Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-01-2025 08:52
Behavioral task
behavioral1
Sample
JaffaCakes118_3dea75d9db5b89b9dfbeade07c52b58b.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_3dea75d9db5b89b9dfbeade07c52b58b.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_3dea75d9db5b89b9dfbeade07c52b58b.exe
-
Size
500KB
-
MD5
3dea75d9db5b89b9dfbeade07c52b58b
-
SHA1
c46c3024f857bff8aa6f4cd3639e7af6262206dd
-
SHA256
6bebba76eaaf80577684a4d1af3195f0eeb9d4435b0911d46bb760bd97396d64
-
SHA512
949bdd04ae5d4757e22f0b4b1c4fbb4823b16824cb6a7e26be9a486b95fdf357323e2cdba44c7a67e41a8c9780e48ce445c621a5a62517ee1a61cfa2d893d554
-
SSDEEP
12288:3xexIc4ZzqNFpDo6eTtPPbQ0iVuAqpc1pZMrlwXq3Mi:MxZHNFpDo7tPEMAUc1pZSwD
Malware Config
Extracted
cybergate
v1.07.5
lstreeet.no-ip.biz:15963
OAKTI06NWO4PTL
-
enable_keylogger
false
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
install
-
install_file
winlogone.exe
-
install_flag
false
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
whore1
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Signatures
-
Cybergate family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation JaffaCakes118_3dea75d9db5b89b9dfbeade07c52b58b.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation real.exe -
Executes dropped EXE 4 IoCs
pid Process 4336 real.exe 320 real.exe 208 real.exe 4184 real.exe -
Loads dropped DLL 1 IoCs
pid Process 1616 real.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Key Name real = "C:\\Users\\Admin\\AppData\\Roaming\\FolderName@OFF@\\real.exe" reg.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4644 set thread context of 64 4644 JaffaCakes118_3dea75d9db5b89b9dfbeade07c52b58b.exe 98 PID 4336 set thread context of 320 4336 real.exe 105 PID 4336 set thread context of 208 4336 real.exe 106 -
resource yara_rule behavioral2/memory/4644-0-0x0000000000400000-0x0000000000580000-memory.dmp upx behavioral2/memory/4644-5-0x0000000000400000-0x0000000000580000-memory.dmp upx behavioral2/memory/64-15-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/64-17-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/64-21-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/4644-20-0x0000000000400000-0x0000000000580000-memory.dmp upx behavioral2/files/0x000b000000021a75-37.dat upx behavioral2/memory/4336-45-0x0000000000400000-0x0000000000580000-memory.dmp upx behavioral2/memory/4336-48-0x0000000000400000-0x0000000000580000-memory.dmp upx behavioral2/memory/4336-49-0x0000000000400000-0x0000000000580000-memory.dmp upx behavioral2/memory/64-50-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/4336-65-0x0000000000400000-0x0000000000580000-memory.dmp upx behavioral2/memory/4336-78-0x0000000000400000-0x0000000000580000-memory.dmp upx behavioral2/memory/64-81-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/208-83-0x0000000010410000-0x0000000010475000-memory.dmp upx behavioral2/memory/1616-91-0x0000000000400000-0x0000000000580000-memory.dmp upx behavioral2/memory/208-87-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral2/memory/208-84-0x0000000010410000-0x0000000010475000-memory.dmp upx behavioral2/memory/320-171-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/4184-178-0x0000000000400000-0x0000000000580000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language real.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language real.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language real.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_3dea75d9db5b89b9dfbeade07c52b58b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_3dea75d9db5b89b9dfbeade07c52b58b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language real.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language real.exe -
