Analysis

  • max time kernel
    151s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-10-2022 01:34

General

  • Target

    177a2d0e340135f5961c5bad463a499ad0efa9dea5668bd320ccb12074b4d3ad.exe

  • Size

    1.8MB

  • MD5

    04d799029ab0e86964b91d200a7d669b

  • SHA1

    d2686050393e7891a3727a1cf8850c24df87e722

  • SHA256

    177a2d0e340135f5961c5bad463a499ad0efa9dea5668bd320ccb12074b4d3ad

  • SHA512

    f7eec1d88f017064d21929a9640e8e1839ea53bf57e0f96d657528d83491ed4d792205832ab3a9cb907317befdaf1e3c2d52d7926ff27ad9ff0552d51461daf7

  • SSDEEP

    49152:ydSpWnEMLne6wVT0W9/1qw/rZZaUH8iwi:ydS58neiwD2UciT

Malware Config

Extracted

Family

cybergate

Version

2.6

Botnet

vítima

C2

cabrakan.zapto.org:81

Mutex

***MUTEX***

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    install

  • install_file

    svchost.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Net Framework 3,5 yükleyiniz.

  • message_box_title

    Net Framework

  • password

    abcd1234

  • regkey_hkcu

    HKCU

Signatures

  • CyberGate, Rebhip

    CyberGate is a lightweight remote administration tool with a wide array of functionalities.

  • Adds policy Run key to start application 2 TTPs 4 IoCs
  • Executes dropped EXE 3 IoCs
  • Modifies Installed Components in the registry 2 TTPs 2 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in System32 directory 5 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 29 IoCs
  • NTFS ADS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\177a2d0e340135f5961c5bad463a499ad0efa9dea5668bd320ccb12074b4d3ad.exe
    "C:\Users\Admin\AppData\Local\Temp\177a2d0e340135f5961c5bad463a499ad0efa9dea5668bd320ccb12074b4d3ad.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:5012
    • C:\Users\Admin\AppData\Local\Temp\177a2d0e340135f5961c5bad463a499ad0efa9dea5668bd320ccb12074b4d3ad.exe
      "C:\Users\Admin\AppData\Local\Temp\177a2d0e340135f5961c5bad463a499ad0efa9dea5668bd320ccb12074b4d3ad.exe"
      2⤵
      • Checks BIOS information in registry
      • Suspicious use of SetThreadContext
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1584
      • C:\Users\Admin\AppData\Local\Temp\177a2d0e340135f5961c5bad463a499ad0efa9dea5668bd320ccb12074b4d3ad.exe
        3⤵
        • Adds policy Run key to start application
        • Modifies Installed Components in the registry
        • Adds Run key to start application
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:4392
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe"
          4⤵
            PID:1160
          • C:\Users\Admin\AppData\Local\Temp\177a2d0e340135f5961c5bad463a499ad0efa9dea5668bd320ccb12074b4d3ad.exe
            "C:\Users\Admin\AppData\Local\Temp\177a2d0e340135f5961c5bad463a499ad0efa9dea5668bd320ccb12074b4d3ad.exe"
            4⤵
            • Checks computer location settings
            • Drops file in System32 directory
            • Modifies registry class
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of AdjustPrivilegeToken
            PID:1324
            • C:\Windows\SysWOW64\install\svchost.exe
              "C:\Windows\system32\install\svchost.exe"
              5⤵
              • Executes dropped EXE
              PID:4148
              • C:\Windows\SysWOW64\install\svchost.exe
                "C:\Windows\system32\install\svchost.exe"
                6⤵
                • Executes dropped EXE
                • Checks BIOS information in registry
                • Drops file in System32 directory
                • Suspicious use of SetThreadContext
                • Modifies registry class
                • NTFS ADS
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of SetWindowsHookEx
                PID:3896
                • C:\Windows\SysWOW64\install\svchost.exe
                  7⤵
                  • Executes dropped EXE
                  • Suspicious behavior: EnumeratesProcesses
                  PID:4452

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    3
    T1060

    Defense Evasion

    Modify Registry

    3
    T1112

    Discovery

    Query Registry

    2
    T1012

    System Information Discovery

    3
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\XX--XX--XX.txt
      Filesize

      229KB

      MD5

      b74a6f1a0e835942ea3a5426bba9f832

      SHA1

      0c0094999d11dc7010fa09dc95ff928030111f76

      SHA256

      f3ec1e6b3c3baba8666b1f450570a2177f50ab6cff7c1a87d89aea9acdd32819

      SHA512

      67f1a496a761e8cb3e8605845e7b1e6e1b5e8b29793129dc1da00a9adbafad9cda5dda5533de6bbbafb11fad01f9bc4035e2c6cafaef4bdd6db203fd0405b647

