Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-12-2024 18:05

General

  • Target

    c8d4fe17c8e0f6741010b9a72cf21217_JaffaCakes118.exe

  • Size

    316KB

  • MD5

    c8d4fe17c8e0f6741010b9a72cf21217

  • SHA1

    b0aa40025446913d2bf701830e846137f7f9f5e1

  • SHA256

    7123d75e78f1bf613547d9ef6f1d15f27d3359b6f03228ef71ed454dc345fd4b

  • SHA512

    e2b89b8e747ec465d44510f23c06e150e28ddbeef8561f711b5e8da287cbe3fe75aa3fae1c0002d44eecb67ab4cc53e658c6a0d6f31091b0876fd0a1fa6b683a

  • SSDEEP

    6144:9jbeipsJgGnuaLd0EIGPCVfS3WmHR1LstMu5ZFCxiF0tgJc6Bwc:9uPJgGtLD5PCRmHTwtMubFcNae6z

Malware Config

Extracted

Family

cybergate

Version

v1.07.5

Botnet

fares

C2

127.0.0.1:82

abou-fares.no-ip.org:83

Mutex

O12C6FC8BD6K13

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    install

  • install_file

    server.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    123

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Signatures

  • CyberGate, Rebhip

    CyberGate is a lightweight remote administration tool with a wide array of functionalities.

  • Cybergate family
  • Adds policy Run key to start application 2 TTPs 4 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Drops file in System32 directory 4 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3460
      • C:\Users\Admin\AppData\Local\Temp\c8d4fe17c8e0f6741010b9a72cf21217_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\c8d4fe17c8e0f6741010b9a72cf21217_JaffaCakes118.exe"
        2⤵
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4828
        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exe
          C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exe
          3⤵
          • Adds policy Run key to start application
          • Boot or Logon Autostart Execution: Active Setup
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:3360
          • C:\Windows\SysWOW64\explorer.exe
            explorer.exe
            4⤵
            • Boot or Logon Autostart Execution: Active Setup
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:536
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            4⤵
              PID:4720
            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exe
              "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exe"
              4⤵
              • Checks computer location settings
              • Executes dropped EXE
              • Drops file in System32 directory
              • System Location Discovery: System Language Discovery
              • Modifies registry class
              • Suspicious behavior: GetForegroundWindowSpam
              • Suspicious use of AdjustPrivilegeToken
              PID:5088
              • C:\Windows\SysWOW64\install\server.exe
                "C:\Windows\system32\install\server.exe"
                5⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                PID:4156
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 4156 -s 584
                  6⤵
                  • Program crash
                  PID:1076
          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exe
            C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exe
            3⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:3128
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4156 -ip 4156
        1⤵
          PID:4824

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\Admin2.txt

          Filesize

          224KB

          MD5

          fb17623d2aa1f471dbf5c47f80f9d0e4

          SHA1

          8ffee9639c154db94cb5af2ff4707e10492f029c

          SHA256

          ff447148de491aa170768ef8b7a17d52bf423402cf437b38a96c81930c9a7655

          SHA512

          708230ba67283af0e2b5109c78b246b876af1a312c47df417087d5916d7c48c2a023f1532e5972e9cb34b5d38e3c0ba5d521f33a90d93214217aae946906da6d

        • C:\Users\Admin\AppData\Local\Temp\Admin7

          Filesize

          8B

          MD5

          3534619a053edb851e58b2c07e9a0503

          SHA1

          bef3fd956a0a160aa7b7fc70999a6380ce3ac416

          SHA256

          4e1fc0715376c5874134600d4f20f7cf71c84d83a4bc8c1b6c9d413d00ad75c6

          SHA512

          86bb3be407fa123edd4e78a458d22466f7b7e9875769dac9989de1723909b2017c6a718df383330585ab6ca8cd6c61564d5a145cb200abe80b2b3d7f3d15c573