Suspicious use of AdjustPrivilegeToken 17 IoCs
description pid Process Token: SeBackupPrivilege 1616 real.exe Token: SeRestorePrivilege 1616 real.exe Token: SeDebugPrivilege 1616 real.exe Token: SeDebugPrivilege 1616 real.exe Token: SeDebugPrivilege 320 real.exe Token: SeDebugPrivilege 320 real.exe Token: SeDebugPrivilege 320 real.exe Token: SeDebugPrivilege 320 real.exe Token: SeDebugPrivilege 320 real.exe Token: SeDebugPrivilege 320 real.exe Token: SeDebugPrivilege 320 real.exe Token: SeDebugPrivilege 320 real.exe Token: SeDebugPrivilege 320 real.exe Token: SeDebugPrivilege 320 real.exe Token: SeDebugPrivilege 320 real.exe Token: SeDebugPrivilege 320 real.exe Token: SeDebugPrivilege 320 real.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 4644 JaffaCakes118_3dea75d9db5b89b9dfbeade07c52b58b.exe 64 JaffaCakes118_3dea75d9db5b89b9dfbeade07c52b58b.exe 4336 real.exe 320 real.exe 4184 real.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4644 wrote to memory of 64 4644 JaffaCakes118_3dea75d9db5b89b9dfbeade07c52b58b.exe 98 PID 4644 wrote to memory of 64 4644 JaffaCakes118_3dea75d9db5b89b9dfbeade07c52b58b.exe 98 PID 4644 wrote to memory of 64 4644 JaffaCakes118_3dea75d9db5b89b9dfbeade07c52b58b.exe 98 PID 4644 wrote to memory of 64 4644 JaffaCakes118_3dea75d9db5b89b9dfbeade07c52b58b.exe 98 PID 4644 wrote to memory of 64 4644 JaffaCakes118_3dea75d9db5b89b9dfbeade07c52b58b.exe 98 PID 4644 wrote to memory of 64 4644 JaffaCakes118_3dea75d9db5b89b9dfbeade07c52b58b.exe 98 PID 4644 wrote to memory of 64 4644 JaffaCakes118_3dea75d9db5b89b9dfbeade07c52b58b.exe 98 PID 4644 wrote to memory of 64 4644 JaffaCakes118_3dea75d9db5b89b9dfbeade07c52b58b.exe 98 PID 64 wrote to memory of 3288 64 JaffaCakes118_3dea75d9db5b89b9dfbeade07c52b58b.exe 99 PID 64 wrote to memory of 3288 64 JaffaCakes118_3dea75d9db5b89b9dfbeade07c52b58b.exe 99 PID 64 wrote to memory of 3288 64 JaffaCakes118_3dea75d9db5b89b9dfbeade07c52b58b.exe 99 PID 3288 wrote to memory of 452 3288 cmd.exe 103 PID 3288 wrote to memory of 452 3288 cmd.exe 103 PID 3288 wrote to memory of 452 3288 cmd.exe 103 PID 64 wrote to memory of 4336 64 JaffaCakes118_3dea75d9db5b89b9dfbeade07c52b58b.exe 104 PID 64 wrote to memory of 4336 64 JaffaCakes118_3dea75d9db5b89b9dfbeade07c52b58b.exe 104 PID 64 wrote to memory of 4336 64 JaffaCakes118_3dea75d9db5b89b9dfbeade07c52b58b.exe 104 PID 4336 wrote to memory of 320 4336 real.exe 105 PID 4336 wrote to memory of 320 4336 real.exe 105 PID 4336 wrote to memory of 320 4336 real.exe 105 PID 4336 wrote to memory of 320 4336 real.exe 105 PID 4336 wrote to memory of 320 4336 real.exe 105 PID 4336 wrote to memory of 320 4336 real.exe 105 PID 4336 wrote to memory of 320 4336 real.exe 105 PID 4336 wrote to memory of 320 4336 real.exe 105 PID 4336 wrote to memory of 208 4336 real.exe 106 PID 4336 wrote to memory of 208 4336 real.exe 106 PID 4336 wrote to memory of 208 4336 real.exe 106 PID 4336 wrote to memory of 208 4336 real.exe 106 PID 4336 wrote to memory of 208 4336 real.exe 106 PID 4336 wrote to memory of 208 4336 real.exe 106 PID 4336 wrote to memory of 208 4336 real.exe 106 PID 4336 wrote to memory of 208 4336 real.exe 106 PID 4336 wrote to memory of 208 4336 real.exe 106 PID 4336 wrote to memory of 208 4336 real.exe 106 PID 4336 wrote to memory of 208 4336 real.exe 106 PID 4336 wrote to memory of 208 4336 real.exe 106 PID 4336 wrote to memory of 208 4336 real.exe 106 PID 208 wrote to memory of 