Analysis
-
max time kernel
151s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01/10/2022, 23:50
Static task
static1
Behavioral task
behavioral1
Sample
cf60acded0fd519b2f0322549282e260c8a7efee654d564bff835d2f30073997.exe
Resource
win7-20220812-en
General
-
Target
cf60acded0fd519b2f0322549282e260c8a7efee654d564bff835d2f30073997.exe
-
Size
1.1MB
-
MD5
6ad158f11a5f717855659f919e50bfc8
-
SHA1
e131ea67a82999decdc71d95bd198b419b374181
-
SHA256
cf60acded0fd519b2f0322549282e260c8a7efee654d564bff835d2f30073997
-
SHA512
c851c05f17fd5871a711516f93d7b096eaa5cb3b0fbe88b1c3ea42bba1d28f23d0cff316bd07719222d883da05ada5ea87abd93f19ff65c09ea3cf9a5e42c529
-
SSDEEP
24576:VA7jTeFeRmJkcoQricOIQxiZY1iaapCdbxQx1mTT:VA7/eFLJZoQrbTFZY1iaa4dk1Q
Malware Config
Extracted
cybergate
2.6
Ativado
anonymatuu.no-ip.biz:999
***MUTEX***
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
install
-
install_file
svchost.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
texto da mensagem
-
message_box_title
tÃtulo da mensagem
-
password
123
-
regkey_hkcu
svchost
-
regkey_hklm
svchost
Signatures
-
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run microsoft.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\install\\svchost.exe" microsoft.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run microsoft.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\install\\svchost.exe" microsoft.exe -
Executes dropped EXE 5 IoCs
pid Process 2000 microsoft.exe 940 runtime.exe 932 microsoft.exe 1676 svchost.exe 2020 svchost.exe -
Modifies Installed Components in the registry 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{CKP0JUX1-P70Q-T565-7UE6-45OVK7FJ2QCL} microsoft.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{CKP0JUX1-P70Q-T565-7UE6-45OVK7FJ2QCL}\StubPath = "C:\\Windows\\system32\\install\\svchost.exe Restart" microsoft.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{CKP0JUX1-P70Q-T565-7UE6-45OVK7FJ2QCL} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{CKP0JUX1-P70Q-T565-7UE6-45OVK7FJ2QCL}\StubPath = "C:\\Windows\\system32\\install\\svchost.exe" explorer.exe -
resource yara_rule behavioral1/memory/932-84-0x0000000024010000-0x0000000024072000-memory.dmp upx behavioral1/memory/932-93-0x0000000024080000-0x00000000240E2000-memory.dmp upx behavioral1/memory/2016-98-0x0000000024080000-0x00000000240E2000-memory.dmp upx behavioral1/memory/2016-101-0x0000000024080000-0x00000000240E2000-memory.dmp upx behavioral1/memory/932-106-0x00000000240F0000-0x0000000024152000-memory.dmp upx behavioral1/memory/1696-111-0x00000000240F0000-0x0000000024152000-memory.dmp upx behavioral1/memory/1696-113-0x00000000240F0000-0x0000000024152000-memory.dmp upx behavioral1/memory/1696-118-0x00000000240F0000-0x0000000024152000-memory.dmp upx -
Loads dropped DLL 2 IoCs
pid Process 2000 microsoft.exe 1696 explorer.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run microsoft.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Windows\\system32\\install\\svchost.exe" microsoft.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run microsoft.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Windows\\system32\\install\\svchost.exe" microsoft.exe -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini explorer.exe -
