Analysis
-
max time kernel
172s -
max time network
190s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
04/10/2022, 03:33
Behavioral task
behavioral1
Sample
eca370714cffc52def1b513f8813c771bdb4735c4063498cd81ab42bd452ae2b.exe
Resource
win7-20220901-en
General
-
Target
eca370714cffc52def1b513f8813c771bdb4735c4063498cd81ab42bd452ae2b.exe
-
Size
336KB
-
MD5
69d0cba10d41ffaded42a429d339c5a5
-
SHA1
30f6aac8ba2883f098d23d2448b52dc4592fdec6
-
SHA256
eca370714cffc52def1b513f8813c771bdb4735c4063498cd81ab42bd452ae2b
-
SHA512
51e6e9e3d4590b75e0f805805450a15eb8ef25f94121c9031598ba79312f02ec156f9fee840f4d4b8607955896f1e37045587d4b4a85b925b36c460dd52937f2
-
SSDEEP
6144:qOpslFlqphdBCkWYxuukP1pjSKSNVkq/MVJb3D68ws:qwslWTBd47GLRMTb3D68ws
Malware Config
Extracted
cybergate
v1.07.5
Test
nekisamja.no-ip.biz:85
127.0.0.1:999
L38D5PV8S47081
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
install
-
install_file
explorer.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
156577_a
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Signatures
-
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\install\\explorer.exe" server.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run server.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\install\\explorer.exe" server.exe -
Executes dropped EXE 3 IoCs
pid Process 4492 server.exe 4468 server.exe 4136 explorer.exe -
Modifies Installed Components in the registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{387K34EM-GBK7-R4AX-YBD4-W4GWY0E4T6H4} server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{387K34EM-GBK7-R4AX-YBD4-W4GWY0E4T6H4}\StubPath = "C:\\Windows\\system32\\install\\explorer.exe Restart" server.exe -
resource yara_rule behavioral2/memory/4492-137-0x0000000010410000-0x0000000010475000-memory.dmp upx behavioral2/memory/4492-144-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral2/memory/4468-147-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral2/memory/4468-150-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral2/memory/4468-153-0x0000000010480000-0x00000000104E5000-memory.dmp upx -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation eca370714cffc52def1b513f8813c771bdb4735c4063498cd81ab42bd452ae2b.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation server.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\system32\\install\\explorer.exe" server.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run server.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\system32\\install\\explorer.exe" server.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\install\explorer.exe server.exe File opened for modification C:\Windows\SysWOW64\install\explorer.exe server.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1444 4136 WerFault.exe 87 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4492 server.exe 4492 server.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4468 server.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeBackupPrivilege 4468 server.exe Token: SeRestorePrivilege 4468 server.exe Token: SeDebugPrivilege 4468 server.exe Token: SeDebugPrivilege 4468 server.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1684 wrote to memory of 4492 1684 eca370714cffc52def1b513f8813c771bdb4735c4063498cd81ab42bd452ae2b.exe 83 PID 1684 wrote to memory of 4492 1684 eca370714cffc52def1b513f8813c771bdb4735c4063498cd81ab42bd452ae2b.exe 83 PID 1684 wrote to memory of 4492 1684 eca370714cffc52def1b513f8813c771bdb4735c4063498cd81ab42bd452ae2b.exe 83 PID 4492 wrote to memory of 1840 4492 server.exe 85 PID 4492 wrote to memory of 1840 4492 server.exe 85 PID 4492 wrote to memory of 1840 4492 server.exe 85 PID 4492 wrote to memory of 1840 4492 server.exe 85 PID 4492 wrote to memory of 1840 4492 server.exe 85 PID 4492 wrote to memory of 1840 4492 server.exe 85 PID 4492 wrote to memory of 1840 4492 server.exe 85 PID 4492 wrote to memory of 1840 4492 server.exe 85 PID 4492 wrote to memory of 1840 4492 server.exe 85 PID 4492 wrote to memory of 1840 4492 server.exe 85 PID 4492 wrote to memory of 1840 4492 server.exe 85 PID 4492 wrote to memory of 1840 4492 server.exe 85 PID 4492 wrote to memory of 1840 4492 server.exe 85 PID 4492 wrote to memory of 1840 4492 server.exe 85 PID 4492 wrote to memory of 1840 4492 server.exe 85 PID 4492 wrote to memory of 1840 4492 server.exe 85 PID 4492 wrote to memory of 1840 4492 server.exe 85 PID 4492 wrote to memory of 1840 4492 server.exe 85 PID 4492 wrote to memory of 1840 4492 server.exe 85 PID 4492 wrote to memory of 1840 4492 server.exe 85 PID 4492 wrote to memory of 1840 4492 server.exe 85 PID 4492 wrote to memory of 1840 4492 server.exe 85 PID 4492 wrote to memory of 1840 4492 server.exe 