Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03/10/2022, 07:23
Behavioral task
behavioral1
Sample
abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe
Resource
win7-20220812-en
General
-
Target
abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe
-
Size
281KB
-
MD5
68eb7c7ae5f1b6d1dbfca954d42cefdf
-
SHA1
ffee3029a64d93f7bcf56c6417bfc07902a13d82
-
SHA256
abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4
-
SHA512
80bf7bd333f6050ca9f436adff69747524ea05f7d135e1f8afcf8517ca46e3f5a6a6f28d63d62245cf381b1cf32350958e52dbb78cc005dde9e7e76e75319bfe
-
SSDEEP
6144:Oy+phOTwlTIBoFUQ23QIKPhzD61+XEQY48U:L+pw0lIBoMAfN214lf
Malware Config
Extracted
cybergate
v1.11.0
MTO
jjleo.no-ip.biz:3333
0J4TF557YB86G7
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_file
svchost
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
jntdkb
-
regkey_hkcu
HKCU\Windows® NetMeeting
-
regkey_hklm
HKLM\Windows® NetMeeting
Signatures
-
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies\Windows® NetMeeting = "C:\\Windows\\svchost" abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies\Windows® NetMeeting = "C:\\Windows\\svchost" abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe -
Modifies Installed Components in the registry 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{32W562W7-018X-UE5S-R824-QI8AXIT873HU} abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{32W562W7-018X-UE5S-R824-QI8AXIT873HU}\StubPath = "C:\\Windows\\svchost Restart" abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{32W562W7-018X-UE5S-R824-QI8AXIT873HU} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{32W562W7-018X-UE5S-R824-QI8AXIT873HU}\StubPath = "C:\\Windows\\svchost" explorer.exe -
resource yara_rule behavioral1/memory/1248-55-0x0000000010410000-0x0000000010482000-memory.dmp upx behavioral1/memory/1248-64-0x0000000010490000-0x0000000010502000-memory.dmp upx behavioral1/memory/1136-69-0x0000000010490000-0x0000000010502000-memory.dmp upx behavioral1/memory/1136-72-0x0000000010490000-0x0000000010502000-memory.dmp upx behavioral1/memory/1248-77-0x0000000010510000-0x0000000010582000-memory.dmp upx behavioral1/memory/776-82-0x0000000010510000-0x0000000010582000-memory.dmp upx behavioral1/memory/776-83-0x0000000010510000-0x0000000010582000-memory.dmp upx behavioral1/memory/776-84-0x0000000010510000-0x0000000010582000-memory.dmp upx -
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost explorer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost explorer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ explorer.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM\Windows® NetMeeting = "C:\\Windows\\svchost" abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU\Windows® NetMeeting = "C:\\Windows\\svchost" abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\svchost abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe File opened for modification C:\Windows\svchost abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe File opened for modification C:\Windows\svchost explorer.exe File opened for modification C:\Windows\ explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 776 explorer.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeBackupPrivilege 1136 explorer.exe Token: SeRestorePrivilege 1136 explorer.exe Token: SeBackupPrivilege 776 explorer.exe Token: SeRestorePrivilege 776 explorer.exe Token: SeDebugPrivilege 776 explorer.exe Token: SeDebugPrivilege 776 explorer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1248 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1248 wrote to memory of 1444 1248 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 12 PID 1248 wrote to memory of 1444 1248 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 12 PID 1248 wrote to memory of 1444 1248 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 12 PID 1248 wrote to memory of 1444 1248 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 12 PID 1248 wrote to memory of 1444 1248 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 12 PID 1248 wrote to memory of 1444 1248 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 12 PID 1248 wrote to memory of 1444 1248 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 12 PID 1248 wrote to memory of 1444 1248 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 12 PID 1248 wrote to memory of 1444 1248 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 12 PID 1248 wrote to memory of 1444 1248 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 12 PID 1248 wrote to memory of 1444 1248 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 12 PID 1248 wrote to memory of 1444 1248 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 12 PID 1248 wrote to memory of 1444 1248 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 12 PID 1248 wrote to memory of 1444 1248 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 12 PID 1248 wrote to memory of 1444 1248 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 12 PID 1248 wrote to memory of 1444 1248 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 12 PID 1248 wrote to memory of 1444 1248 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 12 PID 1248 wrote to memory of 1444 1248 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 12 PID 1248 wrote to memory of 1444 1248 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 12 PID 1248 wrote to memory of 1444 1248 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 