Analysis
-
max time kernel
150s -
max time network
195s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
12-07-2021 23:48
Static task
static1
Behavioral task
behavioral1
Sample
88AB0FB7AAB828733D7FAD8DD72BA73C7188803ED85C1.exe
Resource
win7v20210408
General
-
Target
88AB0FB7AAB828733D7FAD8DD72BA73C7188803ED85C1.exe
-
Size
1.3MB
-
MD5
9fb3ef5f9d35773451f983671b2240f0
-
SHA1
0de17fc90bbae1b1a1db740939dd222b44f433ca
-
SHA256
88ab0fb7aab828733d7fad8dd72ba73c7188803ed85c19d01a267ad7809cba44
-
SHA512
f32e742494550b0d8dda6dac6ac28f13b004fb43e782c1358e51a77a8755c152b5713bd524efc487c831462ee93e10b87a68a99b7cff149c257763753eb9d023
Malware Config
Extracted
cybergate
v1.18.0 - Crack Version
remote
morcoy.duia.ro:2002
pinguela.dnsd.me:2003
matreto.system-ns.co:2004
palotes12.chickenkiller.com:2005
JOSE4.NO-IP.ORG:2006
41S0823EXU0802
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs
-
ftp_interval
30
-
injected_process
javaw.exe
-
install_dir
systemroot
-
install_file
ms.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
6146
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Signatures
-
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 88AB0FB7AAB828733D7FAD8DD72BA73C7188803ED85C1.exe Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Program Files (x86)\\systemroot\\ms.exe" 88AB0FB7AAB828733D7FAD8DD72BA73C7188803ED85C1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 88AB0FB7AAB828733D7FAD8DD72BA73C7188803ED85C1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Program Files (x86)\\systemroot\\ms.exe" 88AB0FB7AAB828733D7FAD8DD72BA73C7188803ED85C1.exe -
Modifies Installed Components in the registry 2 TTPs
-
resource yara_rule behavioral1/memory/1884-67-0x0000000001C80000-0x0000000001CF2000-memory.dmp upx behavioral1/memory/1884-68-0x0000000003220000-0x0000000003262000-memory.dmp upx behavioral1/memory/1884-69-0x00000000033E0000-0x0000000003422000-memory.dmp upx -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Program Files (x86)\\systemroot\\ms.exe" 88AB0FB7AAB828733D7FAD8DD72BA73C7188803ED85C1.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run 88AB0FB7AAB828733D7FAD8DD72BA73C7188803ED85C1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Program Files (x86)\\systemroot\\ms.exe" 88AB0FB7AAB828733D7FAD8DD72BA73C7188803ED85C1.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Windows\CurrentVersion\Run 88AB0FB7AAB828733D7FAD8DD72BA73C7188803ED85C1.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1016 set thread context of 1884 1016 88AB0FB7AAB828733D7FAD8DD72BA73C7188803ED85C1.exe 26 -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\systemroot\ms.exe 88AB0FB7AAB828733D7FAD8DD72BA73C7188803ED85C1.exe File opened for modification C:\Program Files (x86)\systemroot\ms.exe 88AB0FB7AAB828733D7FAD8DD72BA73C7188803ED85C1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 88AB0FB7AAB828733D7FAD8DD72BA73C7188803ED85C1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 88AB0FB7AAB828733D7FAD8DD72BA73C7188803ED85C1.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1884 88AB0FB7AAB828733D7FAD8DD72BA73C7188803ED85C1.exe 1884 88AB0FB7AAB828733D7FAD8DD72BA73C7188803ED85C1.exe 1884 88AB0FB7AAB828733D7FAD8DD72BA73C7188803ED85C1.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1884 88AB0FB7AAB828733D7FAD8DD72BA73C7188803ED85C1.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeBackupPrivilege 1884 88AB0FB7AAB828733D7FAD8DD72BA73C7188803ED85C1.exe Token: SeRestorePrivilege 1884 88AB0FB7AAB828733D7FAD8DD72BA73C7188803ED85C1.exe Token: SeDebugPrivilege 1884 88AB0FB7AAB828733D7FAD8DD72BA73C7188803ED85C1.exe Token: SeDebugPrivilege 1884 88AB0FB7AAB828733D7FAD8DD72BA73C7188803ED85C1.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1016 88AB0FB7AAB828733D7FAD8DD72BA73C7188803ED85C1.exe 1016 88AB0FB7AAB828733D7FAD8DD72BA73C7188803ED85C1.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1016 wrote to memory of 1884 1016 88AB0FB7AAB828733D7FAD8DD72BA73C7188803ED85C1.exe 26 PID 1016 wrote to memory of 1884 1016 88AB0FB7AAB828733D7FAD8DD72BA73C7188803ED85C1.exe 26 PID 1016 wrote to memory of 1884 1016 88AB0FB7AAB828733D7FAD8DD72BA73C7188803ED85C1.exe 26 PID 1016 wrote to memory of 1884 1016 88AB0FB7AAB828733D7FAD8DD72BA73C7188803ED85C1.exe 26 PID 1016 wrote to memory of 1884 1016 88AB0FB7AAB828733D7FAD8DD72BA73C7188803ED85C1.exe 26 PID 1016 wrote to memory of 1884 1016 88AB0FB7AAB828733D7FAD8DD72BA73C7188803ED85C1.exe 26 PID 1016 wrote to memory of 1884 1016 88AB0FB7AAB828733D7FAD8DD72BA73C7188803ED85C1.exe 26 PID 1016 wrote to memory of 1884 1016 88AB0FB7AAB828733D7FAD8DD72BA73C7188803ED85C1.exe 26 PID 1016 wrote to memory of 1884 1016 88AB0FB7AAB828733D7FAD8DD72BA73C7188803ED85C1.exe 26 PID 1016 wrote to memory of 1884 1016 88AB0FB7AAB828733D7FAD8DD72BA73C7188803ED85C1.exe 26 PID 1016 wrote to memory of 1884 1016 88AB0FB7AAB828733D7FAD8DD72BA73C7188803ED85C1.exe 26 PID 1016 wrote to memory of 1884 1016 88AB0FB7AAB828733D7FAD8DD72BA73C7188803ED85C1.exe 26 PID 1884 wrote to memory of 1796 1884 88AB0FB7AAB828733D7FAD8DD72BA73C7188803ED85C1.exe 30 PID 1884 wrote to memory of 1796 1884 88AB0FB7AAB828733D7FAD8DD72BA73C7188803ED85C1.exe 30 PID 1884 wrote to memory of 1796 1884 88AB0FB7AAB828733D7FAD8DD72BA73C7188803ED85C1.exe 30 PID 1884 wrote to memory of 1796 1884 88AB0FB7AAB828733D7FAD8DD72BA73C7188803ED85C1.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\88AB0FB7AAB828733D7FAD8DD72BA73C7188803ED85C1.exe"C:\Users\Admin\AppData\Local\Temp\88AB0FB7AAB828733D7FAD8DD72BA73C7188803ED85C1.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\Users\Admin\AppData\Local\Temp\88AB0FB7AAB828733D7FAD8DD72BA73C7188803ED85C1.exe"C:\Users\Admin\AppData\Local\Temp\88AB0FB7AAB828733D7FAD8DD72BA73C7188803ED85C1.exe"2⤵
- Adds policy Run key to start application
- Adds Run key to start application
- Drops file in Program Files directory
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Windows\SysWOW64\cscript.exe"C:\Windows\system32\cscript.exe" "C:\Users\Admin\AppData\Roaming\Adminv1.18.0 - Trial version.vbs"3⤵PID:1796
-
-