Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04-12-2024 05:38
Static task
static1
Behavioral task
behavioral1
Sample
c110eca666deeca1cddced355578a6e3_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
c110eca666deeca1cddced355578a6e3_JaffaCakes118.exe
-
Size
640KB
-
MD5
c110eca666deeca1cddced355578a6e3
-
SHA1
c9b72f8dc81bd336380c68046d1c91e483a7842b
-
SHA256
b85eafa96eb973ad15fd6dbdfbf589e9447b8062443a466058c7b5808418410d
-
SHA512
8a4be55bd5651404aa60720a6817bfc1e82831754e92fdb27d3a6589f2d27d823c0c93ced6b57eb2c7aab1f0bf69eb54cbc2435714335979b5e5a024ca889ed4
-
SSDEEP
12288:JByrywwv1A/HcIujcXfwrBEhxc1QhnxMc8TF5eMjkHANVcfblk8ry9l4sxrV:2MQxq+hI2z
Malware Config
Extracted
cybergate
2.5
vítima
127.0.0.1:81
adircool.no-ip.biz:8080
adircool.no-ip.biz:80
adircool.no-ip.biz:8081
adircool.no-ip.biz:82
iuKJH67
-
enable_keylogger
true
-
enable_message_box
true
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
Windir
-
install_file
Windir.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
ERROR. COULD NOT RUN THE EXECUTABLE.
-
message_box_title
ERROR
-
password
abcd1234
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Signatures
-
Cybergate family
-
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 206.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\Windir\\Windir.exe" 206.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 206.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\Windir\\Windir.exe" 206.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{8V4C8O1C-8878-GGGF-01RU-15H70L34EQS2} 206.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8V4C8O1C-8878-GGGF-01RU-15H70L34EQS2}\StubPath = "C:\\Windows\\system32\\Windir\\Windir.exe Restart" 206.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{8V4C8O1C-8878-GGGF-01RU-15H70L34EQS2} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8V4C8O1C-8878-GGGF-01RU-15H70L34EQS2}\StubPath = "C:\\Windows\\system32\\Windir\\Windir.exe" explorer.exe -
Executes dropped EXE 2 IoCs
pid Process 2176 206.exe 2168 206.exe -
Loads dropped DLL 1 IoCs
pid Process 2176 206.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\system32\\Windir\\Windir.exe" 206.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\system32\\Windir\\Windir.exe" 206.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Windir\Windir.exe 206.exe File opened for modification C:\Windows\SysWOW64\Windir\Windir.exe 206.exe File opened for modification C:\Windows\SysWOW64\Windir\ 206.exe File created C:\Windows\SysWOW64\Windir\Windir.exe 206.exe -
resource yara_rule behavioral1/files/0x00090000000120d6-6.dat upx behavioral1/memory/2176-8-0x0000000000400000-0x000000000044C000-memory.dmp upx behavioral1/memory/2176-12-0x0000000024010000-0x0000000024052000-memory.dmp upx behavioral1/memory/2176-274-0x0000000000400000-0x000000000044C000-memory.dmp upx behavioral1/memory/1924-458-0x0000000024060000-0x00000000240A2000-memory.dmp upx behavioral1/memory/2176-740-0x0000000000400000-0x000000000044C000-memory.dmp upx behavioral1/memory/2168-483-0x0000000000400000-0x000000000044C000-memory.dmp upx behavioral1/memory/2176-482-0x0000000000220000-0x000000000026C000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 206.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 206.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2176 206.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2168 206.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2168 206.exe Token: SeDebugPrivilege 2168 206.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2176 206.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2432 wrote to memory of 2176 2432 c110eca666deeca1cddced355578a6e3_JaffaCakes118.exe 29 PID 2432 wrote to memory of 2176 2432 c110eca666deeca1cddced355578a6e3_JaffaCakes118.exe 29 PID 2432 wrote to memory of 2176 2432 c110eca666deeca1cddced355578a6e3_JaffaCakes118.exe 29 PID 2432 wrote to memory of 2176 2432 c110eca666deeca1cddced355578a6e3_JaffaCakes118.exe 29 PID 2176 wrote to memory of 1204 2176 206.exe 21 PID 2176 wrote to memory of 1204 2176 206.exe 21 PID 2176 wrote to memory of 1204 2176 206.exe 21 PID 2176 wrote to memory of 1204 2176 206.exe 21 PID 2176 wrote to memory of 1204 2176 206.exe 21 PID 2176 wrote to memory of 1204 2176 206.exe 21 PID 2176 