Analysis
-
max time kernel
147s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-10-2024 15:38
Behavioral task
behavioral1
Sample
5d58bec5b44118df7cd4b652b3dbec84_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
5d58bec5b44118df7cd4b652b3dbec84_JaffaCakes118.exe
-
Size
298KB
-
MD5
5d58bec5b44118df7cd4b652b3dbec84
-
SHA1
df01357d2622dee58cd45071bb9b0587c72228b5
-
SHA256
72cb75ae8837a88348290cc8917796a2719ac145b5dce677eb8683f74a29f042
-
SHA512
80b238953ebdf5e0165e74963a19c1d4aea10ed38a25e7e5c1ca0ad8b75df54de90c722e79af7372caacb59bab03e97832d3ee17bdd3a6b6407042b8311e7442
-
SSDEEP
6144:e6BsG/orIrM+NW6o2SWnIq+ikCdGodAXbAFI6:TBsGQr4/xS2hdEbA
Malware Config
Extracted
cybergate
2.5
1
dodge2006.vicp.net:81
dodge2005.vicp.net:82
***MUTEX***
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_file
360safe.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
ÕâÊÇÀ´×ÔÓÚN0_LoseµÄÎʺò£¡
-
message_box_title
N0_LoseµÄÎʺò
-
password
123
-
regkey_hklm
HKLM
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\system32\\360safe.exe" 5d58bec5b44118df7cd4b652b3dbec84_JaffaCakes118.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\360safe.exe 5d58bec5b44118df7cd4b652b3dbec84_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\360safe.exe 5d58bec5b44118df7cd4b652b3dbec84_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ 5d58bec5b44118df7cd4b652b3dbec84_JaffaCakes118.exe File created C:\Windows\SysWOW64\360safe.exe 5d58bec5b44118df7cd4b652b3dbec84_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2348-0-0x0000000000400000-0x000000000044C000-memory.dmp upx behavioral1/memory/2348-259-0x0000000000400000-0x000000000044C000-memory.dmp upx behavioral1/memory/1368-438-0x0000000024060000-0x00000000240A2000-memory.dmp upx behavioral1/files/0x000d000000012276-437.dat upx behavioral1/memory/2348-713-0x0000000000400000-0x000000000044C000-memory.dmp upx behavioral1/memory/2536-714-0x0000000024100000-0x0000000024142000-memory.dmp upx behavioral1/memory/1368-736-0x0000000024060000-0x00000000240A2000-memory.dmp upx behavioral1/memory/2536-737-0x0000000000400000-0x000000000044C000-memory.dmp upx behavioral1/memory/2536-745-0x0000000024100000-0x0000000024142000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5d58bec5b44118df7cd4b652b3dbec84_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5d58bec5b44118df7cd4b652b3dbec84_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2348 5d58bec5b44118df7cd4b652b3dbec84_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2536 5d58bec5b44118df7cd4b652b3dbec84_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2536 5d58bec5b44118df7cd4b652b3dbec84_JaffaCakes118.exe Token: SeDebugPrivilege 2536 5d58bec5b44118df7cd4b652b3dbec84_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2348 5d58bec5b44118df7cd4b652b3dbec84_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2348 wrote to memory of 1196 2348 5d58bec5b44118df7cd4b652b3dbec84_JaffaCakes118.exe 21 PID 2348 wrote to memory of 1196 2348 5d58bec5b44118df7cd4b652b3dbec84_JaffaCakes118.exe 21 PID 2348 wrote to memory of 1196 2348 5d58bec5b44118df7cd4b652b3dbec84_JaffaCakes118.exe 21 PID 2348 wrote to memory of 1196 2348 5d58bec5b44118df7cd4b652b3dbec84_JaffaCakes118.exe 21 PID 2348 wrote to memory of 1196 2348 5d58bec5b44118df7cd4b652b3dbec84_JaffaCakes118.exe 21 PID 2348 wrote to memory of 1196 2348 5d58bec5b44118df7cd4b652b3dbec84_JaffaCakes118.exe 21 PID 2348 wrote to memory of 1196 2348 