Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
05-12-2024 20:30
Static task
static1
Behavioral task
behavioral1
Sample
c94b5ed31851d3ca7d8e2240984c6d31_JaffaCakes118.exe
Resource
win7-20241010-en
General
-
Target
c94b5ed31851d3ca7d8e2240984c6d31_JaffaCakes118.exe
-
Size
472KB
-
MD5
c94b5ed31851d3ca7d8e2240984c6d31
-
SHA1
8c6bb36630930a921b49dd8843adfb865856292e
-
SHA256
b8d2e36634a58afe21c3b9a31c6bcde5c7f159fef9a8d8e59447c4ca06f63588
-
SHA512
b5bc4a2386b39c9c8d6c10e24f52312820cc8442c0b37f2e20440aafc7158bff787c958749ce2324445cbd4afa59f05dadb17f35e3531c295daff1be57e9f81c
-
SSDEEP
12288:LAtSqT2pND5V5N2KgjRa9DTNykiZC3F+/VzCO2Uv+:1k
Malware Config
Extracted
cybergate
v1.02.0
cyber
seeplusplus.no-ip.biz:82
637P16NC31BW1J
-
enable_keylogger
false
-
enable_message_box
true
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
windows
-
install_file
svchost.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
we wont doing this right now you can change that later if you want ;)
-
message_box_title
CyberGate
-
password
blood4life
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Signatures
-
Cybergate family
-
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\windows\\svchost.exe" vbc.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run vbc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\windows\\svchost.exe" vbc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run vbc.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8B0LCDMG-48AX-SJ8Y-WSLH-3F6FT81JW0XJ}\StubPath = "C:\\Windows\\system32\\windows\\svchost.exe" explorer.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{8B0LCDMG-48AX-SJ8Y-WSLH-3F6FT81JW0XJ} vbc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8B0LCDMG-48AX-SJ8Y-WSLH-3F6FT81JW0XJ}\StubPath = "C:\\Windows\\system32\\windows\\svchost.exe Restart" vbc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{8B0LCDMG-48AX-SJ8Y-WSLH-3F6FT81JW0XJ} explorer.exe -
Executes dropped EXE 1 IoCs
pid Process 620 svchost.exe -
Loads dropped DLL 1 IoCs
pid Process 2272 vbc.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\system32\\windows\\svchost.exe" vbc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\system32\\windows\\svchost.exe" vbc.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\windows\svchost.exe vbc.exe File opened for modification C:\Windows\SysWOW64\windows\svchost.exe vbc.exe File opened for modification C:\Windows\SysWOW64\windows\svchost.exe vbc.exe File opened for modification C:\Windows\SysWOW64\windows\ vbc.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2552 set thread context of 2468 2552 c94b5ed31851d3ca7d8e2240984c6d31_JaffaCakes118.exe 30 -
