Analysis

  • max time kernel
    147s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2024, 07:55

General

  • Target

    eae458a8d7c770a99fb705633a2142bf_JaffaCakes118.exe

  • Size

    468KB

  • MD5

    eae458a8d7c770a99fb705633a2142bf

  • SHA1

    63d927ddd5ca89703cfb6baf70557a5ad4f7efb7

  • SHA256

    f1a4a1a76e43602db98448e8229a1e3596698453503fb5f861d19c5df0a2ec40

  • SHA512

    a11bfeb15f6ffd34a5bdc45c89986554d8078007e2f7dcbce78712768bf51cf62356811a0505c95282ba92effa11f00c8bb9da8d596de39910b1752d017dc786

  • SSDEEP

    6144:GuLjGGm5UA4ewDqeUMaadm9wg1/WgpEp/ZHMbJkUdTni4snDpox4+pIZd3MMbt0C:FGFzpsHwfnJ9MZMMhJyni/2Zb8qO

Malware Config

Extracted

Family

cybergate

Version

v1.07.5

Botnet

ADMIN RF

C2

hack789456.no-ip.org:81

Mutex

13GS63566D068Q

Attributes
  • enable_keylogger

    true

  • enable_message_box

    true

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    WinDir

  • install_file

    Svchost.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Cannot find file 'C:/Extracted/Tibia.dat/' Please Reistall

  • message_box_title

    Tibia

  • password

    789456

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Signatures

  • CyberGate, Rebhip

    CyberGate is a lightweight remote administration tool with a wide array of functionalities.

  • Adds policy Run key to start application 2 TTPs 4 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1208
      • C:\Users\Admin\AppData\Local\Temp\eae458a8d7c770a99fb705633a2142bf_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\eae458a8d7c770a99fb705633a2142bf_JaffaCakes118.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:764
        • C:\Users\Admin\AppData\Local\Temp\eae458a8d7c770a99fb705633a2142bf_JaffaCakes118.exe
          C:\Users\Admin\AppData\Local\Temp\eae458a8d7c770a99fb705633a2142bf_JaffaCakes118.exe
          3⤵
          • Adds policy Run key to start application
          • Boot or Logon Autostart Execution: Active Setup
          • Adds Run key to start application
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:2552
          • C:\Windows\SysWOW64\explorer.exe
            explorer.exe
            4⤵
            • Boot or Logon Autostart Execution: Active Setup
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:3068
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            4⤵
              PID:2256
            • C:\Users\Admin\AppData\Local\Temp\eae458a8d7c770a99fb705633a2142bf_JaffaCakes118.exe
              "C:\Users\Admin\AppData\Local\Temp\eae458a8d7c770a99fb705633a2142bf_JaffaCakes118.exe"
              4⤵
              • Loads dropped DLL
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: GetForegroundWindowSpam
              • Suspicious use of AdjustPrivilegeToken
              PID:2060
              • C:\Windows\WinDir\Svchost.exe
                "C:\Windows\WinDir\Svchost.exe"
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Drops file in Windows directory
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                PID:2188
                • C:\Windows\WinDir\Svchost.exe
                  C:\Windows\WinDir\Svchost.exe
                  6⤵
                  • Executes dropped EXE
                  PID:636

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\Admin2.txt

        Filesize

        224KB

        MD5

        78bb75a8156dacb50265e0b639e86f2f

        SHA1

        a61a749a47cf1c3763146ef0bca781acc028a130

        SHA256

        2c0434e084d89dce4203df7a18ea0f0cb05e7838292d8055bb3aab6c4b974bdb

        SHA512

        0b9e7ae507644d43bd12e6728fd637b937d7131730706396ae52b9c87fb020cc6b3fa2e917abd806d75ddc26a4eeb5d953978cb474a4955983fa2444b0a6e500

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        97bd1baa1b5f0e88573adb75c4bcdc91

        SHA1

        7c1ec866ae0ba7bca213b578898ed46bb6428855

        SHA256

        5b5b9435ec6ba3ae7a56a08138be7e375e8034b8b6ab6fbd53052e83a3672292

        SHA512

        b0f1ae2715651e9c6be62885b37763a98750602b513ee81f44805c294349e46b2e388a60f20c96a2a0908020320c1a99ee152306a259c017a95abbf0b894b5d8

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        22bd1b7000e3b75621f9deff403c42ca

