d575bca99f3ace24ed065349317e1f7278d85

              SHA256

              cd79c904fe574e22fef8ac555f3ed1e1b968f9e4cf7043c8cd600eea728cd80a

              SHA512

              a4f110e52dffd69a8c9811078c0d9df789a30e0599510fa9c60e09ee50e14d1d5d344d95c842eaf0018ff2401a6400a5d17b8fccc3d7ceed1ff598b1b8e657a1

            • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

              Filesize

              8B

              MD5

              ef2f1f8d78ff2f7bee9eb08b8ae67a8a

              SHA1

              9eba03feed8c736e1bead328080c832fdc701067

              SHA256

              1183aa94568f21b9021e7c3d2f1517ed4401477d586b7a4e414690ce96d8f7f7

              SHA512

              df7b2eea5183a57eef8a30f4834d8b54b0f3d95622cb7d42f79b4e56b79ae0c86604db66c74ec4dadc291437c125962772908ff9776a30a2a56a0f48005f5dc1

            • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

              Filesize

              8B

              MD5

              b5ea2116d0b186f922048e5f8d67abda

              SHA1

              b65545aa8c764d81b80fdac1560506a6cb3b8b4c

              SHA256

              0350d7db837c5adb57a61bb9b41958d375b9f9be4ccb43800da56dacced98f17

              SHA512

              c55932fb9abdcb94c80e1ecae6ee5e19211128174447c07081cf55f15f1761746f608cba06b0e21522412cbb11a560307fe4f6348bfd3199d69332ce5c951909

            • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

              Filesize

              8B

              MD5

              29bdbe746867b10c197b1ced1e380b14

              SHA1

              e40d15f1f0f9608b5e31d9b18da3191b2f5aad30

              SHA256

              1a559de44529422abdaa92826196475be72da624641f9b14cb5ace41c4dd8d75

              SHA512

              bdff9af641ff0047683ec83f8d89ea2fa0c3eeab6a856b7cb085f59f063d4fc21eefd709a4891480a3359cc93b9500cf3432e9890bbc26309f24bc4114773fa0

            • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

              Filesize

              8B

              MD5

              b47a8c64bc0e4b265bbc4cdaa1a1caf0

              SHA1

              56ed9398e98855f6cdd616011ac1a427a4eec257

              SHA256

              dc059ca029be2fef2d6b8d57e1df326b6472bfa81ae59b8e3d481e8c5d3084a9

              SHA512

              c92d719e9c6189f7ad2540f6568edabdc426fa40f754398356d9115dcb759d2d23c9c3534d865b3ffdb586235e1c07eaaef65fa71639c5ccf4c0fcbf730ae0f7

            • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

              Filesize

              8B

              MD5

              8d675dc8842dc8937d235cba81385234

              SHA1

              8bee3bcfd87ec81c78bb70516954331132bf0e79

              SHA256

              a6b8bca5451e565b10c0b09f923159a6c69b9274f3a59b52ade75620b0e597a4

              SHA512

              005934983c8cdf41b039a02f5d473516f0ac6eaa971710f428cb42b10840a479b758942b2dad44af240c2a1618026f60980ea98b2b84d6842aa48e5de7f6d0a4

            • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

              Filesize

              8B

              MD5

              2cc99fa1697ea77cba1f82fae8060cd1

              SHA1

              f28f0208e21e21d0683fa2ba5cf6dd88af327bc1

              SHA256

              d1154bcaae78006f54f3a341d298faf7c5bed4d61b208861a663cee41c4633b5

              SHA512

              766057e1ffd8f5e2a2437832b17d2b900809fe9c9617db3a97fc1d3381c608c17314690d4ac7b1773b5c25d63de21848c0812182897076888aa22569db479960

            • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

              Filesize

              8B

              MD5

              f4315098837a03d1144d8f1e9ca16e51

              SHA1

              f5a10b4a62a9148a204cf299e809b56828449e51

              SHA256

              4fc343db7bc82a6692811255b39be22c2424250c41c6e7f1e0d0b59bde75b9ec

              SHA512

              6739eabc43ba9a9bf1863e7b5ae824d0d52d0e08b44036b334e8ad8c8daf438a918452f975d805abd8c508fb9245919fa5811f3dcf6113ab121de40efacbabc3

            • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

              Filesize

              8B

              MD5

              bb2d8fcddd259a4c5fbf860b1c900562

              SHA1

              5f7fedede894a165a058381a4e9a6fe547df26a7

              SHA256

              f309cf708e752b08d292490d4d31410f909cea5f2bf8109c34f78ce6985f89d2

              SHA512

              c26b68d5d2633bf021d384094430a00dea6b8edaa23f42e672542f8c2198880cc0e1165a0467dc0cc68cbebe796b4d3d3267e2edfb35ab7b6d56d8f2ff8b891f

            • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

              Filesize

              8B

              MD5

              f2a7ddc00fa17088c1b72527ee0fb69b

              SHA1

              e0936b95d4ab1493d3267a91b074b3aee9e9e7dd

              SHA256

              7efb8ca9d1589efe199b78221fd597d98e83ee9edbbf32d63c4cdd162ea2daba

              SHA512

              70968219e3d59a3cba56b039a87c8c462768a07ac61a8e53e872a7344336ca5460534c5564e0dcd6b97696e377ff1809464edb6164fc445831bad47d86f0816c

            • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

              Filesize

              8B

              MD5

              511ec3b5c15ab66ae8c8a994f1590902

              SHA1

              a8eae26309707ed7bf3553674bade10964822721

              SHA256

              9b2a3a7090a046bd055f6ec2c36f0354fd914ad6682c2982895e4f348b1b2b72

              SHA512

              3ecb8aa8d4fa26a734fb40413598c447ade6266cad9563a49d5c03cda86d8544eb26f050b02d0955b2d746e33e2bff1f35d3dbdaad48eea98cb77708ef950942

            • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

              Filesize

              8B

              MD5

              ccf4c8c0406ab8ecaba880fbe7d23800

              SHA1

              30bd00797af51f8509a92054bd704a4721b75845

              SHA256

              9ebb49fb42404f479fde050d5574ce4fb7fc345324d9f54e2a332e8599d25cd8

              SHA512

              d762527a9bc4934fd3f8cf6770d82256851a781e1955bcca3f558128b79b7b67d7f3c7e6a8b177bf150c891b1a4e9758a674fee5c8069161462a82f09164c3fd

            • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

              Filesize

              8B

              MD5

              bda761646329cfc91e2d9e053deb49b7

              SHA1

              0e89e7cd6584eaa1650df492397e9575105b4679

              SHA256

              eabfee4f73f3c28a2881fec6e32d382a4dbed3f5269a7d505610afdf2b5d0dfb

              SHA512

              87baae1eadb79a97cd87e6d1acbaa849034ccd1f525be365bd42d946b04cd8d7639091700b4ef61bfcb738d809b78246a0434f809192c3d7fe67cb5d5629a4a8

            • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

              Filesize

              8B

              MD5

              076ad15802ab7617164f307a5e5aeaaf

              SHA1

              c7eb9d4701cdba8a317638f16034f0038ea4da09

              SHA256

              c6f7c54ef36ef32629296f2cf04a1879def4f03f66c00e88a6673c154fd45385

              SHA512

              60047e09915d4a7adadad1e9dd1304356dff7c3ce996b048e4d69c62bf6c4ad6ebe74bdac12c228c7011f2474621ccdf95d4f2083eaee485ce44a7718987d821

            • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

              Filesize

              8B

              MD5

              0634dd6da6e786212fa14f6fb66e8f03

              SHA1

              ac29fa472cda48c04938c60276c8ff0defcd90f1

              SHA256

              fc2b53f1fb516f48b5e114c86f25b9d1aa2af0780e3295d24e66b96bf0ace97b

              SHA512

              38546914ab3bf12b8640a611d57bd1521c90bbd7ec4c3935ffff704ee8945660f6f099245e68d8cc19ba7e9295b4ba0b3baebf1d2eef6353dea74c02d63603bd

            • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

              Filesize

              8B

              MD5

              7b413ec4d6176e70a0ff8138bb494a18

              SHA1

              fcce16c47bbf390c9b2980e21c5ae6043989f046

              SHA256

              c2e1c48a671f1f56726470b0336ef03b0d4f9a15fb0b7a2378cfb9787952bfbb

              SHA512

              0f2c6f12807fd21c00342de716e03966a1b871e817b19ff4e00ad23ce773cefcf4ea0448a5cee4951c40a88106f9f1324b489bede72f53b94df3b93b71328f71

            • C:\Users\Admin\AppData\Roaming\logs.dat

              Filesize

              15B

              MD5

              e21bd9604efe8ee9b59dc7605b927a2a

              SHA1

              3240ecc5ee459214344a1baac5c2a74046491104

              SHA256

              51a3fe220229aa3fdddc909e20a4b107e7497320a00792a280a03389f2eacb46

              SHA512

              42052ad5744ad76494bfa71d78578e545a3b39bfed4c4232592987bd28064b6366a423084f1193d137493c9b13d9ae1faac4cf9cc75eb715542fa56e13ca1493

            • memory/1460-182-0x00000000240F0000-0x0000000024152000-memory.dmp

              Filesize

              392KB

            • memory/1460-145-0x00000000240F0000-0x0000000024152000-memory.dmp

              Filesize

              392KB

            • memory/1608-180-0x0000000024080000-0x00000000240E2000-memory.dmp

              Filesize

              392KB

            • memory/1608-78-0x0000000024080000-0x00000000240E2000-memory.dmp

              Filesize

              392KB

            • memory/1608-18-0x0000000001010000-0x0000000001011000-memory.dmp

              Filesize

              4KB

            • memory/1608-17-0x0000000000F50000-0x0000000000F51000-memory.dmp

              Filesize

              4KB

            • memory/4616-73-0x0000000024080000-0x00000000240E2000-memory.dmp

              Filesize

              392KB

            • memory/4616-12-0x0000000024010000-0x0000000024072000-memory.dmp

              Filesize

              392KB

            • memory/4616-16-0x0000000024080000-0x00000000240E2000-memory.dmp

              Filesize

              392KB