        • C:\Users\Admin\AppData\Local\Temp\Admin7

          Filesize

          8B

          MD5

          8e3d1def9213111badf268b90e7bd948

          SHA1

          cbf923f4c6e7b4ccf636da8eae4657b4f44be668

          SHA256

          d99bfbf29bf93752b5fbd9179592e0a40500d06e6568e09ffa555212fa98ccf8

          SHA512

          c695d6131aa8d52dd37c8f1ef400c958164dd0e90492e4cae490c5b8467f2c5611a2b1bbc7ed71b093089b4cd8a4507873b37e714004d0ddb053e4a6c4b0e891

        • C:\Users\Admin\AppData\Local\Temp\Admin7

          Filesize

          8B

          MD5

          021db203dcf013ba5d2ca84052c2d5dc

          SHA1

          4a2a1423bac4bc107322da51049dfacd97e92c1e

          SHA256

          b421d7baeac13c5a303850d382450eb177314ac3d457b19ae59a22662172a766

          SHA512

          f403c73cfe17b3b1db45398bdad5ed08b6ffd97b7b97b17f4eb13e2ecda5014f102cea3eb571f43062e6af28e6c8112a55c4a4ec0bb215592734e3940813d5b6

        • C:\Users\Admin\AppData\Local\Temp\Admin7

          Filesize

          8B

          MD5

          88deadba11a98ea48297c65d0b92dda0

          SHA1

          2cd324be57523d9a45a18d5b214096f9b3fc823f

          SHA256

          575f2929f37c3e92f9c847194bb8b9507f14ee93675384b8b54578c1a16235de

          SHA512

          d61bd4977e8014fb53aecdaf428d9f95a48946611b6d8ae4fdceeb46ba25e3a1bfaf2553065d87d3455a997ecac9baca4781fb049ecfc0f34fa74fa8f914151d

        • C:\Users\Admin\AppData\Local\Temp\Admin7

          Filesize

          8B

          MD5

          4181d7f62619ab00f0f9c623bc7d9dea

          SHA1

          a1762172ca511045b649dc30c5537c034a6df34d

          SHA256

          0e91d3360ab9f62f97d1e025024d40874e6edc0577ac43df87b0430c4b574c44

          SHA512

          ed5adbd515b29035a452a25e79ad4274381e27048fe6c6b08c2dfb0aefebae26f26364fbe987fe0203ba4337f6fe514375cae6735a84e1783c65eee4fa90a1e2

        • C:\Users\Admin\AppData\Local\Temp\Admin7

          Filesize

          8B

          MD5

          1f403746aa23aea74e00445941d532fe

          SHA1

          ac488b7938f5bac20392e46e60a26072176f63ed

          SHA256

          b7782ce414b49959fb273770fa16bc1f4db373ab8c368bca2d174a104b8c49cd

          SHA512

          9b318a936af5dfc9ce937c1e99736f5b6d4a067283a1a9d61d9e9d82b4dd13e87fb165ea1dbc2c1c63bc57a08963cb67010e3e6e5447bc909d44d09e0a9aa0ce

        • C:\Users\Admin\AppData\Local\Temp\Admin7

          Filesize

          8B

          MD5

          50f6ff7bae859daae2788138a2d92830

          SHA1

          42c74677d9d00b0581f34dcc7ea8bab8a905c440

          SHA256

          708ed5386c5d957ade2826ac838a349726af080c1ca859c37213342210e8a262

          SHA512

          f8f9b0361cb13714eb3146228cc7c95b15867d3aeed252d4ce9081fc88dee84c34d6f17182da8aeeae063b28168d5042b0879c27d3bd63fc8abb6182445e23b2

