Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-11-2024 23:56

General

  • Target

    b42163ab99d02bd0da2170880fe50fa9_JaffaCakes118.exe

  • Size

    296KB

  • MD5

    b42163ab99d02bd0da2170880fe50fa9

  • SHA1

    70b7dbdf82699a1f805642e818b656ec24024110

  • SHA256

    fc7cd836936be0eb170c0cb634e5462e6e3107bab886ccc8eec1eb964b2f1821

  • SHA512

    14c38af172532f6a9331dafdaee58583a758b79d6324dc4a40356ccc23778a8086b065ef80e50f5ca07a5a8fe53013eef8ed33368aeb73454e919948be9875af

  • SSDEEP

    6144:/OpslFlqmhdBCkWYxuukP1pjSKSNVkq/MVJbm:/wslbTBd47GLRMTbm

Malware Config

Extracted

Family

cybergate

Version

v1.07.5

Botnet

platinum

C2

qwerty12345.no-ip.biz:100

Mutex

722PJ8G1T63870

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    install

  • install_file

    fotka.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    12345

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Signatures

  • CyberGate, Rebhip

    CyberGate is a lightweight remote administration tool with a wide array of functionalities.

  • Cybergate family
  • Adds policy Run key to start application 2 TTPs 4 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in System32 directory 4 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3476
      • C:\Users\Admin\AppData\Local\Temp\b42163ab99d02bd0da2170880fe50fa9_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\b42163ab99d02bd0da2170880fe50fa9_JaffaCakes118.exe"
        2⤵
        • Adds policy Run key to start application
        • Boot or Logon Autostart Execution: Active Setup
        • Checks computer location settings
        • Adds Run key to start application
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:728
        • C:\Windows\SysWOW64\explorer.exe
          explorer.exe
          3⤵
          • Boot or Logon Autostart Execution: Active Setup
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:3416
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe"
          3⤵
            PID:2412
          • C:\Users\Admin\AppData\Local\Temp\b42163ab99d02bd0da2170880fe50fa9_JaffaCakes118.exe
            "C:\Users\Admin\AppData\Local\Temp\b42163ab99d02bd0da2170880fe50fa9_JaffaCakes118.exe"
            3⤵
            • Checks computer location settings
            • Drops file in System32 directory
            • System Location Discovery: System Language Discovery
            • Modifies registry class
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of AdjustPrivilegeToken
            PID:2304
            • C:\Windows\SysWOW64\install\fotka.exe
              "C:\Windows\system32\install\fotka.exe"
              4⤵
              • Executes dropped EXE
              PID:776
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 776 -s 548
                5⤵
                • Program crash
                PID:4448
          • C:\Windows\SysWOW64\install\fotka.exe
            "C:\Windows\system32\install\fotka.exe"
            3⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:3136
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3136 -s 592
              4⤵
              • Program crash
              PID:4136
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 3136 -ip 3136
        1⤵
          PID:3396
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 364 -p 776 -ip 776
          1⤵
            PID:2432

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\Admin2.txt

            Filesize

            224KB

            MD5

            4a096959769dddccf0f9bfa4e530b427

            SHA1

            0dc7cfbd7990765da0b3d2e394919aecc6106e2f

            SHA256

            4e012074cad8199a6252850b2aae6eabfcf80ac933c110b4035efe066ebc3545

            SHA512

            7cd41aa2208f2df3c7033e98e28efdcc09158d316e1df3f9d747fd2779388e8ac1b97dd74adbcf9d2e26c17752ee49be0bbcee23fd03097001677877a7dfcb04

          • C:\Users\Admin\AppData\Local\Temp\Admin7

            Filesize

            8B

            MD5

            42543f1de0a6fa710d70d6bcec674ef4

            SHA1

            a65acf2bc795767d93bbb372c90a1ea3429a65c8

            SHA256

            358a0713e66f2d9532a84470c78f1eec8e518ce1774fa5840b0f13d79a0c1cfd

            SHA512

            a15e218789936adf818aa17ed87ed9c7c90f7b8c47fa94a805418e1da7826269660c4cd6a958c01cd1843805701f8e87dc20edcb998ae6f0cd02815d110aaad1

