Analysis
-
max time kernel
149s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01-01-2025 21:08
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_60a9e86c4b77f46f58ec5f072ca0a2ac.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_60a9e86c4b77f46f58ec5f072ca0a2ac.exe
-
Size
1.4MB
-
MD5
60a9e86c4b77f46f58ec5f072ca0a2ac
-
SHA1
680d2139c24cbf360021c5f03a74e06efe53fe72
-
SHA256
c134fa58a35c04c0475c3c8f3746f8f978b4f3e8e6920aaf8fe3f1230806886b
-
SHA512
d6b7a411887a591732d31b55f21575937f808e259456d06b4a5569c1dc51f0526d8dce00a851fdf6525971cb63093eae908bc9d33b83ae92e1c9f815ff6dc8e4
-
SSDEEP
24576:2Lj5wuSgemx/+ZEl3mKJQYjMR4HADMINEclhUCNxd08adN0m9F+6MU8aGxu:oVwuSmx/+ZEljJNjQMahXNk3Km9F+K7
Malware Config
Extracted
cybergate
2.6
vítima
192.168.2.12:1020
***MUTEX***
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
install
-
install_file
server.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
texto da mensagem
-
message_box_title
título da mensagem
-
password
1020
Signatures
-
Cybergate family
-
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run GAROTA~1.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "c:\\dir\\install\\install\\server.exe" GAROTA~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run GAROTA~1.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "c:\\dir\\install\\install\\server.exe" GAROTA~1.EXE -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{08B0E5JF-4FCB-11CF-AAA5-00401C6XX500} GAROTA~1.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{08B0E5JF-4FCB-11CF-AAA5-00401C6XX500}\StubPath = "c:\\dir\\install\\install\\server.exe Restart" GAROTA~1.EXE -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation GAROTA~1.EXE -
Executes dropped EXE 6 IoCs
pid Process 3828 GAROTA~1.EXE 5016 GAROTA~1.EXE 4388 houdini.exe 4416 server.exe 3964 server.exe 2316 server.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" JaffaCakes118_60a9e86c4b77f46f58ec5f072ca0a2ac.exe -
AutoIT Executable 4 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0007000000023c77-5.dat autoit_exe behavioral2/files/0x000a000000023c73-13.dat autoit_exe behavioral2/memory/4388-18-0x0000000000400000-0x00000000004B2000-memory.dmp autoit_exe behavioral2/memory/4388-59-0x0000000000400000-0x00000000004B2000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3828 set thread context of 5016 3828 GAROTA~1.EXE 84 PID 4416 set thread context of 3964 4416 server.exe 88 -
resource yara_rule behavioral2/memory/4388-15-0x0000000010000000-0x0000000010096000-memory.dmp upx behavioral2/memory/4388-20-0x0000000010000000-0x0000000010096000-memory.dmp upx behavioral2/memory/4388-19-0x0000000010000000-0x0000000010096000-memory.dmp upx behavioral2/memory/3964-48-0x0000000024010000-0x0000000024072000-memory.dmp upx behavioral2/memory/3964-54-0x0000000024010000-0x0000000024072000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 808 2316 WerFault.exe 89 -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_60a9e86c4b77f46f58ec5f072ca0a2ac.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GAROTA~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language houdini.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GAROTA~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server.exe -
Modifies registry class 20 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff houdini.exe Set value (data) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 houdini.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 houdini.exe Set value (data) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff houdini.exe Set value (data) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 houdini.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell houdini.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Documents" houdini.exe Set value (data) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots houdini.exe Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\NodeSlot = "1" houdini.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags houdini.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 houdini.exe Set value (data) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = ffffffff houdini.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\WOW6432Node\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ houdini.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings houdini.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell houdini.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU houdini.exe Set value (data) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff houdini.exe Set value (data) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 14002e80922b16d365937a46956b92703aca08af0000 houdini.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 houdini.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ houdini.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 5016 GAROTA~1.EXE 5016 GAROTA~1.EXE 3964 server.exe 3964 server.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4388 houdini.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 3944 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3944 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 5016 GAROTA~1.EXE 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe 4388 houdini.