5d58bec5b44118df7cd4b652b3dbec84_JaffaCakes118.exe 21 PID 2348 wrote to memory of 1196 2348 5d58bec5b44118df7cd4b652b3dbec84_JaffaCakes118.exe 21 PID 2348 wrote to memory of 1196 2348 5d58bec5b44118df7cd4b652b3dbec84_JaffaCakes118.exe 21 PID 2348 wrote to memory of 1196 2348 5d58bec5b44118df7cd4b652b3dbec84_JaffaCakes118.exe 21 PID 2348 wrote to memory of 1196 2348 5d58bec5b44118df7cd4b652b3dbec84_JaffaCakes118.exe 21 PID 2348 wrote to memory of 1196 2348 5d58bec5b44118df7cd4b652b3dbec84_JaffaCakes118.exe 21 PID 2348 wrote to memory of 1196 2348 5d58bec5b44118df7cd4b652b3dbec84_JaffaCakes118.exe 21 PID 2348 wrote to memory of 1196 2348 5d58bec5b44118df7cd4b652b3dbec84_JaffaCakes118.exe 21 PID 2348 wrote to memory of 1196 2348 5d58bec5b44118df7cd4b652b3dbec84_JaffaCakes118.exe 21 PID 2348 wrote to memory of 1196 2348 5d58bec5b44118df7cd4b652b3dbec84_JaffaCakes118.exe 21 PID 2348 wrote to memory of 1196 2348 5d58bec5b44118df7cd4b652b3dbec84_JaffaCakes118.exe 21 PID 2348 wrote to memory of 1196 2348 5d58bec5b44118df7cd4b652b3dbec84_JaffaCakes118.exe 21 PID 2348 wrote to memory of 1196 2348 5d58bec5b44118df7cd4b652b3dbec84_JaffaCakes118.exe 21 PID 2348 wrote to memory of 1196 2348 5d58bec5b44118df7cd4b652b3dbec84_JaffaCakes118.exe 21 PID 2348 wrote to memory of 1196 2348 5d58bec5b44118df7cd4b652b3dbec84_JaffaCakes118.exe 21 PID 2348 wrote to memory of 1196 2348 5d58bec5b44118df7cd4b652b3dbec84_JaffaCakes118.exe 21 PID 2348 wrote to memory of 1196 2348 5d58bec5b44118df7cd4b652b3dbec84_JaffaCakes118.exe 21 PID 2348 wrote to memory of 1196 2348 5d58bec5b44118df7cd4b652b3dbec84_JaffaCakes118.exe 21 PID 2348 wrote to memory of 1196 2348 5d58bec5b44118df7cd4b652b3dbec84_JaffaCakes118.exe 21 PID 2348 wrote to memory of 1196 2348 5d58bec5b44118df7cd4b652b3dbec84_JaffaCakes118.exe 21 PID 2348 wrote to memory of 1196 2348 5d58bec5b44118df7cd4b652b3dbec84_JaffaCakes118.exe 21 PID 2348 wrote to memory of 1196 2348 5d58bec5b44118df7cd4b652b3dbec84_JaffaCakes118.exe 21 PID 2348 wrote to memory of 1196 2348 5d58bec5b44118df7cd4b652b3dbec84_JaffaCakes118.exe 21 PID 2348 wrote to memory of 1196 2348 5d58bec5b44118df7cd4b652b3dbec84_JaffaCakes118.exe 21 PID 2348 wrote to memory of 1196 2348 5d58bec5b44118df7cd4b652b3dbec84_JaffaCakes118.exe 21 PID 2348 wrote to memory of 1196 2348 5d58bec5b44118df7cd4b652b3dbec84_JaffaCakes118.exe 21 PID 2348 wrote to memory of 1196 2348 5d58bec5b44118df7cd4b652b3dbec84_JaffaCakes118.exe 21 PID 2348 wrote to memory of 1196 2348 5d58bec5b44118df7cd4b652b3dbec84_JaffaCakes118.exe 21 PID 2348 wrote to memory of 1196 2348 5d58bec5b44118df7cd4b652b3dbec84_JaffaCakes118.exe 21 PID 2348 wrote to memory of 1196 2348 5d58bec5b44118df7cd4b652b3dbec84_JaffaCakes118.exe 21 PID 2348 wrote to memory of 1196 2348 5d58bec5b44118df7cd4b652b3dbec84_JaffaCakes118.exe 21 PID 2348 wrote to memory of 1196 2348 5d58bec5b44118df7cd4b652b3dbec84_JaffaCakes118.exe 21 PID 2348 wrote to memory of 1196 2348 5d58bec5b44118df7cd4b652b3dbec84_JaffaCakes118.exe 21 PID 2348 wrote to memory of 1196 2348 5d58bec5b44118df7cd4b652b3dbec84_JaffaCakes118.exe 21 PID 2348 wrote to memory of 1196 2348 5d58bec5b44118df7cd4b652b3dbec84_JaffaCakes118.exe 21 PID 2348 wrote to memory of 1196 2348 5d58bec5b44118df7cd4b652b3dbec84_JaffaCakes118.exe 21 PID 2348 wrote to memory of 1196 2348 5d58bec5b44118df7cd4b652b3dbec84_JaffaCakes118.exe 21 PID 2348 wrote to memory of 1196 2348 5d58bec5b44118df7cd4b652b3dbec84_JaffaCakes118.exe 