AutoIT Executable 8 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000900000001429e-58.dat autoit_exe behavioral1/files/0x000900000001429e-62.dat autoit_exe behavioral1/files/0x000900000001429e-66.dat autoit_exe behavioral1/files/0x000900000001429e-78.dat autoit_exe behavioral1/files/0x000600000001450c-100.dat autoit_exe behavioral1/files/0x000600000001450c-114.dat autoit_exe behavioral1/files/0x000600000001450c-116.dat autoit_exe behavioral1/files/0x000600000001450c-130.dat autoit_exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\install\ explorer.exe File created C:\Windows\SysWOW64\install\svchost.exe microsoft.exe File opened for modification C:\Windows\SysWOW64\install\svchost.exe microsoft.exe File opened for modification C:\Windows\SysWOW64\install\svchost.exe explorer.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2000 set thread context of 932 2000 microsoft.exe 28 PID 1676 set thread context of 2020 1676 svchost.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1696 explorer.exe Token: SeDebugPrivilege 1696 explorer.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 932 microsoft.exe 1696 explorer.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 1696 explorer.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 940 runtime.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2020 wrote to memory of 2000 2020 cf60acded0fd519b2f0322549282e260c8a7efee654d564bff835d2f30073997.exe 26 PID 2020 wrote to memory of 2000 2020 cf60acded0fd519b2f0322549282e260c8a7efee654d564bff835d2f30073997.exe 26 PID 2020 wrote to memory of 2000 2020 cf60acded0fd519b2f0322549282e260c8a7efee654d564bff835d2f30073997.exe 26 PID 2020 wrote to memory of 2000 2020 cf60acded0fd519b2f0322549282e260c8a7efee654d564bff835d2f30073997.exe 26 PID 2020 wrote to memory of 940 2020 cf60acded0fd519b2f0322549282e260c8a7efee654d564bff835d2f30073997.exe 27 PID 2020 wrote to memory of 940 2020 cf60acded0fd519b2f0322549282e260c8a7efee654d564bff835d2f30073997.exe 27 PID 2020 wrote to memory of 940 2020 cf60acded0fd519b2f0322549282e260c8a7efee654d564bff835d2f30073997.exe 27 PID 2020 wrote to memory of 940 2020 cf60acded0fd519b2f0322549282e260c8a7efee654d564bff835d2f30073997.exe 27 PID 2000 wrote to memory of 932 2000 microsoft.exe 28 PID 2000 wrote to memory of 932 2000 microsoft.exe 28 PID 2000 wrote to memory of 932 2000 microsoft.exe 28 PID 2000 wrote to memory of 932 2000 microsoft.exe 28 PID 2000 wrote to memory of 932 2000 microsoft.exe 28 PID 2000 wrote to memory of 932 2000 microsoft.exe 28 PID 2000 wrote to memory of 932 2000 microsoft.exe 28 PID 2000 wrote to memory of 932 2000 microsoft.exe 28 PID 2000 wrote to memory of 932 2000 microsoft.exe 28 PID 2000 wrote to memory of 932 2000 microsoft.exe 28 PID 2000 wrote to memory of 932 2000 microsoft.exe 28 PID 932 wrote to memory of 1412 932 microsoft.exe 8 PID 932 wrote to memory of 1412 932 microsoft.exe 8 PID 932 wrote to memory of 1412 932 microsoft.exe 8 PID 932 wrote to memory of 1412 932 microsoft.exe 8 PID 932 wrote to memory of 1412 932 microsoft.exe 8 PID 932 wrote to memory of 1412 932 microsoft.exe 8 PID 932 wrote to memory of 1412 932 microsoft.exe 