        SHA1

        cd159b9be029185961b6f2352c7f1cfd2404a20e

        SHA256

        7b6ef5b0791df3bf60e9c02552b752a8dc317189659ca78f63a98dbbc842e319

        SHA512

        0abfcab0189fefb25323a1a29615556227c2bcd7365384d990262caf3e5fb5f9ca2604df778bf74c92a4da179f6202ff3ab3ed3e1ff78e7927890258ea51110e

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        6e168d131b14ba35d07d15e09d7f385d

        SHA1

        f709e60f1fea4cd34cb8bf9249ab22bf3c31d812

        SHA256

        ba9713193bb47a5a20374b706d1ddc341d9f4b6ba55b6c3e57f268a91b8d48f7

        SHA512

        1b932814de86804b0ce1fa19e8d6da5bed77257f919fea24fd1a3cfa89debd2123539f94bb0d6ead0e63aab6ad852ad210935376e9382ea01b5cec23162b1f8f

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        93d9b964df590fb8e17e5be7229641f7

        SHA1

        2c8892d53e3a9ed45590b2d76448b9b5fd4d709e

        SHA256

        11437fb75fb8ad69ab87cff296e040ac6c402c421686c72d496ab3ac350b553e

        SHA512

        692c35ed3536fa3b51e27c8840ecf7dca46db603ecb0fb9de2380702da2b7c8d33fc83c8b83bd8eeca497e91b0899dcac35b8754095ef98f3f9fcabf9a619494

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        faf533403cac28e9439d120c5b206e9f

        SHA1

        f29cf5423582fae38e9e83a8d9b8fa5bdf3f7baa

        SHA256

        9371d34c6127aa21a572ca588295a2e8ed57beda40164e5721e0bbd904d22b04

        SHA512

        8e029cf7b5062a483e9943b89749960c8d9dc7c04bf630060b8c68947569fb36e0dc1622f2bfe117570e087a79727fb43ca920c506d44ad84c659a756a33468c

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        69474caeb95a2cb4ef64d08bdc6e9ef8

        SHA1

        bf538fcb5716b3461f6031498e24aed52b353cfd

        SHA256

        0430625a4e9d64e55b82929ce6e2339561fc9ab84a5e6e850db4dc00709793e9

        SHA512

        20c47c9d5d2552b9430f728d90a629c0460c1be92c6281cff80ab85238b893eb71a53b6bee712fb85879c8d0ff3a7ffeb6c8c620b444f9a0276e0162525f74e7

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        f3c3ab431ab5728c8258e75e1762772c

        SHA1

        aa390da136a06542a9fe425dc9a9bff55dc85e00

        SHA256

        5a099a8ce36888030f34df12cdd2f65f923e6d68daa09e1abe4dc432a5fce620

        SHA512

        4f1e6161c6a9c513ef674c4072402ecac32dcdd2c5445bb5c73bea9e30f00b5b6974406d83ac623beff7f8bff4b92c0642ccd62906f6073fff2918fdecf7e3b0

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        1d9f5a4b508c58ceda1a762adeaafc50

        SHA1

        67856fe038aab96d100a102f5b11461763ddf58f

        SHA256

        273f919fbd9295c424749dc4debde353852162c5456318aca74269155a42fa69

        SHA512

        648ebb2ed71b49334b512199554c335e417bf3a83d0169541e3195ff7a5251906625b66e6f8384c801ce33700daecec566bfccbdb068989edd62c5b778ed8efd

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        6ccf96c282224a1f3be38b1198be140e

        SHA1

        7273eb7de06ae6289aaa17a296561c783d974fdd

        SHA256

        d4d02c631891473b994e2ae983c6fb6ec0d99e1079fe9812016aba9d968ff3cf

        SHA512

        0e49d795b21de3c642d91b2c4244ab2bc98465696beebe64d92d5073719b3d58e42b105fca639d48e8a6c4af2afebae8ef931f0f12f28d903c2be4ccfbdde2ce

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        1ee730273230eb4bc8cf81fcb6e47743

        SHA1

        121fdfe284cb82a9de816b2ebb1e38e07b01b6e4

        SHA256

        9afb5b852348f78efc803ea3e0a7e42b1c2386e44ea4356d531324d44cdd84af

        SHA512

        4f216fffd70d6426f2eff6d2845a82be0fdbdd057d93cf98c06cd2b749aff8f77b2590909199ce8c76d0654d8472b0a689824d8defd7dfa06c9e0b2592acbf23

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        db9c898f296ef5fb0e7a535502a6b778