          • C:\Users\Admin\AppData\Local\Temp\Admin7

            Filesize

            8B

            MD5

            7eea07e801c2acfa574c90625959b1a0

            SHA1

            4e42cea30862e08c0d3f72cab25c2e47a467c0b8

            SHA256

            5ae6560dd0657035da73f5d3d897918af249d02b12a3e24799856999cf819101

            SHA512

            06bb70ed4645f530088e9ac3c125c4798a4a653ce768947cfa063a23f578b2dffe802bc4d84ef68c68f68309c250a2a8c4ef49c24ba42f2ec456517f8538f4d0

          • C:\Users\Admin\AppData\Local\Temp\Admin7

            Filesize

            8B

            MD5

            65d20fb6bbfac87ec91e56a4c4162fb6

            SHA1

            624e2686fe5284ac1e5c5a074ccb96a3efc644c6

            SHA256

            3b48ea9ebb98211b8e4b4c46058feb7f3bd9e33d7b4aa93ec63eb0bc76657ece

            SHA512

            7280533ea703da07d92ef680482f00689ea69fc55dadccd2c0f5cfa88e03ea0feddd93315b6f25a3921ab7f9d29cf9e1b16ef3243c4a1fb83b68241dac2667ea

          • C:\Users\Admin\AppData\Local\Temp\Admin7

            Filesize

            8B

            MD5

            55368bcb97d6d01842930e55141f7280

            SHA1

            fe50af512a01458ed44c41df4e6c5886344ae04d

            SHA256

            e9ceae63575634172bb8f3b8442a568caba722e4170ecfc893fcb75969510a7c

            SHA512

            72a0ac844fddb66be968ceb0f03eb57ed39a76f189ba0f092bcc7b2d387fc83d3764067c14110f1fb7a46e27744e367c6bd33cdf34705c66161caca63e366ae4

          • C:\Users\Admin\AppData\Local\Temp\Admin7

            Filesize

            8B

            MD5

            3529b1e417fee69d1f6836e1f469bf3b

            SHA1

            2977d488eb944389551e4a9e8530ef47c76b852d

            SHA256

            60261b927c5949c36d41818685431f80e984342ef2285aaa5d03ded5d89e8f6d

            SHA512

            f3b34cf401a447afe367b1b9cce21c3fec5ee4aa704ffa16338666fd8b57655ec07e213971305b26cbd42eead2aa4538ee3b07c55dd3942150c2cb96e6a45323

          • C:\Users\Admin\AppData\Local\Temp\Admin7

            Filesize

            8B

            MD5

            62a75afbabe7dc20aaecbb77fbab1571

            SHA1

            19303638237d2e47011191f7fa81fb509aabf134

            SHA256

            b2878d8bd905132870bcd639c54a77ce97a6d5303a844685118a6355eac839dd

            SHA512

            847cc87ee040b6c2688086d3b10e92fba517a20bf6fcdb824e5cf201f454087bfa6bc2dabdc1b2ff915d30f0ae061d346c5efe5ef3ee107799fba8bbc112c0e2

          • C:\Users\Admin\AppData\Local\Temp\Admin7

            Filesize

            8B

            MD5

            019364c235ff914157412578a769bfbb

            SHA1

            485477117fa6e2b4078cbf8dca9c21fd181d690a

            SHA256

            dd6fd59ce326f6a87fba05843f663079ddb2ec38d8c8bb459fc2b8b98b62a8aa

            SHA512

            beafc5e8742a7b07db414689a3ce7c7149043d9b86ece5522035272e4045924e90cb252205aa4f8e737321fb8d8ca8cd61673994fe48d8ae898bab38a5236f71

          • C:\Users\Admin\AppData\Local\Temp\Admin7

            Filesize

            8B

            MD5

            fd4f6901eec486f187f2bc222e9bf88f

            SHA1

            b52ddb894ed9e0cbf2092dd38e28659991c11f2d

            SHA256

            f114e43ad147d0a5cb0afb1cd791db2da75bbc12f3882e3a73f1a144b5b7d6c9

            SHA512

            7b4c046d9d4788df754d70c2e8900047ad44bba58757428abe269bf98bd819ae0e53c22da7d9c993c2a0b7df3a22039b782fd925affb16090ebdac2c2950c565