    • C:\Windows\SysWOW64\install\svchost.exe
      Filesize

      1.8MB

      MD5

      04d799029ab0e86964b91d200a7d669b

      SHA1

      d2686050393e7891a3727a1cf8850c24df87e722

      SHA256

      177a2d0e340135f5961c5bad463a499ad0efa9dea5668bd320ccb12074b4d3ad

      SHA512

      f7eec1d88f017064d21929a9640e8e1839ea53bf57e0f96d657528d83491ed4d792205832ab3a9cb907317befdaf1e3c2d52d7926ff27ad9ff0552d51461daf7

    • C:\Windows\SysWOW64\install\svchost.exe
      Filesize

      1.8MB

      MD5

      04d799029ab0e86964b91d200a7d669b

      SHA1

      d2686050393e7891a3727a1cf8850c24df87e722

      SHA256

      177a2d0e340135f5961c5bad463a499ad0efa9dea5668bd320ccb12074b4d3ad

      SHA512

      f7eec1d88f017064d21929a9640e8e1839ea53bf57e0f96d657528d83491ed4d792205832ab3a9cb907317befdaf1e3c2d52d7926ff27ad9ff0552d51461daf7

    • C:\Windows\SysWOW64\install\svchost.exe
      Filesize

      1.8MB

      MD5

      04d799029ab0e86964b91d200a7d669b

      SHA1

      d2686050393e7891a3727a1cf8850c24df87e722

      SHA256

      177a2d0e340135f5961c5bad463a499ad0efa9dea5668bd320ccb12074b4d3ad

      SHA512

      f7eec1d88f017064d21929a9640e8e1839ea53bf57e0f96d657528d83491ed4d792205832ab3a9cb907317befdaf1e3c2d52d7926ff27ad9ff0552d51461daf7

    • C:\Windows\SysWOW64\install\svchost.exe
      Filesize

      1.8MB

      MD5

      04d799029ab0e86964b91d200a7d669b

      SHA1

      d2686050393e7891a3727a1cf8850c24df87e722

      SHA256

      177a2d0e340135f5961c5bad463a499ad0efa9dea5668bd320ccb12074b4d3ad

      SHA512

      f7eec1d88f017064d21929a9640e8e1839ea53bf57e0f96d657528d83491ed4d792205832ab3a9cb907317befdaf1e3c2d52d7926ff27ad9ff0552d51461daf7

    • memory/1324-277-0x0000000024080000-0x00000000240E2000-memory.dmp
      Filesize

      392KB

    • memory/1324-200-0x0000000000000000-mapping.dmp
    • memory/1324-209-0x0000000000400000-0x000000000060A000-memory.dmp
      Filesize

      2.0MB

    • memory/1324-210-0x0000000024080000-0x00000000240E2000-memory.dmp
      Filesize

      392KB

    • memory/1324-205-0x0000000024080000-0x00000000240E2000-memory.dmp
      Filesize

      392KB

    • memory/1584-161-0x000000000040F000-0x0000000000410000-memory.dmp
      Filesize

      4KB

    • memory/1584-169-0x0000000000400000-0x000000000060A000-memory.dmp
      Filesize

      2.0MB

    • memory/1584-151-0x0000000000406000-0x0000000000407000-memory.dmp
      Filesize

      4KB

    • memory/1584-154-0x0000000000404000-0x0000000000405000-memory.dmp
      Filesize

      4KB

    • memory/1584-155-0x0000000000403000-0x0000000000404000-memory.dmp
      Filesize

      4KB

    • memory/1584-156-0x000000000040E000-0x000000000040F000-memory.dmp
      Filesize

      4KB

    • memory/1584-157-0x000000000040C000-0x000000000040D000-memory.dmp
      Filesize

      4KB

    • memory/1584-158-0x0000000000408000-0x0000000000409000-memory.dmp
      Filesize

      4KB

    • memory/1584-159-0x000000000040A000-0x000000000040B000-memory.dmp
      Filesize

      4KB

    • memory/1584-160-0x0000000000405000-0x0000000000406000-memory.dmp
      Filesize

      4KB

    • memory/1584-149-0x0000000000402000-0x0000000000403000-memory.dmp
      Filesize

      4KB

    • memory/1584-162-0x0000000000410000-0x0000000000411000-memory.dmp
      Filesize

      4KB

    • memory/1584-163-0x0000000000411000-0x0000000000412000-memory.dmp
      Filesize

      4KB

    • memory/1584-164-0x0000000000416000-0x0000000000417000-memory.dmp
      Filesize

      4KB

    • memory/1584-166-0x0000000000450000-0x0000000000451000-memory.dmp
      Filesize

      4KB

    • memory/1584-167-0x0000000000451000-0x0000000000452000-memory.dmp
      Filesize

