Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    21/09/2024, 17:36

General

  • Target

    f04f5c550ab73d8c1d4472b04a9be779_JaffaCakes118.exe

  • Size

    345KB

  • MD5

    f04f5c550ab73d8c1d4472b04a9be779

  • SHA1

    860ef10c41d6a1b56f91f0bf9e3101f68e615522

  • SHA256

    38a269c9ccbd442b4366348dfbfa48b0b4e15beacfab27c5ec8257ed714a7d18

  • SHA512

    9e69b49b9478a9a5f61197670dbc0ce781c299bb18e6ace7ee7b86d167a9cc8210e16bf5fcb23fe9f1e2834a9ef0a51f20fed3db87e50cd06077191be6c085eb

  • SSDEEP

    6144:AmcD66Rm5JGmrpQsK3RD2u270jupCJsCxCsIBhd8v:pcD66VZ2zkPaCx2h

Malware Config

Extracted

Family

cybergate

Version

2.6

Botnet

vítima

C2

darkcitow.sytes.net:80

darkcitow.sytes.net:82

darkcitow.sytes.net:81

Mutex

***MUTEX***

Attributes
  • enable_keylogger

    true

  • enable_message_box

    true

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    install

  • install_file

    server.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Error al iniciar la aplicacon porque no se encontro sqlite.dll. La reinstalacion de la aplicacion puede solucionar el problema.

  • message_box_title

    Generador Ugc.exe - No se puede encontrar el componente

  • password

    abcd1234

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Signatures

  • CyberGate, Rebhip

    CyberGate is a lightweight remote administration tool with a wide array of functionalities.

  • Adds policy Run key to start application 2 TTPs 4 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 10 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops desktop.ini file(s) 1 IoCs
  • Drops file in System32 directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1192
      • C:\Users\Admin\AppData\Local\Temp\f04f5c550ab73d8c1d4472b04a9be779_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\f04f5c550ab73d8c1d4472b04a9be779_JaffaCakes118.exe"
        2⤵
        • Adds policy Run key to start application
        • Boot or Logon Autostart Execution: Active Setup
        • Adds Run key to start application
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:2316
        • C:\Windows\SysWOW64\explorer.exe
          explorer.exe
          3⤵
          • Boot or Logon Autostart Execution: Active Setup
          • System Location Discovery: System Language Discovery
          PID:1332
        • C:\Windows\SysWOW64\explorer.exe
          explorer.exe
          3⤵
          • Loads dropped DLL
          • Drops desktop.ini file(s)
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          PID:2924
          • C:\Windows\SysWOW64\install\server.exe
            "C:\Windows\system32\install\server.exe"
            4⤵
            • Executes dropped EXE
            PID:1548

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\XX--XX--XX.txt

      Filesize

      230KB

      MD5

      dfe8d7c61b338242c3400fe753ef67c3

      SHA1

      da40d8a9149c0582658eeb4067b15522a1584181

      SHA256

      d9220539014848a4f8b34d628b38c9621e5b5f57b90f4574aa30c55ac8dc64c3

      SHA512

      2c3355e05b6db6b16638cbb0eade7ae6b418e33bf3792e0124405195b61fa9476882c7ca3424525ac89d96941ef144448c7c1982ff7d65005667f90617a5a62c

    • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

      Filesize

      8B

      MD5

      7b7eb081ac755ac79be3243293680e50

      SHA1

      14b4a7bf59ebcd2e206b5891547a70739c415c28

      SHA256

      d4df044c94b5dfa1160d9e51c80aa2aede24e74cf269b6133f7d8c3fdb4d9466

      SHA512

      86a98d9713079318a16c9119a0430bc0d5dddb55cd9df3a45247523590f0f7eb44c11db6b3af7cd9310c52c5c1ba801e9530322388d40a47ea5a7fb42f39185b

    • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

      Filesize

      8B

      MD5

      311a9f9923b0fc983d5cd95779b2ddcb

      SHA1

      33b0b947dbb09a116e4497166019cd98a8cbaecf

      SHA256

      47bc236f587d7319dbdddee702b6aacb92ecfccfb42b69ccb2cda1d50241889d

      SHA512

      39ef226ab251cd382841789cf4c9def0ba32a22b4610b8db7f9a86eb9a69807dc1b1a3116668c8fcc4cdd581a72a157c7784228dad334a91ece28dd3d3601bfa

    • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

      Filesize

      8B

      MD5

      cc25f8aa5f60b82d48aa5256935921c4

      SHA1

      1211818af642b4696cbf63b39556bd5a62f96092

      SHA256

      889e545eff0bb1fa5435dde639a864514e749e013821f37c7a44ddd4cd98dd96

      SHA512

      03265605c93893ecbbacc1472c3b88347d323edfe151ef9a9cd5e85491c714bdf4712957dd57afd8b7805c737aa45508d71796330f0a6e012c01396c9dbf41d4

    • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

      Filesize

      8B

      MD5

      457af60c639cffe0e13c9772db0a2712

      SHA1

      360c3ed8ba9f097f87d07388b4ccc982edbaf273

      SHA256

      d5d12dc345c401b27f8b4f241939feeab13a325aed6a0017b7acfbb7d6a6a255

      SHA512

      ef4d79130c2376c585d1b7a7c07f4e111a6b21d048584a43ec9dd1a86ce2d7566823241c6634fa54a4262af0f8bd703bbc15f14fad3fc23c95dbc8f9f0ba3559

    • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

      Filesize

      8B

      MD5

      c8945d3eca3330ba61fb49eeb0c391e5

      SHA1

      9f0dc9f5a460b9f43286c7467d26d88f16f812f9

      SHA256

      afc9064c1122ce2979fb2c241f3e9f2d18b34d0401cf2d15aa65ed3d0a85e51d

      SHA512

      0f4124b4af9ec678a2d7ae17bb07588e620142682485d6c45922cc2f81a7b9a58f3a1ee21e0fb14ff6e2f69c8ebf879bf4b62e53e90efd50a0276df7a5fa9c20

    • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

      Filesize

      8B

      MD5

      8f3a26da2f2f4c297bd55989945dbac9

      SHA1

      8854d6d1dfd4dab790d6f6a30642c4fcfe89c76b

      SHA256

      fd8bae25b89a9c1e7722eecde59188c6a1c450d722cedd3a8f901924f2b860b2

      SHA512

      38d5d7ce6bdb0a3860073bf3f4652b9a1e83d9ed4d5c651759839b91de9293350d1cc94946b1187433e55924907e96df05e29522f05fd73eea9ba5e49d41d6e6

    • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

      Filesize

      8B

      MD5

      064c6f83ff139369fc9043f9bdc5a25e

      SHA1

      d379e54646a84ef042084ba07ca57afcae64fd97

      SHA256

      87c31f832100596ac1056bc30b394413220250818cb600fd8e725b9454264429

      SHA512

      776b320092e77569b2c5b66796dc4b07f6f7fae2958798edabe16d7c2e69e1c72afac3f5ecbaa819d36392f2ffb85c1d23aae66a902dc3db8b83a1314620be98

    • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

      Filesize

      8B

      MD5

      b8f51600a07a77ee5de7f5bbf1344c23

      SHA1

      79cb251a157fdfbcadd112fff0dd5a7237b9d439

      SHA256

      536b7d140c96b7c8bdb84954d34df74bde7b6052dbb2f1d87e0370c69401b530

      SHA512

      4e5557bc9a6e0d99ddac6862783b9de36516d7fb3dee16f9cda657eaebd0d076f9a19c86122cb565aa1665205832fcc005707652d7d9201e5c33228382b5c409

    • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

      Filesize

      8B

      MD5

      8d91f68925ef1e317dfd30d3693083ac

      SHA1

      e2f128fc5b6c061fa2281f5a75f5439b39592746

      SHA256

      6ded8ba27e48f66837efe410c6c9230ad0917bebe58a3c91abc4bfc007142f1b

      SHA512

      3d8e707869a0d7e1df649eee79201df24b75d10bf196cf0a34906c62165901f5d3cb6465d2e5df8bfc2a172f9ddd1fc86f8da20dbbba2ec344907af63912fa74

    • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

      Filesize

      8B

      MD5

      aa24e803781ebad288307dbd38fa7d57

      SHA1

      baa4d5001d6005174217283721173c3a8c84f4c1

      SHA256

      ce8affed468953468d5c7884c4ddb7aeebc6c7075bd1820865522f5b72fa7e74

      SHA512

      4302ebf3b76d3f46f31fc058159e2e6a36b420a6b870acef5fb5124f8ebcbf16f8b661d5390be3f9b0dd06ca72283a2db7c0304a9ded82fe6777690f151aa32c

    • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

      Filesize

      8B

      MD5

      3466005ed5ccbcd7487a893676e215db

      SHA1

      1083777b109502ed021b0facfd6c645b4979554b

      SHA256

      be504ddb1d0c039307daf0fc56592ffa425307948f16f7801969e8061c893b09

      SHA512

      e315a895408da25e9cf78f5003a8b2866557ff797bd6dda9d08c4703b74bfb002d1ba280384fdf3a270ba5bbcbd83c8a4e19ea559c7109dabce2fcf31e368d3b

    • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

      Filesize

      8B

      MD5

      6861daba426780b16861798a4edfeaae

      SHA1

      86e58d57913c20bc3a5404bcb1f9c498a683c11d

      SHA256

      10b3567f924607f8f4a89eb324acf6d292a5c35363c324db9af078bf37adbac5

      SHA512

      28c730deb91a6159982ef029605b219147248b9539b15900feb49547730bab4f1df9d051c4b899f6481126c2648b4ced7dd7d633de1338594585e866cc0db828

    • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

      Filesize

      8B

      MD5

      f8a8d672f2f50746a7f5312d9e4b6500

      SHA1

      ef07ae6ccc1c54f537fb8cedb26ed40e086fdac0

      SHA256

      8e7076a8dac970ef681d9aa86b8c01b940f1dd109bf5245f2864b56001d73aab

      SHA512

      ff2bead52aa7037e0fa3786aad0056b968930c8f1232ef1ad417aba4084332fbe9087d60fdb571ca34dec7e52531b32f7a973b62bd93b8682395ece83376cf52

    • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

      Filesize

      8B

      MD5

      33091fbebe3159b1f3676f75b608ffc7

      SHA1

      cddda52722b01c0f6b9ff81f0dd459592a81c273

      SHA256

      fc3f37cd904129209ec927f6ef3a831863475fd7bc271c071040a9ffda005262

      SHA512

      c1aa36e55857863e1c40051f2bd2bdfbb10c059ad8c6665e7830d4eb818cf7da350c79e792ce6dd9f0b1e584cd79356e2df6b2e811a12d033ca5f1d7759faf13

    • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

      Filesize

      8B

      MD5

      3fa255a716a2df95d26f851cf251d633

      SHA1

      4a281b40c26bc6edbbab41a73b40aa757ef47850

      SHA256

      9cd535c81e6d429f4d92a94b3f049b74a2ac233caf9818c6fb9ec16a6479af3e

      SHA512

      ee46058ec0d7886ed82c730f621e2f1613657eddcc96d18194de0aa9a9ef7bb766daf6770b14a14ad819e602a40f4c98d6913f1a86414f66b66e4ff20cdeb510

    • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

      Filesize

      8B

      MD5

      3825e1c77c33f9bab9e10e3da22fc140

      SHA1

      98bcdc698c70f60d90f0c9197aaef1e5f2d5f09f

      SHA256

      86991f214b2425c6079a66352bd56d91b1ea62c68ea7159b46d3b5bbaf4b2b9a

      SHA512

      f6b6fdb3905d63980fbbc90ca3cde4279d5b041ff135be3d90fa053165e974928bc6ea6a8b2b722ec38d95116fd0b849f96a211bd9f687808dd8378ba8f37f01

    • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

      Filesize

      8B

      MD5

      af7d8bff43d9c338f493fed6e60263c0

      SHA1

      4d492fe2592e5c3cd4163f148fd5f577a41b9639

      SHA256

      ded0512ad4c93c45327f477be4fdb584e1bf90daf6f745fb0a205846e948d070

      SHA512

      cc77f35f6f084f2eb40a1d74e3cd8f02258a18fe4e82e3eabb9376908bdd8b1216694850f6443bb9f97dd340c8c28e0cf7ca11a2e5d3e87a0e12f82307488e3b

    • C:\Users\Admin\AppData\Roaming\logs.dat

      Filesize

      15B

      MD5

      e21bd9604efe8ee9b59dc7605b927a2a

      SHA1

      3240ecc5ee459214344a1baac5c2a74046491104

      SHA256

      51a3fe220229aa3fdddc909e20a4b107e7497320a00792a280a03389f2eacb46

      SHA512

      42052ad5744ad76494bfa71d78578e545a3b39bfed4c4232592987bd28064b6366a423084f1193d137493c9b13d9ae1faac4cf9cc75eb715542fa56e13ca1493

    • C:\Windows\SysWOW64\install\server.exe

      Filesize

      345KB

      MD5

      f04f5c550ab73d8c1d4472b04a9be779

      SHA1

      860ef10c41d6a1b56f91f0bf9e3101f68e615522

      SHA256

      38a269c9ccbd442b4366348dfbfa48b0b4e15beacfab27c5ec8257ed714a7d18

      SHA512

      9e69b49b9478a9a5f61197670dbc0ce781c299bb18e6ace7ee7b86d167a9cc8210e16bf5fcb23fe9f1e2834a9ef0a51f20fed3db87e50cd06077191be6c085eb

    • memory/1192-4-0x00000000029B0000-0x00000000029B1000-memory.dmp

      Filesize

      4KB

    • memory/1332-540-0x0000000024080000-0x00000000240E2000-memory.dmp

      Filesize

      392KB

    • memory/1332-895-0x0000000024080000-0x00000000240E2000-memory.dmp

      Filesize

      392KB

    • memory/1332-253-0x0000000000120000-0x0000000000121000-memory.dmp

      Filesize

      4KB

    • memory/1332-254-0x00000000000E0000-0x00000000000E1000-memory.dmp

      Filesize

      4KB

    • memory/1548-896-0x0000000000400000-0x0000000000457000-memory.dmp

      Filesize

      348KB

    • memory/1548-893-0x0000000000400000-0x0000000000457000-memory.dmp

      Filesize

      348KB

    • memory/2316-312-0x0000000000400000-0x0000000000457000-memory.dmp

      Filesize

      348KB

    • memory/2316-0-0x0000000000400000-0x0000000000457000-memory.dmp

      Filesize

      348KB

    • memory/2316-867-0x0000000000400000-0x0000000000457000-memory.dmp

      Filesize

      348KB

    • memory/2316-3-0x0000000024010000-0x0000000024072000-memory.dmp

      Filesize

      392KB

    • memory/2924-897-0x0000000004630000-0x0000000004687000-memory.dmp

      Filesize

      348KB

    • memory/2924-889-0x0000000004630000-0x0000000004687000-memory.dmp

      Filesize

      348KB

    • memory/2924-891-0x0000000004630000-0x0000000004687000-memory.dmp

      Filesize

      348KB