Analysis
-
max time kernel
150s -
max time network
140s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
24-07-2021 21:57
Static task
static1
Behavioral task
behavioral1
Sample
7C09DCEBD6136A6A73A96EAC91568DCC.exe
Resource
win7v20210410
0 signatures
0 seconds
General
-
Target
7C09DCEBD6136A6A73A96EAC91568DCC.exe
-
Size
789KB
-
MD5
7c09dcebd6136a6a73a96eac91568dcc
-
SHA1
4e197a783345969df826faaca772b065530bd6c5
-
SHA256
7ef8a647eee5935219cea3f21cdc5a1fe28a53b177c6d3280e5ee8f2304b3e5c
-
SHA512
c5c180756342e3a5456d19084e6bd75ac5ed73068566e89c0e5d25aa740893306aca48ffb25e320a605e53f942c1299767da4e9f215f8d31f53b2c2ce5327c22
Malware Config
Extracted
Family
cybergate
Version
v3.4.2.2
Botnet
remote
C2
asade.no-ip.org:25565
Mutex
D4T52W8MT863F7
Attributes
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
rdns
-
install_file
windows
-
install_flag
false
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
cybergate
-
regkey_hkcu
erterterter
-
regkey_hklm
sdsdfsdf
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 648 7C09DCEBD6136A6A73A96EAC91568DCC.exe -
resource yara_rule behavioral2/memory/576-131-0x0000000010480000-0x00000000104F0000-memory.dmp upx -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\779.exe 7C09DCEBD6136A6A73A96EAC91568DCC.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\779.exe 7C09DCEBD6136A6A73A96EAC91568DCC.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 860 set thread context of 648 860 7C09DCEBD6136A6A73A96EAC91568DCC.exe 75 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 576 explorer.exe Token: SeDebugPrivilege 576 explorer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 648 7C09DCEBD6136A6A73A96EAC91568DCC.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 860 wrote to memory of 648 860 7C09DCEBD6136A6A73A96EAC91568DCC.exe 75 PID 860 wrote to memory of 648 860 7C09DCEBD6136A6A73A96EAC91568DCC.exe 75 PID 860 wrote to memory of 648 860 7C09DCEBD6136A6A73A96EAC91568DCC.exe 75 PID 860 wrote to memory of 648 860 7C09DCEBD6136A6A73A96EAC91568DCC.exe 75 PID 860 wrote to memory of 648 860 7C09DCEBD6136A6A73A96EAC91568DCC.exe 75 PID 860 wrote to memory of 648 860 7C09DCEBD6136A6A73A96EAC91568DCC.exe 75 PID 860 wrote to memory of 648 860 7C09DCEBD6136A6A73A96EAC91568DCC.exe 75 PID 860 wrote to memory of 648 860 7C09DCEBD6136A6A73A96EAC91568DCC.exe 75 PID 860 wrote to memory of 648 860 7C09DCEBD6136A6A73A96EAC91568DCC.exe 75 PID 860 wrote to memory of 648 860 7C09DCEBD6136A6A73A96EAC91568DCC.exe 75 PID 860 wrote to memory of 648 860 7C09DCEBD6136A6A73A96EAC91568DCC.exe 75 PID 648 wrote to memory of 2644 648 7C09DCEBD6136A6A73A96EAC91568DCC.exe 28 PID 648 wrote to memory of 2644 648 7C09DCEBD6136A6A73A96EAC91568DCC.exe 28 PID 648 wrote to memory of 2644 648 7C09DCEBD6136A6A73A96EAC91568DCC.exe 28 PID 648 wrote to memory of 2644 648 7C09DCEBD6136A6A73A96EAC91568DCC.exe 28 PID 648 wrote to memory of 2644 648 7C09DCEBD6136A6A73A96EAC91568DCC.exe 28 PID 648 wrote to memory of 2644 648 7C09DCEBD6136A6A73A96EAC91568DCC.exe 28 PID 648 wrote to memory of 2644 648 7C09DCEBD6136A6A73A96EAC91568DCC.exe 28 PID 648 wrote to memory of 2644 648 7C09DCEBD6136A6A73A96EAC91568DCC.exe 28 PID 648 wrote to memory of 2644 648 7C09DCEBD6136A6A73A96EAC91568DCC.exe 28 PID 648 wrote to memory of 2644 648 7C09DCEBD6136A6A73A96EAC91568DCC.exe 28 PID 648 wrote to memory of 2644 648 7C09DCEBD6136A6A73A96EAC91568DCC.exe 28 PID 648 wrote to memory of 2644 648 7C09DCEBD6136A6A73A96EAC91568DCC.exe 28 PID 648 wrote to memory of 2644 648 7C09DCEBD6136A6A73A96EAC91568DCC.exe 28 PID 