Analysis

  • max time kernel
    147s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-06-2024 06:46

General

  • Target

    192b7e38dacf1d14c887b109a6d5d262_JaffaCakes118.exe

  • Size

    664KB

  • MD5

    192b7e38dacf1d14c887b109a6d5d262

  • SHA1

    1f1fa04d42264b763b6beca075cec24f603fa961

  • SHA256

    61fdd1038772d9bdb5d24ac458f25d1f503761bef935245569f780c6e784c08c

  • SHA512

    785ed00931808f273a7ab010219f533245620054925b6799bffae186ad21be1e24368a9177b9e5f371ba9b475cf58e219c35e151098f1299771cbe0930116338

  • SSDEEP

    12288:nkabMod1JJ9/AHC5cM2Hu4cz2KMBB+vhDzsfdkx3JoLC4RRqEwAskg16quner:nVj5LV5cM2Hu07dn0E6zr

Malware Config

Extracted

Family

cybergate

Version

v1.07.5

Botnet

DarkeiC

C2

wolfieboy.sytes.net:100

Mutex

8S880G00F8POY1

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    Microsoft

  • install_file

    Windows Update.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    admin123

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Signatures

  • CyberGate, Rebhip

    CyberGate is a lightweight remote administration tool with a wide array of functionalities.

  • Adds policy Run key to start application 2 TTPs 4 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Executes dropped EXE 1 IoCs
  • UPX packed file 11 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 4 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3432
      • C:\Users\Admin\AppData\Local\Temp\192b7e38dacf1d14c887b109a6d5d262_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\192b7e38dacf1d14c887b109a6d5d262_JaffaCakes118.exe"
        2⤵
        • Adds Run key to start application
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:740
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
          C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
          3⤵
          • Adds policy Run key to start application
          • Boot or Logon Autostart Execution: Active Setup
          • Adds Run key to start application
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:1992
          • C:\Windows\SysWOW64\explorer.exe
            explorer.exe
            4⤵
            • Boot or Logon Autostart Execution: Active Setup
            • Suspicious use of AdjustPrivilegeToken
            PID:3960
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            4⤵
              PID:1856
            • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
              "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"
              4⤵
              • Drops file in Windows directory
              • Modifies registry class
              • Suspicious behavior: GetForegroundWindowSpam
              • Suspicious use of AdjustPrivilegeToken
              PID:3924
              • C:\Windows\Microsoft\Windows Update.exe
                "C:\Windows\Microsoft\Windows Update.exe"
                5⤵
                • Executes dropped EXE
                PID:3612

      Network

      MITRE ATT&CK Matrix ATT&CK v13

      Execution

      Scripting

      1
      T1064

      Persistence

      Boot or Logon Autostart Execution

      3
      T1547

      Registry Run Keys / Startup Folder

      2
      T1547.001

      Active Setup

      1
      T1547.014

      Privilege Escalation

      Boot or Logon Autostart Execution

      3
      T1547

      Registry Run Keys / Startup Folder

      2
      T1547.001

      Active Setup

      1
      T1547.014

      Defense Evasion

      Modify Registry

      3
      T1112

      Scripting

      1
      T1064

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\Admin2.txt
        Filesize

        224KB

        MD5

        afeaa288a334c7fc5026a69430b96638

        SHA1

        9e04eb19ef4dbaef771fd9db8d17165395bca985

        SHA256

        3fa394587b3c211de933819ab1048924001df3060b3fc9b90b078a15066fac43

        SHA512

        f77203f64e8dfb4cf68d7cc1459c7403af0f7146749169798cef432e9736f6cece41f6305e9004b3be4eda3b3161a8cce202912fe46cea9320b2ee497cadf22d

      • C:\Users\Admin\AppData\Local\Temp\Admin7
        Filesize

        8B

        MD5

        d8544174400f315d144888462568023b

        SHA1

        9b1124be65fc355fadaeeb62d8bc493a3749ccc3

        SHA256

        d8284f7bfe6c524cda79f5240c53f7441e942ed286826268c188756a59862de8

        SHA512

        91247f077a71652cc0439445d7a87300e5792c22bd1ea7365d85317843730da8de0f67cfd28e7d8b670f00c522f6a69e68980559bd2353dcf71a32ad2332ff75

      • C:\Users\Admin\AppData\Local\Temp\Admin7
        Filesize

        8B

        MD5

        cdd5cf4b0ecbdd1d47c6dba104b59a8b

        SHA1

        f158d739958bb8817cf586e8dc6a251e9f21edac

        SHA256

        b44afcff4eaa9beec0031d552c5cd3a9067c92404bf0ad5d0210a76beee6e73e

        SHA512

        3c1b9657642d879fa793de4836609aa8b8fa52d6ac9c0e55adfc9d793eedb746e7c04a14d8dec2f6d5ac68d1a10974b64d44b7c8189d1f904c0875eec6163e9f