          • C:\Users\Admin\AppData\Local\Temp\Admin7

            Filesize

            8B

            MD5

            ed234315ec52b91263b235d1ddfc95d9

            SHA1

            68ab6f1644ca175c0325c45581556011a11307ca

            SHA256

            7fe99806afaf144a59f1615cdcd6d54366707583f90f712767538e583de7d4a1

            SHA512

            98c0977cd6312f0a57f2415579a3b61b2284c15f33bcbfdaa77802d0cf576e7bd4d77c99b2945f3be761fce70db0d3fb2ae30d107f8d073138d64c8268ecf951

          • C:\Users\Admin\AppData\Local\Temp\Admin7

            Filesize

            8B

            MD5

            4b011bf3819f8eb9ac87695c43275ce8

            SHA1

            50d7622ecb5144740018499838b4f089d1ff2c3e

            SHA256

            d445b640f5f58eca73383bc7d5b4dbfff84120eb83b4efd87b70af0d6bd2d1f8

            SHA512

            1acc83b4cf1301f3b1152e3cd928132fde0ad4a99dca1a4ec7ef5d23320a8d1402f6f6f08138e5888b6c6f72d604541efdb250927d9dcaac7997afb3088335f4

          • C:\Users\Admin\AppData\Local\Temp\Admin7

            Filesize

            8B

            MD5

            b5a61d7c6018dfd6a3a4cb3ae9a3c45a

            SHA1

            384165e91203817697ed4f05b93f391205145101

            SHA256

            ee494bbf192f3e052dd2c3024668531567d324c7dc0d941021ef747fa9c0c522

            SHA512

            5e8b23cde16a919f9875297651b06f3121509ddcaf7dbcac19d15c8a9ffb1af2476ae12b9dd49e2909ebc4889a750230f3e7be19ac03ee28012758f83e4ea8ed

          • C:\Users\Admin\AppData\Local\Temp\Admin7

            Filesize

            8B

            MD5

            94e0e15e82989d7e244314b46b5498a7

            SHA1

            d9cd822a7781f30bd0b54b589c90562cada9f784

            SHA256

            66f351464f27aea5cddb649feb0d252121ccbff527af30702e66dc5ea9fd5415

            SHA512

            2c8e7b228245edc5274137e8f8f83a0fbd3256afa3af27255b8861c941bf48c89c89a92c9bc6a74de8a95991b14d3d33e66e16116feb66550ee39ee585b0580c

          • C:\Users\Admin\AppData\Local\Temp\Admin7

            Filesize

            8B

            MD5

            db77b89604a073c9417e6756a08cf4ff

            SHA1

            4807fec7e64ff44c8f3b2b915f7b4f5f5edb7f81

            SHA256

            630ced368ae1e4f46672f252c7d6574cf394825712e1cedb3029faf51dc98467

            SHA512

            e9d0b26aefee7e68f445bf35d5684ecbcc9df9c1e557e4b926cbcd1074e73f99c4bd2c8b9b07ba40ff82e4b16edd20e8a42be3e918356d47d02d28fcf3821abd

          • C:\Users\Admin\AppData\Local\Temp\Admin7

            Filesize

            8B

            MD5

            388b484018c1cdaa6f63318eeb0b8d73

            SHA1

            1e1dd68ea96667b21efaa625a86bb79023f7cfc7

            SHA256

            516125d1494e4473fc2ef343beec79924d22dc767db476a3dbcecf2ddbc5c296

            SHA512

            e76862ff42cd18351c781c4e016dc0970d09548ea015c08cf03f7de7af2a1df3f010da99adb2f831468c1a357b0e20a0392ddb1b791d70613612af753e014652

          • C:\Users\Admin\AppData\Local\Temp\Admin7

            Filesize

            8B

            MD5

            18a6a1f8b66f1a935962f9d269fe4f18

            SHA1

            f6396ba394f6451e5a7f8d784197600892c46d88

            SHA256

            0b2f62aa69d86dda00e72a8e5e3a8d5a1c9b2a94ec31c39949625c49a9cac268

            SHA512

            e07c4bb301bb528bb673061517706f28bd3e9c6ccedf84f0e48d341e56c782120059af6bb8e3f47519c0b665c207b8ba6fcbfa93b352227adbd0e53a90f301b7

