Analysis

  • max time kernel
    14s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    18-12-2024 21:15

General

  • Target

    fd259cfefa1dd16178ef6623b8c8399b_JaffaCakes118.exe

  • Size

    518KB

  • MD5

    fd259cfefa1dd16178ef6623b8c8399b

  • SHA1

    65f4e9094b8f1d9b9a843432e1c914dc1d4fe1e2

  • SHA256

    250355658006933dcbc4c2ccd87ddcd014b3177d97050dccfecf774b114d00d4

  • SHA512

    3260721f7b43b1141e4d778b9cbfa614e3f59265a428b04b00d22f54d8708be91f0f8b61266ba24488a65de7c59f5a337db8c7936dd80371790a8b1035972f4b

  • SSDEEP

    12288:sFywNSoOj/RBuCXRINHGoAY984mZmk3Wmqy8uVMvS:QN+RUmRamnY984pkmhy8uqvS

Malware Config

Extracted

Family

cybergate

Version

2.6

Botnet

vítima

C2

aldhmi.dyndns.biz:82

Mutex

dxd

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_file

    system 32.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    texto da mensagem

  • message_box_title

    título da mensagem

  • password

    abcd1234

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Signatures

  • CyberGate, Rebhip

    CyberGate is a lightweight remote administration tool with a wide array of functionalities.

  • Cybergate family
  • Adds policy Run key to start application 2 TTPs 4 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1336
      • C:\Users\Admin\AppData\Local\Temp\fd259cfefa1dd16178ef6623b8c8399b_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\fd259cfefa1dd16178ef6623b8c8399b_JaffaCakes118.exe"
        2⤵
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2076
        • C:\Users\Admin\AppData\Local\Xenocode\ApplianceCaches\crypted.exe_v492682F1\TheApp\STUBEXE\@APPDATALOCAL@\Temp\crypted.exe
          C:\Users\Admin\AppData\Local\Temp\crypted.exe
          3⤵
          • Adds policy Run key to start application
          • Boot or Logon Autostart Execution: Active Setup
          • Executes dropped EXE
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:2028
          • C:\Windows\SysWOW64\explorer.exe
            explorer.exe
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2424
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2424 -s 232
              5⤵
              • Program crash
              PID:1536
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            4⤵
              PID:2344

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • \Users\Admin\AppData\Local\Xenocode\ApplianceCaches\crypted.exe_v492682F1\TheApp\STUBEXE\@APPDATALOCAL@\Temp\crypted.exe

        Filesize

        16KB

        MD5

        3d09f19fc258588b0a9406b2baa6cf74

        SHA1

        2070d0b98716f2bbd0801e4421b9c916c4924e8e

        SHA256

        470bc7e1ec992322b920b5a71c456920ae13b18ea93983bbea3ba07344648d11

        SHA512

        d31cd795708560319b347e54275becb5d046ce845211098a45a039d10ae7f3eb2d043576be56da7c34b52c966bdbab5dc5ff6e27be400b36d151b5a0d5f498c2

