Analysis
-
max time kernel
146s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16/03/2025, 21:41
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_7bcec0a179c260480c9cebd476583c20.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_7bcec0a179c260480c9cebd476583c20.exe
Resource
win10v2004-20250314-en
General
-
Target
JaffaCakes118_7bcec0a179c260480c9cebd476583c20.exe
-
Size
502KB
-
MD5
7bcec0a179c260480c9cebd476583c20
-
SHA1
9fea8914d8a4d30d722874f377722da94150ca28
-
SHA256
29fedf9867ed632b91360f0bdd8e04b5c52107960a6b0fef566a225e1204e72d
-
SHA512
3c5e87ea5638fa3fc61d932e640a6d8b5a357c1bf8d5076134b42b13b5397c577642fa024f61e9b4859401248042bb7ab2c866ec40520fb2c4a150c0b2ff16ab
-
SSDEEP
12288:vofp0v4lY68xJU9sQaHbwFWhj58dQ8+Bs0d:Y0vIds97Tvm+a0d
Malware Config
Extracted
cybergate
2.6
ÖÍíÉ
asas.hopto.org:666
mena.ath.cx:666
***MUTEX***
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
svchost.exe
-
install_file
windows.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
texto da mensagem
-
message_box_title
t?tulo da mensagem
-
password
abcd1234
Signatures
-
Cybergate family
-
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 123.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Users\\Admin\\AppData\\Local\\Temp\\123.exe" 123.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 123.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Users\\Admin\\AppData\\Local\\Temp\\123.exe" 123.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{GF4X7745-WQW6-GR05-83C3-J2A4J26U82BY} 123.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{GF4X7745-WQW6-GR05-83C3-J2A4J26U82BY}\StubPath = "C:\\Users\\Admin\\AppData\\Local\\Temp\\123.exe Restart" 123.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{GF4X7745-WQW6-GR05-83C3-J2A4J26U82BY} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{GF4X7745-WQW6-GR05-83C3-J2A4J26U82BY}\StubPath = "C:\\Users\\Admin\\AppData\\Local\\Temp\\123.exe" explorer.exe -
Executes dropped EXE 1 IoCs
pid Process 1360 123.exe -
Loads dropped DLL 1 IoCs
pid Process 1276 JaffaCakes118_7bcec0a179c260480c9cebd476583c20.exe -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini explorer.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1276 set thread context of 1360 1276 JaffaCakes118_7bcec0a179c260480c9cebd476583c20.exe 30 -
resource yara_rule behavioral1/memory/1360-284-0x0000000000400000-0x000000000045E000-memory.dmp upx behavioral1/memory/1360-887-0x0000000000400000-0x000000000045E000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_7bcec0a179c260480c9cebd476583c20.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 123.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1360 123.exe 1360 123.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 1276 JaffaCakes118_7bcec0a179c260480c9cebd476583c20.exe Token: SeIncBasePriorityPrivilege 1276 JaffaCakes118_7bcec0a179c260480c9cebd476583c20.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1360 123.exe 1976 explorer.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 1976 explorer.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1276 JaffaCakes118_7bcec0a179c260480c9cebd476583c20.exe 1276 JaffaCakes118_7bcec0a179c260480c9cebd476583c20.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1276 wrote to memory of 1360 1276 JaffaCakes118_7bcec0a179c260480c9cebd476583c20.exe 30 PID 1276 wrote to memory of 1360 1276 JaffaCakes118_7bcec0a179c260480c9cebd476583c20.exe 30 PID 1276 wrote to memory of 1360 1276 JaffaCakes118_7bcec0a179c260480c9cebd476583c20.exe 30 PID 1276 wrote to memory of 1360 1276 JaffaCakes118_7bcec0a179c260480c9cebd476583c20.exe 30 PID 1276 wrote to memory of 1360 1276 JaffaCakes118_7bcec0a179c260480c9cebd476583c20.exe 30 PID 1276 wrote to memory of 1360 1276 JaffaCakes118_7bcec0a179c260480c9cebd476583c20.exe 30 PID 1276 wrote to memory of 1360 1276 JaffaCakes118_7bcec0a179c260480c9cebd476583c20.exe 30 PID 1276 wrote to memory of 1360 1276 JaffaCakes118_7bcec0a179c260480c9cebd476583c20.exe 30 PID 1360 wrote to memory