resource yara_rule behavioral1/memory/2484-548-0x0000000024070000-0x00000000240CF000-memory.dmp upx behavioral1/memory/2484-895-0x0000000024070000-0x00000000240CF000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c94b5ed31851d3ca7d8e2240984c6d31_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2468 vbc.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2272 vbc.exe Token: SeDebugPrivilege 2272 vbc.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2468 vbc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2552 wrote to memory of 2468 2552 c94b5ed31851d3ca7d8e2240984c6d31_JaffaCakes118.exe 30 PID 2552 wrote to memory of 2468 2552 c94b5ed31851d3ca7d8e2240984c6d31_JaffaCakes118.exe 30 PID 2552 wrote to memory of 2468 2552 c94b5ed31851d3ca7d8e2240984c6d31_JaffaCakes118.exe 30 PID 2552 wrote to memory of 2468 2552 c94b5ed31851d3ca7d8e2240984c6d31_JaffaCakes118.exe 30 PID 2552 wrote to memory of 2468 2552 c94b5ed31851d3ca7d8e2240984c6d31_JaffaCakes118.exe 30 PID 2552 wrote to memory of 2468 2552 c94b5ed31851d3ca7d8e2240984c6d31_JaffaCakes118.exe 30 PID 2552 wrote to memory of 2468 2552 c94b5ed31851d3ca7d8e2240984c6d31_JaffaCakes118.exe 30 PID 2552 wrote to memory of 2468 2552 c94b5ed31851d3ca7d8e2240984c6d31_JaffaCakes118.exe 30 PID 2552 wrote to memory of 2468 2552 c94b5ed31851d3ca7d8e2240984c6d31_JaffaCakes118.exe 30 PID 2552 wrote to memory of 2468 2552 c94b5ed31851d3ca7d8e2240984c6d31_JaffaCakes118.exe 30 PID 2552 wrote to memory of 2468 2552 c94b5ed31851d3ca7d8e2240984c6d31_JaffaCakes118.exe 30 PID 2552 wrote to memory of 2468 2552 c94b5ed31851d3ca7d8e2240984c6d31_JaffaCakes118.exe 30 PID 2468 wrote to memory of 1200 2468 vbc.exe 21 PID 2468 wrote to memory of 1200 2468 vbc.exe 21 PID 2468 wrote to memory of 1200 2468 vbc.exe 21 PID 2468 wrote to memory of 1200 2468 vbc.exe 21 PID 2468 wrote to memory of 1200 2468 vbc.exe 21 PID 2468 wrote to memory of 1200 2468 vbc.exe 21 PID 2468 wrote to memory of 1200 2468 vbc.exe 21 PID 2468 wrote to memory of 1200 2468 vbc.exe 21 PID 2468 wrote to memory of 1200 2468 vbc.exe 21 PID 2468 wrote to memory of 1200 2468 vbc.exe 21 PID 2468 wrote to memory of 1200 2468 vbc.exe 21 PID 2468 wrote to memory of 1200 2468 vbc.exe 21 PID 2468 wrote to memory of 1200 2468 vbc.exe 21 PID 2468 wrote to memory of 1200 2468 vbc.exe 21 PID 2468 wrote to memory of 1200 2468 vbc.exe 21 PID 2468 wrote to memory of 1200 2468 vbc.exe 21 PID 2468 wrote to memory of 1200 2468 vbc.exe 21 PID 2468 wrote to memory of 1200 2468 vbc.exe 21 PID 2468 wrote to memory of 1200 2468 vbc.exe 21 PID 2468 wrote to memory of 1200 2468 vbc.exe 21 PID 2468 wrote to memory of 1200 2468 vbc.exe 21 PID 2468 wrote to memory of 1200 2468 vbc.exe 21 PID 2468 wrote to memory of 1200 2468 vbc.exe 21 PID 2468 wrote to memory of 1200 2468 vbc.exe 21 PID 2468 wrote to memory of 1200 2468 vbc.exe 21 PID 2468 wrote