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4388 houdini.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 4128 wrote to memory of 3828 4128 JaffaCakes118_60a9e86c4b77f46f58ec5f072ca0a2ac.exe 83 PID 4128 wrote to memory of 3828 4128 JaffaCakes118_60a9e86c4b77f46f58ec5f072ca0a2ac.exe 83 PID 4128 wrote to memory of 3828 4128 JaffaCakes118_60a9e86c4b77f46f58ec5f072ca0a2ac.exe 83 PID 3828 wrote to memory of 5016 3828 GAROTA~1.EXE 84 PID 3828 wrote to memory of 5016 3828 GAROTA~1.EXE 84 PID 3828 wrote to memory of 5016 3828 GAROTA~1.EXE 84 PID 3828 wrote to memory of 5016 3828 GAROTA~1.EXE 84 PID 3828 wrote to memory of 5016 3828 GAROTA~1.EXE 84 PID 3828 wrote to memory of 5016 3828 GAROTA~1.EXE 84 PID 3828 wrote to memory of 5016 3828 GAROTA~1.EXE 84 PID 3828 wrote to memory of 5016 3828 GAROTA~1.EXE 84 PID 3828 wrote to memory of 5016 3828 GAROTA~1.EXE 84 PID 3828 wrote to memory of 5016 3828 GAROTA~1.EXE 84 PID 3828 wrote to memory of 5016 3828 GAROTA~1.EXE 84 PID 3828 wrote to memory of 5016 3828 GAROTA~1.EXE 84 PID 3828 wrote to memory of 5016 3828 GAROTA~1.EXE 84 PID 4128 wrote to memory of 4388 4128 JaffaCakes118_60a9e86c4b77f46f58ec5f072ca0a2ac.exe 85 PID 4128 wrote to memory of 4388 4128 JaffaCakes118_60a9e86c4b77f46f58ec5f072ca0a2ac.exe 85 PID 4128 wrote to memory of 4388 4128 JaffaCakes118_60a9e86c4b77f46f58ec5f072ca0a2ac.exe 85 PID 5016 wrote to memory of 4416 5016 GAROTA~1.EXE 87 PID 5016 wrote to memory of 4416 5016 GAROTA~1.EXE 87 PID 5016 wrote to memory of 4416 5016 GAROTA~1.EXE 87 PID 5016 wrote to memory of 3432 5016 GAROTA~1.EXE 56 PID 5016 wrote to memory of 3432 5016 GAROTA~1.EXE 56 PID 4416 wrote to memory of 3964 4416 server.exe 88 PID 4416 wrote to memory of 3964 4416 server.exe 88 PID 4416 wrote to memory of 3964 4416 server.exe 88 PID 4416 wrote to memory of 3964 4416 server.exe 88 PID 4416 wrote to memory of 3964 4416 server.exe 88 PID 4416 wrote to memory of 3964 4416 server.exe 88 PID 4416 wrote to memory of 3964 4416 server.exe 88 PID 4416 wrote to memory of 3964 4416 server.exe 88 PID 4416 wrote to memory of 3964 4416 server.exe 88 PID 4416 wrote to memory of 3964 4416 server.exe 88 PID 4416 wrote to memory of 3964 4416 server.exe 88 PID 4416 wrote to memory of 3964 4416 server.exe 88 PID 4416 wrote to memory of 3964 4416 server.exe 88 PID 3964 wrote to memory of 2316 3964 server.exe 89 PID 3964 wrote to memory of 2316 3964 server.exe 89 PID 3964 wrote to memory of 2316 3964 server.exe 89 PID 3964 wrote to memory of 2316 3964 server.exe 89 PID 3964 wrote to memory of 2316 3964 server.exe 89 PID 3964 wrote to memory of 2316 3964 server.exe 89 PID 3964 wrote to memory of 2316 3964 server.exe 89 PID 3964 wrote to memory of 2316 3964 server.exe 89 PID 3964 wrote to memory of 2316 3964 server.exe 89 PID 3964 wrote to memory of 2316 3964 server.exe 89
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3432
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_60a9e86c4b77f46f58ec5f072ca0a2ac.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_60a9e86c4b77f46f58ec5f072ca0a2ac.exe"2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4128 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\GAROTA~1.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\GAROTA~1.EXE3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3828 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\GAROTA~1.EXE"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\GAROTA~1.EXE"4⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\dir\install\install\server.exe"C:\dir\install\install\server.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\dir\install\install\server.exe"C:\dir\install\install\server.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3964 -
C:\dir\install\install\server.exe"C:\dir\install\install\server.exe"7⤵
- Executes dropped EXE
PID:2316 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2316 -s 768⤵
- Program crash
PID:808
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\houdini.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\houdini.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4388
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x3fc 0x3001⤵
- Suspicious use of AdjustPrivilegeToken
PID:3944
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 2316 -ip 23161⤵PID:4884
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
982KB
MD56f2d823c1cc85edb87df59b070c72507
SHA169a10539fc51771c402eaa49424b8f3980351e45
SHA25680058bea65c5b2becd1d2c9fa1d24337364246e3ff8807775bfea20516dc6838
SHA512a2d200d63a04c6accab9c21a8354dacdb7cbe60c647fc688dfd2e6db5b51c256c2080a07161fc8e5b4e1decf305b224f311eb6768b263db6357b60238a36766c
-
Filesize
1.2MB
MD55498e1c4d2c4e312781079b998a2fa62
SHA1908e1967f6c11f11d52151dd3720482b6c50536f
SHA2569ad1d11d144fbb22c50a2d11b693686f0c68db1548a7ec8f561e619ef723abdf
SHA5125ac8d690ec8e53a009d6610d7103123b170951a11798b87f78fdbfe65bc22224a694ff11977304474ad45b5e876c84b6361a1702ff7f3477c311f849f3597971
-
Filesize
229KB
MD5325ac8c54831ff744a98a21c3de89eee
SHA101aa5a4fa0a4b213fd377b2d06b99b2edceaabf0
SHA25664f5157737363729bfda3ddba8bb913fc91f26fc43d2a72607fb35f1173418a2
SHA5129bd7ae1382908ddb3a1b5dff74931d5f67c679a83fdcd33b35ef9ed12bad3e182c5a681ad9449c179537f5f66886d630cf79e5348129133dbc9689d0c24be813