      4KB

    • memory/1584-168-0x0000000000452000-0x0000000000453000-memory.dmp
      Filesize

      4KB

    • memory/1584-152-0x0000000000407000-0x0000000000408000-memory.dmp
      Filesize

      4KB

    • memory/1584-170-0x0000000000414000-0x0000000000415000-memory.dmp
      Filesize

      4KB

    • memory/1584-171-0x0000000000453000-0x0000000000454000-memory.dmp
      Filesize

      4KB

    • memory/1584-172-0x0000000000415000-0x0000000000416000-memory.dmp
      Filesize

      4KB

    • memory/1584-173-0x0000000000412000-0x0000000000413000-memory.dmp
      Filesize

      4KB

    • memory/1584-174-0x0000000000454000-0x0000000000455000-memory.dmp
      Filesize

      4KB

    • memory/1584-148-0x0000000000401000-0x0000000000402000-memory.dmp
      Filesize

      4KB

    • memory/1584-146-0x0000000000400000-0x000000000060A000-memory.dmp
      Filesize

      2.0MB

    • memory/1584-177-0x0000000000455000-0x0000000000456000-memory.dmp
      Filesize

      4KB

    • memory/1584-145-0x0000000000400000-0x000000000060A000-memory.dmp
      Filesize

      2.0MB

    • memory/1584-178-0x0000000000413000-0x0000000000414000-memory.dmp
      Filesize

      4KB

    • memory/1584-144-0x0000000000400000-0x000000000060A000-memory.dmp
      Filesize

      2.0MB

    • memory/1584-143-0x00000000024B1000-0x000000000259F000-memory.dmp
      Filesize

      952KB

    • memory/1584-142-0x0000000000400000-0x000000000060A000-memory.dmp
      Filesize

      2.0MB

    • memory/1584-136-0x00000000024B0000-0x00000000025E8000-memory.dmp
      Filesize

      1.2MB

    • memory/1584-134-0x0000000000000000-mapping.dmp
    • memory/3896-214-0x0000000000000000-mapping.dmp
    • memory/3896-218-0x0000000002C00000-0x0000000002D38000-memory.dmp
      Filesize

      1.2MB

    • memory/3896-267-0x0000000002C01000-0x0000000002CEF000-memory.dmp
      Filesize

      952KB

    • memory/3896-228-0x0000000000400000-0x000000000060A000-memory.dmp
      Filesize

      2.0MB

    • memory/3896-227-0x0000000000400000-0x000000000060A000-memory.dmp
      Filesize

      2.0MB

    • memory/3896-226-0x0000000000400000-0x000000000060A000-memory.dmp
      Filesize

      2.0MB

    • memory/3896-225-0x0000000002C01000-0x0000000002CEF000-memory.dmp
      Filesize

      952KB

    • memory/3896-224-0x0000000000400000-0x000000000060A000-memory.dmp
      Filesize

      2.0MB

    • memory/4148-211-0x0000000000000000-mapping.dmp
    • memory/4148-215-0x0000000000400000-0x000000000060A000-memory.dmp
      Filesize

      2.0MB

    • memory/4148-264-0x0000000000400000-0x000000000060A000-memory.dmp
      Filesize

      2.0MB

    • memory/4392-196-0x0000000024010000-0x0000000024072000-memory.dmp
      Filesize

      392KB

    • memory/4392-175-0x0000000000000000-mapping.dmp
    • memory/4392-206-0x0000000000400000-0x000000000044E000-memory.dmp
      Filesize

      312KB

    • memory/4392-181-0x0000000000400000-0x000000000044E000-memory.dmp
      Filesize

      312KB

    • memory/4392-202-0x0000000024080000-0x00000000240E2000-memory.dmp
      Filesize

      392KB

    • memory/4392-194-0x0000000000400000-0x000000000044E000-memory.dmp
      Filesize

      312KB

    • memory/4392-176-0x0000000000400000-0x000000000044E000-memory.dmp
      Filesize

      312KB

    • memory/4392-180-0x0000000000400000-0x000000000044E000-memory.dmp
      Filesize

      312KB

    • memory/4452-255-0x0000000000000000-mapping.dmp
    • memory/4452-276-0x0000000000400000-0x000000000044E000-memory.dmp
      Filesize

      312KB

    • memory/4452-278-0x0000000000400000-0x000000000044E000-memory.dmp
      Filesize

      312KB

    • memory/5012-132-0x0000000000400000-0x000000000060A000-memory.dmp
      Filesize

      2.0MB

    • memory/5012-193-0x0000000000400000-0x000000000060A000-memory.dmp
      Filesize

      2.0MB

    • memory/5012-153-0x0000000000400000-0x000000000060A000-memory.dmp
      Filesize

      2.0MB