Analysis
-
max time kernel
150s -
max time network
198s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
17-05-2021 21:31
Static task
static1
Behavioral task
behavioral1
Sample
4df346a12ef5679ec0b960d037c8f52a.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
4df346a12ef5679ec0b960d037c8f52a.exe
Resource
win10v20210410
General
-
Target
4df346a12ef5679ec0b960d037c8f52a.exe
-
Size
554KB
-
MD5
4df346a12ef5679ec0b960d037c8f52a
-
SHA1
65efd3a10061179a689c71bf2f47bf72d632b210
-
SHA256
b543eff3487cfe5e18d6a4dcd26f21ea04ce8e689d01d72fdbf2f422e451d20b
-
SHA512
03a5621cc571457ef22e915f1bb0632f5649168fd230fb9fd0dca7a817778584019feeb1d4032c7c9d505fb2faccbf8fd30903043a0aeca09bf86344537db295
Malware Config
Extracted
cybergate
v3.4.2.2
remote
asade.no-ip.org:25565
G164JO6TGAX8GC
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
rdns
-
install_file
windows
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
cybergate
-
regkey_hkcu
erdsvexcv
-
regkey_hklm
werwdsf
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1504 Qlezrhhlbmw.exe -
resource yara_rule behavioral1/memory/1780-110-0x00000000104F0000-0x0000000010560000-memory.dmp upx -
Loads dropped DLL 2 IoCs
pid Process 628 4df346a12ef5679ec0b960d037c8f52a.exe 628 4df346a12ef5679ec0b960d037c8f52a.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run Qlezrhhlbmw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\werwdsf = "C:\\Program Files (x86)\\rdns\\windows" Qlezrhhlbmw.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Windows\CurrentVersion\Run Qlezrhhlbmw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Windows\CurrentVersion\Run\erdsvexcv = "C:\\Program Files (x86)\\rdns\\windows" Qlezrhhlbmw.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\rdns\windows Qlezrhhlbmw.exe File opened for modification C:\Program Files (x86)\rdns\windows Qlezrhhlbmw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1780 explorer.exe Token: SeDebugPrivilege 1780 explorer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1504 Qlezrhhlbmw.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 628 wrote to memory of 1504 628 4df346a12ef5679ec0b960d037c8f52a.exe 29 PID 628 wrote to memory of 1504 628 4df346a12ef5679ec0b960d037c8f52a.exe 29 PID 628 wrote to memory of 1504 628 4df346a12ef5679ec0b960d037c8f52a.exe 29 PID 628 wrote to memory of 1504 628 4df346a12ef5679ec0b960d037c8f52a.exe 29 PID 1504 wrote to memory of 1748 1504 Qlezrhhlbmw.exe 30 PID 1504 wrote to memory of 1748 1504 Qlezrhhlbmw.exe 30 PID 1504 wrote to memory of 1748 1504 Qlezrhhlbmw.exe 30 PID 1504 wrote to memory of 1748 1504 Qlezrhhlbmw.exe 30 PID 1504 wrote to memory of 1748 1504 Qlezrhhlbmw.exe 30 PID 1504 wrote to memory of 1748 1504 Qlezrhhlbmw.exe 30 PID 1504 wrote to memory of 1748 1504 Qlezrhhlbmw.exe 30 PID 1504 wrote to memory of 1748 1504 Qlezrhhlbmw.exe 30 PID 1504 wrote to memory of 1748 1504 Qlezrhhlbmw.exe 30 PID 1504 wrote to memory of 1748 1504 Qlezrhhlbmw.exe 30 PID 1504 wrote to memory of 1748 1504 Qlezrhhlbmw.exe 30 PID 1504 wrote to memory of 1748 1504 Qlezrhhlbmw.exe 30 PID 1504 wrote to memory of 1748 1504 Qlezrhhlbmw.exe 