        • C:\Users\Admin\AppData\Local\Temp\Admin7

          Filesize

          8B

          MD5

          e06899faa30ee307df813a6e93b2e99f

          SHA1

          4c3406e8cad8e7c30c3761f52434bd56ef56b638

          SHA256

          946218c13c7fbf1eeb8468a032fdca0a3a7cc1e0c07133246d069b77420e5138

          SHA512

          26c768f47dbbebdbf6fd37541366788fac439eb25d0168213c1658f25f7e812bb3ed164e91238ecb172cfba2c8f46e45baaca3a8eb932d18b2c21340100af7c2

        • C:\Users\Admin\AppData\Local\Temp\Admin7

          Filesize

          8B

          MD5

          1c2f7aa137a15dd6cfe08a4b7a53db9d

          SHA1

          278982390e27ca174007554642b2f5cf79e365ca

          SHA256

          6bc185ff1ef6e9f1fe3ebf3febaabf6c26e01ff39d5c48fc053d2b2fb41ffe1f

          SHA512

          6818fde15dec7407f37020f9cea0f65789cc0f402d91e41fabf0fd72446bd6b80cfcfaa4428e74cfef6ca7268370995b650786bcff9ed5111fdfde64d3c65403

        • C:\Users\Admin\AppData\Local\Temp\Admin7

          Filesize

          8B

          MD5

          ba59b24b586b7c8412d0efe28bd05620

          SHA1

          ddc799eca829c725d92dba1d75332ff26042a8b8

          SHA256

          3e02fb80f89ebd1dc25c586e134b733a45644715a53bada973049b08b17a1cf7

          SHA512

          d40268e45526904e57709a348d31f955bf2c141de8804f225612ae75fe8c0aaf8594004984426c1dbda805a19c43c707ca770df401810bca583ab9299d817575

        • C:\Users\Admin\AppData\Local\Temp\Admin7

          Filesize

          8B

          MD5

          c1e2edc33fbfb58d680411a0c8625669

          SHA1

          3a8cfa8b496d7c25b36865813caf2c4bde287da4

          SHA256

          6ebedba83db7f69476a20481e732f0441a84ba59868f42a5862d94e75134019b

          SHA512

          4e5ee38c65873276344de618653ba3d0a7fc34f2ca29bcd500af1a105ae402d319c9a0d9f182758df7116184c0f0ec1419c12e19f0c87bad7eadc715c42de1f7

        • C:\Users\Admin\AppData\Local\Temp\Admin7

          Filesize

          8B

          MD5

          126f01ef695a69d3cb0da8e96c84bc26

          SHA1

          fa155255786601e3bfedb0ca47c567ef85e9415f

          SHA256

          618692cdd7cae4acb44320d5c40a1a2532ee0ca19ced5dca56862c37f119e7a5

          SHA512

          7b4166f2e40367ba8ab36d52f5dd4c1e38b205013e999c950e6849b4bd0a54fed966e5e50f30899cbb45eef87df7cbce70cb236376000f85e030f94347d1f03d

        • C:\Users\Admin\AppData\Local\Temp\Admin7

          Filesize

          8B

          MD5

          66d14f67a7d07e5936b217444c2a3f7b

          SHA1

          0f8fdaae818bac8a6521907003900f570a2a24ad

          SHA256

          1db9472f45e06d01ea3f0b449457d69c43231537062ea8b47e745c741cc6d4fc

          SHA512

          25dde28c1f7804ea4b467f573ec5c5684eaf412fdc4d786580b46a492002c7a72398cddf6807ca40ca3b5057c816401a0178451840599e275481a605c87609b0

        • C:\Users\Admin\AppData\Local\Temp\Admin7

          Filesize

          8B

          MD5

          57661eee29f4cb4ec570d80f677e21c0

          SHA1

          0eb97c7d99b5a793c715cd53326e14c7c2dac913

          SHA256

          a38c844ddb1f5a5275b2c749231bfb55a1082d077b574058580ae8a52c57e3d3

          SHA512

          b281697a87661b3df658cf4b89cea0276135f7e413f113b9b0b1f6179cae62fe02bc6ac622d9c669eadbfb087d17041164a8234ce022a4ae9cf05e54c4101fe5