2496 208 real.exe 107 PID 208 wrote to memory of 2496 208 real.exe 107 PID 208 wrote to memory of 2496 208 real.exe 107 PID 208 wrote to memory of 2496 208 real.exe 107 PID 208 wrote to memory of 2496 208 real.exe 107 PID 208 wrote to memory of 2496 208 real.exe 107 PID 208 wrote to memory of 2496 208 real.exe 107 PID 208 wrote to memory of 2496 208 real.exe 107 PID 208 wrote to memory of 2496 208 real.exe 107 PID 208 wrote to memory of 2496 208 real.exe 107 PID 208 wrote to memory of 2496 208 real.exe 107 PID 208 wrote to memory of 2496 208 real.exe 107 PID 208 wrote to memory of 2496 208 real.exe 107 PID 208 wrote to memory of 2496 208 real.exe 107 PID 208 wrote to memory of 2496 208 real.exe 107 PID 208 wrote to memory of 2496 208 real.exe 107 PID 208 wrote to memory of 2496 208 real.exe 107 PID 208 wrote to memory of 2496 208 real.exe 107 PID 208 wrote to memory of 2496 208 real.exe 107 PID 208 wrote to memory of 2496 208 real.exe 107 PID 208 wrote to memory of 2496 208 real.exe 107 PID 208 wrote to memory of 2496 208 real.exe 107 PID 208 wrote to memory of 2496 208 real.exe 107 PID 208 wrote to memory of 2496 208 real.exe 107 PID 208 wrote to memory of 2496 208 real.exe 107 PID 208 wrote to memory of 2496 208 real.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3dea75d9db5b89b9dfbeade07c52b58b.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3dea75d9db5b89b9dfbeade07c52b58b.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3dea75d9db5b89b9dfbeade07c52b58b.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3dea75d9db5b89b9dfbeade07c52b58b.exe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:64 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\KBVAW.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3288 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Key Name real" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\FolderName@OFF@\real.exe" /f4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:452
-
-
-
C:\Users\Admin\AppData\Roaming\FolderName@OFF@\real.exe"C:\Users\Admin\AppData\Roaming\FolderName@OFF@\real.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4336 -
C:\Users\Admin\AppData\Roaming\FolderName@OFF@\real.exe"C:\Users\Admin\AppData\Roaming\FolderName@OFF@\real.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:320
-
-
C:\Users\Admin\AppData\Roaming\FolderName@OFF@\real.exe"C:\Users\Admin\AppData\Roaming\FolderName@OFF@\real.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:208 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:2496
-
-
C:\Users\Admin\AppData\Roaming\FolderName@OFF@\real.exe"C:\Users\Admin\AppData\Roaming\FolderName@OFF@\real.exe"5⤵
- Checks computer location settings
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1616 -
C:\Users\Admin\AppData\Roaming\FolderName@OFF@\real.exe"C:\Users\Admin\AppData\Roaming\FolderName@OFF@\real.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4184
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD57f198c345ee51464a78fdce6345155bf
SHA1790df04136ae8251c5f719f93fd0f0411daeba01
SHA256b47ee1e4198cb7864f59b8e56a0c3586ab1fc407ebd870d24e1bf7b6d9f3061f
SHA512854356180d58715b3327b953242bac94d0b5be0aabc29f9aa321ff204c822bd84f8a87999b3e932f9f45899fa6378e2b5633e80715e329f73f1d9362c9978547
-
Filesize
8B
MD5bbabfb868dc392426c1ff67ca58de817
SHA1a3f6911328ff5eccbc57340ae55eca354bd237d1
SHA2561d42f1555cf6c60f19a1fa2513b305ae8905f8b20ece868a30bc99de24e569ca
SHA5126de87476de6b86ea13f947072185f5ebee453f0501725bab910a3f012e117b703be8599dbca1c90d070c394005dab1fb3a4dca13bb60599c6dca232022db1388
-
Filesize
8B