wrote to memory of 1204 2176 206.exe 21 PID 2176 wrote to memory of 1204 2176 206.exe 21 PID 2176 wrote to memory of 1204 2176 206.exe 21 PID 2176 wrote to memory of 1204 2176 206.exe 21 PID 2176 wrote to memory of 1204 2176 206.exe 21 PID 2176 wrote to memory of 1204 2176 206.exe 21 PID 2176 wrote to memory of 1204 2176 206.exe 21 PID 2176 wrote to memory of 1204 2176 206.exe 21 PID 2176 wrote to memory of 1204 2176 206.exe 21 PID 2176 wrote to memory of 1204 2176 206.exe 21 PID 2176 wrote to memory of 1204 2176 206.exe 21 PID 2176 wrote to memory of 1204 2176 206.exe 21 PID 2176 wrote to memory of 1204 2176 206.exe 21 PID 2176 wrote to memory of 1204 2176 206.exe 21 PID 2176 wrote to memory of 1204 2176 206.exe 21 PID 2176 wrote to memory of 1204 2176 206.exe 21 PID 2176 wrote to memory of 1204 2176 206.exe 21 PID 2176 wrote to memory of 1204 2176 206.exe 21 PID 2176 wrote to memory of 1204 2176 206.exe 21 PID 2176 wrote to memory of 1204 2176 206.exe 21 PID 2176 wrote to memory of 1204 2176 206.exe 21 PID 2176 wrote to memory of 1204 2176 206.exe 21 PID 2176 wrote to memory of 1204 2176 206.exe 21 PID 2176 wrote to memory of 1204 2176 206.exe 21 PID 2176 wrote to memory of 1204 2176 206.exe 21 PID 2176 wrote to memory of 1204 2176 206.exe 21 PID 2176 wrote to memory of 1204 2176 206.exe 21 PID 2176 wrote to memory of 1204 2176 206.exe 21 PID 2176 wrote to memory of 1204 2176 206.exe 21 PID 2176 wrote to memory of 1204 2176 206.exe 21 PID 2176 wrote to memory of 1204 2176 206.exe 21 PID 2176 wrote to memory of 1204 2176 206.exe 21 PID 2176 wrote to memory of 1204 2176 206.exe 21 PID 2176 wrote to memory of 1204 2176 206.exe 21 PID 2176 wrote to memory of 1204 2176 206.exe 21 PID 2176 wrote to memory of 1204 2176 206.exe 21 PID 2176 wrote to memory of 1204 2176 206.exe 21 PID 2176 wrote to memory of 1204 2176 206.exe 21 PID 2176 wrote to memory of 1204 2176 206.exe 21 PID 2176 wrote to memory of 1204 2176 206.exe 21 PID 2176 wrote to memory of 1204 2176 206.exe 21 PID 2176 wrote to memory of 1204 2176 206.exe 21 PID 2176 wrote to memory of 1204 2176 206.exe 21 PID 2176 wrote to memory of 1204 2176 206.exe 21 PID 2176 wrote to memory of 1204 2176 206.exe 21 PID 2176 wrote to memory of 1204 2176 206.exe 21 PID 2176 wrote to memory of 1204 2176 206.exe 21 PID 2176 wrote to memory of 1204 2176 206.exe 21 PID 2176 wrote to memory of 1204 2176 206.exe 21 PID 2176 wrote to memory of 1204 2176 206.exe 21 PID 2176 wrote to memory of 1204 2176 206.exe 21 PID 2176 wrote to memory of 1204 2176 206.exe 21 PID 2176 wrote to memory of 1204 2176 206.exe 21 PID 2176 wrote to memory of 1204 2176 206.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1204
-
C:\Users\Admin\AppData\Local\Temp\c110eca666deeca1cddced355578a6e3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c110eca666deeca1cddced355578a6e3_JaffaCakes118.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Users\Admin\AppData\Local\Temp\206.exeC:\Users\Admin\AppData\Local\Temp\206.exe3⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- System Location Discovery: System Language Discovery
PID:1924
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2484
-
-
C:\Users\Admin\AppData\Local\Temp\206.exe"C:\Users\Admin\AppData\Local\Temp\206.exe"4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2168
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
233KB
MD5ab39522451ef1366a0fbea2eaf053c1c
SHA14e269daa249352de942f1a273940cfd47791128d
SHA256743c15ac115e0c2442916ad995c54413508ebe7000ab9155e50ac97a03c193c5
SHA51284868e219a3971870d7deaa5672fbeab3c72d0f20ffe391ee723fd640d95344c1f25cbd17f54159b1466ddc431a59a327745eaf47ee8b2f57f1c141d7b2b7ae2
-
Filesize
189KB
MD5b01e04dbf4e519b0514366186ed32639
SHA16f31db19840a6464f9f0924f5a25e5dd6bb54d7d
SHA2567ff1ed9cf25c79eb0aef56c907de50886ba631312b1c73422b86ff4dd3f30381
SHA5129aeacfdaeec8a3bf6b85eb5baa0f904d702f3977d8ed625a632dea8be2f076e1648f3e9b108ac2ac66569010603c93924e72501a6c124a9318582b5633dc5072
-
Filesize
15B
MD54362e21af8686f5ebba224768d292a5b
SHA1504510a4d10e230dcd1605ab3342525b38a10933
SHA256b1b2cc9a6bf77f9e56955acbbce253c70fc25b92d1e150d9928b9183b19b93b3
SHA512f2ee4b95d5c50b533de93f21f9d73a75ab8c755ab9f343b4848bd92b6827e76dc5e17fe27b0f2ad2049a1ee0fe20d0cb0398b1973277b85e84b6af004e945850