to memory of 1200 2468 vbc.exe 21 PID 2468 wrote to memory of 1200 2468 vbc.exe 21 PID 2468 wrote to memory of 1200 2468 vbc.exe 21 PID 2468 wrote to memory of 1200 2468 vbc.exe 21 PID 2468 wrote to memory of 1200 2468 vbc.exe 21 PID 2468 wrote to memory of 1200 2468 vbc.exe 21 PID 2468 wrote to memory of 1200 2468 vbc.exe 21 PID 2468 wrote to memory of 1200 2468 vbc.exe 21 PID 2468 wrote to memory of 1200 2468 vbc.exe 21 PID 2468 wrote to memory of 1200 2468 vbc.exe 21 PID 2468 wrote to memory of 1200 2468 vbc.exe 21 PID 2468 wrote to memory of 1200 2468 vbc.exe 21 PID 2468 wrote to memory of 1200 2468 vbc.exe 21 PID 2468 wrote to memory of 1200 2468 vbc.exe 21 PID 2468 wrote to memory of 1200 2468 vbc.exe 21 PID 2468 wrote to memory of 1200 2468 vbc.exe 21 PID 2468 wrote to memory of 1200 2468 vbc.exe 21 PID 2468 wrote to memory of 1200 2468 vbc.exe 21 PID 2468 wrote to memory of 1200 2468 vbc.exe 21 PID 2468 wrote to memory of 1200 2468 vbc.exe 21 PID 2468 wrote to memory of 1200 2468 vbc.exe 21 PID 2468 wrote to memory of 1200 2468 vbc.exe 21 PID 2468 wrote to memory of 1200 2468 vbc.exe 21 PID 2468 wrote to memory of 1200 2468 vbc.exe 21 PID 2468 wrote to memory of 1200 2468 vbc.exe 21 PID 2468 wrote to memory of 1200 2468 vbc.exe 21 PID 2468 wrote to memory of 1200 2468 vbc.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\c94b5ed31851d3ca7d8e2240984c6d31_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c94b5ed31851d3ca7d8e2240984c6d31_JaffaCakes118.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- System Location Discovery: System Language Discovery
PID:2484
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2656
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"4⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2272 -
C:\Windows\SysWOW64\windows\svchost.exe"C:\Windows\system32\windows\svchost.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:620
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
219KB
MD58cdc1dc6662d029a4ab77257452302a7
SHA19b9eb5c24f1dfecd54d321e1c6a27d5d46001c8b
SHA256267496251106daab1e6a84b9a7a914563166209a3246b84ac09b4305d12d01c9
SHA5123b7510bc3db520287752a75697b610127e204c003db3169a4e2f981c4a14b07e4413dc938485ae1760013c7e029ed962e505fb3c588d6d3f46e63a1a9965278d
-
Filesize
8B
MD57360065d78ebb8933d975751e424785b
SHA17a365580a0d63664bf5365325f90a6f9eab1d592
SHA256d6672fe712e377d91b8cfa01ef1c319e271093bb874524ddecf2f8baeb53bd77
SHA512c15b93cc5b962f572b88fcdbb17f04efce9c4de5aeac2ad4adef5b2e073c56afca6b27236d855a582ec22463bbb726eab7f116c1148405a39cc3c5325b806e84
-
Filesize
8B
MD573f6aa1d5e9f599c80651f72ce2a0fb4
SHA17d8c2cf211a72a181a4333fde80151a7ca846641
SHA256a48e5a93b94aa5c2f7301e6b06a36a5c76ca77be917b221dbeae1d4c4708a3de
