Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-01-2025 15:33

General

  • Target

    JaffaCakes118_ada507f4f1a73c25f4425b649b6a4483.exe

  • Size

    198KB

  • MD5

    ada507f4f1a73c25f4425b649b6a4483

  • SHA1

    95e0c83f1aae90f95d77a905f1b7d0eb8d077eee

  • SHA256

    9dab7b4fd164f3ec579ccfc14743c5bc82fa734bf4b518d046321875512712d4

  • SHA512

    f9a6c57a6bf40c46914558510c064a0ebebe05c3d10d45a04b677d8b431fe72e4bd13af98e2d0df77df44e5a76111debeedfb9ace2acd35d9c9ad7f76f09abf9

  • SSDEEP

    3072:ZiG9l4CUKsJNWqxObeItPPjtq0svSa51sH4fdJ+KQSJNSY/ne7w:DAKsJNxAbeICYa51T3VnUw

Malware Config

Extracted

Family

cybergate

Version

2.2

Botnet

vítima

C2

127.0.0.1:81

Mutex

***MUTEX***

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    install

  • install_file

    server.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    texto da mensagem

  • message_box_title

    título da mensagem

  • password

    abcd1234

Signatures

  • CyberGate, Rebhip

    CyberGate is a lightweight remote administration tool with a wide array of functionalities.

  • Cybergate family
  • Adds policy Run key to start application 2 TTPs 4 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • UPX packed file 11 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ada507f4f1a73c25f4425b649b6a4483.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ada507f4f1a73c25f4425b649b6a4483.exe"
    1⤵
    • Adds policy Run key to start application
    • Boot or Logon Autostart Execution: Active Setup
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2672
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe"
      2⤵
        PID:1748
      • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ada507f4f1a73c25f4425b649b6a4483.exe
        "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ada507f4f1a73c25f4425b649b6a4483.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        PID:2740

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\UuU.uUu

      Filesize

      8B

      MD5

      93ed4414f15c5d463840e80d31b13975

      SHA1

      657973b7fee9d0f85028068d1c1b75c6133c6dd0

      SHA256

      5e7cbf2bbc5fc7edf467bcf18770f7ef0e71287000503ccd326f91b6831d3d94

      SHA512

      28dc7071a4f94eafe97b440490c9fbc2bb5e7bd70ae420a837d74ac0d125631b2e9250b7c652fbea31149d98f1bde1ce01be149d547ced0b862b604d81de02c0

    • C:\Users\Admin\AppData\Local\Temp\XX--XX--XX.txt

      Filesize

      137KB

      MD5

      dbc2c6deedc5023447458859f499bffe

      SHA1

      e1bbdb957f23afa4f048771fd392d0eeffee7474

      SHA256

      6c18e4e53cb59b9fa8070490d150547fbfe391d931aea55672222b9e68327062

      SHA512

      1b7aba815011e56c2e3c22987d3e213a46c7551a1766646540fc9ab3014b60c298ca3be16a9fa216aeaed69929512da7f4509d3299a4d9493bf798902f90182e

    • C:\Users\Admin\AppData\Roaming\logs.dat

      Filesize

      15B

      MD5

      86f3c87caff4d7973404ff22c664505b

      SHA1

      245bc19c345bc8e73645cd35f5af640bc489da19

      SHA256

      e8ab966478c22925527b58b0a7c3d89e430690cbdabb44d501744e0ad0ac9ddb

      SHA512

      0940c4b339640f60f1a21fc9e4e958bf84f0e668f33a9b24d483d1e6bfcf35eca45335afee1d3b7ff6fd091b2e395c151af8af3300e154d3ea3fdb2b73872024

    • memory/2672-2-0x0000000024010000-0x000000002404C000-memory.dmp

      Filesize

      240KB

    • memory/2672-51-0x0000000024050000-0x000000002408C000-memory.dmp

      Filesize

      240KB

    • memory/2672-6-0x0000000024050000-0x000000002408C000-memory.dmp

      Filesize

      240KB

    • memory/2672-55-0x0000000000400000-0x0000000000439000-memory.dmp

      Filesize

      228KB

    • memory/2740-57-0x0000000024050000-0x000000002408C000-memory.dmp

      Filesize

      240KB

    • memory/2740-56-0x0000000024050000-0x000000002408C000-memory.dmp

      Filesize

      240KB

    • memory/2740-54-0x0000000003710000-0x0000000003711000-memory.dmp

      Filesize

      4KB

    • memory/2740-60-0x0000000024050000-0x000000002408C000-memory.dmp

      Filesize

      240KB

    • memory/2740-59-0x0000000024050000-0x000000002408C000-memory.dmp

      Filesize

      240KB

    • memory/2740-61-0x0000000024050000-0x000000002408C000-memory.dmp

      Filesize

      240KB

    • memory/2740-69-0x0000000024050000-0x000000002408C000-memory.dmp

      Filesize

      240KB

    • memory/2740-68-0x0000000024050000-0x000000002408C000-memory.dmp

      Filesize

      240KB

    • memory/2740-7-0x00000000001E0000-0x00000000001E1000-memory.dmp

      Filesize

      4KB

    • memory/2740-8-0x00000000005A0000-0x00000000005A1000-memory.dmp

      Filesize

      4KB

    • memory/2740-83-0x0000000024050000-0x000000002408C000-memory.dmp

      Filesize

      240KB