Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
03/10/2022, 07:23
Behavioral task
behavioral1
Sample
abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe
Resource
win7-20220812-en
General
-
Target
abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe
-
Size
281KB
-
MD5
68eb7c7ae5f1b6d1dbfca954d42cefdf
-
SHA1
ffee3029a64d93f7bcf56c6417bfc07902a13d82
-
SHA256
abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4
-
SHA512
80bf7bd333f6050ca9f436adff69747524ea05f7d135e1f8afcf8517ca46e3f5a6a6f28d63d62245cf381b1cf32350958e52dbb78cc005dde9e7e76e75319bfe
-
SSDEEP
6144:Oy+phOTwlTIBoFUQ23QIKPhzD61+XEQY48U:L+pw0lIBoMAfN214lf
Malware Config
Extracted
cybergate
v1.11.0
MTO
jjleo.no-ip.biz:3333
0J4TF557YB86G7
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_file
svchost
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
jntdkb
-
regkey_hkcu
HKCU\Windows® NetMeeting
-
regkey_hklm
HKLM\Windows® NetMeeting
Signatures
-
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies\Windows® NetMeeting = "C:\\Windows\\svchost" abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies\Windows® NetMeeting = "C:\\Windows\\svchost" abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe -
Modifies Installed Components in the registry 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{32W562W7-018X-UE5S-R824-QI8AXIT873HU} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{32W562W7-018X-UE5S-R824-QI8AXIT873HU}\StubPath = "C:\\Windows\\svchost" explorer.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{32W562W7-018X-UE5S-R824-QI8AXIT873HU} abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{32W562W7-018X-UE5S-R824-QI8AXIT873HU}\StubPath = "C:\\Windows\\svchost Restart" abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe -
resource yara_rule behavioral2/memory/4884-133-0x0000000010410000-0x0000000010482000-memory.dmp upx behavioral2/memory/4884-138-0x0000000010490000-0x0000000010502000-memory.dmp upx behavioral2/memory/620-141-0x0000000010490000-0x0000000010502000-memory.dmp upx behavioral2/memory/620-144-0x0000000010490000-0x0000000010502000-memory.dmp upx behavioral2/memory/4884-147-0x0000000010510000-0x0000000010582000-memory.dmp upx behavioral2/memory/960-150-0x0000000010510000-0x0000000010582000-memory.dmp upx behavioral2/memory/960-151-0x0000000010510000-0x0000000010582000-memory.dmp upx behavioral2/memory/960-152-0x0000000010510000-0x0000000010582000-memory.dmp upx -
Drops startup file 3 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost explorer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ explorer.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost explorer.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM\Windows® NetMeeting = "C:\\Windows\\svchost" abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU\Windows® NetMeeting = "C:\\Windows\\svchost" abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\svchost abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe File opened for modification C:\Windows\svchost abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe File opened for modification C:\Windows\svchost explorer.exe File opened for modification C:\Windows\ explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 960 explorer.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeBackupPrivilege 620 explorer.exe Token: SeRestorePrivilege 620 explorer.exe Token: SeBackupPrivilege 960 explorer.exe Token: SeRestorePrivilege 960 explorer.exe Token: SeDebugPrivilege 960 explorer.exe Token: SeDebugPrivilege 960 explorer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4884 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4884 wrote to memory of 2056 4884 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 67 PID 4884 wrote to memory of 2056 4884 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 67 PID 4884 wrote to memory of 2056 4884 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 67 PID 4884 wrote to memory of 2056 4884 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 67 PID 4884 wrote to memory of 2056 4884 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 67 PID 4884 wrote to memory of 2056 4884 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 67 PID 4884 wrote to memory of 2056 4884 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 67 PID 4884 wrote to memory of 2056 4884 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 67 PID 4884 wrote to memory of 2056 4884 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 67 PID 4884 wrote to memory of 2056 4884 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 67 PID 4884 wrote to memory of 2056 4884 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 67 PID 4884 wrote to memory of 2056 4884 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 67 PID 4884 wrote to memory of 2056 4884 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 67 PID 4884 wrote to memory of 2056 4884 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 67 PID 4884 wrote to memory of 2056 4884 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 67 PID 4884 wrote to memory of 2056 4884 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 67 PID 4884 wrote to memory of 2056 4884 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 67 PID 4884 wrote to memory of 2056 4884 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 67 PID 4884 wrote to memory of 2056 4884 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 67 PID 4884 wrote to memory of 2056 4884 