Analysis
-
max time kernel
43s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19/09/2022, 01:44
Static task
static1
Behavioral task
behavioral1
Sample
926c51ff26dcad0f4e61cc66c7df26f130b6ec6351a7f548fbc90e7c82b188bf.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
926c51ff26dcad0f4e61cc66c7df26f130b6ec6351a7f548fbc90e7c82b188bf.exe
Resource
win10v2004-20220901-en
General
-
Target
926c51ff26dcad0f4e61cc66c7df26f130b6ec6351a7f548fbc90e7c82b188bf.exe
-
Size
464KB
-
MD5
ed11e8aa6dfc108eab3560d20a90047c
-
SHA1
65e31696064fcf49207d22142f8166ee7e3294c7
-
SHA256
926c51ff26dcad0f4e61cc66c7df26f130b6ec6351a7f548fbc90e7c82b188bf
-
SHA512
f214e6bf38239ac394e94834cf5742223c2b76315c0be4ea9aa69a8985f0ae2a3ddef38f093258f6df622c0312dfb6f860e5b494aca5b0af9fd085b9d9dfe81c
-
SSDEEP
12288:AP7ZyPBOzdvKZivg/egCFs2jrUDsyCgLsaeO:AzZyPQzdvJvceVwsyNsa
Malware Config
Extracted
cybergate
v1.07.5
WALLLERO SXE 11.6
braian.no-ip.biz:4662
1MABO4436T64FQ
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
Win32
-
install_file
Win32.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
123456
-
regkey_hkcu
Win32
-
regkey_hklm
Win32
Signatures
-
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\Win32\\Win32.exe" 926c51ff26dcad0f4e61cc66c7df26f130b6ec6351a7f548fbc90e7c82b188bf.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 926c51ff26dcad0f4e61cc66c7df26f130b6ec6351a7f548fbc90e7c82b188bf.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\Win32\\Win32.exe" 926c51ff26dcad0f4e61cc66c7df26f130b6ec6351a7f548fbc90e7c82b188bf.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 926c51ff26dcad0f4e61cc66c7df26f130b6ec6351a7f548fbc90e7c82b188bf.EXE -
Modifies Installed Components in the registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{T7V8U04E-T1TP-865E-20HU-P873XB48MYBA} 926c51ff26dcad0f4e61cc66c7df26f130b6ec6351a7f548fbc90e7c82b188bf.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{T7V8U04E-T1TP-865E-20HU-P873XB48MYBA}\StubPath = "C:\\Windows\\system32\\Win32\\Win32.exe Restart" 926c51ff26dcad0f4e61cc66c7df26f130b6ec6351a7f548fbc90e7c82b188bf.EXE -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run 926c51ff26dcad0f4e61cc66c7df26f130b6ec6351a7f548fbc90e7c82b188bf.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Win32 = "C:\\Windows\\system32\\Win32\\Win32.exe" 926c51ff26dcad0f4e61cc66c7df26f130b6ec6351a7f548fbc90e7c82b188bf.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run 926c51ff26dcad0f4e61cc66c7df26f130b6ec6351a7f548fbc90e7c82b188bf.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\Win32 = "C:\\Windows\\system32\\Win32\\Win32.exe" 926c51ff26dcad0f4e61cc66c7df26f130b6ec6351a7f548fbc90e7c82b188bf.EXE -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\Win32\Win32.exe 926c51ff26dcad0f4e61cc66c7df26f130b6ec6351a7f548fbc90e7c82b188bf.EXE File opened for modification C:\Windows\SysWOW64\Win32\Win32.exe 926c51ff26dcad0f4e61cc66c7df26f130b6ec6351a7f548fbc90e7c82b188bf.EXE -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1500 set thread context of 872 1500 926c51ff26dcad0f4e61cc66c7df26f130b6ec6351a7f548fbc90e7c82b188bf.exe 27 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 872 926c51ff26dcad0f4e61cc66c7df26f130b6ec6351a7f548fbc90e7c82b188bf.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 872 926c51ff26dcad0f4e61cc66c7df26f130b6ec6351a7f548fbc90e7c82b188bf.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1500 926c51ff26dcad0f4e61cc66c7df26f130b6ec6351a7f548fbc90e7c82b188bf.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1500 wrote to memory of 872 1500 926c51ff26dcad0f4e61cc66c7df26f130b6ec6351a7f548fbc90e7c82b188bf.exe 27 PID 1500 wrote to memory of 872 1500 926c51ff26dcad0f4e61cc66c7df26f130b6ec6351a7f548fbc90e7c82b188bf.exe 27 PID 1500 wrote to memory of 872 1500 926c51ff26dcad0f4e61cc66c7df26f130b6ec6351a7f548fbc90e7c82b188bf.exe 27 PID 1500 wrote to memory of 872 1500 926c51ff26dcad0f4e61cc66c7df26f130b6ec6351a7f548fbc90e7c82b188bf.exe 27 PID 1500 wrote to memory of 872 1500 926c51ff26dcad0f4e61cc66c7df26f130b6ec6351a7f548fbc90e7c82b188bf.exe 27 PID 1500 wrote to memory of 872 1500 926c51ff26dcad0f4e61cc66c7df26f130b6ec6351a7f548fbc90e7c82b188bf.exe 27 PID 1500 wrote to memory of 872 1500 926c51ff26dcad0f4e61cc66c7df26f130b6ec6351a7f548fbc90e7c82b188bf.exe 27 PID 1500 wrote to memory of 872 1500 926c51ff26dcad0f4e61cc66c7df26f130b6ec6351a7f548fbc90e7c82b188bf.exe 27 PID 1500 wrote to memory of 872 1500 926c51ff26dcad0f4e61cc66c7df26f130b6ec6351a7f548fbc90e7c82b188bf.exe 27 PID 1500 wrote to memory of 872 1500 926c51ff26dcad0f4e61cc66c7df26f130b6ec6351a7f548fbc90e7c82b188bf.exe 27 PID 1500 wrote to memory of 872 1500 926c51ff26dcad0f4e61cc66c7df26f130b6ec6351a7f548fbc90e7c82b188bf.exe 27 PID 1500 wrote to memory of 872 1500 926c51ff26dcad0f4e61cc66c7df26f130b6ec6351a7f548fbc90e7c82b188bf.exe 27 PID 1500 wrote to memory of 872 1500 926c51ff26dcad0f4e61cc66c7df26f130b6ec6351a7f548fbc90e7c82b188bf.exe 27 PID 1500 wrote to memory of 872 1500 926c51ff26dcad0f4e61cc66c7df26f130b6ec6351a7f548fbc90e7c82b188bf.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\926c51ff26dcad0f4e61cc66c7df26f130b6ec6351a7f548fbc90e7c82b188bf.exe"C:\Users\Admin\AppData\Local\Temp\926c51ff26dcad0f4e61cc66c7df26f130b6ec6351a7f548fbc90e7c82b188bf.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Users\Admin\AppData\Local\Temp\926c51ff26dcad0f4e61cc66c7df26f130b6ec6351a7f548fbc90e7c82b188bf.EXE"C:\Users\Admin\AppData\Local\Temp\926c51ff26dcad0f4e61cc66c7df26f130b6ec6351a7f548fbc90e7c82b188bf.EXE"2⤵
- Adds policy Run key to start application
- Modifies Installed Components in the registry
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:872
-