Analysis

  • max time kernel
    147s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    12-12-2024 22:34

General

  • Target

    e896eba812ea3fb2e54b56b78444d08c_JaffaCakes118.exe

  • Size

    576KB

  • MD5

    e896eba812ea3fb2e54b56b78444d08c

  • SHA1

    fb80a88176e921a625f71b2eed24e7b7a8191e96

  • SHA256

    fa35778cd58754297fef513a4e15371bd1c7045e535d28d490ac2046787854d0

  • SHA512

    49962050ecff6b1212b914cca638e6628593fef3dff8c514a11f234aa3784a6c1eb6bbf849164b881fd604a7e4cebacf3dea2e5f9ac7807660c536075037edaa

  • SSDEEP

    12288:B58QaE7V0AlfdX4VVS3AHbzdQM58QaE7V0AlfdX4VVS3AHbzdQ/:YQaKiUlHAHNQ5QaKiUlHAHNQ/

Malware Config

Extracted

Family

cybergate

Version

2.6

Botnet

mast

C2

10.12.155.178:333

mastadont.no-ip.org:333

Mutex

***MUTEX***

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./

  • ftp_interval

    10

  • ftp_password

    j95pu0wt

  • ftp_port

    21

  • ftp_server

    stealagress.far.ru

  • ftp_username

    w246246

  • injected_process

    explorer.exe

  • install_dir

    svchoster

  • install_file

    winhost.exe

  • install_flag

    true

  • keylogger_enable_ftp

    true

  • message_box_caption

    texto da mensagem

  • message_box_title

    título da mensagem

  • password

    mast

  • regkey_hkcu

    winhost.exe

  • regkey_hklm

    winhost

Signatures

  • CyberGate, Rebhip

    CyberGate is a lightweight remote administration tool with a wide array of functionalities.

  • Cybergate family
  • Adds policy Run key to start application 2 TTPs 4 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in System32 directory 5 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • UPX packed file 14 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 11 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1232
      • C:\Users\Admin\AppData\Local\Temp\e896eba812ea3fb2e54b56b78444d08c_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\e896eba812ea3fb2e54b56b78444d08c_JaffaCakes118.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2604
        • C:\Users\Admin\AppData\Local\Temp\e896eba812ea3fb2e54b56b78444d08c_JaffaCakes118.exe
          3⤵
          • Adds policy Run key to start application
          • Boot or Logon Autostart Execution: Active Setup
          • Adds Run key to start application
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:2652
          • C:\Windows\SysWOW64\explorer.exe
            explorer.exe
            4⤵
            • Boot or Logon Autostart Execution: Active Setup
            • System Location Discovery: System Language Discovery
            PID:3040
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            4⤵
              PID:2196
            • C:\Users\Admin\AppData\Local\Temp\e896eba812ea3fb2e54b56b78444d08c_JaffaCakes118.exe
              "C:\Users\Admin\AppData\Local\Temp\e896eba812ea3fb2e54b56b78444d08c_JaffaCakes118.exe"
              4⤵
              • Loads dropped DLL
              • Drops file in System32 directory
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: GetForegroundWindowSpam
              • Suspicious use of AdjustPrivilegeToken
              PID:2440
              • C:\Windows\SysWOW64\svchoster\winhost.exe
                "C:\Windows\system32\svchoster\winhost.exe"
                5⤵
                • Executes dropped EXE
                • Drops file in System32 directory
                • Suspicious use of SetThreadContext
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of SetWindowsHookEx
                PID:1612
                • C:\Windows\SysWOW64\svchoster\winhost.exe
                  6⤵
                  • Executes dropped EXE
                  PID:900

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\XX--XX--XX.txt

        Filesize

        229KB

        MD5

        284c5b832b3e4a8df29aa430cef2bee5

        SHA1

        1ab6a9430fd4efdc523dd4368c06309d8eec4717

        SHA256

        e509b3b51cdb999f5eed69068456189163ea76a010c2f8e14e72a9ca7a755baa

        SHA512

        f67d9bce3edfe36d36cdadf7a93c085a0313aa9fced4258a20c582db1a0d426b3502da27d3e7de9c2c17511ea2bd2883e1139692aa8c43a0e0ef862e5b95a612

      • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

        Filesize

        8B

        MD5

        bb3bd2ae629684ace3fa95dfc9bf9a7e

        SHA1

        b901dcf2f84cd7b7a7fb5b9361f8597cb8dfcf34

        SHA256

        a6cc1070847654db035c67a9ab185239a193c82cc0a93050f7e9107e83119dff

        SHA512

        78cd84f96c85ba4139dee6cd30b4835f0539a5e4d88b245e1e8b1081da896f8fb242f6f4bcb2a69b2e48beda5474181305cd60027d309e8d8a8c72e01987bedf

      • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

        Filesize

        8B

        MD5

        e425eaf94572559ad3f7b4789de7aa5b

        SHA1

        e6a8c707b3f7166080d43a6d2715146d9718f1a3

        SHA256

        e836044115dcb714cf884a38f4e39645c75ecb75460d139d94721b10f7d13d65

        SHA512

        8b04c1c865dee9ebd47034a58833284e54c843ea0f22cee6423fd7478643f1205bce86f18070fc34702e0b60e5c60ffea13228d50fde67f381c3e44df82026a0

      • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

        Filesize

        8B

        MD5

        388b06e4d27f838740316ab98adce8de

        SHA1

        22f4f434e0824f427175efd89589a26592b3efe9

        SHA256

        88611abbaee17d4508653437165dc1483ae46e26eac62176e2bc503d13ff92a3

        SHA512

        7cbd1b35315a583adb2fc7c2e92b797f551246231754f4617b61ab9d7162bfc45a4f8f81ea24b82821f49284127e202e4e2a7f87e2d3c22af5891a70d9b2402e

      • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

        Filesize

        8B

        MD5

        30a870ce09287fcf1dc3532561ad502c

        SHA1

        2ce902f910e55499acc1cfc05e4234f8e3d66c79

        SHA256

        ccd3257419a26a1a9e83d43cbaa22609b3fadfcdf8a5b13112392950026f07c4

        SHA512

        d823355d0a470f0382e2c42a06c51f571a4e468c9e19f9e3c045fc938953c2930dee34bacb9d969d1bdbf798d92ac3db6c1e28cd261141ed0768f47998f02b80

      • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

        Filesize

        8B

        MD5

        692dd248d88d68bd78f70dfa346fb1f7

        SHA1

        db803d28144d6dc39e08cf49df16487987182419

        SHA256

        afd6e7669d7286798a949c8541a0c0fb0d6798b3cba09a815920c2d891a182cd

        SHA512

        30ec386e700601fc3c9fd24786ad1dfde2c433cb71e884805b1eae52c2594b7374fe0ab4f5b65df6e2ef158f91983fed102373264f6b871278b45a4e43f7e1ee

      • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

        Filesize

        8B

        MD5

        373ef5de942bbeb7f1aac34a95c10e05

        SHA1

        f81b4e9b8ae82b84c98890a6804dc4c1237b84b2

        SHA256

        23679fa1503233f571c3e54374d75dda2bffef671ec5bdad17e104142ed6534a

        SHA512

        91f11d3ec0136d6ff4b3ce3bd1616aefc63328b3fd616993b2be81a522a3aebbd1dfed5c6e97062530bee34004b77ec51df0edb147068fe94e6ed83aa160da8a

      • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

        Filesize

        8B

        MD5

        869a06d310c7637b04ded7572ec99731

        SHA1

        08a2209756fc77fa06ddf55ba503f90d84368aa5

        SHA256

        847e4fc56938796455088e5f751488fd5ecc9a8d59620cada2dbec8e64fb6d19

        SHA512

        3340ce9ce504e4b5b9c2377e498b495f6bf1fa13585ebcbc219a1c366abfcac6174686ba728b4d68240b11c5f1ee32961ef4f4564e48d135b314e71e4b161ed9

      • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

        Filesize

        8B

        MD5

        1b1230972fd313629bb2afec74251833

        SHA1

        efe03275628c41452155a5cc63050e9fe4558c05

        SHA256

        acedf6a5b9e12b3aede697a6815db3c0458c9d1887878d906765802e797613ad

        SHA512

        27efd3b001541364ef1a1029bf8ce2886d31cbe5ad102248c6b6f093a453437a06813394c21c1e0f43af990bc93e78da7356e1ad108ca9ac9086104c66840640

      • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

        Filesize

        8B

        MD5

        3de0bb0bd313ddd98b6232cde5def1eb

        SHA1

        e09273d5d258499a8af958e7faf6b889a5286db7

        SHA256

        a33ec438e8b4eb3b68c6310d331cfaa95ba4fc6c39b4f9fb869f32309d9182d0

        SHA512

        8762ee4cf8e424ff2f66d6f4febc3990e9a1ac87672fffa179002485b7efd0496bfa0f73f0a3213f83ee4cc998c7f0146c65966c554a394bd649645487d2da2f

      • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

        Filesize

        8B

        MD5

        e614bc5a0e3180b2e270189d7076cb98

        SHA1

        a192746c324ec6a5f100ac55e04c711d27098563

        SHA256

        f7ad6c8946baa45447801674d8d442966ba9b25eae5a5600151029e7e959e095

        SHA512

        8e4913b9f7ca93450f54637e74c7156ebf2bfe6b7b07c75f8fb8d2cdd1e3dd94024360317aab5f4d88e2615c24cf2776e433fda473fa9529d8fad2cd1e7f14fd

      • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

        Filesize

        8B

        MD5

        cb87389c87cb2065d7d80472b7ff3f15

        SHA1

        490f8e4fc7bb685d0b83999958a77478ab22d926

        SHA256

        93b771de2eb1af30ed8d098e56a5fc544f3433bb18dc0d481cc41dfaba1c9b8b

        SHA512

        3b93869d420e4c98b9a7f50ea525f2989c53192febc0889d9a62ca55b50241803d7c133d5ac5f8aa1337d1ac45e5b19163b383b2c4fddd0a69d62ccd4dbdc21c

      • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

        Filesize

        8B

        MD5

        348ac5d02aaef32d49f8d32a2c8694d4

        SHA1

        2fb9af084fda9a47acc070f6fa0c91a27bb6af9c

        SHA256

        e3991c67e833882f4266b4967f45da5a08ea32487a6eaa8148dca33e27955cbc

        SHA512

        25920e8cf4fbc3e2abaeda455e76381145287c754b04e91671cd9182f73a5e8d6a8cd1e169df74e425ee7a29352221458cbdc3218eaba2ba4d32914edd3cc1e5

      • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

        Filesize

        8B

        MD5

        747789d46c2e1278cb2aa5d5362c2daa

        SHA1

        857023e4a07b2fe007c9de72b3f34debf01c2866

        SHA256

        85fbdc2284a335e8dc3b591e140b1b478af32c8de93adbd16da3dadfd9899798

        SHA512

        6e65e5962a4036ee243077a0fc86771184739fe9835bed1f004c1d3bdec881afed187beb065012e656572a71ece29e6a729cfb1220d8ba027075f8e2df0252f3

      • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

        Filesize

        8B

        MD5

        2b648545627c62b08ed3b90993286261

        SHA1

        7f726d5aeb7aa844d44bea01ea8bc945372cf258

        SHA256

        933bd6ee79061c4bc8f0a4c89896396b69c6cb3f551e3d4fc3ab511995acca8e

        SHA512

        8c2c8ee9301d4b78c9e43c053eb3f9ab711962331a2a79a73cb9a0c9e1c83a9db78fbe639b2caa9bf5930ce95c8d078282107ac44691b5b0e25bd48c3357480d

      • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

        Filesize

        8B

        MD5

        7cfee88e246285ab3f631750a02787c3

        SHA1

        499a9b5ac4e75caed5e8aea006430c25de604d5a

        SHA256

        dbb06eac153c786966deffde12e212f8e5f2e17b94612696ef1a5603cdcd3cc7

        SHA512

        5766f7a22def30f1bf1c5d7ca57b786c44a7b609da806d597fe058bfe18080fbfcb83307e8799799d906b3c9c2903ece64f5aa4dd2fcfae6985bf3da0c707cfa

      • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

        Filesize

        8B

        MD5

        bab2b7150f84e19d687751677001280d

        SHA1

        49b87a3ba9524fe7854c142f130483d5b2d35d47

        SHA256

        8bed9f95556d789b9156277560cdf3762113eb492bbbb1faad7ae91cb797f753

        SHA512

        3e5e527f121d824bcc75083bf5e1ee7c9a92c4fb829fac7b699bf659ffb16c024b4b1172df4c198246df1363aecf94ece091afa2a933ea8e5941da0237a3b290

      • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

        Filesize

        8B

        MD5

        b1fab836469e026c17397a7baed01838

        SHA1

        4e471989f8d9b55a65037bbff33691d6fe0c6141

        SHA256

        9c7f1aeef03d46a01f349fa2fdca1b7348d9d3cbf5b4ea94ebf7625b764ea61c

        SHA512

        95618f23aedd7e30722d3ff8ef9bd50baed87c3f77723c665b36c1250a18c3256535aabf193a66bafd96fb28d40693de192c8b43f435023dd0939a8a93d083df

      • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

        Filesize

        8B

        MD5

        c856fbf6503a30c95da6766706695511

        SHA1

        3b496c2ef157b237d1a6214dd7aea83d35749c38

        SHA256

        0ead4400c1b04377208a5de5afd10d286f63f1fd3130daa05398e4c33dfc9d2d

        SHA512

        9c4d4c2cec5ec3e4182f77d0db2425f119d4faf8401429670db5c030ad4e6257f2940255364536f680b4f24146fe43d2f036f3cfb4acd513fb599a9b3504a25b

      • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

        Filesize

        8B

        MD5

        3d651a695f15017380d954b1eb768d36

        SHA1

        22b5053c3212f1aeeb3c85039714a2d295c764ae

        SHA256

        e30f0d1bcad3150960879bc7c5c092f134b7ebea4d6ffe2927b6785138bf1a3b

        SHA512

        5352ac17c328cc05c6344b41d531af36a3186437be63886a042882ed5607aa9807807aa8d085958b0005ae0a072cd0539b646c0247fa27efb1eaac4797af10d9

      • C:\Users\Admin\AppData\Roaming\logs.dat

        Filesize

        15B

        MD5

        e21bd9604efe8ee9b59dc7605b927a2a

        SHA1

        3240ecc5ee459214344a1baac5c2a74046491104

        SHA256

        51a3fe220229aa3fdddc909e20a4b107e7497320a00792a280a03389f2eacb46

        SHA512

        42052ad5744ad76494bfa71d78578e545a3b39bfed4c4232592987bd28064b6366a423084f1193d137493c9b13d9ae1faac4cf9cc75eb715542fa56e13ca1493

      • C:\Windows\SysWOW64\svchoster\winhost.exe

        Filesize

        576KB

        MD5

        e896eba812ea3fb2e54b56b78444d08c

        SHA1

        fb80a88176e921a625f71b2eed24e7b7a8191e96

        SHA256

        fa35778cd58754297fef513a4e15371bd1c7045e535d28d490ac2046787854d0

        SHA512

        49962050ecff6b1212b914cca638e6628593fef3dff8c514a11f234aa3784a6c1eb6bbf849164b881fd604a7e4cebacf3dea2e5f9ac7807660c536075037edaa

      • memory/900-918-0x0000000000400000-0x0000000000457000-memory.dmp

        Filesize

        348KB

      • memory/900-913-0x0000000000400000-0x0000000000457000-memory.dmp

        Filesize

        348KB

      • memory/1232-19-0x0000000002100000-0x0000000002101000-memory.dmp

        Filesize

        4KB

      • memory/2652-2-0x0000000000400000-0x0000000000457000-memory.dmp

        Filesize

        348KB

      • memory/2652-4-0x0000000000400000-0x0000000000457000-memory.dmp

        Filesize

        348KB

      • memory/2652-11-0x0000000000400000-0x0000000000457000-memory.dmp

        Filesize

        348KB

      • memory/2652-321-0x0000000000400000-0x0000000000457000-memory.dmp

        Filesize

        348KB

      • memory/2652-880-0x0000000000400000-0x0000000000457000-memory.dmp

        Filesize

        348KB

      • memory/2652-6-0x0000000000400000-0x0000000000457000-memory.dmp

        Filesize

        348KB

      • memory/2652-9-0x0000000000400000-0x0000000000457000-memory.dmp

        Filesize

        348KB

      • memory/2652-13-0x0000000000400000-0x0000000000457000-memory.dmp

        Filesize

        348KB

      • memory/2652-15-0x0000000000400000-0x0000000000457000-memory.dmp

        Filesize

        348KB

      • memory/2652-14-0x0000000000400000-0x0000000000457000-memory.dmp

        Filesize

        348KB

      • memory/2652-7-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

        Filesize

        4KB

      • memory/2652-12-0x0000000000400000-0x0000000000457000-memory.dmp

        Filesize

        348KB

      • memory/3040-268-0x00000000000E0000-0x00000000000E1000-memory.dmp

        Filesize

        4KB

      • memory/3040-919-0x0000000024080000-0x00000000240E2000-memory.dmp

        Filesize

        392KB

      • memory/3040-262-0x00000000000A0000-0x00000000000A1000-memory.dmp

        Filesize

        4KB

      • memory/3040-548-0x0000000024080000-0x00000000240E2000-memory.dmp

        Filesize

        392KB