Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
12/03/2025, 17:11
Behavioral task
behavioral1
Sample
JaffaCakes118_6c3d7c23d6be4e33dfe625d859419ed3.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_6c3d7c23d6be4e33dfe625d859419ed3.exe
-
Size
281KB
-
MD5
6c3d7c23d6be4e33dfe625d859419ed3
-
SHA1
7f08bffec88780bba5808575d6d07848975fbe1b
-
SHA256
39260d5c75993246dd3188dba74b8710886b740861e1071d06306bc22a7d7a6f
-
SHA512
197dc8013c5d6b955d4050d9381bebb6b155032bc300dc3c30a7e7cc2de9f88af1e79d2ee265c5b1354854461a618d5984858064fff6696e1da63f79578cf448
-
SSDEEP
6144:AScrL04mp8D6WGc/YSlIipB/ScrL04mp8D6WGc/YSlIipBRdSZ:Rcry78QSVEcry78QSVnoZ
Malware Config
Extracted
cybergate
v1.18.0 - Crack Version
remote
78.108.51.79:81
78.108.51.79:90
2RH1M6N655T4I3
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
Macromedia
-
install_file
winlogon.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
ladyinred
-
regkey_hklm
Java(TM) Platform SE binary
Signatures
-
Cybergate family
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\¼\StubPath = "C:\\Windows\\system32\\Macromedia\\winlogon.exe Restart" JaffaCakes118_6c3d7c23d6be4e33dfe625d859419ed3.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\¼ JaffaCakes118_6c3d7c23d6be4e33dfe625d859419ed3.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Java(TM) Platform SE binary = "C:\\Windows\\system32\\Macromedia\\winlogon.exe" JaffaCakes118_6c3d7c23d6be4e33dfe625d859419ed3.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\Macromedia\winlogon.exe JaffaCakes118_6c3d7c23d6be4e33dfe625d859419ed3.exe File opened for modification C:\Windows\SysWOW64\Macromedia\winlogon.exe JaffaCakes118_6c3d7c23d6be4e33dfe625d859419ed3.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 1572 2220 WerFault.exe 87 232 2220 WerFault.exe 87 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_6c3d7c23d6be4e33dfe625d859419ed3.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2220 JaffaCakes118_6c3d7c23d6be4e33dfe625d859419ed3.exe 2220 JaffaCakes118_6c3d7c23d6be4e33dfe625d859419ed3.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2220 JaffaCakes118_6c3d7c23d6be4e33dfe625d859419ed3.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6c3d7c23d6be4e33dfe625d859419ed3.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6c3d7c23d6be4e33dfe625d859419ed3.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:2220 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2220 -s 4242⤵
- Program crash
PID:1572
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2220 -s 4682⤵
- Program crash
PID:232
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2220 -ip 22201⤵PID:5084
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 2220 -ip 22201⤵PID:3536