Analysis
-
max time kernel
94s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2024 18:12
Behavioral task
behavioral1
Sample
a3634be84a1bc9c0233f05f4836cae3e_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
a3634be84a1bc9c0233f05f4836cae3e_JaffaCakes118.exe
-
Size
296KB
-
MD5
a3634be84a1bc9c0233f05f4836cae3e
-
SHA1
e0cfcfe709331b148daf16787bec1b752b6fc1c9
-
SHA256
663b88581bcc1519206fc5e07d0dbb52280ba3b77c454baa9700e6481394b645
-
SHA512
7ac3567dad148e83469154812b1c47b35c61f647c816e74ca486b63db8dfd6efc816d0ec242d38cbcafd8c10e98332cfc3a0cd75c69cf047afc568fcb357314b
-
SSDEEP
6144:/OpslFlqfFQ+lWDn3zG+biI5fa3p+pjZLPLenMS43Gl9f4/lQOwgM36Yga:/wslCnMTq+b23p+pjZeu3sN49QVgM36k
Malware Config
Extracted
cybergate
v1.07.5
Ndcb
gosth.no-ip.org:3470
8K1NH8TV1486O6
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
Services
-
install_file
Winver.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
password
gogole10
-
regkey_hkcu
Svchost-32
-
regkey_hklm
Explorer
Signatures
-
Cybergate family
-
Program crash 1 IoCs
pid pid_target Process procid_target 400 3116 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a3634be84a1bc9c0233f05f4836cae3e_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a3634be84a1bc9c0233f05f4836cae3e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a3634be84a1bc9c0233f05f4836cae3e_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
PID:3116 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3116 -s 5202⤵
- Program crash
PID:400
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3116 -ip 31161⤵PID:808