12 PID 1248 wrote to memory of 1444 1248 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 12 PID 1248 wrote to memory of 1444 1248 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 12 PID 1248 wrote to memory of 1444 1248 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 12 PID 1248 wrote to memory of 1444 1248 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 12 PID 1248 wrote to memory of 1444 1248 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 12 PID 1248 wrote to memory of 1444 1248 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 12 PID 1248 wrote to memory of 1444 1248 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 12 PID 1248 wrote to memory of 1444 1248 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 12 PID 1248 wrote to memory of 1444 1248 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 12 PID 1248 wrote to memory of 1444 1248 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 12 PID 1248 wrote to memory of 1444 1248 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 12 PID 1248 wrote to memory of 1444 1248 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 12 PID 1248 wrote to memory of 1444 1248 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 12 PID 1248 wrote to memory of 1444 1248 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 12 PID 1248 wrote to memory of 1444 1248 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 12 PID 1248 wrote to memory of 1444 1248 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 12 PID 1248 wrote to memory of 1444 1248 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 12 PID 1248 wrote to memory of 1444 1248 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 12 PID 1248 wrote to memory of 1444 1248 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 12 PID 1248 wrote to memory of 1444 1248 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 12 PID 1248 wrote to memory of 1444 1248 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 12 PID 1248 wrote to memory of 1444 1248 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 12 PID 1248 wrote to memory of 1444 1248 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 12 PID 1248 wrote to memory of 1444 1248 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 12 PID 1248 wrote to memory of 1444 1248 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 12 PID 1248 wrote to memory of 1444 1248 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 12 PID 1248 wrote to memory of 1444 1248 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 12 PID 1248 wrote to memory of 1444 1248 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 12 PID 1248 wrote to memory of 1444 1248 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 12 PID 1248 wrote to memory of 1444 1248 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 12 PID 1248 wrote to memory of 1444 1248 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 12 PID 1248 wrote to memory of 1444 1248 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 12 PID 1248 wrote to memory of 1444 1248 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 12 PID 1248 wrote to memory of 1444 1248 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 12 PID 1248 wrote to memory of 1444 1248 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 12 PID 1248 wrote to memory of 1444 1248 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 12 PID 1248 wrote to memory of 1444 1248 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 12 PID 1248 wrote to memory of 1444 1248 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 12 PID 1248 wrote to memory of 1444 1248 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 12 PID 1248 wrote to memory of 1444 1248 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 12 PID 1248 wrote to memory of 1444 1248 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 12 PID 1248 wrote to memory of 1444 1248 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 12 PID 1248 wrote to memory of 1444 1248 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 12 PID 1248 wrote to memory of 1444 1248 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 12
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1444
-
C:\Users\Admin\AppData\Local\Temp\abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe"C:\Users\Admin\AppData\Local\Temp\abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe"2⤵
- Adds policy Run key to start application
- Modifies Installed Components in the registry
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵
- Modifies Installed Components in the registry
- Suspicious use of AdjustPrivilegeToken
PID:1136
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵
- Drops startup file
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:776
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
239KB
MD5f1d834f45410020ad38440af9e05d71c
SHA15968f4ca5bdd2683a0800bc0af0d1cb3b502fd17
SHA256250b917a36a5f61e0be3bb2b5aa4c7aaf220f637ca027165425eb8efbfc8d238
SHA5125e181e7a7fb588a61334eca77e11a51acb959624f6e2498fd9a98159aa8f3031a7ef68cd445c38e230f614a8e9999e5947140d74f055760ca4e118fa542688cc
-
Filesize
281KB
MD568eb7c7ae5f1b6d1dbfca954d42cefdf
SHA1ffee3029a64d93f7bcf56c6417bfc07902a13d82
SHA256abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4
SHA51280bf7bd333f6050ca9f436adff69747524ea05f7d135e1f8afcf8517ca46e3f5a6a6f28d63d62245cf381b1cf32350958e52dbb78cc005dde9e7e76e75319bfe