Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    93s
  • max time network
    141s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/09/2024, 11:14

General

  • Target

    e011a235dc8fa9746a826a8958ffa919_JaffaCakes118.exe

  • Size

    296KB

  • MD5

    e011a235dc8fa9746a826a8958ffa919

  • SHA1

    02e13274b479fac5b4d52b3e5b20302c55fd0ad5

  • SHA256

    09732e5978fb3c2c4dd1940cda89fa46770aeb9bce74e58c61cf65ca79464790

  • SHA512

    0062b8443d4c29e017206e976ba2e293fec0f57a4cad31311e09c67ba1d5114f82a22405762b87a9d9d14b6c550c508e727c7ae01324fb0eade07bd3a83d2269

  • SSDEEP

    6144:TOpslclqXhdBCkWYxuukP1pjSKStVkq/MVJbw:TwslNTBd47GrRMTbw

Malware Config

Extracted

Family

cybergate

Version

v1.07.5

Botnet

remote22

C2

86.51.251.14:81

Mutex

KO4D5Y5B0SCYD2

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    install

  • install_file

    server.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    0108081

Signatures

  • CyberGate, Rebhip

    CyberGate is a lightweight remote administration tool with a wide array of functionalities.

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\e011a235dc8fa9746a826a8958ffa919_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e011a235dc8fa9746a826a8958ffa919_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:1624
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1624 -s 248
      2⤵
      • Program crash
      PID:3068
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 1624 -ip 1624
    1⤵
      PID:1804

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1624-0-0x0000000000400000-0x0000000000451000-memory.dmp

      Filesize

      324KB