21 PID 2348 wrote to memory of 1196 2348 5d58bec5b44118df7cd4b652b3dbec84_JaffaCakes118.exe 21 PID 2348 wrote to memory of 1196 2348 5d58bec5b44118df7cd4b652b3dbec84_JaffaCakes118.exe 21 PID 2348 wrote to memory of 1196 2348 5d58bec5b44118df7cd4b652b3dbec84_JaffaCakes118.exe 21 PID 2348 wrote to memory of 1196 2348 5d58bec5b44118df7cd4b652b3dbec84_JaffaCakes118.exe 21 PID 2348 wrote to memory of 1196 2348 5d58bec5b44118df7cd4b652b3dbec84_JaffaCakes118.exe 21 PID 2348 wrote to memory of 1196 2348 5d58bec5b44118df7cd4b652b3dbec84_JaffaCakes118.exe 21 PID 2348 wrote to memory of 1196 2348 5d58bec5b44118df7cd4b652b3dbec84_JaffaCakes118.exe 21 PID 2348 wrote to memory of 1196 2348 5d58bec5b44118df7cd4b652b3dbec84_JaffaCakes118.exe 21 PID 2348 wrote to memory of 1196 2348 5d58bec5b44118df7cd4b652b3dbec84_JaffaCakes118.exe 21 PID 2348 wrote to memory of 1196 2348 5d58bec5b44118df7cd4b652b3dbec84_JaffaCakes118.exe 21 PID 2348 wrote to memory of 1196 2348 5d58bec5b44118df7cd4b652b3dbec84_JaffaCakes118.exe 21 PID 2348 wrote to memory of 1196 2348 5d58bec5b44118df7cd4b652b3dbec84_JaffaCakes118.exe 21 PID 2348 wrote to memory of 1196 2348 5d58bec5b44118df7cd4b652b3dbec84_JaffaCakes118.exe 21 PID 2348 wrote to memory of 1196 2348 5d58bec5b44118df7cd4b652b3dbec84_JaffaCakes118.exe 21 PID 2348 wrote to memory of 1196 2348 5d58bec5b44118df7cd4b652b3dbec84_JaffaCakes118.exe 21 PID 2348 wrote to memory of 1196 2348 5d58bec5b44118df7cd4b652b3dbec84_JaffaCakes118.exe 21 PID 2348 wrote to memory of 1196 2348 5d58bec5b44118df7cd4b652b3dbec84_JaffaCakes118.exe 21 PID 2348 wrote to memory of 1196 2348 5d58bec5b44118df7cd4b652b3dbec84_JaffaCakes118.exe 21 PID 2348 wrote to memory of 1196 2348 5d58bec5b44118df7cd4b652b3dbec84_JaffaCakes118.exe 21 PID 2348 wrote to memory of 1196 2348 5d58bec5b44118df7cd4b652b3dbec84_JaffaCakes118.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1196
-
C:\Users\Admin\AppData\Local\Temp\5d58bec5b44118df7cd4b652b3dbec84_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5d58bec5b44118df7cd4b652b3dbec84_JaffaCakes118.exe"2⤵
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵
- System Location Discovery: System Language Discovery
PID:1368
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:2580
-
-
C:\Users\Admin\AppData\Local\Temp\5d58bec5b44118df7cd4b652b3dbec84_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5d58bec5b44118df7cd4b652b3dbec84_JaffaCakes118.exe"3⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2536
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
189KB
MD5e3c051efbe1ebfcab1d9a2747f3339c0
SHA1e1ff12bdc73ccbd59aaeff0c103723d994ca541d
SHA256b120197a58d684fd56a40112ca0b1e9936b796e482b646644e3d122974472bee
SHA5120fbb6f1b3fc94c1b1464ea29e1ae749f726707c87dc758b456eddbf559265298dfd149096e6c773ff0c62407b3d4c755cf746a94f3729a4b0888c7334563f074
-
Filesize
15B
MD54362e21af8686f5ebba224768d292a5b
SHA1504510a4d10e230dcd1605ab3342525b38a10933
SHA256b1b2cc9a6bf77f9e56955acbbce253c70fc25b92d1e150d9928b9183b19b93b3
SHA512f2ee4b95d5c50b533de93f21f9d73a75ab8c755ab9f343b4848bd92b6827e76dc5e17fe27b0f2ad2049a1ee0fe20d0cb0398b1973277b85e84b6af004e945850
-
Filesize
298KB
MD55d58bec5b44118df7cd4b652b3dbec84
SHA1df01357d2622dee58cd45071bb9b0587c72228b5
SHA25672cb75ae8837a88348290cc8917796a2719ac145b5dce677eb8683f74a29f042
SHA51280b238953ebdf5e0165e74963a19c1d4aea10ed38a25e7e5c1ca0ad8b75df54de90c722e79af7372caacb59bab03e97832d3ee17bdd3a6b6407042b8311e7442