Analysis
-
max time kernel
152s -
max time network
68s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
02/10/2022, 13:00
Static task
static1
Behavioral task
behavioral1
Sample
824cd81bb1f2e09a9948fd4713a7e330e0eed613c707a746aff07ac8a02f9a7f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
824cd81bb1f2e09a9948fd4713a7e330e0eed613c707a746aff07ac8a02f9a7f.exe
Resource
win10v2004-20220812-en
General
-
Target
824cd81bb1f2e09a9948fd4713a7e330e0eed613c707a746aff07ac8a02f9a7f.exe
-
Size
949KB
-
MD5
676b2cd05e641e3eac05ae3e2f9a4fd0
-
SHA1
82d9da10dbf62d65513e1286333f0585491e914a
-
SHA256
824cd81bb1f2e09a9948fd4713a7e330e0eed613c707a746aff07ac8a02f9a7f
-
SHA512
d68d6fc183458e636d734177b82565f0419a74d5c35c08f8ff97dd491977f99ff8b4549955e161d3bccade59c57246f928368ed72635049b7474378f129a8dae
-
SSDEEP
12288:9NPEpj1NvjDdZDiQYXMqE4Xvb3BySDZVmKSUPuqWeahQeAWeBY:95EDdiQYXMq97BySrmxqrMvP
Malware Config
Extracted
cybergate
v3.4.2.4
INF_SPR_0106
clippico.zapto.org:33881
BBQJ4HII2D46NL
-
enable_keylogger
false
-
enable_message_box
false
-
ftp_directory
./logs
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
install
-
install_file
FlashPlayerPlugin_11_6_602_179.exe
-
install_flag
false
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
27042704
-
regkey_hkcu
FlashPlayerPlugin
Signatures
-
resource yara_rule behavioral1/memory/1744-82-0x0000000010410000-0x0000000010480000-memory.dmp upx behavioral1/memory/1872-87-0x0000000010410000-0x0000000010480000-memory.dmp upx behavioral1/memory/1872-89-0x0000000010410000-0x0000000010480000-memory.dmp upx behavioral1/memory/1872-90-0x0000000010410000-0x0000000010480000-memory.dmp upx -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1760 set thread context of 1744 1760 824cd81bb1f2e09a9948fd4713a7e330e0eed613c707a746aff07ac8a02f9a7f.exe 28 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1872 applaunch.exe Token: SeDebugPrivilege 1872 applaunch.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1760 wrote to memory of 1744 1760 824cd81bb1f2e09a9948fd4713a7e330e0eed613c707a746aff07ac8a02f9a7f.exe 28 PID 1760 wrote to memory of 1744 1760 824cd81bb1f2e09a9948fd4713a7e330e0eed613c707a746aff07ac8a02f9a7f.exe 28 PID 1760 wrote to memory of 1744 1760 824cd81bb1f2e09a9948fd4713a7e330e0eed613c707a746aff07ac8a02f9a7f.exe 28 PID 1760 wrote to memory of 1744 1760 824cd81bb1f2e09a9948fd4713a7e330e0eed613c707a746aff07ac8a02f9a7f.exe 28 PID 1760 wrote to memory of 1744 1760 824cd81bb1f2e09a9948fd4713a7e330e0eed613c707a746aff07ac8a02f9a7f.exe 28 PID 1760 wrote to memory of 1744 1760 824cd81bb1f2e09a9948fd4713a7e330e0eed613c707a746aff07ac8a02f9a7f.exe 28 PID 1760 wrote to memory of 1744 1760 824cd81bb1f2e09a9948fd4713a7e330e0eed613c707a746aff07ac8a02f9a7f.exe 28 PID 1760 wrote to memory of 1744 1760 824cd81bb1f2e09a9948fd4713a7e330e0eed613c707a746aff07ac8a02f9a7f.exe 28 PID 1760 wrote to memory of 1744 1760 824cd81bb1f2e09a9948fd4713a7e330e0eed613c707a746aff07ac8a02f9a7f.exe 28 PID 1760 wrote to memory of 1744 1760 824cd81bb1f2e09a9948fd4713a7e330e0eed613c707a746aff07ac8a02f9a7f.exe 28 PID 1760 wrote to memory of 1744 1760 824cd81bb1f2e09a9948fd4713a7e330e0eed613c707a746aff07ac8a02f9a7f.exe 28 PID 1760 wrote to memory of 1744 1760 824cd81bb1f2e09a9948fd4713a7e330e0eed613c707a746aff07ac8a02f9a7f.exe 28 PID 1760 wrote to memory of 1744 1760 824cd81bb1f2e09a9948fd4713a7e330e0eed613c707a746aff07ac8a02f9a7f.exe 28 PID 1760 wrote to memory of 1744 1760 824cd81bb1f2e09a9948fd4713a7e330e0eed613c707a746aff07ac8a02f9a7f.exe 28 PID 1760 wrote to memory of 1744 1760 824cd81bb1f2e09a9948fd4713a7e330e0eed613c707a746aff07ac8a02f9a7f.exe 28 PID 1760 wrote to memory of 1732 1760 824cd81bb1f2e09a9948fd4713a7e330e0eed613c707a746aff07ac8a02f9a7f.exe 29 PID 1760 wrote to memory of 1732 1760 824cd81bb1f2e09a9948fd4713a7e330e0eed613c707a746aff07ac8a02f9a7f.exe 29 PID 1760 wrote to memory of 1732 1760 