8 PID 932 wrote to memory of 1412 932 microsoft.exe 8 PID 932 wrote to memory of 1412 932 microsoft.exe 8 PID 932 wrote to memory of 1412 932 microsoft.exe 8 PID 932 wrote to memory of 1412 932 microsoft.exe 8 PID 932 wrote to memory of 1412 932 microsoft.exe 8 PID 932 wrote to memory of 1412 932 microsoft.exe 8 PID 932 wrote to memory of 1412 932 microsoft.exe 8 PID 932 wrote to memory of 1412 932 microsoft.exe 8 PID 932 wrote to memory of 1412 932 microsoft.exe 8 PID 932 wrote to memory of 1412 932 microsoft.exe 8 PID 932 wrote to memory of 1412 932 microsoft.exe 8 PID 932 wrote to memory of 1412 932 microsoft.exe 8 PID 932 wrote to memory of 1412 932 microsoft.exe 8 PID 932 wrote to memory of 1412 932 microsoft.exe 8 PID 932 wrote to memory of 1412 932 microsoft.exe 8 PID 932 wrote to memory of 1412 932 microsoft.exe 8 PID 932 wrote to memory of 1412 932 microsoft.exe 8 PID 932 wrote to memory of 1412 932 microsoft.exe 8 PID 932 wrote to memory of 1412 932 microsoft.exe 8 PID 932 wrote to memory of 1412 932 microsoft.exe 8 PID 932 wrote to memory of 1412 932 microsoft.exe 8 PID 932 wrote to memory of 1412 932 microsoft.exe 8 PID 932 wrote to memory of 1412 932 microsoft.exe 8 PID 932 wrote to memory of 1412 932 microsoft.exe 8 PID 932 wrote to memory of 1412 932 microsoft.exe 8 PID 932 wrote to memory of 1412 932 microsoft.exe 8 PID 932 wrote to memory of 1412 932 microsoft.exe 8 PID 932 wrote to memory of 1412 932 microsoft.exe 8 PID 932 wrote to memory of 1412 932 microsoft.exe 8 PID 932 wrote to memory of 1412 932 microsoft.exe 8 PID 932 wrote to memory of 1412 932 microsoft.exe 8 PID 932 wrote to memory of 1412 932 microsoft.exe 8 PID 932 wrote to memory of 1412 932 microsoft.exe 8 PID 932 wrote to memory of 1412 932 microsoft.exe 8 PID 932 wrote to memory of 1412 932 microsoft.exe 8 PID 932 wrote to memory of 1412 932 microsoft.exe 8 PID 932 wrote to memory of 1412 932 microsoft.exe 8 PID 932 wrote to memory of 1412 932 microsoft.exe 8
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1412
-
C:\Users\Admin\AppData\Local\Temp\cf60acded0fd519b2f0322549282e260c8a7efee654d564bff835d2f30073997.exe"C:\Users\Admin\AppData\Local\Temp\cf60acded0fd519b2f0322549282e260c8a7efee654d564bff835d2f30073997.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\microsoft.exe"C:\Users\Admin\AppData\Local\Temp\microsoft.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Users\Admin\AppData\Local\Temp\microsoft.exe"C:\Users\Admin\AppData\Local\Temp\microsoft.exe"4⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Modifies Installed Components in the registry
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:932 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe5⤵
- Modifies Installed Components in the registry
PID:2016
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe5⤵
- Loads dropped DLL
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1696 -
C:\Windows\SysWOW64\install\svchost.exe"C:\Windows\system32\install\svchost.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1676 -
C:\Windows\SysWOW64\install\svchost.exe"C:\Windows\SysWOW64\install\svchost.exe"7⤵
- Executes dropped EXE
PID:2020
