Analysis

  • max time kernel
    142s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    27-11-2024 16:38

General

  • Target

    a8bfe7df2f4d9b547c4e85ccc89973f4_JaffaCakes118.exe

  • Size

    5.9MB

  • MD5

    a8bfe7df2f4d9b547c4e85ccc89973f4

  • SHA1

    270fe328a8a70efffa1419e906c1aea6055be3ac

  • SHA256

    e5cba6c7c3799af656089ca87949fd6e80cb7b52f1cce0e6c90a74cc4b7b4c9e

  • SHA512

    9ff7c2ced52a2de40b15f8e5007123f32dc0211d904f4e714fa9612043d304f30f24941b3bb46f82901f5633fec8446ef9626a1c3f569065198eb74dde2d9742

  • SSDEEP

    98304:GvxwIPd8ETSTQcxfHdqCWS13hr1E9TrmRsb4tUPexufd8biYsSmq8Ydpe:RanuDMCWSLhE9TySUtUPecmmSp7

Malware Config

Extracted

Family

cybergate

Version

v1.07.5

Botnet

Cyber

C2

crysiscore.no-ip.info:100

Mutex

7FJF6386WIN204

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • ftp_password

    lol12345

  • ftp_port

    21

  • ftp_server

    www7.subdomain.com

  • ftp_username

    user1172371

  • injected_process

    explorer.exe

  • install_dir

    install

  • install_file

    WindiwsBackup.exe

  • install_flag

    true

  • keylogger_enable_ftp

    true

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    123456

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Signatures

  • CyberGate, Rebhip

    CyberGate is a lightweight remote administration tool with a wide array of functionalities.

  • Cybergate family
  • Adds policy Run key to start application 2 TTPs 4 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of FindShellTrayWindow 7 IoCs
  • Suspicious use of SendNotifyMessage 5 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1364
      • C:\Users\Admin\AppData\Local\Temp\a8bfe7df2f4d9b547c4e85ccc89973f4_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\a8bfe7df2f4d9b547c4e85ccc89973f4_JaffaCakes118.exe"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2104
        • C:\Users\Admin\AppData\Local\Temp\71b20ffa4ed3416197f7e70efa29a321.exe
          "C:\Users\Admin\AppData\Local\Temp\71b20ffa4ed3416197f7e70efa29a321.exe"
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:2776
        • C:\Program Files\VideoLAN\VLC\vlc.exe
          "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\4495f914374547d0855056f7766f1136.mp3"
          3⤵
          • Suspicious behavior: AddClipboardFormatListener
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of SetWindowsHookEx
          PID:2880
        • C:\Users\Admin\AppData\Local\Temp\330952af9c144001ba05a4cc50918295.exe
          "C:\Users\Admin\AppData\Local\Temp\330952af9c144001ba05a4cc50918295.exe"
          3⤵
          • Adds policy Run key to start application
          • Boot or Logon Autostart Execution: Active Setup
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:2408
          • C:\Windows\SysWOW64\explorer.exe
            explorer.exe
            4⤵
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of AdjustPrivilegeToken
            PID:1528
            • C:\Windows\SysWOW64\install\WindiwsBackup.exe
              "C:\Windows\system32\install\WindiwsBackup.exe"
              5⤵
              • Executes dropped EXE
              PID:2384
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0x490
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2980

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\330952af9c144001ba05a4cc50918295.exe

      Filesize

      290KB

      MD5

      e41d76b1a8151af0156bbd944cd693ee

      SHA1

      e234bb05e37aac0d6be5db78222487e0706a22eb

      SHA256

      1876d3332e2868eaa9ccebb9ba7bfaf46bce3d71a59f79c4920393d3d6d99b21

      SHA512

      af504866a69193d03239fd4df19430042e02ad28e7e405a33787ca9fa04db5090b3afc4a56096c5f5c0f63e4428e0f92ba34f5f5bfcaa387989c4d717eec760a

    • C:\Users\Admin\AppData\Local\Temp\4495f914374547d0855056f7766f1136.mp3

      Filesize

      5.0MB

      MD5

      38407d56f81267dc167fce91e7952176

      SHA1

      a049533a1cb687e75967ac90e27d9c2267f6ba35

      SHA256

      473b88721778c837e7e53599b99194e9fbd37518f5bb0981f311b86c076f1ca0

      SHA512

      859a2742b24cc364cdeefa8a4234bc716c5d4e916886524a1eea8f1d9273d12409fb8475409fe1fbbb36921d2501de4d0daf78e20ae86f7535d3be0f741b5786

