Analysis
-
max time kernel
16s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
01-01-2025 21:58
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_60e2c4748cb369963ade5d5e93eba743.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
JaffaCakes118_60e2c4748cb369963ade5d5e93eba743.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_60e2c4748cb369963ade5d5e93eba743.exe
-
Size
328KB
-
MD5
60e2c4748cb369963ade5d5e93eba743
-
SHA1
adc5b8b45748cf5220f5617616dae761390bd70d
-
SHA256
923ad557f320679ed043446a3cb9e8dfa49313202904669c8cfdf5bd55120784
-
SHA512
672f7850b8790ef959f2abaef3744cb593fe99ae62585b2001f407006ffd9c9a3cddb69905f15c0568a170289426c0ee45284dd6f041fb581dcce0a7e282c71a
-
SSDEEP
6144:dlWbPESlzd91X0UbsDuta1gnQ6yc9b/OiZ9mKpoUh/hy3Y+vLyMI72/1E3:dQbsSXToDurQVcx/F9lp7/MI+GuE3
Malware Config
Extracted
cybergate
v1.07.5
Cybergate15444
danaibrahim.zapto.org:15444
3R602X51T6XEV5
-
enable_keylogger
true
-
enable_message_box
true
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
install
-
install_file
bader.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Windows can't open this application!
-
message_box_title
Error
-
password
14931
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Signatures
-
Cybergate family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2528 set thread context of 740 2528 JaffaCakes118_60e2c4748cb369963ade5d5e93eba743.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_60e2c4748cb369963ade5d5e93eba743.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2528 wrote to memory of 740 2528 JaffaCakes118_60e2c4748cb369963ade5d5e93eba743.exe 29 PID 2528 wrote to memory of 740 2528 JaffaCakes118_60e2c4748cb369963ade5d5e93eba743.exe 29 PID 2528 wrote to memory of 740 2528 JaffaCakes118_60e2c4748cb369963ade5d5e93eba743.exe 29 PID 2528 wrote to memory of 740 2528 JaffaCakes118_60e2c4748cb369963ade5d5e93eba743.exe 29 PID 2528 wrote to memory of 740 2528 JaffaCakes118_60e2c4748cb369963ade5d5e93eba743.exe 29 PID 2528 wrote to memory of 740 2528 JaffaCakes118_60e2c4748cb369963ade5d5e93eba743.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_60e2c4748cb369963ade5d5e93eba743.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_60e2c4748cb369963ade5d5e93eba743.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_60e2c4748cb369963ade5d5e93eba743.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_60e2c4748cb369963ade5d5e93eba743.exe" "2⤵PID:740
-