of 1196 1360 123.exe 21 PID 1360 wrote to memory of 1196 1360 123.exe 21 PID 1360 wrote to memory of 1196 1360 123.exe 21 PID 1360 wrote to memory of 1196 1360 123.exe 21 PID 1360 wrote to memory of 1196 1360 123.exe 21 PID 1360 wrote to memory of 1196 1360 123.exe 21 PID 1360 wrote to memory of 1196 1360 123.exe 21 PID 1360 wrote to memory of 1196 1360 123.exe 21 PID 1360 wrote to memory of 1196 1360 123.exe 21 PID 1360 wrote to memory of 1196 1360 123.exe 21 PID 1360 wrote to memory of 1196 1360 123.exe 21 PID 1360 wrote to memory of 1196 1360 123.exe 21 PID 1360 wrote to memory of 1196 1360 123.exe 21 PID 1360 wrote to memory of 1196 1360 123.exe 21 PID 1360 wrote to memory of 1196 1360 123.exe 21 PID 1360 wrote to memory of 1196 1360 123.exe 21 PID 1360 wrote to memory of 1196 1360 123.exe 21 PID 1360 wrote to memory of 1196 1360 123.exe 21 PID 1360 wrote to memory of 1196 1360 123.exe 21 PID 1360 wrote to memory of 1196 1360 123.exe 21 PID 1360 wrote to memory of 1196 1360 123.exe 21 PID 1360 wrote to memory of 1196 1360 123.exe 21 PID 1360 wrote to memory of 1196 1360 123.exe 21 PID 1360 wrote to memory of 1196 1360 123.exe 21 PID 1360 wrote to memory of 1196 1360 123.exe 21 PID 1360 wrote to memory of 1196 1360 123.exe 21 PID 1360 wrote to memory of 1196 1360 123.exe 21 PID 1360 wrote to memory of 1196 1360 123.exe 21 PID 1360 wrote to memory of 1196 1360 123.exe 21 PID 1360 wrote to memory of 1196 1360 123.exe 21 PID 1360 wrote to memory of 1196 1360 123.exe 21 PID 1360 wrote to memory of 1196 1360 123.exe 21 PID 1360 wrote to memory of 1196 1360 123.exe 21 PID 1360 wrote to memory of 1196 1360 123.exe 21 PID 1360 wrote to memory of 1196 1360 123.exe 21 PID 1360 wrote to memory of 1196 1360 123.exe 21 PID 1360 wrote to memory of 1196 1360 123.exe 21 PID 1360 wrote to memory of 1196 1360 123.exe 21 PID 1360 wrote to memory of 1196 1360 123.exe 21 PID 1360 wrote to memory of 1196 1360 123.exe 21 PID 1360 wrote to memory of 1196 1360 123.exe 21 PID 1360 wrote to memory of 1196 1360 123.exe 21 PID 1360 wrote to memory of 1196 1360 123.exe 21 PID 1360 wrote to memory of 1196 1360 123.exe 21 PID 1360 wrote to memory of 1196 1360 123.exe 21 PID 1360 wrote to memory of 1196 1360 123.exe 21 PID 1360 wrote to memory of 1196 1360 123.exe 21 PID 1360 wrote to memory of 1196 1360 123.exe 21 PID 1360 wrote to memory of 1196 1360 123.exe 21 PID 1360 wrote to memory of 1196 1360 123.exe 21 PID 1360 wrote to memory of 1196 1360 123.exe 21 PID 1360 wrote to memory of 1196 1360 123.exe 21 PID 1360 wrote to memory of 1196 1360 123.exe 21 PID 1360 wrote to memory of 1196 1360 123.exe 21 PID 1360 wrote to memory of 1196 1360 123.exe 21 PID 1360 wrote to memory of 1196 1360 123.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1196
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7bcec0a179c260480c9cebd476583c20.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7bcec0a179c260480c9cebd476583c20.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Users\Admin\AppData\Local\Xenocode\ApplianceCaches\123.exe_v0024BA3A\TheApp\STUBEXE\@APPDATALOCAL@\Temp\123.exe
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops desktop.ini file(s)
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1976
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
240KB
MD51dea89ed93efdfc6b37b5833b092b5ab
SHA1d049afb4bec5e8b7343985a1e31cbe1e8e1603ad
SHA256006e122d1b2bf3a8b8e9c16d1667d2ca374508a87965568489c7bdb6f01a143b
SHA5122c936bfa99dd4810a496dc36218a2c2eae3698666b9185704bfa0dc3e048eacc2f6a860ed178dc7621beb4ddf40b38252a3d0a64521f1e888eabaf99f91bacc3
-
\Users\Admin\AppData\Local\Xenocode\ApplianceCaches\123.exe_v0024BA3A\TheApp\STUBEXE\@APPDATALOCAL@\Temp\123.exe
Filesize16KB
MD59cee2f28a386e1fef40d4f504720869b
SHA1cb8e318e8c0cd4777b4438d537f80a3806c67393
SHA2561707ec75792abe1eade9f41b866b5e2ae9b1d1d17d21be4e4ef7c64ce2a312e3
SHA512d46f704228d0591330622a5f1e8df973808297949e5ffd4ee3491b102bc9aa921a102fee35c0b1b338e2717f5eae0349b7fa4bf85d7ead316192b05b8a357101