    • C:\Users\Admin\AppData\Local\Temp\71b20ffa4ed3416197f7e70efa29a321.exe

      Filesize

      340KB

      MD5

      ba35670096e51b9db5c4d95243a67e66

      SHA1

      f18d230059bc12b16bb06d8efb8d1f1a9de3f603

      SHA256

      cc0d1c3ef2daaeb4b4dadedc1c47372c949981016184a1f4af63068b5b31847f

      SHA512

      e7525da0347a940de43e9e307f51db956e97b91c293ef4e988cc98a0c7daaa8e0919ccfa4f4270a28cb0124759f3366b2d259d0a513d14152c84b57140a16e77

    • C:\Users\Admin\AppData\Local\Temp\Admin2.txt

      Filesize

      224KB

      MD5

      ff5344038e2e7dc973a446297d1b762e

      SHA1

      77ff1fb0365f6d4dd513da48ce4fb738cf21d342

      SHA256

      b8528cbb85c46d65e86a4c229d8ffe5c3c4a84076eb11d00787ffe8083c5753d

      SHA512

      ce41aef98091f952f6aa915932740a31b57b08a82bd2aad3a5b07fd7414ce0a53fa328b0bf408b4fd8660bc643d969f86432a8b55a0eddf645b9f8d42cd6562b

    • C:\Users\Admin\AppData\Local\Temp\Admin7

      Filesize

      8B

      MD5

      16b32d538f3370669df2e735f4462ccc

      SHA1

      4acb6776b091b21100a5c5020545a95d2e04c413

      SHA256

      e31ccc2c4e4dfbe43e0422e8702ac3cf906c58b5699bad5b8890a90b4071ffb9

      SHA512

      dc5e6faa0309930806875eb433497af62f4a936e6749ea3e3674cd025835502ed4a5b6638d82895936e4e54f265dd13aa6e3796cdd9ae021f341f3c404874c0e

    • C:\Users\Admin\AppData\Local\Temp\Admin7

      Filesize

      8B

      MD5

      ae0f5f58e08d0d671045cacaae9ecfae

      SHA1

      dee42fa34edf8183970f8cd27c2ec50bcb854735

      SHA256

      a0bd92ba1a6483f88094c5e9bd5e6e8a1c145c538fa0192fdd90a72c42efdf8b

      SHA512

      424b46f3bdd50c87ecb9c9ea2461f788a767357443bb31f9e59465c97cc02341e127200f32cd56449fcd7cac802043364e094d8870f4d3a967620256d6be8866

    • C:\Users\Admin\AppData\Local\Temp\Admin7

      Filesize

      8B

      MD5

      4312d8c23560aad171346ac3a777e853

      SHA1

      da250d85937773fc77d978cc43b79a7dc1cab76c

      SHA256

      cb9d5d6fbb5c485bf85c6aa32fe33eca6ef6da6e154bf3b101839dd914b049e8

      SHA512

      c17e4ae4357116a128d309bc904018bef1a51513e90f62588c2887ad09c9cf265448822be669b204e11ff8a1304b673bdd2ae72272aa08960c27555540fb86e2

    • C:\Users\Admin\AppData\Local\Temp\Admin7

      Filesize

      8B

      MD5

      4309875898263ba6f9a6ed0a651d7733

      SHA1

      ce98e8c6d72c739d2f0b137e74f72c4667fe9c8c

      SHA256

      90f1b1f20a65a14797677eb97f277d1d5fdb5bbf6d18c7fb7e18f49fa2c792b0

      SHA512

      98a79f794ecdc63b95ee8daf2b2b4643282e8ce2adb90418359b89412d7dfd10e99b8e141735383b0c5ebb90b97c5ebeede3e59fbdd63afceee438835332cc35

    • C:\Users\Admin\AppData\Local\Temp\Admin7

      Filesize

      8B

      MD5

      f79827b854d34a58846397113e671253

      SHA1

      872cf5544774115a55acb449a5bde81ba5e7a071

      SHA256

      a8b04abc394e7fe7998db80537e21bca256d9f33878dcff958b8671eabc169b7

      SHA512

      bdf05501660857ef8ae8f8a85fc5a90338cc42d4cfbbb9c0c6de67aa8dd9173f9780de89b849694e3e1ae67e693dc38dc11ce7a1896329beaba8e8dfbc15856a

