Analysis

  • max time kernel
    150s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    29-09-2024 19:58

General

  • Target

    ff3b7f563de4bd79698ca6e2ee3ca06a_JaffaCakes118.exe

  • Size

    548KB

  • MD5

    ff3b7f563de4bd79698ca6e2ee3ca06a

  • SHA1

    06e5eb41bec31f468229ea93a54976dc76eb4ad9

  • SHA256

    ffb320ec60c0a19ad1a4a3dddd22075c6e66a94cbef4c321a6d09f5f3a36ae55

  • SHA512

    29e2ec9acb0e011ed297b6bdeb1304ebd70593ec85b7b63ea89552ac05ed7f791797e79db7eb400cd4e08064e668ccfc2233bf6981ba0945ed16e83fd0a62a11

  • SSDEEP

    12288:DuqrBDT27EdMxsygLDeFCv+WNCR0oX5M/k1:DxrVBd4lZjXB1

Malware Config

Extracted

Family

cybergate

Version

2.6

Botnet

Server

C2

asmida.zapto.org:81

asmida2.zapto.org:81

asmida.zapto.org:444

asmida2.zapto.org:444

Mutex

***MUTEX***

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    Microsoft

  • install_file

    Microsoft.NET.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    texto da mensagem

  • message_box_title

    título da mensagem

  • password

    abcd1234

  • regkey_hkcu

    HKCU

Signatures

  • CyberGate, Rebhip

    CyberGate is a lightweight remote administration tool with a wide array of functionalities.

  • Adds policy Run key to start application 2 TTPs 4 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • UPX packed file 19 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1124
      • C:\Users\Admin\AppData\Local\Temp\ff3b7f563de4bd79698ca6e2ee3ca06a_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\ff3b7f563de4bd79698ca6e2ee3ca06a_JaffaCakes118.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2860
        • C:\Users\Admin\AppData\Local\Temp\ff3b7f563de4bd79698ca6e2ee3ca06a_JaffaCakes118.exe
          C:\Users\Admin\AppData\Local\Temp\ff3b7f563de4bd79698ca6e2ee3ca06a_JaffaCakes118.exe
          3⤵
          • Adds policy Run key to start application
          • Boot or Logon Autostart Execution: Active Setup
          • Adds Run key to start application
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:884
          • C:\Windows\SysWOW64\explorer.exe
            explorer.exe
            4⤵
            • Boot or Logon Autostart Execution: Active Setup
            • System Location Discovery: System Language Discovery
            PID:1532
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            4⤵
              PID:2192
            • C:\Users\Admin\AppData\Local\Temp\ff3b7f563de4bd79698ca6e2ee3ca06a_JaffaCakes118.exe
              "C:\Users\Admin\AppData\Local\Temp\ff3b7f563de4bd79698ca6e2ee3ca06a_JaffaCakes118.exe"
              4⤵
              • Loads dropped DLL
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: GetForegroundWindowSpam
              • Suspicious use of AdjustPrivilegeToken
              PID:300
              • C:\Windows\Microsoft\Microsoft.NET.exe
                "C:\Windows\Microsoft\Microsoft.NET.exe"
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                PID:1608
                • C:\Windows\Microsoft\Microsoft.NET.exe
                  C:\Windows\Microsoft\Microsoft.NET.exe
                  6⤵
                  • Executes dropped EXE
                  PID:1672

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\XX--XX--XX.txt

        Filesize

        230KB

        MD5

        e18d8cbc78b26b05ab5f2c9589fcc2e2

        SHA1

        e5931a83af7072391dca60220f66932c5de98c5d

        SHA256

        9605a26a6c7d61a5a7eb2f4586a3f7d8331f1894edeb3eaa6896a208ee664e51

        SHA512

        146b154c25599674c604122055e5f8982210d18078cb23d5037d46bc906c0899fa5762bab5b0fa8b4a65764e46683a6ccedc029f338a0a6f464e2178f9ada07c

      • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

        Filesize

        8B

        MD5

        cb39f176812163fd88f07ee341e00eb2

        SHA1

        1f6d21200ae020625e8a1910c1b670cacb43bd77

        SHA256

        c7a27894655ae7f9233a030c4c6400d1e97f418db37523f29908d9b34c17fc07

        SHA512

        4d074f36f32af45bfe732e6b7822ed41505e13fab1e2c05cb372f28abb6e823bc3a1e02d0eae9944b8633f0a90df73e52393cb24c43b948f261f2e0876be6887

      • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

        Filesize

        8B

        MD5

        28c696ff5eb728fe67db0ce72eb6056b

        SHA1

        abaf1154cad94efbc3f801a3053ad24f640b77e3

        SHA256

        5853dfc45a375c3f0f8fbb1cbca992ca9b9c72b5f6eff58a3e652094b20a67ec

        SHA512

        250baec64f766a75a70fa7a79dceb6e56beffec4df885b74f56e94af27f5ab30a76c7aa2f6570e3b6a1059b51cfdb0568c065da9a597b66a1e25deab8a900dd6

      • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

        Filesize

        8B

        MD5

        3b26093030e8b32b4d475346644854a6

        SHA1

        51dc46b55e8f292cf1d11afb04d4c70395b41314

        SHA256

        f4ddb612cc4d62a4c93705f61219a20e1edbdc2918cb6f11aa44e2afe01388d0

        SHA512

        1fbead627ed9a46094a51aca117453568ce37cdaeba726dd7a3078284ea563f0b30223003e95e81775f7c789ea729515338069917ba76c3ee711cf29549e3257

      • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

        Filesize

        8B

        MD5

        96924c9d2c3e36e4c3b94e11e2fdf6a6

        SHA1

        8c357c69667f50377ecf9150a6d1e0a2e2c6ab98

        SHA256

        7e2cea1c68d9b200b0095dada5a6d7125cfc04e09d98b80b623a173905b8f8e6

        SHA512

        ae72674f5d7ef8e27ac6e013125b1bcfd729cc40ec1f2fb2e9b5611fe02e7828be859f9c5ef82f6d229b81075dbfbbd21a62c37cc935e09bc09ff9a25ceca448

      • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

        Filesize

        8B

        MD5

        a15aa21f59e3f2da22853756cddb586f

        SHA1

        2de5d7657e933785e2ef58663d8634feb16d8c63

        SHA256

        04cc646e7423948d58ac342546fa6e75da47135c6d89094b384ee814e2933b34

        SHA512

        346a8938248072492351d066bfb56f562418a71d3fb7bb9e7ba7cc78bec56534c50b7c958ca134f66db7d012667388140436f3744f2bba570edcb6d8b67a6c0c

      • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

        Filesize

        8B

        MD5

        502384de9be0f61f32e81378fcbffdda

        SHA1

        e71f115f234953ff5d34027308f8a72bcb72ba55

        SHA256

        60c0eb459a0e338c379186b22830383544b1bd0a497e1587055b8d3fcdfed429

        SHA512

        e689dff09ab3a65fb17c31686571f8aeea36f14cdb5c83452027b8da1987bf88f6831be341ba5c3b285ab10cfbf26105b3964b2bfd0900621212c38b2bbd85bf

      • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

        Filesize

        8B

        MD5

        fcda5aacd79327ed8683a28a8a708f8d

        SHA1

        b1eb3887dc57ca2ee51a92946633b6991f683d72

        SHA256

        a09d385cc4c4851278ae8f0398432922fdadabba96ec488cf6b1c87b15ff6fee

        SHA512

        41de6ffdadc0369b7fc12b171d97775c06e9e342c5cec0a29166bd54b8855bcb15221c365f65ae57f4d68ec181cb1e3d49903e6696cd644ba4db8de6ee710350

      • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

        Filesize

        8B

        MD5

        4b414d64e690c87a006b73f5d55ca630

        SHA1

        d5d6d92d358cf6e8daaa106cbd7cde2f3a696744

        SHA256

        350af8b9a8c1229a0f1a5575e1b3bbe32d9fe0ec6c674d2fead882d973823b4a

        SHA512

        6797da5ceae4fa5dd36be57247708739e449a775ece978da6f1331f471b4955535dd9d10c7eab1a01f31b2c5e7dbc0556bfa8548dab9ad5ba35b81d7839052a6

      • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

        Filesize

        8B

        MD5

        da573b4d846708fb9efa197f69a45741

        SHA1

        e3ecc9c4fcd77e2eaf7d1047d1dd1c760d6b5ba3

        SHA256

        0cd16a3d6eec4f5ebf486b6ca2e837a767ab0ee55036d9adc967ba28dd8c458e

        SHA512

        b0c83b25fa50d73fcd092f84a7eb8770b824be924d42b12ae85e441c4c0a196dee4fe7eafc7e443dc1c77317a991e04f8c19bc3988ca625c5d052a30a94557cc

      • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

        Filesize

        8B

        MD5

        d5771c8c2d9202b67789d92665b32fdf

        SHA1

        f4cff8f1e02d6fe18e10e5b9dc0513e39c0d8cf6

        SHA256

        1c082666d8890b054f458e27ec2c644f39c71238993007d03a100f781594218c

        SHA512

        e877a3bd632d682555b154c9f9ae4e2d726ae8e5b619313df45f3e09fd173bdec9da44cd6c2adf40319042dc4853a3a432b04d2d5ad63c7d6531bd1992242dca

      • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

        Filesize

        8B

        MD5

        2b66680bf68b2280210c62265e682880

        SHA1

        dcb48684657ea635c792369981be57058ff23c38

        SHA256

        16072093d550f5bda661f9da89fdf3ee3438d813a750deeea759188b60928aea

        SHA512

        19eee998f56949afb4ca4a1abeb4700ae9f4ae0e216afdba5a56ba7abec43a2d973ebd66cd9675c460d0d13bf81504597604d9df6eccdf5d0d8a4e67a69407b2

      • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

        Filesize

        8B

        MD5

        c33d01ce06e6736d103381fab8b4f70d

        SHA1

        09b053d9f7e37b38843f6f85d19eadb7cfcaedb8

        SHA256

        f6a9cadff6856e26f7fe171f2632cafd08747d3d935fae27c0de06207fbb6b22

        SHA512

        b9f01ab51880662bb22cba8c162d049c46008e7cac88e72cc9c296fbe8dd4f34bc77910a1bcb77e7d21b86342a9d25a6780d60680f872cb1935bc32f27d99b44

      • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

        Filesize

        8B

        MD5

        c3f09657215b5937ce7ee99a09242749

        SHA1

        dea1a3f3b77e45d41c221cf74cef105f8a6e4a7d

        SHA256

        216dac02edd6d87b979affa4c86c56d71fc853839f454cd1168f8696d0183a9c

        SHA512

        713833b7f0a6de01cb40566c0f722f44d2fb0818dd467099177f77134d98c7b854d43c39961bd4edbb8e6880782b823fa2e0e33d3e7e83cb30ae21ec97566ff2

      • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

        Filesize

        8B

        MD5

        a1bd552fc482e63f4475ca65c21cd2cf

        SHA1

        aaecccc08f7d3e2a99afe1dfddb211434045aae5

        SHA256

        db60fb723a64b9f87caa39e991b2c2765f2daf51c313936c88fce4d013118550

        SHA512

        ae51f69d709fc1f9d901ccc778ec8bb0198dec65e186027092e134e4abcfed314c3a2384b9fcf0027c7ae991058d854bc38b19c6c3ceeb935f80de3abee283fa

      • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

        Filesize

        8B

        MD5

        1ec110c34d55a7a78de752b30e9c0c57

        SHA1

        e905e8aa3a58b99f4a71ac805f660147a54636de

        SHA256

        130b15b4cb9661107fc2d617c57a4eabcc0f0b5d921ea7a1dc6cabb879a060f7

        SHA512

        94eec73771667e35b8e5bf9e893d43e3bd29677dde946bbd3973feb0ea5b3b4042b322c352fdfd23b55f648f6b6f0f1403a2b574a8bed5a153ef73c231fd7b76

      • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

        Filesize

        8B

        MD5

        c4104335ac708489c664d989d930b4d2

        SHA1

        09259de1f8d6dcbd593c31de406d03fc608a4d1d

        SHA256

        d4a773b7dedca92966a583314144ca0ca326c31240a054630508556554f5e1d8

        SHA512

        b4ae70e4f04dd691dc3b8744d3731028849f3c3127e7685b384f2e01f1ce56b7f184d4b5986389cc9a92d462292fd8c653b9d24e3bacaf80d04b81824b8b0512

      • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

        Filesize

        8B

        MD5

        b09fe8642d0483b2800a9a4100cd47b6

        SHA1

        5170740e3e92e467739fc1e4e19d79caee81e358

        SHA256

        0c1455e11a2955d4f8c57744ebf88e5f09564dbe3c2486ca83952961bb07f7fa

        SHA512

        70212888b192da9d0b5807979a4967fef4e9d049edd67acee1505c9d8a310168af962a14372c71fee96b1edcb2e0c81fc481f935294ed82681df9a9c7f3b806b