      • memory/2028-690-0x0000000000400000-0x000000000046D000-memory.dmp

        Filesize

        436KB

      • memory/2028-308-0x0000000000400000-0x000000000046D000-memory.dmp

        Filesize

        436KB

      • memory/2076-0-0x0000000000360000-0x00000000003B2000-memory.dmp

        Filesize

        328KB

      • memory/2076-95-0x0000000000360000-0x00000000003B2000-memory.dmp

        Filesize

        328KB

      • memory/2076-62-0x0000000000360000-0x00000000003B2000-memory.dmp

        Filesize

        328KB

      • memory/2076-60-0x0000000000360000-0x00000000003B2000-memory.dmp

        Filesize

        328KB

      • memory/2076-57-0x0000000000360000-0x00000000003B2000-memory.dmp

        Filesize

        328KB

      • memory/2076-55-0x0000000000360000-0x00000000003B2000-memory.dmp

        Filesize

        328KB

      • memory/2076-28-0x0000000000360000-0x00000000003B2000-memory.dmp

        Filesize

        328KB

      • memory/2076-51-0x0000000000360000-0x00000000003B2000-memory.dmp

        Filesize

        328KB

      • memory/2076-49-0x0000000000360000-0x00000000003B2000-memory.dmp

        Filesize

        328KB

      • memory/2076-45-0x0000000000360000-0x00000000003B2000-memory.dmp

        Filesize

        328KB

      • memory/2076-44-0x0000000000360000-0x00000000003B2000-memory.dmp

        Filesize

        328KB

      • memory/2076-42-0x0000000000360000-0x00000000003B2000-memory.dmp

        Filesize

        328KB

      • memory/2076-40-0x0000000000360000-0x00000000003B2000-memory.dmp

        Filesize

        328KB

      • memory/2076-38-0x0000000000360000-0x00000000003B2000-memory.dmp

        Filesize

        328KB

      • memory/2076-36-0x0000000000360000-0x00000000003B2000-memory.dmp

        Filesize

        328KB

      • memory/2076-34-0x0000000000360000-0x00000000003B2000-memory.dmp

        Filesize

        328KB

      • memory/2076-30-0x0000000000360000-0x00000000003B2000-memory.dmp

        Filesize

        328KB

      • memory/2076-24-0x0000000000360000-0x00000000003B2000-memory.dmp

        Filesize

        328KB

      • memory/2076-53-0x0000000000360000-0x00000000003B2000-memory.dmp

        Filesize

        328KB

      • memory/2076-64-0x0000000000360000-0x00000000003B2000-memory.dmp

        Filesize

        328KB

      • memory/2076-93-0x0000000000360000-0x00000000003B2000-memory.dmp

        Filesize

        328KB

      • memory/2076-22-0x0000000000360000-0x00000000003B2000-memory.dmp

        Filesize

        328KB

      • memory/2076-20-0x0000000000360000-0x00000000003B2000-memory.dmp

        Filesize

        328KB

      • memory/2076-18-0x0000000000360000-0x00000000003B2000-memory.dmp

        Filesize

        328KB

      • memory/2076-16-0x0000000000360000-0x00000000003B2000-memory.dmp

        Filesize

        328KB

      • memory/2076-14-0x0000000000360000-0x00000000003B2000-memory.dmp

        Filesize

        328KB

      • memory/2076-12-0x0000000000360000-0x00000000003B2000-memory.dmp

        Filesize

        328KB

      • memory/2076-10-0x0000000000360000-0x00000000003B2000-memory.dmp

        Filesize

        328KB

      • memory/2076-8-0x0000000000360000-0x00000000003B2000-memory.dmp

        Filesize

        328KB

      • memory/2076-6-0x0000000000360000-0x00000000003B2000-memory.dmp

        Filesize

        328KB

      • memory/2076-4-0x0000000000360000-0x00000000003B2000-memory.dmp

        Filesize

        328KB

      • memory/2076-2-0x0000000000360000-0x00000000003B2000-memory.dmp

        Filesize

        328KB

      • memory/2076-1-0x0000000000360000-0x00000000003B2000-memory.dmp

        Filesize

        328KB

      • memory/2076-168-0x0000000000360000-0x00000000003B2000-memory.dmp

        Filesize

        328KB

      • memory/2076-26-0x0000000000360000-0x00000000003B2000-memory.dmp

        Filesize

        328KB

      • memory/2076-94-0x00000000774E0000-0x00000000774E1000-memory.dmp

        Filesize

        4KB

      • memory/2076-66-0x0000000000360000-0x00000000003B2000-memory.dmp

        Filesize

        328KB

      • memory/2076-279-0x0000000000360000-0x00000000003B2000-memory.dmp

        Filesize

        328KB

      • memory/2076-73-0x0000000000360000-0x00000000003B2000-memory.dmp

        Filesize

        328KB

      • memory/2076-87-0x0000000000360000-0x00000000003B2000-memory.dmp

        Filesize

        328KB