        SHA1

        0eca139866b3d41545e7a2e14d063c3b72cb653b

        SHA256

        cbf2e4f755a20fa4d078b9a5909add1c93488fa6ca3a4dd59adf0b0c84837bd0

        SHA512

        face02ca6d54ff01becc93290e14c37afb154aaf0213c13e6fc147a75caada29a58b3b45a57d7caf2724ba0eebf117c85afdf422d759c65b707422a8df5731a2

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        eccd91f8d4fc1915d660ea35a449775e

        SHA1

        41a79ff0c234926f45e57909791c3ebb7ed716a6

        SHA256

        fe63abe957be14535dfdb033dbe5e8e927b6cb0691ac7922e522239688e144f6

        SHA512

        7bf98b7ef8042d1e1ed299741028dce6fbcf9129b11914515ab7fc17be41befc19659328a9679dd6bff927ee0b621516aafa7c3b3e912924700462d57b94207f

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        6efcaba05e0dbcc6a633e3bf44d42b72

        SHA1

        885af76e73e03df5ef2eb0121571b814c6dbf60a

        SHA256

        d0113beaef243c0961db4befd1a3761d4b13ed9b3de6163033e9f366998334a3

        SHA512

        891df2b27e3a2d9ce7806fb5b411866f96e290108356b6922cebf89feb913581d000d9a3f03343778b5372a5f435ac8298a62dcb355e8c5d198566a621f51adf

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        301f09cdc24acbcdc78566d21ee02630

        SHA1

        138d351aa13e2c0f8cb2bbc4deeb3528a9f95f3d

        SHA256

        8a24c81ea52ecf2791959ed6912e571688b175e8cb31efeb2698ac12071aa4f0

        SHA512

        6e92d0cb8c299286412762d4222b8b30378b10bc4ac15a76c8093af196f9e5d2ead52ea2cb83a9be113cd08ee18527d95cba96fc99ae33c970f77edc20100718

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        d2eba59490f2f4ad0ba70beae87085e6

        SHA1

        564d2f628a3f32c8288430ce61ca3b2037ea1712

        SHA256

        bf9fc421c3a13c3817484c9ef65e95f553db20e1be276ff7a7c7459949251adb

        SHA512

        9e2153927a8bd16cf60f56da1a65c244a6f72476ed2ae1447130bd170a9483d489b74c053faf367c81818efcafa562629ad0ec239678cfa7c5b457ee7bb668c9

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        896a5c80e949b0f54ebbd3a2283a1569

        SHA1

        f873112dc26bc634acaa066a6fd5382a476182ec

        SHA256

        aed53af3eff05852d02f223c2af120c9bb7df9379b1351b7b777ade5d6d2aa48

        SHA512

        226468e6e8760abdac2b514b6ac617ec969563cd13c60fc1b6d3062a66af9f9c36525a2738ff19743977af07e14e493b0f2462db4e323f428ac5bd8cd096e491

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        23f3e746d48227c07a4c395492ac9856

        SHA1

        19797c90527abb6995341a33a75255533de1002e

        SHA256

        1ce854dc01fcc603f3057470179f542050504294539f04a3bb38a7888d62d9b5

        SHA512

        b5ca4da08d5c85a317b5d6b017f23150e006b86d2c377412f13fa2d0ae7d41f5ce8a10d86346d119d7edcf090d931bc15e5b308e4ddc6c44da2f947be83ab256

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        719c118875f44dde3326b9e3a252011c

        SHA1

        f34d407d8ac822afa9907cf0d0864c3f4cc15f75

        SHA256

        c03311db00ba6786e54ee7aba2836fd6a9dafde72fe37af354cfa1e4de6a841a

        SHA512

        3fb4e6c0dae4de92c092920e457c080c7afc5d98c9e79144ac5f1390a0106ba8d017f4b6794af6b54a82d2ab00c534d73a1dc6e29fa5115e6bcbd9adf9644ca3

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        de28efb98ea4b9f7835915a8911e545a

        SHA1

        d0d02552f92a477f029b43119686c8979c61cb8e

        SHA256

        f8ebb878e6a7cbbcaaf98f5b3b6d3bd244369540ac35eb833718d8a3dcab3642

        SHA512

        b939405730346475fe74c64b1d36162a913144db333f6489c374a1db5deb372b1f9ce00246e7e5b103a12becfeb28357969b797b7f4f923e7865222408c26280

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        f00d5d5bc24b639d0d6874f08d1ae57d