      • C:\Users\Admin\AppData\Roaming\logs.dat

        Filesize

        15B

        MD5

        e21bd9604efe8ee9b59dc7605b927a2a

        SHA1

        3240ecc5ee459214344a1baac5c2a74046491104

        SHA256

        51a3fe220229aa3fdddc909e20a4b107e7497320a00792a280a03389f2eacb46

        SHA512

        42052ad5744ad76494bfa71d78578e545a3b39bfed4c4232592987bd28064b6366a423084f1193d137493c9b13d9ae1faac4cf9cc75eb715542fa56e13ca1493

      • C:\Windows\Microsoft\Microsoft.NET.exe

        Filesize

        548KB

        MD5

        ff3b7f563de4bd79698ca6e2ee3ca06a

        SHA1

        06e5eb41bec31f468229ea93a54976dc76eb4ad9

        SHA256

        ffb320ec60c0a19ad1a4a3dddd22075c6e66a94cbef4c321a6d09f5f3a36ae55

        SHA512

        29e2ec9acb0e011ed297b6bdeb1304ebd70593ec85b7b63ea89552ac05ed7f791797e79db7eb400cd4e08064e668ccfc2233bf6981ba0945ed16e83fd0a62a11

      • memory/300-903-0x00000000065B0000-0x0000000006823000-memory.dmp

        Filesize

        2.4MB

      • memory/300-918-0x00000000065B0000-0x0000000006823000-memory.dmp

        Filesize

        2.4MB

      • memory/300-572-0x0000000000400000-0x0000000000673000-memory.dmp

        Filesize

        2.4MB

      • memory/884-317-0x0000000000400000-0x0000000000455000-memory.dmp

        Filesize

        340KB

      • memory/884-6-0x0000000000400000-0x0000000000455000-memory.dmp

        Filesize

        340KB

      • memory/884-8-0x0000000000400000-0x0000000000455000-memory.dmp

        Filesize

        340KB

      • memory/884-13-0x0000000000400000-0x0000000000455000-memory.dmp

        Filesize

        340KB

      • memory/884-14-0x0000000000400000-0x0000000000455000-memory.dmp

        Filesize

        340KB

      • memory/884-12-0x0000000000400000-0x0000000000455000-memory.dmp

        Filesize

        340KB

      • memory/884-881-0x0000000000400000-0x0000000000455000-memory.dmp

        Filesize

        340KB

      • memory/1124-18-0x00000000029F0000-0x00000000029F1000-memory.dmp

        Filesize

        4KB

      • memory/1532-262-0x00000000000E0000-0x00000000000E1000-memory.dmp

        Filesize

        4KB

      • memory/1532-548-0x0000000024080000-0x00000000240E2000-memory.dmp

        Filesize

        392KB

      • memory/1532-264-0x0000000000010000-0x0000000000011000-memory.dmp

        Filesize

        4KB

      • memory/1532-914-0x0000000024080000-0x00000000240E2000-memory.dmp

        Filesize

        392KB

      • memory/1608-904-0x0000000000400000-0x0000000000673000-memory.dmp

        Filesize

        2.4MB

      • memory/1608-913-0x0000000000400000-0x0000000000673000-memory.dmp

        Filesize

        2.4MB

      • memory/1672-912-0x0000000000400000-0x0000000000455000-memory.dmp

        Filesize

        340KB

      • memory/1672-917-0x0000000000400000-0x0000000000455000-memory.dmp

        Filesize

        340KB

      • memory/2860-11-0x00000000005D7000-0x0000000000655000-memory.dmp

        Filesize

        504KB

      • memory/2860-10-0x0000000000400000-0x0000000000673000-memory.dmp

        Filesize

        2.4MB

      • memory/2860-0-0x0000000000400000-0x0000000000673000-memory.dmp

        Filesize

        2.4MB

      • memory/2860-5-0x0000000000400000-0x0000000000673000-memory.dmp

        Filesize

        2.4MB

      • memory/2860-2-0x00000000005D7000-0x0000000000655000-memory.dmp

        Filesize

        504KB

      • memory/2860-1-0x0000000000400000-0x0000000000673000-memory.dmp

        Filesize

        2.4MB