648 wrote to memory of 2644 648 7C09DCEBD6136A6A73A96EAC91568DCC.exe 28 PID 648 wrote to memory of 2644 648 7C09DCEBD6136A6A73A96EAC91568DCC.exe 28 PID 648 wrote to memory of 2644 648 7C09DCEBD6136A6A73A96EAC91568DCC.exe 28 PID 648 wrote to memory of 2644 648 7C09DCEBD6136A6A73A96EAC91568DCC.exe 28 PID 648 wrote to memory of 2644 648 7C09DCEBD6136A6A73A96EAC91568DCC.exe 28 PID 648 wrote to memory of 2644 648 7C09DCEBD6136A6A73A96EAC91568DCC.exe 28 PID 648 wrote to memory of 2644 648 7C09DCEBD6136A6A73A96EAC91568DCC.exe 28 PID 648 wrote to memory of 2644 648 7C09DCEBD6136A6A73A96EAC91568DCC.exe 28 PID 648 wrote to memory of 2644 648 7C09DCEBD6136A6A73A96EAC91568DCC.exe 28 PID 648 wrote to memory of 2644 648 7C09DCEBD6136A6A73A96EAC91568DCC.exe 28 PID 648 wrote to memory of 2644 648 7C09DCEBD6136A6A73A96EAC91568DCC.exe 28 PID 648 wrote to memory of 2644 648 7C09DCEBD6136A6A73A96EAC91568DCC.exe 28 PID 648 wrote to memory of 2644 648 7C09DCEBD6136A6A73A96EAC91568DCC.exe 28 PID 648 wrote to memory of 2644 648 7C09DCEBD6136A6A73A96EAC91568DCC.exe 28 PID 648 wrote to memory of 2644 648 7C09DCEBD6136A6A73A96EAC91568DCC.exe 28 PID 648 wrote to memory of 2644 648 7C09DCEBD6136A6A73A96EAC91568DCC.exe 28 PID 648 wrote to memory of 2644 648 7C09DCEBD6136A6A73A96EAC91568DCC.exe 28 PID 648 wrote to memory of 2644 648 7C09DCEBD6136A6A73A96EAC91568DCC.exe 28 PID 648 wrote to memory of 2644 648 7C09DCEBD6136A6A73A96EAC91568DCC.exe 28 PID 648 wrote to memory of 2644 648 7C09DCEBD6136A6A73A96EAC91568DCC.exe 28 PID 648 wrote to memory of 2644 648 7C09DCEBD6136A6A73A96EAC91568DCC.exe 28 PID 648 wrote to memory of 2644 648 7C09DCEBD6136A6A73A96EAC91568DCC.exe 28 PID 648 wrote to memory of 2644 648 7C09DCEBD6136A6A73A96EAC91568DCC.exe 28 PID 648 wrote to memory of 2644 648 7C09DCEBD6136A6A73A96EAC91568DCC.exe 28 PID 648 wrote to memory of 2644 648 7C09DCEBD6136A6A73A96EAC91568DCC.exe 28 PID 648 wrote to memory of 2644 648 7C09DCEBD6136A6A73A96EAC91568DCC.exe 28 PID 648 wrote to memory of 2644 648 7C09DCEBD6136A6A73A96EAC91568DCC.exe 28 PID 648 wrote to memory of 2644 648 7C09DCEBD6136A6A73A96EAC91568DCC.exe 28 PID 648 wrote to memory of 2644 648 7C09DCEBD6136A6A73A96EAC91568DCC.exe 28 PID 648 wrote to memory of 2644 648 7C09DCEBD6136A6A73A96EAC91568DCC.exe 28 PID 648 wrote to memory of 2644 648 7C09DCEBD6136A6A73A96EAC91568DCC.exe 28 PID 648 wrote to memory of 2644 648 7C09DCEBD6136A6A73A96EAC91568DCC.exe 28 PID 648 wrote to memory of 2644 648 7C09DCEBD6136A6A73A96EAC91568DCC.exe 28 PID 648 wrote to memory of 2644 648 7C09DCEBD6136A6A73A96EAC91568DCC.exe 28 PID 648 wrote to memory of 2644 648 7C09DCEBD6136A6A73A96EAC91568DCC.exe 28 PID 648 wrote to memory of 2644 648 7C09DCEBD6136A6A73A96EAC91568DCC.exe 28 PID 648 wrote to memory of 2644 648 7C09DCEBD6136A6A73A96EAC91568DCC.exe 28 PID 648 wrote to memory of 2644 648 7C09DCEBD6136A6A73A96EAC91568DCC.exe 28 PID 648 wrote to memory of 2644 648 7C09DCEBD6136A6A73A96EAC91568DCC.exe 28 PID 648 wrote to memory of 2644 648 7C09DCEBD6136A6A73A96EAC91568DCC.exe 28
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:2644
-
C:\Users\Admin\AppData\Local\Temp\7C09DCEBD6136A6A73A96EAC91568DCC.exe"C:\Users\Admin\AppData\Local\Temp\7C09DCEBD6136A6A73A96EAC91568DCC.exe"2⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Users\Admin\AppData\Local\Temp\7C09DCEBD6136A6A73A96EAC91568DCC.exe"C:\Users\Admin\AppData\Local\Temp\7C09DCEBD6136A6A73A96EAC91568DCC.exe"3⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:648 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:576
-
-
-