SHA5123025f949ead40f6a98745183563f89ebcf55d8e94d3e6d86743e03ca2642026b3875e4e14a69a5635b7ba0a1a87d8a904a6f6867f0b0df94be73c1c89230243d
-
Filesize
8B
MD5b832864e657f2851dcd0314d539cdd78
SHA148e6845989ef32bdabc2d95b9bb9d6ca7babb945
SHA256d3eb7608ae921ef0e49d9af5ca3999df034ce33f33ad9c032b7a918aa2c9064e
SHA512f253a84663764b85625e1c567ab3958c262d826dede45fc26e9cd7860541c7863c302c5b18ecb4609f7c055369db4728dbc4ac92024b95040418486f3789c134
-
Filesize
8B
MD5b1aa5bb33db43428dac970656bef6889
SHA1f690e945df1b7808dedb580f524a8d5b7be6b7fd
SHA2565f9277a6e1a13f92070a836630795b344e5802b7f8626b4a649e5cd7b4869ebc
SHA512e94e71b311fc7c98e90273782a3dd0fb4cc9df2135f4af751c111918379d3e86cc9708d32db14364e5b364c5b2c1e888e57ed002f607c753f0b5934b4366596b
-
Filesize
8B
MD51719ad45bcfeb03cf3c84ff6f6c7d72b
SHA14e8afd6792e48c4babdf992f705ab7650a14470a
SHA256017fc9e6e4faa782530d4676cd99cf7033fb7481c15d881ae4ade2dc15f8641e
SHA5129e28d6528831830e7602d6b898cdbd3ec4839e6731e2975555802ff20d8c18d040141ea8888d08c7ca65ab005ca831575fcd74977495a5497a1594bb3ea0a6d7
-
Filesize
8B
MD54f7503333fb52321771e6d5d708a6f29
SHA159d6259db8209a643af84cf8b6d2efdae6e40d97
SHA2566efe4d3173cf40071b3162d6545c2f32b2923060d4405ce459a1406d9bf1218d
SHA512ff30e9128d5142425db3cf7088ee2403ccdd4c61c328a86b9c9f684c8de32d0c5e96749c658a44eede3adb32ea44d635d89cd6cb063002347aa7f6a2d52ebd8d
-
Filesize
8B
MD577c208dcfe3f2ab0021600a4b5a0ee82
SHA14aff5152eee3f7d74bb0b2bf08a3bd6eddf7f959
SHA2565fd6ab1337e77f92f2a795b2a1d3c4e6b659e235b27f6085d1c413ed77246fcb
SHA5120989c5895ad388ef14c88fadbfef8096beedb596843929e87f80d6f355e3aab9fba6c2b56592b20afab5359ac8f00312ca66e58578da849e486e40e3a16cc006
-
Filesize
8B
MD591915e75624e5fbb777d6e3f0e30aa6e
SHA1cd1501393d75e8f3323f2c0463a33fe8f6ccb0d8
SHA256849178d7a02ab40df3b690d83b8392325e15ae850f312f8817f5a2a24f9e6475
SHA512c2c0a8ad74e0b7421421678d65c1fd60acd01cba67275106f409650043b3f70f95316675ad0e1bbd4c534037677e65795dd0962704933a952d2c76f067ef0807
-
Filesize
8B
MD596fc8d2f112a0cbf4d1d191391f60e5b
SHA1327de101eca39fed71788aa10515919e5c46185f
SHA256bb7a690a4d52a34fb1aabcefda75817ed431f4e35d90266fdeca2716479ca895
SHA51231d757f62eb79805cae6a4f4ff4ce1ee2f164b052172abc205bc9ebd940d526f897acab285fde6a16900ee31ab5db9b9b67fb53716101d422de486914bdfbeb2
-
Filesize
8B
MD5860fd30ada22d14ab7ce2f763932a0b7
SHA1debc34ae9ae42bf43d4b0b8b31657e5032e8cf8a
SHA256266dacd401a2c14be60243003c7c3a26cf73f534f47f7d87eec66a2e76d463bb
SHA5123338c8f1d698c4f50a8c445bf4f4680fad7e1cb46e7f18fdaea0deefffec0327d3eb0d5158070df0549a004761473eaa10f11498175cc81b00a4757a8be3522b
-
Filesize
8B
MD51bdd39b6321aea9cd715d802ecdbc3d5
SHA1373de7b6ce372f1f49f0404ab1635aa975eddd8a
SHA256597833c49427d0bc21727b5fdb049f1d7baf28bf453a3b8be9dea2e26c333e59
SHA512f98f7f3fe536fe83c06cb16fc8adcf71726c780cd1430e56dc6e1359b17b65f011c59de7f8a75874839faab605e94b8e177696a019576eae6bb1edcbe4ef6045
