Analysis
-
max time kernel
144s -
max time network
147s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
17-05-2021 21:31
Static task
static1
Behavioral task
behavioral1
Sample
4df346a12ef5679ec0b960d037c8f52a.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
4df346a12ef5679ec0b960d037c8f52a.exe
Resource
win10v20210410
General
-
Target
4df346a12ef5679ec0b960d037c8f52a.exe
-
Size
554KB
-
MD5
4df346a12ef5679ec0b960d037c8f52a
-
SHA1
65efd3a10061179a689c71bf2f47bf72d632b210
-
SHA256
b543eff3487cfe5e18d6a4dcd26f21ea04ce8e689d01d72fdbf2f422e451d20b
-
SHA512
03a5621cc571457ef22e915f1bb0632f5649168fd230fb9fd0dca7a817778584019feeb1d4032c7c9d505fb2faccbf8fd30903043a0aeca09bf86344537db295
Malware Config
Extracted
cybergate
v3.4.2.2
remote
asade.no-ip.org:25565
G164JO6TGAX8GC
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
rdns
-
install_file
windows
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
cybergate
-
regkey_hkcu
erdsvexcv
-
regkey_hklm
werwdsf
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2900 Qlezrhhlbmw.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run Qlezrhhlbmw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\werwdsf = "C:\\Program Files (x86)\\rdns\\windows" Qlezrhhlbmw.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Windows\CurrentVersion\Run Qlezrhhlbmw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Windows\CurrentVersion\Run\erdsvexcv = "C:\\Program Files (x86)\\rdns\\windows" Qlezrhhlbmw.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\rdns\windows Qlezrhhlbmw.exe File opened for modification C:\Program Files (x86)\rdns\windows Qlezrhhlbmw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 3088 192 WerFault.exe 77 -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 3088 WerFault.exe 3088 WerFault.exe 3088 WerFault.exe 3088 WerFault.exe 3088 WerFault.exe 3088 WerFault.exe 3088 WerFault.exe 3088 WerFault.exe 3088 WerFault.exe 3088 WerFault.exe 3088 WerFault.exe 3088 WerFault.exe 3088 WerFault.exe 3088 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 3088 WerFault.exe Token: SeBackupPrivilege 3088 WerFault.exe Token: SeDebugPrivilege 3088 WerFault.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3680 wrote to memory of 2900 3680 4df346a12ef5679ec0b960d037c8f52a.exe 76 PID 3680 wrote to memory of 2900 3680 4df346a12ef5679ec0b960d037c8f52a.exe 76 PID 3680 wrote to memory of 2900 3680 4df346a12ef5679ec0b960d037c8f52a.exe 76 PID 2900 wrote to memory of 192 2900 Qlezrhhlbmw.exe 77 PID 2900 wrote to memory of 192 2900 Qlezrhhlbmw.exe 77 PID 2900 wrote to memory of 192 2900 Qlezrhhlbmw.exe 77 PID 2900 wrote to memory of 192 2900 Qlezrhhlbmw.exe 77 PID 2900 wrote to memory of 192 2900 Qlezrhhlbmw.exe 77 PID 2900 wrote to memory of 192 2900 Qlezrhhlbmw.exe 77 PID 2900 wrote to memory of 192 2900 Qlezrhhlbmw.exe 77 PID 2900 wrote to memory of 192 2900 Qlezrhhlbmw.exe 77 PID 2900 wrote to memory of 192 2900 Qlezrhhlbmw.exe 77 PID 2900 wrote to memory of 192 2900 Qlezrhhlbmw.exe 77 PID 2900 wrote to memory of 192 2900 Qlezrhhlbmw.exe 77 PID 2900 wrote to memory of 192 2900 Qlezrhhlbmw.exe 77 PID 2900 wrote to memory of 192 2900 Qlezrhhlbmw.exe 77 PID 2900 wrote to memory of 192 2900 