      • C:\Users\Admin\AppData\Local\Temp\Admin7
        Filesize

        8B

        MD5

        e486dbf60468eb0324ef28679cdbe285

        SHA1

        33a4352fdfeea31cede084eb53191c7ec43419c2

        SHA256

        accab860e784db537540888fea226d715badb703efa9e456b465638c2e8a15e9

        SHA512

        a887453b5e75f7a1f1525a207e90d77bc3bceb350d171c96b8c7f6458a1a513ab1d3c0fdbb2db9eaeb7539de2699831abcb02f3f936388e1644b0755d8ff4dc3

      • C:\Users\Admin\AppData\Local\Temp\Admin7
        Filesize

        8B

        MD5

        202dcb88b421af51c91f6841849b9474

        SHA1

        744a254127879e2e2821a2c2cb44b4a558668911

        SHA256

        c6826806e7a2a169d892ca1d17f124ffe528da78bdf7fc22e081fd0c11c7d436

        SHA512

        b196ada8739bdab7bdb9820cf33000a65365e3df471a8c39160b0bfe2aaec5f1671044f4c8c09301849b0f26aa776b7abc351f8b9b5b4cea454ef7e7b51bdd25

      • C:\Users\Admin\AppData\Local\Temp\Admin7
        Filesize

        8B

        MD5

        6d97a15acb82945e5746a2a1f0fdf986

        SHA1

        8d0220ba9ce01749a4b46b1110483c6a078a4c90

        SHA256

        13f8a9251a1c39f6e1233512487a263facef40ab0c4c57ed2e5d7bc23bea229e

        SHA512

        ffa3ac82214b6b721f14ace26125f0b8271b73b388488711ccdd862f98ee9abc8b278aeeb232d3f91906d46d5c5bc38ca3ada0977066c70e27b1763af4bbea18

      • C:\Users\Admin\AppData\Local\Temp\Admin7
        Filesize

        8B

        MD5

        aad951acccd0ffeb6e368ec9615be8b7

        SHA1

        6773a7cf45427b4a24bf325fb5f6538bc21cedab

        SHA256

        ea2bc28e746502e25b18593f935ab6653c00837f6d0120d4b3844e3987741056

        SHA512

        1f6785a601568f6452dcf76989cb424fc57abb697cc0e79d15a0cc4602c6b50e564552f8b05e7bf5c78607524324da10e3d2accd0fa5b7f4109d0612f24d8c89

      • C:\Users\Admin\AppData\Local\Temp\Admin7
        Filesize

        8B

        MD5

        771a1860bda0830b1b32ca557d033438

        SHA1

        518c1b74671eca5b0350fc7a41d8a62b33709374

        SHA256

        c5774693063461c3cb15edb23e924f30c389c5153c09b91dc1aa34f49340896c

        SHA512

        18716f61cedc8311d00a157f0d08a867dbe488c8cfc38eaf98cbfea6efb26f9e95dceaf3114b30e4d34f538e4787b46ae5302985d3423f95e4ba718bc667f303

      • C:\Users\Admin\AppData\Local\Temp\Admin7
        Filesize

        8B

        MD5

        8ac0ae6621243c45fd17909cd11d310e

        SHA1

        288fa9caed838951225d7964f24f24a4f41174a2

        SHA256

        ed435ff46134801843e9e01a64078db2fb26b7b47c8061e58f323e6167fceda3

        SHA512

        e432830eece55b7bbfb92f16c9e86481516723d5609df01f429e26fa844a871c1c9647837404c33de890c969991781bc127502a1e15943f03aad470a3ac7597b

      • C:\Users\Admin\AppData\Local\Temp\Admin7
        Filesize

        8B

        MD5

        8f035f51e943cb30462336f723d5f319

        SHA1

        419126c0d5aed137508d5932f4e3303c4031bebc

        SHA256

        b3e00895cb40a9a6dc366cf545738c80351a0be228e4f7552645a472e2cf4959

        SHA512

        175bcb6ed9af738257c44c0dd0d3e39448de6e7a647c2fe8611df26dd5091e55ca96a38c9a4cfe5cfd1e2bcd7d11085abd9d4d13ed6cd35f73773c873062211f

