General
-
Target
940dd1fb3cc8f15e4d73fb86721938c5_JaffaCakes118
-
Size
529KB
-
Sample
241124-metkyavpc1
-
MD5
940dd1fb3cc8f15e4d73fb86721938c5
-
SHA1
331a86278ba71274996a40d49f7e90ee8428a754
-
SHA256
4942925b725fba4b9a37ad767d5fdd92f5096da2a5b95656077e0367f8084521
-
SHA512
82f27c2d971651decf41d4d5a369e0da4540524fc9b32c402e70e61670124abb111bbc1e5ea666b706587dd2857e139311d0de04322d9b0d62a0e0b317876c3b
-
SSDEEP
12288:JsEhZ9nSUhxEmwj+FTD0AmiHIHfcej7MftD1Z3f:N93hxzwaZ1mwIHTj7QB1Zv
Static task
static1
Behavioral task
behavioral1
Sample
940dd1fb3cc8f15e4d73fb86721938c5_JaffaCakes118.exe
Resource
win7-20240729-en
Malware Config
Extracted
cybergate
2.6
åáÇ æÛáÇ
vip6554.no-ip.info:288
***MUTEX***
-
enable_keylogger
true
-
enable_message_box
true
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
svchost.exe
-
install_file
windows.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
hghg so like dont hgfgd dstr
-
message_box_title
ÇÚÏ ÇáãÍÇæáå
-
password
147000
-
regkey_hklm
HKLM
Targets
-
-
Target
940dd1fb3cc8f15e4d73fb86721938c5_JaffaCakes118
-
Size
529KB
-
MD5
940dd1fb3cc8f15e4d73fb86721938c5
-
SHA1
331a86278ba71274996a40d49f7e90ee8428a754
-
SHA256
4942925b725fba4b9a37ad767d5fdd92f5096da2a5b95656077e0367f8084521
-
SHA512
82f27c2d971651decf41d4d5a369e0da4540524fc9b32c402e70e61670124abb111bbc1e5ea666b706587dd2857e139311d0de04322d9b0d62a0e0b317876c3b
-
SSDEEP
12288:JsEhZ9nSUhxEmwj+FTD0AmiHIHfcej7MftD1Z3f:N93hxzwaZ1mwIHTj7QB1Zv
-
Cybergate family
-
Adds policy Run key to start application
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2