        SHA1

        4df2fa5d495891a8df387831ac73a6ecb0ab9cea

        SHA256

        f7747a7c8813eae785fe70c221e66ebd447362678278d4f6df61117334754a18

        SHA512

        bfc0cce70c88ca98a15e5951c633361e46cdf6df913db0b83713ec2d5e38f61c2fec93cf6e5a792945943bb71aee0b22a3e5f96af572e4d6bc0bd9d10dcdc1da

      • C:\Users\Admin\AppData\Roaming\Adminlog.dat

        Filesize

        15B

        MD5

        bf3dba41023802cf6d3f8c5fd683a0c7

        SHA1

        466530987a347b68ef28faad238d7b50db8656a5

        SHA256

        4a8e75390856bf822f492f7f605ca0c21f1905172f6d3ef610162533c140507d

        SHA512

        fec60f447dcc90753d693014135e24814f6e8294f6c0f436bc59d892b24e91552108dba6cf5a6fa7c0421f6d290d1bafee9f9f2d95ea8c4c05c2ad0f7c1bb314

      • C:\Windows\WinDir\Svchost.exe

        Filesize

        468KB

        MD5

        eae458a8d7c770a99fb705633a2142bf

        SHA1

        63d927ddd5ca89703cfb6baf70557a5ad4f7efb7

        SHA256

        f1a4a1a76e43602db98448e8229a1e3596698453503fb5f861d19c5df0a2ec40

        SHA512

        a11bfeb15f6ffd34a5bdc45c89986554d8078007e2f7dcbce78712768bf51cf62356811a0505c95282ba92effa11f00c8bb9da8d596de39910b1752d017dc786

      • memory/764-0-0x0000000000400000-0x0000000000477000-memory.dmp

        Filesize

        476KB

      • memory/764-22-0x0000000000400000-0x0000000000477000-memory.dmp

        Filesize

        476KB

      • memory/1208-28-0x0000000002DD0000-0x0000000002DD1000-memory.dmp

        Filesize

        4KB

      • memory/2060-904-0x0000000006B30000-0x0000000006BA7000-memory.dmp

        Filesize

        476KB

      • memory/2060-906-0x0000000006B30000-0x0000000006BA7000-memory.dmp

        Filesize

        476KB

      • memory/2060-1932-0x0000000006B30000-0x0000000006BA7000-memory.dmp

        Filesize

        476KB

      • memory/2060-1926-0x0000000006B30000-0x0000000006BA7000-memory.dmp

        Filesize

        476KB

      • memory/2060-594-0x0000000000400000-0x0000000000477000-memory.dmp

        Filesize

        476KB

      • memory/2188-929-0x0000000000400000-0x0000000000477000-memory.dmp

        Filesize

        476KB

      • memory/2552-23-0x0000000000400000-0x0000000000451000-memory.dmp

        Filesize

        324KB

      • memory/2552-15-0x0000000000400000-0x0000000000451000-memory.dmp

        Filesize

        324KB

      • memory/2552-5-0x0000000000400000-0x0000000000451000-memory.dmp

        Filesize

        324KB

      • memory/2552-7-0x0000000000400000-0x0000000000451000-memory.dmp

        Filesize

        324KB

      • memory/2552-9-0x0000000000400000-0x0000000000451000-memory.dmp

        Filesize

        324KB

      • memory/2552-11-0x0000000000400000-0x0000000000451000-memory.dmp

        Filesize

        324KB

      • memory/2552-13-0x0000000000400000-0x0000000000451000-memory.dmp

        Filesize

        324KB

      • memory/2552-3-0x0000000000400000-0x0000000000451000-memory.dmp

        Filesize

        324KB

      • memory/2552-17-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

        Filesize

        4KB

      • memory/2552-19-0x0000000000400000-0x0000000000451000-memory.dmp

        Filesize

        324KB

      • memory/2552-883-0x0000000000400000-0x0000000000451000-memory.dmp

        Filesize

        324KB

      • memory/2552-24-0x0000000000400000-0x0000000000451000-memory.dmp

        Filesize

        324KB

      • memory/2552-20-0x0000000000400000-0x0000000000451000-memory.dmp

        Filesize

        324KB

      • memory/2552-583-0x0000000000220000-0x0000000000297000-memory.dmp

        Filesize

        476KB

      • memory/3068-538-0x00000000001C0000-0x0000000000441000-memory.dmp

        Filesize

        2.5MB