Analysis
-
max time kernel
150s -
max time network
84s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
02/10/2022, 22:06
Static task
static1
Behavioral task
behavioral1
Sample
92e7f54cd4108b953cebe99c9709ac1f3497d20451d7ffc83af83258cf4966de.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
92e7f54cd4108b953cebe99c9709ac1f3497d20451d7ffc83af83258cf4966de.exe
Resource
win10v2004-20220812-en
General
-
Target
92e7f54cd4108b953cebe99c9709ac1f3497d20451d7ffc83af83258cf4966de.exe
-
Size
1.4MB
-
MD5
74303200f0709e8e88854d6a4504d9d0
-
SHA1
60662a68fa5c15f0d129758f1e227b02f0188a7e
-
SHA256
92e7f54cd4108b953cebe99c9709ac1f3497d20451d7ffc83af83258cf4966de
-
SHA512
bb3e023d20682fcd7e7b2ccaff9b4df836181e53491e2a9b6db5b23ed98930b7a48162c9c47342ec59c9679ed91c627975cfe0a861e27fe685d0f702a75fff82
-
SSDEEP
24576:pRmJkqoQrilOIQ+yMxGaYOMOHkFGuDJAZE8akx:eJXoQryTiMxGaYDOHSlIE8ak
Malware Config
Extracted
cybergate
v1.07.5
remote
jackd2.no-ip.org:1500
H238F68Y23ERP1
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
install
-
install_file
server.exe
-
install_flag
false
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
12345
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Users\\Admin\\AppData\\Roaming\\plugin.exeexplorer.exe" 92e7f54cd4108b953cebe99c9709ac1f3497d20451d7ffc83af83258cf4966de.exe -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 92e7f54cd4108b953cebe99c9709ac1f3497d20451d7ffc83af83258cf4966de.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Adobe Reader = "C:\\Users\\Admin\\AppData\\Roaming\\plugin.exe" 92e7f54cd4108b953cebe99c9709ac1f3497d20451d7ffc83af83258cf4966de.exe -
resource yara_rule behavioral1/memory/1936-56-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/1936-58-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/1936-59-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/1936-63-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/1936-64-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/1936-65-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/1936-67-0x0000000010410000-0x0000000010475000-memory.dmp upx behavioral1/memory/1936-76-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral1/memory/2024-81-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral1/memory/2024-83-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral1/memory/1936-87-0x00000000104F0000-0x0000000010555000-memory.dmp upx behavioral1/memory/928-93-0x00000000104F0000-0x0000000010555000-memory.dmp upx behavioral1/memory/1936-92-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/928-95-0x00000000104F0000-0x0000000010555000-memory.dmp upx behavioral1/memory/928-96-0x00000000104F0000-0x0000000010555000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run 92e7f54cd4108b953cebe99c9709ac1f3497d20451d7ffc83af83258cf4966de.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\Adobe Reader = "C:\\Users\\Admin\\AppData\\Roaming\\plugin.exe" 92e7f54cd4108b953cebe99c9709ac1f3497d20451d7ffc83af83258cf4966de.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1800 set thread context of 1936 1800 92e7f54cd4108b953cebe99c9709ac1f3497d20451d7ffc83af83258cf4966de.exe 28 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 928 svchost.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeBackupPrivilege 2024 explorer.exe Token: SeRestorePrivilege 2024 explorer.exe Token: SeBackupPrivilege 928 svchost.exe Token: SeRestorePrivilege 928 svchost.exe Token: SeDebugPrivilege 928 svchost.exe Token: SeDebugPrivilege 928 svchost.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1936 svchost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1800 wrote to memory of 1936 1800 92e7f54cd4108b953cebe99c9709ac1f3497d20451d7ffc83af83258cf4966de.exe 28 PID 1800 wrote to memory of 1936 1800 92e7f54cd4108b953cebe99c9709ac1f3497d20451d7ffc83af83258cf4966de.exe 28 PID 1800 wrote to memory of 1936 1800 92e7f54cd4108b953cebe99c9709ac1f3497d20451d7ffc83af83258cf4966de.exe 28 PID 1800 wrote to memory of 1936 1800 92e7f54cd4108b953cebe99c9709ac1f3497d20451d7ffc83af83258cf4966de.exe 28 PID 1800 wrote to memory of 1936 1800 92e7f54cd4108b953cebe99c9709ac1f3497d20451d7ffc83af83258cf4966de.exe 28 PID 1800 wrote to memory of 1936 1800 