      • C:\Users\Admin\AppData\Local\Temp\Admin7
        Filesize

        8B

        MD5

        db5cf08132727f98d5a7dc8c1a9d19ac

        SHA1

        897623c4e6eb82b1de42a3cb1d47cabb0efb1400

        SHA256

        6a1c2a4befeab7eb057a4a73103c4c422ca22936fc22d4e1db9ab127a7653562

        SHA512

        420fe8a44b697b8d157fef3dcda3af0abd6a9a3ab08a4bdcf658ee52bb299f22ab129467ffe84894925a572ef4ad2ba5e7e3db60d314b8c7c937f572db2bdf89

      • C:\Users\Admin\AppData\Local\Temp\Admin7
        Filesize

        8B

        MD5

        ff83af7ac74a6e491f755125006391a4

        SHA1

        4fdad4441348beda0ff2803490ed3fc20e7ca2bf

        SHA256

        c287bbb63a80e2385edd2753089821217c83f004a4d3a859d40be93c0396eeb7

        SHA512

        e012c2ae1846d090b614a1b76743b0925ed93d48c2838ddaf17e70fcab86d0266e7fe4036a71f998f450f25136471e58886c2c929ccce6c885e43ebed39ecf63

      • C:\Users\Admin\AppData\Local\Temp\Admin7
        Filesize

        8B

        MD5

        b7b32bdf0af63cd3b137cce904420aaf

        SHA1

        ff430941ac27301549a4b4b1321581364dac6e74

        SHA256

        71de3b6276e47495f002321759bb75573556950fd1d1571e6d793a38cd0931b8

        SHA512

        4fbcc08d319e164d10dcb8ddf6c28d257ccbad1366592ebc8704794a1df23bc661ac59cf764a3242d14b714cc15d15a1715d8d925a3e69fb58d2eaacb9a422b4

      • C:\Users\Admin\AppData\Local\Temp\Admin7
        Filesize

        8B

        MD5

        7dc795388ef88feb08e079112e53a2ca

        SHA1

        06cb0919a6a96fe9f4e6f9b3807aa7d79a6c199f

        SHA256

        1bf0d74fa60177e09ed4071b74c296086ace88e9ca59cc054624d56a8e279fba

        SHA512

        f937fe33da89f8a34eb8f7a122023fdd087f0a8c4c4e113d4c8b7923a4776755cf5043ea0dfb3e157519fd351a332e5bdfb4df0d5da7dd02c70a161ea74d5bc5

      • C:\Users\Admin\AppData\Local\Temp\Admin7
        Filesize

        8B

        MD5

        4a627f809dbd931d144bd97c4cba7dd0

        SHA1

        3d85ee054688e3971c6b273ac041d7a0b4df2996

        SHA256

        30e55af82add2b3afc35e30801fb546bcb918af5cec98fbcf2bd9aef6a2647ba

        SHA512

        1a7eed0461cf856520bfd05f1e4fbea6948f8433f1e4a77648fd34057ba843e55f77dc0afcfec4f5331edb83bc6c2f1765eb1e6e596783e964932aeed2481f1e

      • C:\Users\Admin\AppData\Local\Temp\Admin7
        Filesize

        8B

        MD5

        b2c927cc42cff06f19400f50b9d79ec9

        SHA1

        f35a207c79b9a6d324113db7180b09cf552479a5

        SHA256

        a40e7878e22e122dafe9c75bf10972ba0032866889dae771233c63b1087ee101

        SHA512

        e3d3432e6ac7c811aa56f46faad2861e1924c6b476f3a27707d6c0c31a5ac8ede26f711b54f97858abd16556abeaaa5ddcd6b41ea9bf4a535fce683f12222a62

      • C:\Users\Admin\AppData\Local\Temp\Admin7
        Filesize

        8B

        MD5

        c96d3ed3f411d483885034d88f6a4a05

        SHA1

        de7b031ee81423ae8ec102d9031b244e6e14e19a

        SHA256

        0479bc8dc2a0098b04d44ba9094eabfb144a4aa8f1fb8ac08f6e2cd646587991

        SHA512

        3441f0df599c00fa85dff17aa952c7cdeef402aaaeaba1923fd741ad91d761ccaff13007c3127b9388f0925f5af4330a0c28dc300d58eac732214506bfd58a11

      • C:\Users\Admin\AppData\Local\Temp\Admin7
        Filesize

        8B

        MD5

        d3199362e7f00b48589e199b838d37c1

        SHA1

        7f50a2249679eb78ac75b01bb821e5e9bf61b8e0

        SHA256

        7e9f16ff9a99703444cae45c029f2a371f4d2dd51a319eb788fcfe141f1abed4

        SHA512

        dae104fc3cbad516111d10ded65db255be6e80d731a3cb699f7d494efe707d6d827c33b0852602d5785900a49701efafb361730771feb1d2b27f31313e8452ed