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\runtime.exe"C:\Users\Admin\AppData\Local\Temp\runtime.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:940
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
229KB
MD5749f8c05ff306a3ab84651efdd66ac8b
SHA16f101f5240cfcae5850d0dd24b7ea13075aee46e
SHA25696d6bd4ad6df9a6412ab2ebae524c7b65cf991081415d7783e27f350bd5b5360
SHA512ea674570aa79b9ef559b41adbe4a598702397fda850d46ef8f5ae9b481e3b7c976e5a2107660a5acf9a8323760fb4428dc3f6889698ab39a87a82d70c69cac85
-
Filesize
930KB
MD5600e7019b86f01d33cdd8233085deb96
SHA1c0c491f6bf6bb550e49a82fc1159dad7894de58f
SHA256b00da994c4d55f987ce171d4b661f019b3354f9d2d97fefc67275544a930bc9d
SHA5125f2a2a78f5aa0553927f854d5f7876138ac694607294e3f843f3bc3e1453b376db2b0caeaacd14621a6e815fa4f2ab9bc3d65c514258011e31599c18357e1748
-
Filesize
930KB
MD5600e7019b86f01d33cdd8233085deb96
SHA1c0c491f6bf6bb550e49a82fc1159dad7894de58f
SHA256b00da994c4d55f987ce171d4b661f019b3354f9d2d97fefc67275544a930bc9d
SHA5125f2a2a78f5aa0553927f854d5f7876138ac694607294e3f843f3bc3e1453b376db2b0caeaacd14621a6e815fa4f2ab9bc3d65c514258011e31599c18357e1748
-
Filesize
930KB
MD5600e7019b86f01d33cdd8233085deb96
SHA1c0c491f6bf6bb550e49a82fc1159dad7894de58f
SHA256b00da994c4d55f987ce171d4b661f019b3354f9d2d97fefc67275544a930bc9d
SHA5125f2a2a78f5aa0553927f854d5f7876138ac694607294e3f843f3bc3e1453b376db2b0caeaacd14621a6e815fa4f2ab9bc3d65c514258011e31599c18357e1748
-
Filesize
24KB
MD5db0133a26e827ea34d19cf356bb6111c
SHA1043d74163d9fa5052e79a6f784b0482e700efbd6
SHA256cbda9bf6054d20dfbb0b369aab2bc48729d71b063ad4645dc9a55687bcf14149
SHA5126fcf393b7a5b065b5b42f3251c4be5daf6897361bd8597ba5373b8359bdc4115f164fb814abea5cb00c24ed5c0c777307202c0351a502881ec1bee5b4f6aa291
-
Filesize
930KB
MD5600e7019b86f01d33cdd8233085deb96
SHA1c0c491f6bf6bb550e49a82fc1159dad7894de58f
SHA256b00da994c4d55f987ce171d4b661f019b3354f9d2d97fefc67275544a930bc9d
SHA5125f2a2a78f5aa0553927f854d5f7876138ac694607294e3f843f3bc3e1453b376db2b0caeaacd14621a6e815fa4f2ab9bc3d65c514258011e31599c18357e1748
-
Filesize
930KB
MD5600e7019b86f01d33cdd8233085deb96
SHA1c0c491f6bf6bb550e49a82fc1159dad7894de58f
SHA256b00da994c4d55f987ce171d4b661f019b3354f9d2d97fefc67275544a930bc9d
SHA5125f2a2a78f5aa0553927f854d5f7876138ac694607294e3f843f3bc3e1453b376db2b0caeaacd14621a6e815fa4f2ab9bc3d65c514258011e31599c18357e1748
-
Filesize
930KB
MD5600e7019b86f01d33cdd8233085deb96
SHA1c0c491f6bf6bb550e49a82fc1159dad7894de58f
SHA256b00da994c4d55f987ce171d4b661f019b3354f9d2d97fefc67275544a930bc9d
SHA5125f2a2a78f5aa0553927f854d5f7876138ac694607294e3f843f3bc3e1453b376db2b0caeaacd14621a6e815fa4f2ab9bc3d65c514258011e31599c18357e1748
-
Filesize
930KB
MD5600e7019b86f01d33cdd8233085deb96
SHA1c0c491f6bf6bb550e49a82fc1159dad7894de58f
SHA256b00da994c4d55f987ce171d4b661f019b3354f9d2d97fefc67275544a930bc9d
SHA5125f2a2a78f5aa0553927f854d5f7876138ac694607294e3f843f3bc3e1453b376db2b0caeaacd14621a6e815fa4f2ab9bc3d65c514258011e31599c18357e1748
-
Filesize
930KB
MD5600e7019b86f01d33cdd8233085deb96
SHA1c0c491f6bf6bb550e49a82fc1159dad7894de58f
SHA256b00da994c4d55f987ce171d4b661f019b3354f9d2d97fefc67275544a930bc9d
SHA5125f2a2a78f5aa0553927f854d5f7876138ac694607294e3f843f3bc3e1453b376db2b0caeaacd14621a6e815fa4f2ab9bc3d65c514258011e31599c18357e1748