          • C:\Users\Admin\AppData\Local\Temp\Admin7

            Filesize

            8B

            MD5

            bf0ca600919e25aee275bd0f9a903375

            SHA1

            86dec58d2f19e21787f44f064ded60af7c1bfa26

            SHA256

            9f8fd099a1d3e726e24a32c3aa3fd7412a213320ab41b5c88d5403dd70ded8de

            SHA512

            ed3f5ce3d7ad6b97d47251aee86e581ed4acc24cd487543a869be999a0c9005f6ae724883eb2a43989283ca738ec930ac6d2a8b09d0a586e7a72245816e2a8f9

          • C:\Users\Admin\AppData\Local\Temp\Admin7

            Filesize

            8B

            MD5

            af2391aab7e0f83c949ce9360a7ac840

            SHA1

            cd14192fb288fb5e64632af7d93d4ef1e431320d

            SHA256

            6c430559257a68e92549162c682f646bde4b6a63231099c8a647e11a564182cf

            SHA512

            c642f6054f9c6498db4d7a0f8be1f224a74fe0f081ece0ab7f11289458d1a30f7eff965492af8d3478b2e79250f2a47824a8eb588ec12a488d831523d03ee9ed

          • C:\Users\Admin\AppData\Local\Temp\Admin7

            Filesize

            8B

            MD5

            a95221c2f60e2a22bf1f7f25df7be7a6

            SHA1

            76171f44e9afd62226be671455a27bb5cffcb39b

            SHA256

            c066199a24fc7143b9731b83357719801ba5aac03758892624d2ed24a3976ad5

            SHA512

            e3c8e2be196d337a95839364bd1c3b85f6299170c65dbe7bf18370808ce593ac32d52ab6dbb4aabef71bbe4b3d9bd7c0c543489c1d860ba45959a6bfbc86ab34

          • C:\Users\Admin\AppData\Roaming\Adminlog.dat

            Filesize

            15B

            MD5

            bf3dba41023802cf6d3f8c5fd683a0c7

            SHA1

            466530987a347b68ef28faad238d7b50db8656a5

            SHA256

            4a8e75390856bf822f492f7f605ca0c21f1905172f6d3ef610162533c140507d

            SHA512

            fec60f447dcc90753d693014135e24814f6e8294f6c0f436bc59d892b24e91552108dba6cf5a6fa7c0421f6d290d1bafee9f9f2d95ea8c4c05c2ad0f7c1bb314

          • C:\Windows\SysWOW64\install\fotka.exe

            Filesize

            296KB

            MD5

            b42163ab99d02bd0da2170880fe50fa9

            SHA1

            70b7dbdf82699a1f805642e818b656ec24024110

            SHA256

            fc7cd836936be0eb170c0cb634e5462e6e3107bab886ccc8eec1eb964b2f1821

            SHA512

            14c38af172532f6a9331dafdaee58583a758b79d6324dc4a40356ccc23778a8086b065ef80e50f5ca07a5a8fe53013eef8ed33368aeb73454e919948be9875af

          • memory/728-63-0x0000000010480000-0x00000000104E5000-memory.dmp

            Filesize

            404KB

          • memory/728-2-0x0000000010410000-0x0000000010475000-memory.dmp

            Filesize

            404KB

          • memory/2304-136-0x0000000010560000-0x00000000105C5000-memory.dmp

            Filesize

            404KB

          • memory/2304-161-0x0000000010560000-0x00000000105C5000-memory.dmp

            Filesize

            404KB

          • memory/3416-159-0x0000000010480000-0x00000000104E5000-memory.dmp

            Filesize

            404KB

          • memory/3416-68-0x0000000010480000-0x00000000104E5000-memory.dmp

            Filesize

            404KB

          • memory/3416-66-0x00000000038F0000-0x00000000038F1000-memory.dmp

            Filesize

            4KB

          • memory/3416-8-0x0000000000E00000-0x0000000000E01000-memory.dmp

            Filesize

            4KB

          • memory/3416-7-0x0000000000B40000-0x0000000000B41000-memory.dmp

            Filesize

            4KB