Analysis

  • max time kernel
    147s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    05-12-2024 07:23

General

  • Target

    c6908de2028a305b65da810d2003c1c0_JaffaCakes118.exe

  • Size

    454KB

  • MD5

    c6908de2028a305b65da810d2003c1c0

  • SHA1

    c83d695d1ef80ac2048fad7b582a2db26b87b45a

  • SHA256

    cdaf339f2f2ced25d561cbab18fc3c3750df3cdb51728eb3e5f3a7771051aa67

  • SHA512

    4f3f7e6fc9d473c4a583b7f771315345eeaf75cc8e108c04e80729d2e15edf53861e795267a4456fbf4facae29c74c3aeab49f24679de1bfaf6165dff1d91cf1

  • SSDEEP

    6144:ivs/JRlunhpFGzP+XkJZmy/xPAsAOYAG2jzMHJFx8CHnbSd5qoXTunO+zQXIRe1y:V/JAMwQ4sz9G2UHJFx80Sd8oXQriyj6W

Malware Config

Extracted

Family

cybergate

Version

v1.02.0

Botnet

diesel

C2

diesel123.no-ip.biz:82

Mutex

S71CUODB60GK7H

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    winlog

  • install_file

    winlogon.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    313

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Signatures

  • CyberGate, Rebhip

    CyberGate is a lightweight remote administration tool with a wide array of functionalities.

  • Cybergate family
  • Adds policy Run key to start application 2 TTPs 4 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 23 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in System32 directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1208
      • C:\Users\Admin\AppData\Local\Temp\c6908de2028a305b65da810d2003c1c0_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\c6908de2028a305b65da810d2003c1c0_JaffaCakes118.exe"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2888
        • C:\Users\Admin\AppData\Local\Temp\Crypted.exe
          "C:\Users\Admin\AppData\Local\Temp\Crypted.exe"
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2392
          • C:\Users\Admin\AppData\Local\Temp\Blackout.exe
            "C:\Users\Admin\AppData\Local\Temp\Blackout.exe"
            4⤵
            • Adds policy Run key to start application
            • Boot or Logon Autostart Execution: Active Setup
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Drops file in System32 directory
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of WriteProcessMemory
            PID:2824
            • C:\Windows\SysWOW64\explorer.exe
              explorer.exe
              5⤵
              • Boot or Logon Autostart Execution: Active Setup
              • System Location Discovery: System Language Discovery
              PID:680
            • C:\Program Files\Internet Explorer\iexplore.exe
              "C:\Program Files\Internet Explorer\iexplore.exe"
              5⤵
                PID:1980
              • C:\Users\Admin\AppData\Local\Temp\Blackout.exe
                "C:\Users\Admin\AppData\Local\Temp\Blackout.exe"
                5⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Drops file in System32 directory
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: GetForegroundWindowSpam
                • Suspicious use of AdjustPrivilegeToken
                PID:996
                • C:\Windows\SysWOW64\winlog\winlogon.exe
                  "C:\Windows\system32\winlog\winlogon.exe"
                  6⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • System Location Discovery: System Language Discovery
                  PID:2736
              • C:\Windows\SysWOW64\winlog\winlogon.exe
                "C:\Windows\system32\winlog\winlogon.exe"
                5⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • System Location Discovery: System Language Discovery
                PID:2744
            • C:\Users\Admin\AppData\Local\Temp\RunescapePinGenerator.exe
              "C:\Users\Admin\AppData\Local\Temp\RunescapePinGenerator.exe"
              4⤵
              • Executes dropped EXE
              • System Network Configuration Discovery: Internet Connection Discovery
              PID:2944

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\Crypted.exe

        Filesize

        410KB

        MD5

        387528e521032fff732d3f9d6610acf6

        SHA1

        2eabfdd1944cbc725599cabdd01d98eba392bc6d

        SHA256

        b173f83dad0427136769c6b34ab2995424d93f79d25e1cc5f19cec39f52960b0

        SHA512

        428b961db24396f6db0c3e49b69908d0f535f5fc8b5f8700e487c72f37d557c86dba5a34cab3aac7f57337e62d00a83df4c3b38e30377aaf581c1ee54e181385

      • C:\Users\Admin\AppData\Local\Temp\XX--XX--XX.txt

        Filesize

        219KB

        MD5

        282774e2959386cea97122f2a55a1e45

        SHA1

        1e3347dcf79e0e0c7ed13c5cd42a55ee00a42b4f

        SHA256

        d38f482c7b0ea53169f04194673c0e11cd7b5fcdcf61b3991dc6ccff40516ef8

        SHA512

        2e89951ead42ff6d2549f63f4123ef09603fcec6b98c689af8d7f8816dec55b359c2d8f2ed23b188526b2a94e00ffd6b7d7e205607e5a45f91a4d0163808283b

      • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

        Filesize

        8B

        MD5

        1070c7211d9dd0126ae501d33f08575c

        SHA1

        867a5c217e9f5c027083105260b8a3c06dc095b4

        SHA256

        4e3316b88656f9699dcd0147638984428543a3e09289268c4e6665e9445345a0

        SHA512

        3571c0d7b7aaf57e7cf40a88140a33083e0b369f1a8a17d1bf18a989f74e4c2245a6678f280be25d6683569700bc9881359004a7e91dec177455eb5266e44586

      • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

        Filesize

        8B

        MD5

        0d4e667ad38f5f0113425ef0501f0890

        SHA1

        d808d89a07e1e05cc73c7d41695f5201d07e7bf5

        SHA256

        87fccf21e9bb5b55f185eea232563db5b66fd7d013359523f4d82664d6679e3f

        SHA512

        41ef862537c4ed256071aa7f6ab15b8d97f31e32a6245faa25c492712beb2616654cc3f86fc990fb0851fff2bab1cc874d8d8975769380667a46919891bb81bc

      • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

        Filesize

        8B

        MD5

        c2eed61b46fd0cd31612ac316719d32d

        SHA1

        236508b1505fcf45728a397f86c926acdaf10dda

        SHA256

        20e1593de4aa7e134886491bbe0b242bc5dd0b34b8b4675cae120f1748825960

        SHA512

        35520c132a2c87a6cb4002c9662952c21534b64c44725472d619213b95f3d88f124d695a298bddda3d0e9f0dd5c9fbdc1840d84147bfe7138e58e56b23da6157

      • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

        Filesize

        8B

        MD5

        79aba0a5f98e43f32b798ad40b200b78

        SHA1

        1e8db60fcd5a4faef6f2fd30f678118a454fdebb

        SHA256

        9dfcd34b888b93850a92ba8986c8bf811a7e6cb3ebfb67e87a581c1a2e727c88

        SHA512

        32bae69cc2986e5d8778fdef0c3abc3301d54d8538146653de4c86a01e672377ae1038025d5934038a2e57be0b0b1a8abfce91d8b408cb410c983131086b6ed3

      • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

        Filesize

        8B

        MD5

        8bc6b88646ed4635a861e27b657dc03e

        SHA1

        b0fbbfb20776050835889c7bd0b322198da6e7db

        SHA256

        2c75c027964dd76ca3d6de2e32661662742e7d28f3dd144e78ccda8a300e018e

        SHA512

        e3d718e4ddd0d789c20299ce4d8a350f85da1ab2b8371368efa61b8fac42c01b6d019958c1421cac8354c22223e1b14ebbdd84f96e6bb18ea0b1e7579ecec455

      • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

        Filesize

        8B

        MD5

        d363889fa4892fb0e7cd3c37cccb37e7

        SHA1

        ae458b4c603bc762e88decaf7aa79cc4f8cb1e13

        SHA256

        a498ce5a7c9fd5e61a20ee6eb14815256fa63de1e8fd58251a754e2f6ddf66b6

        SHA512

        745da65a4a1d21336a710bdac5b7569eb727d930716ac511e0776c40e5f42a536bbcabf285ab6ac698688cb2e63ab55c7016e9cf47128020a39215bce58ef94e

      • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

        Filesize

        8B

        MD5

        24b49bfa02bbcfc9078af2e60ed99f26

        SHA1

        3490373b6bf874dfceaae76f670632c2aabcc689

        SHA256

        19b928a15e4c905a80a372373a5055be5693bd6d717bc772c3550fcdcbf17c6f

        SHA512

        e24f791ab15f96c43979a2e4d3f3b8281c076683cb76907b9f72891985faddb0a2bf82c46df2bebb5ecc7b51f6f2d4061dc95f737cfdf0fe4485802f2b0873cc

      • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

        Filesize

        8B

        MD5

        2c14ddd5eb881f9c9f9ca4e5f788aa5b

        SHA1

        e5c63831ad2fa76f9d757c49cf6c90fd81544388

        SHA256

        eaec5eaa90eebd399174400a789a47bcadab92078a151a8d96f32efb20779816

        SHA512

        e6be6c574e1fa37659ebdbe2603a73ac5c6e9768d420855ced3830f42c1acb24b317341d0c540de680ec51bfa1f63fb3ebc83fbb13f343c114524d76afad7c34

      • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

        Filesize

        8B

        MD5

        f199aca6bdf6fc758598888d980fda88

        SHA1

        e2246f99eee3ee031f119b843acbd24ff9cbf090

        SHA256

        cafbf24cc48c39563e44fd93f90420375bc71a9feec9e6120445f93d4a9ca17b

        SHA512

        0daa3207339d1a113947725ecb7209b0deadc64e7750c0a3295e6fca8fb64017ecb74b73242e8c2d3459b376978636c112dfda63a84f756337b12279abf09351

      • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

        Filesize

        8B

        MD5

        e815b94da2bc5773de962751530c5904

        SHA1

        06062791cc08a1b1f617de216eebd52fa6156381

        SHA256

        8d8d527bbbeb02406082bfc0362da1fc24ea29bcc171bb2c7d611c0098beafc7

        SHA512

        1945767a0deb95a82d2840f683849b4a3b65e323714c83cf2d5c4162ec3b4e92d8dd6a6713c860cb4d5409b560eba0e19cdc6d74c96e316f21599d5cc017a726

      • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

        Filesize

        8B

        MD5

        e7933934cf0cfbdaacabc408a8f449ae

        SHA1

        9875e037af91edb4f0f20257f93df9e58ddc2f45

        SHA256

        a9e91f0978faf12f491710a19f59d08b31d0cbc66034bfa7419c50cd6b2266ab

        SHA512

        373f8671e56a2ae798869a844aeea9c456b14b0c129ba1616005d9a42b1315d2e42e377827719abf5bb73a85acd4b44a0396f15cfdc6520bc9fd935851a5baeb

      • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

        Filesize

        8B

        MD5

        4258816142c3d3cb5500bfc0cca62458

        SHA1

        769a523fa2743e05c677e4bec0e31c6bc97bd2b5

        SHA256

        80f9edde3ba19aec96cd20f26305c20b97c91b5ca850afa89b757d7cd22aca70

        SHA512

        987884800772773f018d9bdfa12c606b01fbcef9fd789953a618b5a61574e65f77d2c20691ce987278f581390cf1c132e1b82728a2d7fd7d9fe0a424ee670e10

      • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

        Filesize

        8B

        MD5

        1cc84d088f972c1805cb3122be757ece

        SHA1

        cd6e25a22058122f6ab0a0c1063d73b1fc563114

        SHA256

        c0a14f4f1eaddab7b98bd016927c1ba0a5cd94875a1b7a779be0533a1fa20f5f

        SHA512

        87daf28ae1ed1cddd695e48bec75f816da77fea9a0bd811b64c1e02f160099d602979dd59c61382a698e2cd3a4bdb5625d6f1c81e26d7d62c117831fa94b4187

      • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

        Filesize

        8B

        MD5

        1172dd944489a369bb07cae53f3e909f

        SHA1

        d7f9da5b081df04ce36701d53b682ed28c47d93a

        SHA256

        9aea39c82963f52b0155583dcd79bd962af02aee25a3a0ad375efa33295de2f6

        SHA512

        03c07b436681937b8d5f6e984ea99e7e2bf1f2399047d6f1a6f7d062601ff9a3109efb874871bd596dd590bb20e66ef3aeaef97c141842fe948d5b25942ce926

      • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

        Filesize

        8B

        MD5

        3a49cfee43ac31a8e583f070d0945467

        SHA1

        4d394de1b725e7d1e519866764e9d474b0526a6f

        SHA256

        bfb0adf3182b2f974e90a0870767c56b56ad078a3a1f0cc29017e904f7b55af5

        SHA512

        6cc7cb2288cfd40964ddb4242e3d8f2bfe0ae5e27ec4607987044afae17ff56e94e6b9f814b7cdf760dfd478cc93438ca1146fce41277bf8198629536ad9c287

      • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

        Filesize

        8B

        MD5

        442769561acd363aa1221687b0412428

        SHA1

        83a695f12e4bf87134fdaed9d783cb3b6740e7b6

        SHA256

        6e29de75b24fd1212496320bbb7814c6e6dc76c6afa6484c25045a81a5f48bb1

        SHA512

        8284c6a87010a8ca73a761123270a2500748d5de457461f221f1e738a1161b8564e36563ba7c5078ac04a141cc6cf40a7732a83f479df516e6a71f852d159cc9

      • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

        Filesize

        8B

        MD5

        9e72c7d7600db3f6d06a34075f13d4c0

        SHA1

        bcb5662ca8a88338e4da25f047d8967fd39a7cdb

        SHA256

        5b4a2f49afc39ca973271b6576c61d07747d106c033dda643e14e3471c61ed46

        SHA512

        8e901deb59d03235587ce6b2116af8d2733eb26ed35a13f904d6436b310917c93aadadf534683f236715344e77325ea3707aeb59a12083a6a45eb6b6a16586b3

      • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

        Filesize

        8B

        MD5

        f2d32d8d71564795d5d2025d8902d4fb

        SHA1

        39380d04901f07e8503abf1db115a5760be1aa2f

        SHA256

        47681d1cc39010d06713b017554b247ad496d6e488bb6abd0554e493eeadd75f

        SHA512

        f8167c930727bf47d9f713804520b66f07c5b85936b8b5dc4b955c89ff54ef5efec4a0af3081e6c81852e2a0ad6cc06804812c463d6a8c4441ef50d5c0ba3049

      • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

        Filesize

        8B

        MD5

        018800fac306121f186675c2ceec1fca

        SHA1

        e4c369083f611a3edaa185ef92bfd48254081e25

        SHA256

        611fc9cfb70f260961d230a7be00f062ce1bd6c2503f9485096ebca9cc7ba676

        SHA512

        8bcf727eaed55763d355443bb7ce7213951e19c525d764fff1547467ca88b0078aeef27cd2610a3b88196e5d7be789e1b11721767d6276cc26d4f0f6f3e47867

      • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

        Filesize

        8B

        MD5

        1fb3b21fd2bb7ff4bede79c5330cf7a0

        SHA1

        1bddb084835637aa7ac28c07dafb4a15a2db052c

        SHA256

        34660ff1d3d0b00974776cb1e945f2bdb8cb3ee2fa25726280bf785c73bfd323

        SHA512

        a9f3cce8a983a6c40465c2b87ee31889d749ed85b557427ba4a064153b3ea9e75c24a4c0bfb6c75470ca76473c00b38d97f69dd94adf2aced34216521afe9ad7

      • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

        Filesize

        8B

        MD5

        c7ff389a4b6cdfc67200ce40ef81b361

        SHA1

        80484b7436f0a30b7b013bdea7abb612a0cfc287

        SHA256

        d1db6a735b7fe7a7f8dcdf41e9f38232b47babdf7e4169fac4104d82b94323c4

        SHA512

        e4f0eb05743ac2caf913ffb45e9b152d567e4fefdefdf1fafb730f5db844588bbf0ea8978a6bbd7a98c8f0cb8ff2732004656bc47486d3fe655358c3164acd59

      • C:\Users\Admin\AppData\Roaming\logs.dat

        Filesize

        15B

        MD5

        bf3dba41023802cf6d3f8c5fd683a0c7

        SHA1

        466530987a347b68ef28faad238d7b50db8656a5

        SHA256

        4a8e75390856bf822f492f7f605ca0c21f1905172f6d3ef610162533c140507d

        SHA512

        fec60f447dcc90753d693014135e24814f6e8294f6c0f436bc59d892b24e91552108dba6cf5a6fa7c0421f6d290d1bafee9f9f2d95ea8c4c05c2ad0f7c1bb314

      • \Users\Admin\AppData\Local\Temp\Blackout.exe

        Filesize

        280KB

        MD5

        b6e7f0b3fdff1748a6f185ade0eab521

        SHA1

        81db63ec7b20b4601408e9be832a1a9914aebd92

        SHA256

        eeccc2af5b11a09c0df8d20ac9456d47fcf413f65a60f383347ce60cff4175d2

        SHA512

        9d7859f2c16453ee7ee3a591d8527c5bbb5a5f03f32fb38f44a0214930e98aa3b27f7a8c5fa16a84443a0316f58dcebf88eed67f2a374820482560b6df7d1b17

      • \Users\Admin\AppData\Local\Temp\RunescapePinGenerator.exe

        Filesize

        383KB

        MD5

        24a3fb06ebf325ef89e11ea9b0d9f0bc

        SHA1

        63e6f1f5cbe5bde7a12fd358a073d22e48197758

        SHA256

        caf615c1644b4ddc9b27ff2bd34c004e8adb0fc82ec8843b3cc0c72ed0450c1a

        SHA512

        3f8df0a64ba9e6a5151818f1f07b60ab2338e1312193b9fb0887f1b90581697a62a23883e151423d0eef00ca4eb4619a7685dc54c2524349ceebf88909032cc3

      • memory/1208-38-0x0000000002F30000-0x0000000002F31000-memory.dmp

        Filesize

        4KB

      • memory/2888-0-0x000007FEF6ACE000-0x000007FEF6ACF000-memory.dmp

        Filesize

        4KB

      • memory/2888-1-0x000007FEF6810000-0x000007FEF71AD000-memory.dmp

        Filesize

        9.6MB

      • memory/2888-2-0x000007FEF6810000-0x000007FEF71AD000-memory.dmp

        Filesize

        9.6MB

      • memory/2888-3-0x000007FEF6810000-0x000007FEF71AD000-memory.dmp

        Filesize

        9.6MB

      • memory/2888-12-0x000007FEF6810000-0x000007FEF71AD000-memory.dmp

        Filesize

        9.6MB