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 67 PID 4884 wrote to memory of 2056 4884 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 67 PID 4884 wrote to memory of 2056 4884 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 67 PID 4884 wrote to memory of 2056 4884 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 67 PID 4884 wrote to memory of 2056 4884 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 67 PID 4884 wrote to memory of 2056 4884 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 67 PID 4884 wrote to memory of 2056 4884 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 67 PID 4884 wrote to memory of 2056 4884 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 67 PID 4884 wrote to memory of 2056 4884 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 67 PID 4884 wrote to memory of 2056 4884 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 67 PID 4884 wrote to memory of 2056 4884 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 67 PID 4884 wrote to memory of 2056 4884 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 67 PID 4884 wrote to memory of 2056 4884 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 67 PID 4884 wrote to memory of 2056 4884 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 67 PID 4884 wrote to memory of 2056 4884 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 67 PID 4884 wrote to memory of 2056 4884 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 67 PID 4884 wrote to memory of 2056 4884 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 67 PID 4884 wrote to memory of 2056 4884 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 67 PID 4884 wrote to memory of 2056 4884 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 67 PID 4884 wrote to memory of 2056 4884 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 67 PID 4884 wrote to memory of 2056 4884 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 67 PID 4884 wrote to memory of 2056 4884 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 67 PID 4884 wrote to memory of 2056 4884 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 67 PID 4884 wrote to memory of 2056 4884 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 67 PID 4884 wrote to memory of 2056 4884 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 67 PID 4884 wrote to memory of 2056 4884 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 67 PID 4884 wrote to memory of 2056 4884 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 67 PID 4884 wrote to memory of 2056 4884 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 67 PID 4884 wrote to memory of 2056 4884 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 67 PID 4884 wrote to memory of 2056 4884 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 67 PID 4884 wrote to memory of 2056 4884 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 67 PID 4884 wrote to memory of 2056 4884 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 67 PID 4884 wrote to memory of 2056 4884 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 67 PID 4884 wrote to memory of 2056 4884 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 67 PID 4884 wrote to memory of 2056 4884 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 67 PID 4884 wrote to memory of 2056 4884 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 67 PID 4884 wrote to memory of 2056 4884 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 67 PID 4884 wrote to memory of 2056 4884 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 67 PID 4884 wrote to memory of 2056 4884 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 67 PID 4884 wrote to memory of 2056 4884 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 67 PID 4884 wrote to memory of 2056 4884 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 67 PID 4884 wrote to memory of 2056 4884 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 67 PID 4884 wrote to memory of 2056 4884 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 67 PID 4884 wrote to memory of 2056 4884 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 67 PID 4884 wrote to memory of 2056 4884 abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe 67
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:2056
-
C:\Users\Admin\AppData\Local\Temp\abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe"C:\Users\Admin\AppData\Local\Temp\abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4.exe"2⤵
- Adds policy Run key to start application
- Modifies Installed Components in the registry
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵
- Modifies Installed Components in the registry
- Suspicious use of AdjustPrivilegeToken
PID:620
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵
- Drops startup file
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:960
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
239KB
MD5f1d834f45410020ad38440af9e05d71c
SHA15968f4ca5bdd2683a0800bc0af0d1cb3b502fd17
SHA256250b917a36a5f61e0be3bb2b5aa4c7aaf220f637ca027165425eb8efbfc8d238
SHA5125e181e7a7fb588a61334eca77e11a51acb959624f6e2498fd9a98159aa8f3031a7ef68cd445c38e230f614a8e9999e5947140d74f055760ca4e118fa542688cc
-
Filesize
281KB
MD568eb7c7ae5f1b6d1dbfca954d42cefdf
SHA1ffee3029a64d93f7bcf56c6417bfc07902a13d82
SHA256abd62866cbee40bdaf8d3d41b41f6f480527a408edf7eb8fa2f121d32eb698b4
SHA51280bf7bd333f6050ca9f436adff69747524ea05f7d135e1f8afcf8517ca46e3f5a6a6f28d63d62245cf381b1cf32350958e52dbb78cc005dde9e7e76e75319bfe