Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/03/2025, 16:05
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_5a064addca31cc7ca448cbb6e4c78a4a.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_5a064addca31cc7ca448cbb6e4c78a4a.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_5a064addca31cc7ca448cbb6e4c78a4a.exe
-
Size
2.7MB
-
MD5
5a064addca31cc7ca448cbb6e4c78a4a
-
SHA1
c0d38bf7c40d50643f0e98b023edf9d46a845372
-
SHA256
9dae201039484054b1ff046169b7b4b5647c391b6bdb5817bcb25684fe364c09
-
SHA512
62d2aaa1a51c0008f572ba0ca1c2c646abc6279bec26c6f8a5fbd99526403cc30a49906e9480dbc00faf48e253ad41fa6ab52a5801d2af239a7aa7fda6b83e2a
-
SSDEEP
24576:okK1WysBo+d8ZktrvSGBJm4gWp87NYOYLXWo2XC4JMC00ruymlE8Lx7/7BsifSB6:okK3sBBzONos00Ahtsd0Fmq/INJI
Malware Config
Signatures
-
Cybergate family
-
Executes dropped EXE 2 IoCs
pid Process 2404 JaffaCakes118_5a064addca31cc7ca448cbb6e4c78a4a.exe 536 tPOqY.exe.exe -
Loads dropped DLL 7 IoCs
pid Process 2764 JaffaCakes118_5a064addca31cc7ca448cbb6e4c78a4a.exe 2764 JaffaCakes118_5a064addca31cc7ca448cbb6e4c78a4a.exe 2404 JaffaCakes118_5a064addca31cc7ca448cbb6e4c78a4a.exe 2404 JaffaCakes118_5a064addca31cc7ca448cbb6e4c78a4a.exe 2404 JaffaCakes118_5a064addca31cc7ca448cbb6e4c78a4a.exe 2404 JaffaCakes118_5a064addca31cc7ca448cbb6e4c78a4a.exe 2404 JaffaCakes118_5a064addca31cc7ca448cbb6e4c78a4a.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\YfvXWmcfWvYEBjXsiZnxggTTuDQrLqPgsheYqnKtFLHSjkGHRo = "C:\\Users\\Admin\\AppData\\Local\\JaffaCakes118_5a064addca31cc7ca448cbb6e4c78a4a.exe" JaffaCakes118_5a064addca31cc7ca448cbb6e4c78a4a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_5a064addca31cc7ca448cbb6e4c78a4a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_5a064addca31cc7ca448cbb6e4c78a4a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tPOqY.exe.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1424 timeout.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2764 wrote to memory of 2404 2764 JaffaCakes118_5a064addca31cc7ca448cbb6e4c78a4a.exe 30 PID 2764 wrote to memory of 2404 2764 JaffaCakes118_5a064addca31cc7ca448cbb6e4c78a4a.exe 30 PID 2764 wrote to memory of 2404 2764 JaffaCakes118_5a064addca31cc7ca448cbb6e4c78a4a.exe 30 PID 2764 wrote to memory of 2404 2764 JaffaCakes118_5a064addca31cc7ca448cbb6e4c78a4a.exe 30 PID 2404 wrote to memory of 536 2404 JaffaCakes118_5a064addca31cc7ca448cbb6e4c78a4a.exe 31 PID 2404 wrote to memory of 536 2404 JaffaCakes118_5a064addca31cc7ca448cbb6e4c78a4a.exe 31 PID 2404 wrote to memory of 536 2404 JaffaCakes118_5a064addca31cc7ca448cbb6e4c78a4a.exe 31 PID 2404 wrote to memory of 536 2404 JaffaCakes118_5a064addca31cc7ca448cbb6e4c78a4a.exe 31 PID 536 wrote to memory of 592 536 tPOqY.exe.exe 32 PID 536 wrote to memory of 592 536 tPOqY.exe.exe 32 PID 536 wrote to memory of 592 536 tPOqY.exe.exe 32 PID 536 wrote to memory of 592 536 tPOqY.exe.exe 32 PID 592 wrote to memory of 1424 592 cmd.exe 34 PID 592 wrote to memory of 1424 592 cmd.exe 34 PID 592 wrote to memory of 1424 592 cmd.exe 34 PID 592 wrote to memory of 1424 592 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5a064addca31cc7ca448cbb6e4c78a4a.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5a064addca31cc7ca448cbb6e4c78a4a.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Users\Admin\AppData\Roaming\JaffaCakes118_5a064addca31cc7ca448cbb6e4c78a4a.exe"C:\Users\Admin\AppData\Roaming\JaffaCakes118_5a064addca31cc7ca448cbb6e4c78a4a.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\tPOqY.exe.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\tPOqY.exe.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 5 && del C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\TEMPLA~1\TPOQYE~1.EXE4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:592 -
C:\Windows\SysWOW64\timeout.exetimeout 55⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1424
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
18KB
MD52153e2d85da316a0fe302227e0f9af88
SHA148b334c27d604ce7d89c9c825d211d26427176cf
SHA256645b30a3ef5cf05ad0df575fbbdbc05387b5493ce1778935b60d98681fea7bc0
SHA512647b0b95622c2e9086f072ccf110371b38953619b4cb6697e259165ce12e0dd1854bc6351abb8f693d052d730f8790d72929a8c822a26ac369c372478c1e4fac
-
Filesize
2.7MB
MD55a064addca31cc7ca448cbb6e4c78a4a
SHA1c0d38bf7c40d50643f0e98b023edf9d46a845372
SHA2569dae201039484054b1ff046169b7b4b5647c391b6bdb5817bcb25684fe364c09
SHA51262d2aaa1a51c0008f572ba0ca1c2c646abc6279bec26c6f8a5fbd99526403cc30a49906e9480dbc00faf48e253ad41fa6ab52a5801d2af239a7aa7fda6b83e2a
-
Filesize
768KB
MD501e708ff68dc56cfc2585f652e573c37
SHA1be2ec4312e2bb07b9606257e0b87132943c94eb3
SHA256aa34cf13d9291f9afc6e154f2f643e84d59031cb56491e83e883a62254d7ef9d
SHA512efe791e2a320515d2345e50e6f8578a0a29127cef369b35d2e9b9cc42289cad2038ef53ed06f3e243a7841632c5a658d7472aff8b1717a36d48e3c69d49d1e2c