      • C:\Users\Admin\AppData\Local\Temp\Admin7
        Filesize

        8B

        MD5

        99ff54a2a7e00898386769518574d390

        SHA1

        ea2eed7f42fd416b12fe28cd90919897c0d070e8

        SHA256

        a269ec9e157e3b1570e1e3b5b6a9e1613d486af3fac2a3306d6e38b5342474f9

        SHA512

        5c84e384657092b83b876fe995ef5659adac918caa704844217203923f2f96910947b50b5b7239048f153a3d26019d5ceba8b466ec5efe7c84b45b899a7c35c2

      • C:\Users\Admin\AppData\Local\Temp\Admin7
        Filesize

        8B

        MD5

        40c72a149f2b2938915cafe7c3e45770

        SHA1

        165edd0dc675c5c8bdbc30af9a21f791464f3d0d

        SHA256

        019689edae1191c403c8027ab95165a91694ee185764d40a91197fbb8f447358

        SHA512

        0a96ab8ae7f1f72c8682ec45a933b00b2b45de118d8f033b9c0842ff7d0db306ce1dacc3d2ec2777d02a7a9dfd78f936c67680629d061293dbbfe89c6eaa988f

      • C:\Users\Admin\AppData\Roaming\Adminlog.dat
        Filesize

        15B

        MD5

        bf3dba41023802cf6d3f8c5fd683a0c7

        SHA1

        466530987a347b68ef28faad238d7b50db8656a5

        SHA256

        4a8e75390856bf822f492f7f605ca0c21f1905172f6d3ef610162533c140507d

        SHA512

        fec60f447dcc90753d693014135e24814f6e8294f6c0f436bc59d892b24e91552108dba6cf5a6fa7c0421f6d290d1bafee9f9f2d95ea8c4c05c2ad0f7c1bb314

      • C:\Windows\Microsoft\Windows Update.exe
        Filesize

        1.1MB

        MD5

        d881de17aa8f2e2c08cbb7b265f928f9

        SHA1

        08936aebc87decf0af6e8eada191062b5e65ac2a

        SHA256

        b3a37093609f9a20ad60b85a9fa9de2ba674cba9b5bd687729440c70ba619ca0

        SHA512

        5f23bfb1b8740247b36ed0ab741738c7d4c949736129e767213e321607d1ccd3e3a8428e4ba44bd28a275b5e3f6206285b1a522514b7ef7ea5e698d90a713d34

      • memory/740-2-0x0000000075110000-0x00000000756C1000-memory.dmp
        Filesize

        5.7MB

      • memory/740-12-0x0000000075110000-0x00000000756C1000-memory.dmp
        Filesize

        5.7MB

      • memory/740-0-0x0000000075112000-0x0000000075113000-memory.dmp
        Filesize

        4KB

      • memory/740-1-0x0000000075110000-0x00000000756C1000-memory.dmp
        Filesize

        5.7MB

      • memory/1992-5-0x0000000000400000-0x0000000000456000-memory.dmp
        Filesize

        344KB

      • memory/1992-3-0x0000000000400000-0x0000000000456000-memory.dmp
        Filesize

        344KB

      • memory/1992-6-0x0000000000400000-0x0000000000456000-memory.dmp
        Filesize

        344KB

      • memory/1992-8-0x0000000000400000-0x0000000000456000-memory.dmp
        Filesize

        344KB

      • memory/1992-16-0x0000000010410000-0x0000000010475000-memory.dmp
        Filesize

        404KB

      • memory/1992-152-0x0000000000400000-0x0000000000456000-memory.dmp
        Filesize

        344KB

      • memory/1992-19-0x0000000010480000-0x00000000104E5000-memory.dmp
        Filesize

        404KB

      • memory/3924-1439-0x0000000010560000-0x00000000105C5000-memory.dmp
        Filesize

        404KB

      • memory/3924-153-0x0000000010560000-0x00000000105C5000-memory.dmp
        Filesize

        404KB

      • memory/3960-760-0x0000000010480000-0x00000000104E5000-memory.dmp
        Filesize

        404KB

      • memory/3960-81-0x0000000010480000-0x00000000104E5000-memory.dmp
        Filesize

        404KB

      • memory/3960-21-0x0000000000720000-0x0000000000721000-memory.dmp
        Filesize

        4KB

      • memory/3960-20-0x0000000000660000-0x0000000000661000-memory.dmp
        Filesize

        4KB