Analysis

  • max time kernel
    150s
  • max time network
    156s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    12-07-2021 23:48

General

  • Target

    88AB0FB7AAB828733D7FAD8DD72BA73C7188803ED85C1.exe

  • Size

    1.3MB

  • MD5

    9fb3ef5f9d35773451f983671b2240f0

  • SHA1

    0de17fc90bbae1b1a1db740939dd222b44f433ca

  • SHA256

    88ab0fb7aab828733d7fad8dd72ba73c7188803ed85c19d01a267ad7809cba44

  • SHA512

    f32e742494550b0d8dda6dac6ac28f13b004fb43e782c1358e51a77a8755c152b5713bd524efc487c831462ee93e10b87a68a99b7cff149c257763753eb9d023

Malware Config

Extracted

Family

cybergate

Version

v1.18.0 - Crack Version

Botnet

remote

C2

morcoy.duia.ro:2002

pinguela.dnsd.me:2003

matreto.system-ns.co:2004

palotes12.chickenkiller.com:2005

JOSE4.NO-IP.ORG:2006

Mutex

41S0823EXU0802

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs

  • ftp_interval

    30

  • injected_process

    javaw.exe

  • install_dir

    systemroot

  • install_file

    ms.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    6146

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Signatures

  • CyberGate, Rebhip

    CyberGate is a lightweight remote administration tool with a wide array of functionalities.

  • Adds policy Run key to start application 2 TTPs 4 IoCs
  • Modifies Installed Components in the registry 2 TTPs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 4 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\88AB0FB7AAB828733D7FAD8DD72BA73C7188803ED85C1.exe
    "C:\Users\Admin\AppData\Local\Temp\88AB0FB7AAB828733D7FAD8DD72BA73C7188803ED85C1.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3724
    • C:\Users\Admin\AppData\Local\Temp\88AB0FB7AAB828733D7FAD8DD72BA73C7188803ED85C1.exe
      "C:\Users\Admin\AppData\Local\Temp\88AB0FB7AAB828733D7FAD8DD72BA73C7188803ED85C1.exe"
      2⤵
      • Adds policy Run key to start application
      • Adds Run key to start application
      • Drops file in Program Files directory
      • Checks SCSI registry key(s)
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3872
      • C:\Windows\SysWOW64\cscript.exe
        "C:\Windows\system32\cscript.exe" "C:\Users\Admin\AppData\Roaming\Adminv1.18.0 - Trial version.vbs"
        3⤵
          PID:8

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3872-117-0x0000000000400000-0x000000000044D000-memory.dmp

      Filesize

      308KB

    • memory/3872-119-0x0000000000400000-0x000000000044D000-memory.dmp

      Filesize

      308KB

    • memory/3872-120-0x00000000005E0000-0x0000000000652000-memory.dmp

      Filesize

      456KB

    • memory/3872-121-0x00000000032D0000-0x0000000003312000-memory.dmp

      Filesize

      264KB

    • memory/3872-122-0x0000000003420000-0x0000000003462000-memory.dmp

      Filesize

      264KB