824cd81bb1f2e09a9948fd4713a7e330e0eed613c707a746aff07ac8a02f9a7f.exe 29 PID 1760 wrote to memory of 1732 1760 824cd81bb1f2e09a9948fd4713a7e330e0eed613c707a746aff07ac8a02f9a7f.exe 29 PID 1744 wrote to memory of 1872 1744 applaunch.exe 31 PID 1744 wrote to memory of 1872 1744 applaunch.exe 31 PID 1744 wrote to memory of 1872 1744 applaunch.exe 31 PID 1744 wrote to memory of 1872 1744 applaunch.exe 31 PID 1744 wrote to memory of 1872 1744 applaunch.exe 31 PID 1744 wrote to memory of 1872 1744 applaunch.exe 31 PID 1744 wrote to memory of 1872 1744 applaunch.exe 31 PID 1744 wrote to memory of 1872 1744 applaunch.exe 31 PID 1744 wrote to memory of 1872 1744 applaunch.exe 31 PID 1744 wrote to memory of 1872 1744 applaunch.exe 31 PID 1744 wrote to memory of 1872 1744 applaunch.exe 31 PID 1744 wrote to memory of 1872 1744 applaunch.exe 31 PID 1744 wrote to memory of 1872 1744 applaunch.exe 31 PID 1744 wrote to memory of 1872 1744 applaunch.exe 31 PID 1744 wrote to memory of 1872 1744 applaunch.exe 31 PID 1744 wrote to memory of 1872 1744 applaunch.exe 31 PID 1744 wrote to memory of 1872 1744 applaunch.exe 31 PID 1744 wrote to memory of 1872 1744 applaunch.exe 31 PID 1744 wrote to memory of 1872 1744 applaunch.exe 31 PID 1744 wrote to memory of 1872 1744 applaunch.exe 31 PID 1744 wrote to memory of 1872 1744 applaunch.exe 31 PID 1744 wrote to memory of 1872 1744 applaunch.exe 31 PID 1744 wrote to memory of 1872 1744 applaunch.exe 31 PID 1744 wrote to memory of 1872 1744 applaunch.exe 31 PID 1744 wrote to memory of 1872 1744 applaunch.exe 31 PID 1744 wrote to memory of 1872 1744 applaunch.exe 31 PID 1744 wrote to memory of 1872 1744 applaunch.exe 31 PID 1744 wrote to memory of 1872 1744 applaunch.exe 31 PID 1744 wrote to memory of 1872 1744 applaunch.exe 31 PID 1744 wrote to memory of 1872 1744 applaunch.exe 31 PID 1744 wrote to memory of 1872 1744 applaunch.exe 31 PID 1744 wrote to memory of 1872 1744 applaunch.exe 31 PID 1744 wrote to memory of 1872 1744 applaunch.exe 31 PID 1744 wrote to memory of 1872 1744 applaunch.exe 31 PID 1744 wrote to memory of 1872 1744 applaunch.exe 31 PID 1744 wrote to memory of 1872 1744 applaunch.exe 31 PID 1744 wrote to memory of 1872 1744 applaunch.exe 31 PID 1744 wrote to memory of 1872 1744 applaunch.exe 31 PID 1744 wrote to memory of 1872 1744 applaunch.exe 31 PID 1744 wrote to memory of 1872 1744 applaunch.exe 31 PID 1744 wrote to memory of 1872 1744 applaunch.exe 31 PID 1744 wrote to memory of 1872 1744 applaunch.exe 31 PID 1744 wrote to memory of 1872 1744 applaunch.exe 31 PID 1744 wrote to memory of 1872 1744 applaunch.exe 31 PID 1744 wrote to memory of 1872 1744 applaunch.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\824cd81bb1f2e09a9948fd4713a7e330e0eed613c707a746aff07ac8a02f9a7f.exe"C:\Users\Admin\AppData\Local\Temp\824cd81bb1f2e09a9948fd4713a7e330e0eed613c707a746aff07ac8a02f9a7f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\applaunch.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\applaunch.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\applaunch.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\applaunch.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1872
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\YiafN.vbs"2⤵PID:1732
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
234KB
MD5fe3a60c68d5d289537d7f577b7b41509
SHA1a6c123640a3ba69dd3ec4e827f3d126926614f94
SHA2563c0e800cd82fcc2cf7168cc91c55a48e9d977b7f6b16a8df701a15037ba5c224
SHA512f90910c8d772a5d3cb924bb7b2fea2b57c394cd3cb4dec4c3f74c1e02e9cd7d5dacc8b20425dc24395d4c0f8f08ce6cd8d3a125fd7481df77f11911229272a13
-
Filesize
448B
MD5ecf01140383176c2bef9230e582abe31
SHA1e0d093025188f9b015957248602fa9d72d02295b
SHA2561a9a96a3ad5dea6540d0c9dc87e6c5f257f5abb55c7f1bd95783ff2bb13bb235
SHA512e48e246b7a6d03fc38dca7dceb0d4f713a9ce8936fa06f8905d9a909e3a48fafc2d623f38df9b14defdc63186f4eb48635af79be41d21b0dad448e03db9b005e