Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-01-2025 17:55

General

  • Target

    JaffaCakes118_6708085f337448fea5b87dfa3202312b.exe

  • Size

    698KB

  • MD5

    6708085f337448fea5b87dfa3202312b

  • SHA1

    b7e73e4b6c62d23de8ecce20845bc2293db3136f

  • SHA256

    d30dea175a9c3fcf8ac66290c76565910dae764a9098abe6cd0fd87799e2506c

  • SHA512

    613e0e5a563707e139c5db0d4377bbfd69822187dcc5c3401dfd995d69d547df47f30af40cfde20314e719a15577739338be26b1d1153cd9139dbb87b34a1adf

  • SSDEEP

    12288:RRFj6pBIZprZ861K/uFMobAPRN5zHajQBjETwmQ8Zj+nlM:0pBIvdK/qMcApfz6jQyTwgcM

Malware Config

Extracted

Family

cybergate

Version

v1.07.5

Botnet

remote

C2

83dns.dyndns.biz:82

83dns.dyndns.biz:288

127.0.0.1:82

83dns.dyndns.biz:30400

hakpro83.zapto.org:30400

hakpro83.zapto.org:288

Mutex

2RAPAI81574BI5

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    install

  • install_file

    server.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    prohak

  • regkey_hkcu

    Msnp

  • regkey_hklm

    Msnp

Signatures

  • CyberGate, Rebhip

    CyberGate is a lightweight remote administration tool with a wide array of functionalities.

  • Cybergate family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Molebox Virtualization software 1 IoCs

    Detects file using Molebox Virtualization software.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6708085f337448fea5b87dfa3202312b.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6708085f337448fea5b87dfa3202312b.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4980
    • C:\Extract\File1549.exe
      "C:\Extract\File1549.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:972
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 972 -s 232
        3⤵
        • Program crash
        PID:5092
    • C:\Extract\File2549.exe
      "C:\Extract\File2549.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:3908
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 972 -ip 972
    1⤵
      PID:3484
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0x2d4 0x51c
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2384

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Extract\File1549.exe

      Filesize

      298KB

      MD5

      76897c55182fe491f5ed62b2e0b78343

      SHA1

      60d7198a9eb6d3c32ad08e20fb78486ae5d6743b

      SHA256

      21efcd554766522c59e822223cb3219081465f93131bb97f7d413b55145f4d39

      SHA512

      44c5bfa624ce1e693d9ed68046d22758a45aefb9e91d253817a182461e66b799729c724c02cb506e52493bb237ab7e4692b8fea167843fc1403b5c50658a0470

    • C:\Extract\File2549.exe

      Filesize

      169KB

      MD5

      c9dbaec18e53742b87f3a9a73bde2b93

      SHA1

      1e005a3597d18a4ff78c043e06a2deff0a7ee6be

      SHA256

      fea808cba9fdb12ecef083b12460a85fb2f60f487dbee46499aa2da53b48a17a

      SHA512

      11123f7a5e06164ecad499412d433e7a1f5617f9e43636b5f71ce3ac314886272bcdbf5d7e0ea6f0da2001aee18e7e43ca76ea66def0d42aeb440c2f2f32d62f

    • C:\Users\Admin\AppData\Local\Temp\bassmod.dll

      Filesize

      9KB

      MD5

      780d14604d49e3c634200c523def8351

      SHA1

      e208ef6f421d2260070a9222f1f918f1de0a8eeb

      SHA256

      844eb66a10b848d3a71a8c63c35f0a01550a46d2ff8503e2ca8947978b03b4d2

      SHA512

      a49c030f11da8f0cdc4205c86bec00653ec2f8899983cad9d7195fd23255439291aaec5a7e128e1a103efd93b8566e86f15af89eba4efebf9debce14a7a5564b

    • memory/972-47-0x0000000000400000-0x0000000000451000-memory.dmp

      Filesize

      324KB

    • memory/3908-78-0x0000000000400000-0x0000000000441000-memory.dmp

      Filesize

      260KB

    • memory/3908-87-0x0000000000400000-0x0000000000441000-memory.dmp

      Filesize

      260KB

    • memory/4980-4-0x0000000077582000-0x0000000077583000-memory.dmp

      Filesize

      4KB

    • memory/4980-3-0x0000000002440000-0x0000000002450000-memory.dmp

      Filesize

      64KB

    • memory/4980-2-0x0000000000400000-0x000000000042C000-memory.dmp

      Filesize

      176KB

    • memory/4980-9-0x0000000076F50000-0x0000000077040000-memory.dmp

      Filesize

      960KB

    • memory/4980-7-0x0000000076F70000-0x0000000076F71000-memory.dmp

      Filesize

      4KB

    • memory/4980-38-0x0000000076F50000-0x0000000077040000-memory.dmp

      Filesize

      960KB

    • memory/4980-8-0x0000000076F50000-0x0000000077040000-memory.dmp

      Filesize

      960KB

    • memory/4980-6-0x0000000002290000-0x00000000022A0000-memory.dmp

      Filesize

      64KB

    • memory/4980-43-0x0000000076F50000-0x0000000077040000-memory.dmp

      Filesize

      960KB

    • memory/4980-0-0x00000000006E0000-0x00000000006E1000-memory.dmp

      Filesize

      4KB

    • memory/4980-81-0x00000000021F0000-0x000000000222D000-memory.dmp

      Filesize

      244KB

    • memory/4980-79-0x0000000000400000-0x000000000042C000-memory.dmp

      Filesize

      176KB

    • memory/4980-82-0x0000000076F50000-0x0000000077040000-memory.dmp

      Filesize

      960KB

    • memory/4980-1-0x00000000021F0000-0x000000000222D000-memory.dmp

      Filesize

      244KB

    • memory/4980-5-0x0000000002340000-0x0000000002350000-memory.dmp

      Filesize

      64KB