-
Filesize
8B
MD5d66bf498b775fb3aa19260e2eb4fe72d
SHA1d890930a32d74ef4389163bba4a13d58e7304675
SHA256e753a067c32035ffd21b6cc67bbe3947f13306d5f6ffa57f6344084c6bd90ca5
SHA51275da9a8595e311ac3a29b699ed26646f45238f3ac1fd014d4d3bd0a2fdc7e1fe3e33b621accc739019ea0d5a0797de4e1b983a991658bad44e5040daec4dee3f
-
Filesize
8B
MD51dcd997b85603f47544c2deb76969a83
SHA191a1a86bb5f0d618b4af1789a2fa78c645dbe738
SHA25642454da39921276390247e13c10bcba6ec1fdcd96dd9ebfde2eb7d95c62d381a
SHA512c7ae8050db9148738dc951dbd3dce8aa3fb00cd7da8b3d237d298fa7e1702b9d470e4d3b136cccb94b9db4fe726922e5c8d72fd468008fec5551cf09a0bced62
-
Filesize
8B
MD52531c4c8c54527ff3b117d48e4c57d9a
SHA1edd5e83ea6fac4c878b229ceb4fec226c2fae4e8
SHA256441b21f986f7b4e93bd2652296d7f7b1d356d5311a48f9b2b023a28c0924e404
SHA5122e3a0ea281e77ab106662b1532304493b21a123b66cb1bb88a96a5e041107c164e1c6d32f7a38ad7c8b9c8f266e1a45a89b5983fc054d4f8e8173ab67ec9ce89
-
Filesize
8B
MD5c4ec5c1bb01b9267cc7a6a5a7fee8613
SHA12804c11cfbf59e15c92a8f0621c8171857a048c0
SHA2565467526a55914c9b627f3b341e33cde06c00d1145960876910533184d5629b66
SHA5120acd31ab60bdbcae01f545d231dd35c8845e09fb3b51b7d658562ca49aa3e4c9599c28a3227e12cdb325b6b6994a1c30fb4be5b8b77fe58e5b81574307938def
-
Filesize
8B
MD52e638c47cb6707b29632f6ad4042e878
SHA17613d20cd89a653b8c9dc9bd50c64a58124673cc
SHA25647d21bdb557a09d2b80016d8d8acc7320ea4f82bc44480043cf90adfa381ee2d
SHA512248c7cf6b67fc95329982e81a3966718c309f6fd1478792d1336fd5ee7aa90a3b972d0c8a80589e7c9e42cd816568e32f60c42567376b78cb556b10fc8e36dcc
-
Filesize
8B
MD5efb631a97c4c1e74f5979d4db065c894
SHA1ba4ddbd98383f95d880657ddb2336c9550434841
SHA2568a45d393ea977d0ffcffbdcf4471a29e6b8659f47dddccbee562e3d0fd1a7022
SHA512f98b516c1ff221fcd8e48133dabe3ce7f67ade748b8d190f85252d0be8d6d276d48e7f75a1582cebb5a3fae40eeb6f034fcb850530f344c491158c573acabe13
-
Filesize
8B
MD586c18007627ce4601ec53301754c4bf9
SHA1bdefc07cba14ba8ac6d0dbbe014f09f5e2c82f95
SHA256fc543d50fae237002fc74eb6397b76c3542e105e0245480f62ebdec0fdd9a37f
SHA5121adb0265a5fb46cb1d338f508102c41d210087fb298aa35642722a10de47ddd5412bbb1ef326f0d04635d4c4c0e1a5aa97f79f9f4d691a7835fec86a5cabb336
-
Filesize
8B
MD5a9d409ab95f29248586ac5dad9b4b6d7
SHA1e4cdf73d859cbac4f6c65274819bb72e2477aba7
SHA2565c297aa8948457fc0c6dd4f52198a70294203ab431ca396ddc61dbf2a8bd28bc
SHA512c8690bc56c83e4bdbf992987bfa4abf92371fecc2bf198aeeef846d3d4be635ca0e0a4d76065057c6168ed3b158ca3d84b8fd2c55a490c28877df0adc6e680c1
-
Filesize
1.1MB
MD534aa912defa18c2c129f1e09d75c1d7e
SHA19c3046324657505a30ecd9b1fdb46c05bde7d470
SHA2566df94b7fa33f1b87142adc39b3db0613fc520d9e7a5fd6a5301dd7f51f8d0386
SHA512d1ea9368f5d7166180612fd763c87afb647d088498887961f5e7fb0a10f4a808bd5928e8a3666d70ff794093c51ecca8816f75dd47652fd4eb23dce7f9aa1f98