92e7f54cd4108b953cebe99c9709ac1f3497d20451d7ffc83af83258cf4966de.exe 28 PID 1800 wrote to memory of 1936 1800 92e7f54cd4108b953cebe99c9709ac1f3497d20451d7ffc83af83258cf4966de.exe 28 PID 1800 wrote to memory of 1936 1800 92e7f54cd4108b953cebe99c9709ac1f3497d20451d7ffc83af83258cf4966de.exe 28 PID 1936 wrote to memory of 1256 1936 svchost.exe 12 PID 1936 wrote to memory of 1256 1936 svchost.exe 12 PID 1936 wrote to memory of 1256 1936 svchost.exe 12 PID 1936 wrote to memory of 1256 1936 svchost.exe 12 PID 1936 wrote to memory of 1256 1936 svchost.exe 12 PID 1936 wrote to memory of 1256 1936 svchost.exe 12 PID 1936 wrote to memory of 1256 1936 svchost.exe 12 PID 1936 wrote to memory of 1256 1936 svchost.exe 12 PID 1936 wrote to memory of 1256 1936 svchost.exe 12 PID 1936 wrote to memory of 1256 1936 svchost.exe 12 PID 1936 wrote to memory of 1256 1936 svchost.exe 12 PID 1936 wrote to memory of 1256 1936 svchost.exe 12 PID 1936 wrote to memory of 1256 1936 svchost.exe 12 PID 1936 wrote to memory of 1256 1936 svchost.exe 12 PID 1936 wrote to memory of 1256 1936 svchost.exe 12 PID 1936 wrote to memory of 1256 1936 svchost.exe 12 PID 1936 wrote to memory of 1256 1936 svchost.exe 12 PID 1936 wrote to memory of 1256 1936 svchost.exe 12 PID 1936 wrote to memory of 1256 1936 svchost.exe 12 PID 1936 wrote to memory of 1256 1936 svchost.exe 12 PID 1936 wrote to memory of 1256 1936 svchost.exe 12 PID 1936 wrote to memory of 1256 1936 svchost.exe 12 PID 1936 wrote to memory of 1256 1936 svchost.exe 12 PID 1936 wrote to memory of 1256 1936 svchost.exe 12 PID 1936 wrote to memory of 1256 1936 svchost.exe 12 PID 1936 wrote to memory of 1256 1936 svchost.exe 12 PID 1936 wrote to memory of 1256 1936 svchost.exe 12 PID 1936 wrote to memory of 1256 1936 svchost.exe 12 PID 1936 wrote to memory of 1256 1936 svchost.exe 12 PID 1936 wrote to memory of 1256 1936 svchost.exe 12 PID 1936 wrote to memory of 1256 1936 svchost.exe 12 PID 1936 wrote to memory of 1256 1936 svchost.exe 12 PID 1936 wrote to memory of 1256 1936 svchost.exe 12 PID 1936 wrote to memory of 1256 1936 svchost.exe 12 PID 1936 wrote to memory of 1256 1936 svchost.exe 12 PID 1936 wrote to memory of 1256 1936 svchost.exe 12 PID 1936 wrote to memory of 1256 1936 svchost.exe 12 PID 1936 wrote to memory of 1256 1936 svchost.exe 12 PID 1936 wrote to memory of 1256 1936 svchost.exe 12 PID 1936 wrote to memory of 1256 1936 svchost.exe 12 PID 1936 wrote to memory of 1256 1936 svchost.exe 12 PID 1936 wrote to memory of 1256 1936 svchost.exe 12 PID 1936 wrote to memory of 1256 1936 svchost.exe 12 PID 1936 wrote to memory of 1256 1936 svchost.exe 12 PID 1936 wrote to memory of 1256 1936 svchost.exe 12 PID 1936 wrote to memory of 1256 1936 svchost.exe 12 PID 1936 wrote to memory of 1256 1936 svchost.exe 12 PID 1936 wrote to memory of 1256 1936 svchost.exe 12 PID 1936 wrote to memory of 1256 1936 svchost.exe 12 PID 1936 wrote to memory of 1256 1936 svchost.exe 12 PID 1936 wrote to memory of 1256 1936 svchost.exe 12 PID 1936 wrote to memory of 1256 1936 svchost.exe 12 PID 1936 wrote to memory of 1256 1936 svchost.exe 12 PID 1936 wrote to memory of 1256 1936 svchost.exe 12 PID 1936 wrote to memory of 1256 1936 svchost.exe 12 PID 1936 wrote to memory of 1256 1936 svchost.exe 12
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1256
-
C:\Users\Admin\AppData\Local\Temp\92e7f54cd4108b953cebe99c9709ac1f3497d20451d7ffc83af83258cf4966de.exe"C:\Users\Admin\AppData\Local\Temp\92e7f54cd4108b953cebe99c9709ac1f3497d20451d7ffc83af83258cf4966de.exe"2⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\SysWOW64\svchost.exe"3⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2024
-
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\SysWOW64\svchost.exe"4⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:928 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\SysWOW64\svchost.exe"5⤵PID:1600
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD5b2264c65be86ccdebcef7c17dcc2d358
SHA1689467d0657aeec3eca5d6a8f2c310931d993efd
SHA256d954c361e2750cd6bb836473202517b97c4e4894a6b924bc9a451eeb91896e00
SHA5128ba0e559f3f271c2e165f52620a6ef5d09e6442385bb894130b554de4bbd5c65ad3b31972cffb251219c6b3e9516e45d359f443eba66d2a55028c364a694302b