        • C:\Users\Admin\AppData\Local\Temp\Admin7

          Filesize

          8B

          MD5

          05a085f04fd20f7b6e15fb9819df1658

          SHA1

          e89ce34cd5f4bf5529b18455e7bae9ffe77a542e

          SHA256

          f4e104457530e45d1e81f268812970e4a5a26a42c9c2c09ecb58e6335ae15366

          SHA512

          90206ca0aeea2d1b979aa9d3c43a8b8e7e3d64450a968db6bd246dc509d9ebaadaeaebb1e5efe99e6efe3c58918b09c45af1ed70e3cb187d99073c405817590f

        • C:\Users\Admin\AppData\Local\Temp\Admin7

          Filesize

          8B

          MD5

          c52c453cfda31dc7bb5be2d0af9a6b12

          SHA1

          bce35580596c2ba3aaf7bbe262fec2bd83bebc8f

          SHA256

          690b2197d949fc8cc062ce93f34de076bc84ec085cdef8a112f8ec73b0cab59f

          SHA512

          4ef25a8af82fb0efabb713d617e5fb16b74f60f18caf318b35949bba65c8ad876387f0af5361c600ca091bc37647a4f884460bb133f6697d5cae7bede52e3cd3

        • C:\Users\Admin\AppData\Local\Temp\Admin7

          Filesize

          8B

          MD5

          b32525587884e2658e58b2d147219299

          SHA1

          75fe894cf3bd6ca0405e0eb4db4a31e358e12723

          SHA256

          de104b5faa20d9700be75a44b8f1e3a909ca889dc22ff0de2b38469459fb82bd

          SHA512

          11dcee9f10f2e3740fb0f223c89ac8d81b8e75b1d31d9c92bfc2dfcee316d2d1282799748e8a80411735fa2235cf5fb6cf7cfc0732d7638b405c87dc2be9714d

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exe

          Filesize

          296KB

          MD5

          8bfa79b8632ef2449e9840da3f570812

          SHA1

          cd7ecf6e42284f068fedff4295523b0cd7d7f24b

          SHA256

          522281f97378f53bfed2d9a21ebd968868ce05fbdd7043133a9385daa37d0454

          SHA512

          08dfe679ea9486034d9b03686eb183f5aa720d3a7cd2ee8c23ff3e310f8c33480ab67bf5d520ef545d4b08ecd06a55bbe6036ed5b1d898bd3a80963a1d249dfb

        • C:\Users\Admin\AppData\Roaming\Adminlog.dat

          Filesize

          15B

          MD5

          bf3dba41023802cf6d3f8c5fd683a0c7

          SHA1

          466530987a347b68ef28faad238d7b50db8656a5

          SHA256

          4a8e75390856bf822f492f7f605ca0c21f1905172f6d3ef610162533c140507d

          SHA512

          fec60f447dcc90753d693014135e24814f6e8294f6c0f436bc59d892b24e91552108dba6cf5a6fa7c0421f6d290d1bafee9f9f2d95ea8c4c05c2ad0f7c1bb314

        • memory/536-12-0x00000000006C0000-0x00000000006C1000-memory.dmp

          Filesize

          4KB

        • memory/536-165-0x0000000010480000-0x00000000104E5000-memory.dmp

          Filesize

          404KB

        • memory/536-13-0x0000000000780000-0x0000000000781000-memory.dmp

          Filesize

          4KB

        • memory/536-73-0x0000000010480000-0x00000000104E5000-memory.dmp

          Filesize

          404KB

        • memory/3360-68-0x0000000010480000-0x00000000104E5000-memory.dmp

          Filesize

          404KB

        • memory/3360-11-0x0000000010480000-0x00000000104E5000-memory.dmp

          Filesize

          404KB

        • memory/3360-7-0x0000000010410000-0x0000000010475000-memory.dmp

          Filesize

          404KB