General
-
Target
10034e5acbf9c7d5e98eabd440dfc28e_JaffaCakes118
-
Size
955KB
-
Sample
241003-wrtk5syhlj
-
MD5
10034e5acbf9c7d5e98eabd440dfc28e
-
SHA1
b2575e522f4a47123980141580b705e4b544b4b3
-
SHA256
cf10bdbd4acbe1630a0f7360680768c1d5e2af305eefc0ac8852f3b7610bfe52
-
SHA512
12b3fe73a1ca5d4badf5c9727f7d0745cc3ef7a6a1c6ec87d6fa56ff3e8c177abf24b8670675d4db9ff9ec155229597e8f976439a6b748edf74771391ddd3839
-
SSDEEP
24576:vl8QfAgftcJ+ux0xGGcHjYEwIafxobjevj6lC8cihPe+iGL7M12xpzRcI4f:98QfAgftcJ+ux0xGGcHjYEwIafxobje/
Static task
static1
Behavioral task
behavioral1
Sample
10034e5acbf9c7d5e98eabd440dfc28e_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
cybergate
v1.04.8
remote
bombemran0987.zapto.org:5150
C1LIC7W503FS4Q
-
enable_keylogger
true
-
enable_message_box
true
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
Windows
-
install_file
WinUpd.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Die Datei oder das Verzeichnis ist beschÃĪdigt!
-
message_box_title
Windows
-
password
messi1995
-
regkey_hkcu
WinUpd
-
regkey_hklm
WinUpd
Extracted
latentbot
bombemran0987.zapto.org
Targets
-
-
Target
10034e5acbf9c7d5e98eabd440dfc28e_JaffaCakes118
-
Size
955KB
-
MD5
10034e5acbf9c7d5e98eabd440dfc28e
-
SHA1
b2575e522f4a47123980141580b705e4b544b4b3
-
SHA256
cf10bdbd4acbe1630a0f7360680768c1d5e2af305eefc0ac8852f3b7610bfe52
-
SHA512
12b3fe73a1ca5d4badf5c9727f7d0745cc3ef7a6a1c6ec87d6fa56ff3e8c177abf24b8670675d4db9ff9ec155229597e8f976439a6b748edf74771391ddd3839
-
SSDEEP
24576:vl8QfAgftcJ+ux0xGGcHjYEwIafxobjevj6lC8cihPe+iGL7M12xpzRcI4f:98QfAgftcJ+ux0xGGcHjYEwIafxobje/
-
Adds policy Run key to start application
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2