Qlezrhhlbmw.exe 77 PID 2900 wrote to memory of 192 2900 Qlezrhhlbmw.exe 77 PID 2900 wrote to memory of 192 2900 Qlezrhhlbmw.exe 77 PID 2900 wrote to memory of 192 2900 Qlezrhhlbmw.exe 77 PID 2900 wrote to memory of 192 2900 Qlezrhhlbmw.exe 77 PID 2900 wrote to memory of 192 2900 Qlezrhhlbmw.exe 77 PID 2900 wrote to memory of 192 2900 Qlezrhhlbmw.exe 77 PID 2900 wrote to memory of 192 2900 Qlezrhhlbmw.exe 77 PID 2900 wrote to memory of 192 2900 Qlezrhhlbmw.exe 77 PID 2900 wrote to memory of 192 2900 Qlezrhhlbmw.exe 77 PID 2900 wrote to memory of 192 2900 Qlezrhhlbmw.exe 77 PID 2900 wrote to memory of 192 2900 Qlezrhhlbmw.exe 77 PID 2900 wrote to memory of 192 2900 Qlezrhhlbmw.exe 77 PID 2900 wrote to memory of 192 2900 Qlezrhhlbmw.exe 77 PID 2900 wrote to memory of 192 2900 Qlezrhhlbmw.exe 77 PID 2900 wrote to memory of 192 2900 Qlezrhhlbmw.exe 77 PID 2900 wrote to memory of 192 2900 Qlezrhhlbmw.exe 77 PID 2900 wrote to memory of 192 2900 Qlezrhhlbmw.exe 77 PID 2900 wrote to memory of 192 2900 Qlezrhhlbmw.exe 77 PID 2900 wrote to memory of 192 2900 Qlezrhhlbmw.exe 77 PID 2900 wrote to memory of 192 2900 Qlezrhhlbmw.exe 77 PID 2900 wrote to memory of 192 2900 Qlezrhhlbmw.exe 77 PID 2900 wrote to memory of 192 2900 Qlezrhhlbmw.exe 77 PID 2900 wrote to memory of 192 2900 Qlezrhhlbmw.exe 77 PID 2900 wrote to memory of 192 2900 Qlezrhhlbmw.exe 77 PID 2900 wrote to memory of 192 2900 Qlezrhhlbmw.exe 77 PID 2900 wrote to memory of 192 2900 Qlezrhhlbmw.exe 77 PID 2900 wrote to memory of 192 2900 Qlezrhhlbmw.exe 77 PID 2900 wrote to memory of 192 2900 Qlezrhhlbmw.exe 77 PID 2900 wrote to memory of 192 2900 Qlezrhhlbmw.exe 77 PID 2900 wrote to memory of 192 2900 Qlezrhhlbmw.exe 77 PID 2900 wrote to memory of 192 2900 Qlezrhhlbmw.exe 77 PID 2900 wrote to memory of 192 2900 Qlezrhhlbmw.exe 77 PID 2900 wrote to memory of 192 2900 Qlezrhhlbmw.exe 77 PID 2900 wrote to memory of 192 2900 Qlezrhhlbmw.exe 77 PID 2900 wrote to memory of 192 2900 Qlezrhhlbmw.exe 77 PID 2900 wrote to memory of 192 2900 Qlezrhhlbmw.exe 77 PID 2900 wrote to memory of 192 2900 Qlezrhhlbmw.exe 77 PID 2900 wrote to memory of 192 2900 Qlezrhhlbmw.exe 77 PID 2900 wrote to memory of 192 2900 Qlezrhhlbmw.exe 77 PID 2900 wrote to memory of 192 2900 Qlezrhhlbmw.exe 77 PID 2900 wrote to memory of 192 2900 Qlezrhhlbmw.exe 77 PID 2900 wrote to memory of 192 2900 Qlezrhhlbmw.exe 77 PID 2900 wrote to memory of 192 2900 Qlezrhhlbmw.exe 77 PID 2900 wrote to memory of 192 2900 Qlezrhhlbmw.exe 77 PID 2900 wrote to memory of 192 2900 Qlezrhhlbmw.exe 77 PID 2900 wrote to memory of 192 2900 Qlezrhhlbmw.exe 77 PID 2900 wrote to memory of 192 2900 Qlezrhhlbmw.exe 77
Processes
-
C:\Users\Admin\AppData\Local\Temp\4df346a12ef5679ec0b960d037c8f52a.exe"C:\Users\Admin\AppData\Local\Temp\4df346a12ef5679ec0b960d037c8f52a.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\Users\Admin\AppData\Local\Temp\Qlezrhhlbmw.exe"C:\Users\Admin\AppData\Local\Temp\Qlezrhhlbmw.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\SysWOW64\LaunchWinApp.exe"C:\Windows\system32\LaunchWinApp.exe"3⤵PID:192
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 192 -s 7124⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3088
-
-
-