Analysis

  • max time kernel
    16s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    01-01-2025 21:58

General

  • Target

    JaffaCakes118_60e2c4748cb369963ade5d5e93eba743.exe

  • Size

    328KB

  • MD5

    60e2c4748cb369963ade5d5e93eba743

  • SHA1

    adc5b8b45748cf5220f5617616dae761390bd70d

  • SHA256

    923ad557f320679ed043446a3cb9e8dfa49313202904669c8cfdf5bd55120784

  • SHA512

    672f7850b8790ef959f2abaef3744cb593fe99ae62585b2001f407006ffd9c9a3cddb69905f15c0568a170289426c0ee45284dd6f041fb581dcce0a7e282c71a

  • SSDEEP

    6144:dlWbPESlzd91X0UbsDuta1gnQ6yc9b/OiZ9mKpoUh/hy3Y+vLyMI72/1E3:dQbsSXToDurQVcx/F9lp7/MI+GuE3

Malware Config

Extracted

Family

cybergate

Version

v1.07.5

Botnet

Cybergate15444

C2

danaibrahim.zapto.org:15444

Mutex

3R602X51T6XEV5

Attributes
  • enable_keylogger

    true

  • enable_message_box

    true

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    install

  • install_file

    bader.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Windows can't open this application!

  • message_box_title

    Error

  • password

    14931

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Signatures

  • CyberGate, Rebhip

    CyberGate is a lightweight remote administration tool with a wide array of functionalities.

  • Cybergate family
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_60e2c4748cb369963ade5d5e93eba743.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_60e2c4748cb369963ade5d5e93eba743.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2528
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_60e2c4748cb369963ade5d5e93eba743.exe
      "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_60e2c4748cb369963ade5d5e93eba743.exe" "
      2⤵
        PID:740

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/740-0-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/740-2-0x0000000000400000-0x000000000044F000-memory.dmp

      Filesize

      316KB

    • memory/740-3-0x0000000000400000-0x000000000044F000-memory.dmp

      Filesize

      316KB