Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20/01/2025, 22:15

General

  • Target

    JaffaCakes118_004dd49162ea4c3a5e2d339dadc35d93.exe

  • Size

    4.4MB

  • MD5

    004dd49162ea4c3a5e2d339dadc35d93

  • SHA1

    4b48dbf54b57094656785c0ef258db0b3c0e6859

  • SHA256

    da6de9f0878549518a78b100039e50a15fdf744efa0fa955da48237f6a3d4d63

  • SHA512

    8495d8e5d82d3a7777ed6ac6ae4e13c7a48cf5801613df5b637df48fce5adfa1f9dd5de59555e509a142a6dda07bc296a14ff8b2e0b19316ae046617cc96a9f1

  • SSDEEP

    98304:dEFwscAeiqpnlH2ZAfJTkNL7hc8HgBZzsKk5wJOTJo+mP6JR7Dv3DdffIwevcmln:Oncs21Nxk/JK0W8vB3IYmJH

Malware Config

Extracted

Family

cybergate

Version

2.4

Botnet

v?ima

C2

59.30.63.149:81

Mutex

***MUTEX***

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    install

  • install_file

    server.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    texto da mensagem

  • message_box_title

    t?ulo da mensagem

  • password

    abcd1234

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Signatures

  • CyberGate, Rebhip

    CyberGate is a lightweight remote administration tool with a wide array of functionalities.

  • Cybergate family
  • Adds policy Run key to start application 2 TTPs 4 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_004dd49162ea4c3a5e2d339dadc35d93.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_004dd49162ea4c3a5e2d339dadc35d93.exe"
    1⤵
    • Adds policy Run key to start application
    • Boot or Logon Autostart Execution: Active Setup
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2032
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe"
      2⤵
        PID:2272
      • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_004dd49162ea4c3a5e2d339dadc35d93.exe
        "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_004dd49162ea4c3a5e2d339dadc35d93.exe"
        2⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        PID:2524
        • C:\Users\Admin\AppData\Local\Temp\Portable Beauty Studio 1.47.exe
          "C:\Users\Admin\AppData\Local\Temp\Portable Beauty Studio 1.47.exe"
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:340

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\XX--XX--XX.txt

      Filesize

      8.6MB

      MD5

      6312cb97047db3387d8c5315151e9cc1

      SHA1

      2a5f28e0163ca3f63df0f095c7f4fbe66710e8c2

      SHA256

      48af754d03e92f65fb70781ec884058c7d8588817b2f1b4a04d406ade2f216f1

      SHA512

      2cf1b8101cda7b670c8b5c9b31675825b7ec6d870eef9fcb869e3cba03343d28986edffacef0fc92a56ba8fd2e7800f9d921b9382662aa769f7f61e3884a1fd7

    • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

      Filesize

      8B

      MD5

      1b56e16ad5b4ade27941cdb2c73e7319

      SHA1

      61be7f56604dd4902d13df747408fc52e60157ab

      SHA256

      abf18e050b118da9253fd42005b24195ec5deba6596374f708a2969dfc761d12

      SHA512

      530cbf8ecce1b1db60ab03e7865388fdc33667ddfb6441bacecf2aa296a222848a8980cc2dd726ec8e1aaf13be382c967ec7f90422d9d9c91f990a72d6ec3e8d

    • C:\Users\Admin\AppData\Roaming\logs.dat

      Filesize

      15B

      MD5

      4362e21af8686f5ebba224768d292a5b

      SHA1

      504510a4d10e230dcd1605ab3342525b38a10933

      SHA256

      b1b2cc9a6bf77f9e56955acbbce253c70fc25b92d1e150d9928b9183b19b93b3

      SHA512

      f2ee4b95d5c50b533de93f21f9d73a75ab8c755ab9f343b4848bd92b6827e76dc5e17fe27b0f2ad2049a1ee0fe20d0cb0398b1973277b85e84b6af004e945850

    • \Users\Admin\AppData\Local\Temp\Portable Beauty Studio 1.47.exe

      Filesize

      8.5MB

      MD5

      a3060ec2db9589065bf1af3820af239d

      SHA1

      8765841160d39991e86d5e9d339825feac980d93

      SHA256

      72e2d4999dc0c2d27eb3cb88d54e3fa1c947f5af57e884ff3c60423facba87fc

      SHA512

      bf79bcec6364ea9be7732c174c6e0c7a056c9f7e0bbddde238f81c46b5cb07bf4c2b8f0a2b7b7a0146ed161a2234ee8a9ded12c9209c6becb418c36acd8e6b53

    • memory/340-332-0x0000000000400000-0x0000000000A3B000-memory.dmp

      Filesize

      6.2MB

    • memory/340-303-0x0000000000400000-0x0000000000A3B000-memory.dmp

      Filesize

      6.2MB

    • memory/2032-7-0x0000000024060000-0x00000000240A2000-memory.dmp

      Filesize

      264KB

    • memory/2032-4-0x0000000024010000-0x0000000024052000-memory.dmp

      Filesize

      264KB

    • memory/2032-73-0x0000000000400000-0x0000000000CC8000-memory.dmp

      Filesize

      8.8MB

    • memory/2032-106-0x00000000026D0000-0x0000000002F98000-memory.dmp

      Filesize

      8.8MB

    • memory/2032-0-0x0000000000400000-0x0000000000CC8000-memory.dmp

      Filesize

      8.8MB

    • memory/2032-263-0x0000000000400000-0x0000000000CC8000-memory.dmp

      Filesize

      8.8MB

    • memory/2032-26-0x00000000026D0000-0x0000000002F98000-memory.dmp

      Filesize

      8.8MB

    • memory/2524-257-0x0000000024060000-0x00000000240A2000-memory.dmp

      Filesize

      264KB

    • memory/2524-284-0x00000000073E0000-0x0000000007A1B000-memory.dmp

      Filesize

      6.2MB

    • memory/2524-302-0x00000000073E0000-0x0000000007A1B000-memory.dmp

      Filesize

      6.2MB

    • memory/2524-8-0x00000000001B0000-0x00000000001B1000-memory.dmp

      Filesize

      4KB

    • memory/2524-14-0x00000000001D0000-0x00000000001D1000-memory.dmp

      Filesize

      4KB

    • memory/2524-333-0x0000000024060000-0x00000000240A2000-memory.dmp

      Filesize

      264KB

    • memory/2524-388-0x00000000073E0000-0x0000000007A1B000-memory.dmp

      Filesize

      6.2MB

    • memory/2524-389-0x00000000073E0000-0x0000000007A1B000-memory.dmp

      Filesize

      6.2MB

    • memory/2524-19-0x0000000000350000-0x0000000000351000-memory.dmp

      Filesize

      4KB