    • C:\Users\Admin\AppData\Local\Temp\Admin7

      Filesize

      8B

      MD5

      8ba705bab2e84b27f71cd5f11e1a10de

      SHA1

      3fea8282a7d6a7568de8ba55209dea8c520e5b33

      SHA256

      1258c425b9e057f278380748027cf850e4e05f9f005dfff1d8eabea1c5960f80

      SHA512

      570e75875fcb349e9963c0ea1e87a0101c6dedc06b32a4b8e239756ed9b615345c513d9ba50988f4766fb69b537fcf6a6c6dfa362630e930b3e51e250abfe162

    • C:\Users\Admin\AppData\Local\Temp\Admin7

      Filesize

      8B

      MD5

      553878697c7ba4fc298bd27621855779

      SHA1

      ed7f40a344a9f05b1da1c69c2802de14cfa6ea82

      SHA256

      74080cad92f799df643dfe01d9ce81fd6804f7036bf1e2ff98d26ea25e5592c2

      SHA512

      a51f873badaf21e45568a66ce1c30830e068581688894ccecefe6497d73c8486765252e15bc52cfd064fab90af266c446a404c46eac0a281d5dfbbab3913ae18

    • C:\Users\Admin\AppData\Local\Temp\Admin7

      Filesize

      8B

      MD5

      8b48eca2cbf8de0a3ad93054747588dc

      SHA1

      0b236c85ed61342c0efa5296cc5b57ac95d69009

      SHA256

      3f6a08d2204b1202511316b1efc19792e2b0c9ab3701f5f4799a36689663ee09

      SHA512

      8df419ed68ad982197a0f6f4cc3886c26950f3b40f24e48ef98c27daf50cdceb273f4d7c9287aa765911634a357e3f4fc8182fbd93c4dceed61b6b33a079393a

    • C:\Users\Admin\AppData\Local\Temp\Admin7

      Filesize

      8B

      MD5

      cfa10e64934818cdbaefc8610c937ea6

      SHA1

      2ced4579be6609252f576e4d4e4b9470c0522f87

      SHA256

      0b6280049043758f0089443e15ac73bdca67d09f0107a5b7fa666bfb066e0c44

      SHA512

      e52fd4a4c9cb8920ec6b4d9f917a8afa515839abb29d43cb7887a46ea594240a0719ac0363126031b1ae30ff5ee88eea5ab73cc902620d790ead65528b3e18c2

    • C:\Users\Admin\AppData\Local\Temp\Admin7

      Filesize

      8B

      MD5

      f7300bc75cba8dcfdfa07521d184ccc2

      SHA1

      f1639322765f320a4d62c1cf79769916d2061742

      SHA256

      49679ee9841b862ad3c0888e0ab51ab3541b6f833252804503164930a19be910

      SHA512

      701549e0e19739951ecd22fef43e3937b88dc24368de67d5e91bfa4ab46fbda221cf7cdd1868b5e6dbfefc43c4cf582db450bcc9fae46ef0d21625e4e377bbb5

    • C:\Users\Admin\AppData\Local\Temp\Admin7

      Filesize

      8B

      MD5

      d3162f3e28eee8cc943693fa56fed926

      SHA1

      113e1b1718ea9be10bbc191e103fa6324bfa22c6

      SHA256

      b56cd6f684473da3ce88c4c74a390aef50518475c7af85aa936fefcd3fb3be32

      SHA512

      c697afc8851842857dc0c977597fcc6779822c122b1d066ccd2a537cc1c739aa2dcd51988b3149e5fd2184a7438462f61202b6b6e6a4843da3282a86a5f040e9

    • C:\Users\Admin\AppData\Local\Temp\Admin7

      Filesize

      8B

      MD5

      5d3d95bcf19401c0597710cc7fa89716

      SHA1

      a4714110dd44c8aae1385b1819e52529a856e632

      SHA256

      8c32b68cd1181fbbf2844b799c544e60a7b22b034ac440a92231f1327eb247de

      SHA512

      c14c79e6635c74506013473ad79943dc5f01f23723df986e5fb24a866d200180772e38108da7afa6660d0daed8202452506165bd97f528e1c7859e2c0a364acb