MD5380a4a15d2e01aa19474b795b9b24533
SHA13a9c75c7bc729a4d8f1e9544384d8b4fde55e81a
SHA25669d50c04e8c8b8b8de83af9a5db008f683354df3bb5dcf8ab83415bc3494edd2
SHA5129c7d0c25274876dac30ec86712a4aa6a293a6be05f4574499567d27a29390d2268f42402bae2aab8c58e870ba1b8018a4c5a1fa3dc37f38a3ec9b361e49e174c
-
Filesize
8B
MD5626420b930906fad0dcef7de250c896c
SHA136b2e5e7cb5c3cab0f0e891f54402fd07a39b738
SHA25676b4c7517eff323272010c28399baf9bcff1dd8cd46d24949be627b9dfa06d11
SHA512519ef16bdf559897cef5b69a5a9b72be33e883e07705aa7547ecb069dd273cb3a6e752c4d47f4584f7b74f6dae25474ae6dc38c3b1463ecac5478ea4fd296b99
-
Filesize
8B
MD52cf5ffac9f2610f2c5d059e6b29b223b
SHA10f61a03dd648ac5ba0dc1b0f9fc1cfbec6548d40
SHA25678fd7865db68beb67aee3fa8f0393326d0f1afc3d2d37d28a47e9f859cfbc6e2
SHA51207292e80bdcd085a0397739bb689f194eab35d7f67e70469af83ee129ab9b445ba3126e2538c3d23e0662fd3d9cbf3dc1c883d1fdc770d3aa5e74926cda88bc3
-
Filesize
8B
MD56c5ce67d33b00f44c7a9b480720b8129
SHA135303fa3532484be09d41050ecdeb21d48579818
SHA2562e5211854cffde90f29ed0ee79823a47acf23ff03c8582a3a8715c5fe13d09f5
SHA512122c587576218582daa4d9fcb7ce293b57cb275ca13e09187e376532de063aa8e82b43b3fd75f05f3bcf8dc144a61f8e0c49d543dedbdd9a4f9d91df000a0cb4
-
Filesize
8B
MD54d08585985b450b75cd6ba2ab86b7bcd
SHA17ad0a08c79c027aa3987cf1fb971296afb42395d
SHA25601bf0cbdc44b2ca2d4d84cefd87e2546e7e677933e756778bc39d92adb5a81f0
SHA512f7876e7b04753894f379fdcd8e21effbc98be98c419bdced801c32886bcc978c77aa6be8a0dbdad4035ebc81d1b188f2df6058b8a794dc1714abfa10cfa55cb5
-
Filesize
8B
MD515cbdf0776ba9b4f20cadd6b33f00b76
SHA159e115db65ee26d9685ec140142c1e2c3a39db11
SHA256351006ce0b98f4290caa6d881c839acdb615d90bc2a665b657b4d0d728ecd61c
SHA5124f8b206ecf3273c4e04368bf24dce31c383754db60c51901a610763047dab8d05309e7e409e6c75030b63c477d11e513e9f6824b11ee6704bd35e4d4bf053867
-
Filesize
8B
MD55353e63b3dcc12200b81c0e575722961
SHA1e05b99a2d84934e4b4d9d5c2b5ffc161f33a2e20
SHA2560db4539be2882912e158c100606ec144625bb3203a8dd4278e06edac973f8bb1
SHA512a4cf58d1d880052f7e42d0f7ac0200b8c0d8406d04c9ee35dbf5383f10eed6e425580611247e71bef8ce6632d22fa145df1bdf5e8eff9afaaf00a5cd0c3d474a
-
Filesize
8B
MD5d1e2c124457991d6ae4fa1e120b6903d
SHA12a480e70018587f8b91b71dce724f3d818b3e226
SHA256faf53ff1c799495df773e0cd002b5b0bd3991297ad063397dcbb12563cbffaa9
SHA5120416a65a8c0b293b49c01c2b048bacf1674180dcba83cc3301555840e2558d2d50ca3f6c2374f55adfabafe2cc7a133d97dada93bbc4d4002c5b36943a7e7680
-
Filesize
8B
MD595c89ebe178d9a1638a34ca4281ad5ae
SHA129ec7becca410ecd402a1837930ef44a346ae3b7
SHA2561fb7ce8c70e6eb47359bba899654bda3db5d14b586ed8726779eeb69892016c7
SHA512fc928f511af801e35f37892bce3779197bcd47c3df61e3951500878d1798c2397458cbdfd79c4f6fd4b843c5123622ecc58356ab994c255d436b09a9d89ce8fe
-
Filesize
8B
MD581e25843ee3142e81575c09e7b072803
SHA1214b21ba919fa0b7ef5d7942e2c7049917249424
SHA25648cd88a8a6c378d863ffac1b31284ecf749894feb97bcd2ec9e145812130f9e0
SHA512e99326cc5c0e93320a1098dd4165bb9d399f4d0e7490dda0c12e7698a2013e2d02a4906b2cc1cc79476af3537c1484a33819cc95aced977993cf1d4b386ab69a
-
Filesize
155B
MD5f8c91c062813c5d40d7dad776438c3cc
SHA19db3fbda51c2f872ba693f6be0318b8d842b251c
SHA25613b5540373c481fc4050c54b397e8569589e4a75737889bdb173c3d98343f7ef
SHA5122e137f8920143b6a40a3ac9674e371b8e41f575a02b10765d9146ccc69091d6bc525f600304f1239c895e3a784a2c5caaa86270ebf8fe5c0b616d71eda968baf
-
Filesize
500KB
MD5e671f0d8079942eaed8d44b2c0946428
SHA115355b035c2158a63bdc51ba3f79d04e6cc21769
SHA256e661f72f34ab78ab432f928d445bd107c8060dc017471b71f165d6277418988e
SHA51244ae03cc982d0acc03ed9b997ff354f5f14d1cf9b5e24ceacd1eb4032d3439ab3c9a01ad54320362847ac0c77443e13245e016854189521b994d4829f557ad98