Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
12-07-2021 23:48
Static task
static1
Behavioral task
behavioral1
Sample
88AB0FB7AAB828733D7FAD8DD72BA73C7188803ED85C1.exe
Resource
win7v20210408
General
-
Target
88AB0FB7AAB828733D7FAD8DD72BA73C7188803ED85C1.exe
-
Size
1.3MB
-
MD5
9fb3ef5f9d35773451f983671b2240f0
-
SHA1
0de17fc90bbae1b1a1db740939dd222b44f433ca
-
SHA256
88ab0fb7aab828733d7fad8dd72ba73c7188803ed85c19d01a267ad7809cba44
-
SHA512
f32e742494550b0d8dda6dac6ac28f13b004fb43e782c1358e51a77a8755c152b5713bd524efc487c831462ee93e10b87a68a99b7cff149c257763753eb9d023
Malware Config
Extracted
cybergate
v1.18.0 - Crack Version
remote
morcoy.duia.ro:2002
pinguela.dnsd.me:2003
matreto.system-ns.co:2004
palotes12.chickenkiller.com:2005
JOSE4.NO-IP.ORG:2006
41S0823EXU0802
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs
-
ftp_interval
30
-
injected_process
javaw.exe
-
install_dir
systemroot
-
install_file
ms.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
6146
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Signatures
-
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 88AB0FB7AAB828733D7FAD8DD72BA73C7188803ED85C1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Program Files (x86)\\systemroot\\ms.exe" 88AB0FB7AAB828733D7FAD8DD72BA73C7188803ED85C1.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 88AB0FB7AAB828733D7FAD8DD72BA73C7188803ED85C1.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Program Files (x86)\\systemroot\\ms.exe" 88AB0FB7AAB828733D7FAD8DD72BA73C7188803ED85C1.exe -
Modifies Installed Components in the registry 2 TTPs
-
resource yara_rule behavioral2/memory/3872-120-0x00000000005E0000-0x0000000000652000-memory.dmp upx behavioral2/memory/3872-121-0x00000000032D0000-0x0000000003312000-memory.dmp upx behavioral2/memory/3872-122-0x0000000003420000-0x0000000003462000-memory.dmp upx -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run 88AB0FB7AAB828733D7FAD8DD72BA73C7188803ED85C1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Program Files (x86)\\systemroot\\ms.exe" 88AB0FB7AAB828733D7FAD8DD72BA73C7188803ED85C1.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Windows\CurrentVersion\Run 88AB0FB7AAB828733D7FAD8DD72BA73C7188803ED85C1.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Program Files (x86)\\systemroot\\ms.exe" 88AB0FB7AAB828733D7FAD8DD72BA73C7188803ED85C1.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3724 set thread context of 3872 3724 88AB0FB7AAB828733D7FAD8DD72BA73C7188803ED85C1.exe 76 -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\systemroot\ms.exe 88AB0FB7AAB828733D7FAD8DD72BA73C7188803ED85C1.exe File opened for modification C:\Program Files (x86)\systemroot\ms.exe 88AB0FB7AAB828733D7FAD8DD72BA73C7188803ED85C1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 4 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_SANU&PROD_SANU_DVD-ROM\4&37CE57BA&0&010000 88AB0FB7AAB828733D7FAD8DD72BA73C7188803ED85C1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\ConfigFlags 88AB0FB7AAB828733D7FAD8DD72BA73C7188803ED85C1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_&PROD_HEARTDISK\4&37CE57BA&0&000000 88AB0FB7AAB828733D7FAD8DD72BA73C7188803ED85C1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\ConfigFlags 88AB0FB7AAB828733D7FAD8DD72BA73C7188803ED85C1.