    • C:\Users\Admin\AppData\Local\Temp\Admin7

      Filesize

      8B

      MD5

      fc45dd9c8a5184cf564e37e529c1d934

      SHA1

      a1cf2905d8eb6780d7ec4817fac0ecf1957a3fdd

      SHA256

      d5d57c82d5605f4304a41c6b584f772fa7b63db587793799667232c9a8f25100

      SHA512

      b5b62ea71602ef9566b1970d5c8e45b81d5a2c5a985d890c2be68790062e16f6fc55d2a4df9375202ed783f220d45606dcf6a8a9602aa304b1546d99e4265b7a

    • C:\Users\Admin\AppData\Local\Temp\Admin7

      Filesize

      8B

      MD5

      bfa700a71615793cea0055ea345b5d93

      SHA1

      f2b6af68f702c0b70975cc3e8d70b587819c596c

      SHA256

      ee07518c993f0d6339c368013fc42f4ce2436642439ebdfa2610c2452ead26aa

      SHA512

      9dc82bcc79bfc7b42b0d45a5899c45cd30d57f3b97858dd34242fa12d58aa532cc98d1f7ef640a2e2ae4b914fee077ad0ce8b9bd4a5a0aa78e5116576f3f9645

    • C:\Users\Admin\AppData\Local\Temp\Admin7

      Filesize

      8B

      MD5

      4a1356ee60562e823f77e1a9748a7cb6

      SHA1

      d0dd5770113846af7e0828d31b5da9280aa9f8a8

      SHA256

      be6cf66de9eb52c7b7818a475c0e6f346939601350a6c92ae1c82bd7bab5cb91

      SHA512

      adfe8bf3d4d37a13f51095c42847eb5dbcc713c0d8942ab5b75b088b1a41cf6ad5775ca70f92bd9b511ded800a0ac93a74b0fffc3246ddddfa9c4c34f89fb454

    • C:\Users\Admin\AppData\Local\Temp\Admin7

      Filesize

      8B

      MD5

      1e5d58e04edddf8a30bb7b52b178a5c5

      SHA1

      87c1a2447e25777c749377fdb8a1c8de8901f44a

      SHA256

      dda5ac47b85a8b72310f47893a758e8c32510cba661ea08393bfe43624fce64c

      SHA512

      2649b37ebfddbad133f2117c0b507506b686bcacc219ef8c0aa4fdd03698c962b3a7fa3b2c5b791308d2e63b7fba21417341804123eda2196a380dac81500c73

    • C:\Users\Admin\AppData\Local\Temp\Admin7

      Filesize

      8B

      MD5

      a52c668c5ef122de71e058b763a26d24

      SHA1

      3bbfad89a6cc7bc0e7658d86ca3ef0da6ffe32dd

      SHA256

      5bbb1d2537f0d9e289d11a23e64b88fb2c3890ae1bf1dc7f4808655b5b06c9bc

      SHA512

      29752e2ce1a304a11b9f6127efa60ecfd74dcaee05e4afce29c33cf30bae681e965d6737f1f91c0567a960d1eed925630b3da320e7da83e0789e4fc1fb4f6929

    • C:\Users\Admin\AppData\Roaming\Adminlog.dat

      Filesize

      15B

      MD5

      bf3dba41023802cf6d3f8c5fd683a0c7

      SHA1

      466530987a347b68ef28faad238d7b50db8656a5

      SHA256

      4a8e75390856bf822f492f7f605ca0c21f1905172f6d3ef610162533c140507d

      SHA512

      fec60f447dcc90753d693014135e24814f6e8294f6c0f436bc59d892b24e91552108dba6cf5a6fa7c0421f6d290d1bafee9f9f2d95ea8c4c05c2ad0f7c1bb314

    • memory/1364-25-0x0000000002210000-0x0000000002211000-memory.dmp

      Filesize

      4KB

    • memory/2104-18-0x000007FEF65F0000-0x000007FEF6F8D000-memory.dmp

      Filesize

      9.6MB

    • memory/2104-0-0x000007FEF68AE000-0x000007FEF68AF000-memory.dmp

      Filesize

      4KB

    • memory/2104-2-0x000007FEF65F0000-0x000007FEF6F8D000-memory.dmp

      Filesize

      9.6MB

    • memory/2104-6-0x000007FEF65F0000-0x000007FEF6F8D000-memory.dmp

      Filesize

      9.6MB

    • memory/2408-24-0x0000000010410000-0x0000000010475000-memory.dmp

      Filesize

      404KB