30 PID 1504 wrote to memory of 1748 1504 Qlezrhhlbmw.exe 30 PID 1504 wrote to memory of 1748 1504 Qlezrhhlbmw.exe 30 PID 1504 wrote to memory of 1748 1504 Qlezrhhlbmw.exe 30 PID 1504 wrote to memory of 1748 1504 Qlezrhhlbmw.exe 30 PID 1504 wrote to memory of 1748 1504 Qlezrhhlbmw.exe 30 PID 1504 wrote to memory of 1748 1504 Qlezrhhlbmw.exe 30 PID 1504 wrote to memory of 1748 1504 Qlezrhhlbmw.exe 30 PID 1504 wrote to memory of 1748 1504 Qlezrhhlbmw.exe 30 PID 1504 wrote to memory of 1748 1504 Qlezrhhlbmw.exe 30 PID 1504 wrote to memory of 1748 1504 Qlezrhhlbmw.exe 30 PID 1504 wrote to memory of 1748 1504 Qlezrhhlbmw.exe 30 PID 1504 wrote to memory of 1748 1504 Qlezrhhlbmw.exe 30 PID 1504 wrote to memory of 1748 1504 Qlezrhhlbmw.exe 30 PID 1504 wrote to memory of 1748 1504 Qlezrhhlbmw.exe 30 PID 1504 wrote to memory of 1748 1504 Qlezrhhlbmw.exe 30 PID 1504 wrote to memory of 1748 1504 Qlezrhhlbmw.exe 30 PID 1504 wrote to memory of 1748 1504 Qlezrhhlbmw.exe 30 PID 1504 wrote to memory of 1748 1504 Qlezrhhlbmw.exe 30 PID 1504 wrote to memory of 1748 1504 Qlezrhhlbmw.exe 30 PID 1504 wrote to memory of 1748 1504 Qlezrhhlbmw.exe 30 PID 1504 wrote to memory of 1748 1504 Qlezrhhlbmw.exe 30 PID 1504 wrote to memory of 1748 1504 Qlezrhhlbmw.exe 30 PID 1504 wrote to memory of 1748 1504 Qlezrhhlbmw.exe 30 PID 1504 wrote to memory of 1748 1504 Qlezrhhlbmw.exe 30 PID 1504 wrote to memory of 1748 1504 Qlezrhhlbmw.exe 30 PID 1504 wrote to memory of 1748 1504 Qlezrhhlbmw.exe 30 PID 1504 wrote to memory of 1748 1504 Qlezrhhlbmw.exe 30 PID 1504 wrote to memory of 1748 1504 Qlezrhhlbmw.exe 30 PID 1504 wrote to memory of 1748 1504 Qlezrhhlbmw.exe 30 PID 1504 wrote to memory of 1748 1504 Qlezrhhlbmw.exe 30 PID 1504 wrote to memory of 1748 1504 Qlezrhhlbmw.exe 30 PID 1504 wrote to memory of 1748 1504 Qlezrhhlbmw.exe 30 PID 1504 wrote to memory of 1748 1504 Qlezrhhlbmw.exe 30 PID 1504 wrote to memory of 1748 1504 Qlezrhhlbmw.exe 30 PID 1504 wrote to memory of 1748 1504 Qlezrhhlbmw.exe 30 PID 1504 wrote to memory of 1748 1504 Qlezrhhlbmw.exe 30 PID 1504 wrote to memory of 1748 1504 Qlezrhhlbmw.exe 30 PID 1504 wrote to memory of 1748 1504 Qlezrhhlbmw.exe 30 PID 1504 wrote to memory of 1748 1504 Qlezrhhlbmw.exe 30 PID 1504 wrote to memory of 1748 1504 Qlezrhhlbmw.exe 30 PID 1504 wrote to memory of 1748 1504 Qlezrhhlbmw.exe 30 PID 1504 wrote to memory of 1748 1504 Qlezrhhlbmw.exe 30 PID 1504 wrote to memory of 1748 1504 Qlezrhhlbmw.exe 30 PID 1504 wrote to memory of 1748 1504 Qlezrhhlbmw.exe 30 PID 1504 wrote to memory of 1748 1504 Qlezrhhlbmw.exe 30 PID 1504 wrote to memory of 1748 1504 Qlezrhhlbmw.exe 30 PID 1504 wrote to memory of 1748 1504 Qlezrhhlbmw.exe 30
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\4df346a12ef5679ec0b960d037c8f52a.exe"C:\Users\Admin\AppData\Local\Temp\4df346a12ef5679ec0b960d037c8f52a.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Users\Admin\AppData\Local\Temp\Qlezrhhlbmw.exe"C:\Users\Admin\AppData\Local\Temp\Qlezrhhlbmw.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:1748
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1780
-
-
-