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 88AB0FB7AAB828733D7FAD8DD72BA73C7188803ED85C1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 88AB0FB7AAB828733D7FAD8DD72BA73C7188803ED85C1.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3872 88AB0FB7AAB828733D7FAD8DD72BA73C7188803ED85C1.exe 3872 88AB0FB7AAB828733D7FAD8DD72BA73C7188803ED85C1.exe 3872 88AB0FB7AAB828733D7FAD8DD72BA73C7188803ED85C1.exe 3872 88AB0FB7AAB828733D7FAD8DD72BA73C7188803ED85C1.exe 3872 88AB0FB7AAB828733D7FAD8DD72BA73C7188803ED85C1.exe 3872 88AB0FB7AAB828733D7FAD8DD72BA73C7188803ED85C1.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3872 88AB0FB7AAB828733D7FAD8DD72BA73C7188803ED85C1.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeBackupPrivilege 3872 88AB0FB7AAB828733D7FAD8DD72BA73C7188803ED85C1.exe Token: SeRestorePrivilege 3872 88AB0FB7AAB828733D7FAD8DD72BA73C7188803ED85C1.exe Token: SeDebugPrivilege 3872 88AB0FB7AAB828733D7FAD8DD72BA73C7188803ED85C1.exe Token: SeDebugPrivilege 3872 88AB0FB7AAB828733D7FAD8DD72BA73C7188803ED85C1.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3724 88AB0FB7AAB828733D7FAD8DD72BA73C7188803ED85C1.exe 3724 88AB0FB7AAB828733D7FAD8DD72BA73C7188803ED85C1.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 3724 wrote to memory of 3872 3724 88AB0FB7AAB828733D7FAD8DD72BA73C7188803ED85C1.exe 76 PID 3724 wrote to memory of 3872 3724 88AB0FB7AAB828733D7FAD8DD72BA73C7188803ED85C1.exe 76 PID 3724 wrote to memory of 3872 3724 88AB0FB7AAB828733D7FAD8DD72BA73C7188803ED85C1.exe 76 PID 3724 wrote to memory of 3872 3724 88AB0FB7AAB828733D7FAD8DD72BA73C7188803ED85C1.exe 76 PID 3724 wrote to memory of 3872 3724 88AB0FB7AAB828733D7FAD8DD72BA73C7188803ED85C1.exe 76 PID 3724 wrote to memory of 3872 3724 88AB0FB7AAB828733D7FAD8DD72BA73C7188803ED85C1.exe 76 PID 3724 wrote to memory of 3872 3724 88AB0FB7AAB828733D7FAD8DD72BA73C7188803ED85C1.exe 76 PID 3724 wrote to memory of 3872 3724 88AB0FB7AAB828733D7FAD8DD72BA73C7188803ED85C1.exe 76 PID 3724 wrote to memory of 3872 3724 88AB0FB7AAB828733D7FAD8DD72BA73C7188803ED85C1.exe 76 PID 3724 wrote to memory of 3872 3724 88AB0FB7AAB828733D7FAD8DD72BA73C7188803ED85C1.exe 76 PID 3724 wrote to memory of 3872 3724 88AB0FB7AAB828733D7FAD8DD72BA73C7188803ED85C1.exe 76 PID 3724 wrote to memory of 3872 3724 88AB0FB7AAB828733D7FAD8DD72BA73C7188803ED85C1.exe 76 PID 3724 wrote to memory of 3872 3724 88AB0FB7AAB828733D7FAD8DD72BA73C7188803ED85C1.exe 76 PID 3872 wrote to memory of 8 3872 88AB0FB7AAB828733D7FAD8DD72BA73C7188803ED85C1.exe 80 PID 3872 wrote to memory of 8 3872 88AB0FB7AAB828733D7FAD8DD72BA73C7188803ED85C1.exe 80 PID 3872 wrote to memory of 8 3872 88AB0FB7AAB828733D7FAD8DD72BA73C7188803ED85C1.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\88AB0FB7AAB828733D7FAD8DD72BA73C7188803ED85C1.exe"C:\Users\Admin\AppData\Local\Temp\88AB0FB7AAB828733D7FAD8DD72BA73C7188803ED85C1.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3724 -
C:\Users\Admin\AppData\Local\Temp\88AB0FB7AAB828733D7FAD8DD72BA73C7188803ED85C1.exe"C:\Users\Admin\AppData\Local\Temp\88AB0FB7AAB828733D7FAD8DD72BA73C7188803ED85C1.exe"2⤵
- Adds policy Run key to start application
- Adds Run key to start application
- Drops file in Program Files directory
- Checks SCSI registry key(s)
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3872 -
C:\Windows\SysWOW64\cscript.exe"C:\Windows\system32\cscript.exe" "C:\Users\Admin\AppData\Roaming\Adminv1.18.0 - Trial version.vbs"3⤵PID:8
-
-