85 PID 4492 wrote to memory of 1840 4492 server.exe 85 PID 4492 wrote to memory of 1840 4492 server.exe 85 PID 4492 wrote to memory of 1840 4492 server.exe 85 PID 4492 wrote to memory of 1840 4492 server.exe 85 PID 4492 wrote to memory of 1840 4492 server.exe 85 PID 4492 wrote to memory of 1840 4492 server.exe 85 PID 4492 wrote to memory of 1840 4492 server.exe 85 PID 4492 wrote to memory of 1840 4492 server.exe 85 PID 4492 wrote to memory of 1840 4492 server.exe 85 PID 4492 wrote to memory of 1840 4492 server.exe 85 PID 4492 wrote to memory of 1840 4492 server.exe 85 PID 4492 wrote to memory of 1840 4492 server.exe 85 PID 4492 wrote to memory of 1840 4492 server.exe 85 PID 4492 wrote to memory of 1840 4492 server.exe 85 PID 4492 wrote to memory of 1840 4492 server.exe 85 PID 4492 wrote to memory of 1840 4492 server.exe 85 PID 4492 wrote to memory of 1840 4492 server.exe 85 PID 4492 wrote to memory of 1840 4492 server.exe 85 PID 4492 wrote to memory of 1840 4492 server.exe 85 PID 4492 wrote to memory of 1840 4492 server.exe 85 PID 4492 wrote to memory of 1840 4492 server.exe 85 PID 4492 wrote to memory of 1840 4492 server.exe 85 PID 4492 wrote to memory of 1840 4492 server.exe 85 PID 4492 wrote to memory of 1840 4492 server.exe 85 PID 4492 wrote to memory of 1840 4492 server.exe 85 PID 4492 wrote to memory of 1840 4492 server.exe 85 PID 4492 wrote to memory of 1840 4492 server.exe 85 PID 4492 wrote to memory of 1840 4492 server.exe 85 PID 4492 wrote to memory of 1840 4492 server.exe 85 PID 4492 wrote to memory of 1840 4492 server.exe 85 PID 4492 wrote to memory of 1840 4492 server.exe 85 PID 4492 wrote to memory of 1840 4492 server.exe 85 PID 4492 wrote to memory of 1840 4492 server.exe 85 PID 4492 wrote to memory of 1840 4492 server.exe 85 PID 4492 wrote to memory of 1840 4492 server.exe 85 PID 4492 wrote to memory of 1840 4492 server.exe 85 PID 4492 wrote to memory of 1840 4492 server.exe 85 PID 4492 wrote to memory of 1840 4492 server.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\eca370714cffc52def1b513f8813c771bdb4735c4063498cd81ab42bd452ae2b.exe"C:\Users\Admin\AppData\Local\Temp\eca370714cffc52def1b513f8813c771bdb4735c4063498cd81ab42bd452ae2b.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Users\Admin\AppData\Local\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe"2⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Modifies Installed Components in the registry
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:1840
-
-
C:\Users\Admin\AppData\Local\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe"3⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:4468 -
C:\Windows\SysWOW64\install\explorer.exe"C:\Windows\system32\install\explorer.exe"4⤵
- Executes dropped EXE
PID:4136 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4136 -s 5805⤵
- Program crash
PID:1444
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 4136 -ip 41361⤵PID:3892
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD5c0a1f8fd298a75bde9a1cc0c9677f4e9
SHA1e8d8a8c6397e1ea6b0caf3f72c875e1faacfe3fc
SHA256ae32052942756e2e3ddaa13514583df7a8a90389fe71df591c95324638825be8
SHA512edac4cd3a670c9aa0c897d0c0727ffceb8ff936c2011141976185736376fcea827369aee7b90f532bb806843de638f2509997cf15569958a53140051406785e3
-
Filesize
296KB
MD52a244f64f229c38e3e17b0e1afa43461
SHA1dd8537e3f47b71c3981c8d21c01148386d7ff4f2
SHA25656b8f88b352dd1632966e032ff2e1aebdb84bf8cd706bae8936035459157315c
SHA5124e350ee723dc59fdd5a07705e5f77b54bf9f0fbbfaba8395fa063cecdad48daece3a8438facc8ee9bb286ebe946f5fd5434a4e965f3fe6bc789349d4e5410b84
-
Filesize
296KB
MD52a244f64f229c38e3e17b0e1afa43461
SHA1dd8537e3f47b71c3981c8d21c01148386d7ff4f2
SHA25656b8f88b352dd1632966e032ff2e1aebdb84bf8cd706bae8936035459157315c
SHA5124e350ee723dc59fdd5a07705e5f77b54bf9f0fbbfaba8395fa063cecdad48daece3a8438facc8ee9bb286ebe946f5fd5434a4e965f3fe6bc789349d4e5410b84
-
Filesize
296KB
MD52a244f64f229c38e3e17b0e1afa43461
SHA1dd8537e3f47b71c3981c8d21c01148386d7ff4f2
SHA25656b8f88b352dd1632966e032ff2e1aebdb84bf8cd706bae8936035459157315c
SHA5124e350ee723dc59fdd5a07705e5f77b54bf9f0fbbfaba8395fa063cecdad48daece3a8438facc8ee9bb286ebe946f5fd5434a4e965f3fe6bc789349d4e5410b84
-
Filesize
296KB
MD52a244f64f229c38e3e17b0e1afa43461
SHA1dd8537e3f47b71c3981c8d21c01148386d7ff4f2
SHA25656b8f88b352dd1632966e032ff2e1aebdb84bf8cd706bae8936035459157315c
SHA5124e350ee723dc59fdd5a07705e5f77b54bf9f0fbbfaba8395fa063cecdad48daece3a8438facc8ee9bb286ebe946f5fd5434a4e965f3fe6bc789349d4e5410b84
-
Filesize
296KB
MD52a244f64f229c38e3e17b0e1afa43461
SHA1dd8537e3f47b71c3981c8d21c01148386d7ff4f2
SHA25656b8f88b352dd1632966e032ff2e1aebdb84bf8cd706bae8936035459157315c
SHA5124e350ee723dc59fdd5a07705e5f77b54bf9f0fbbfaba8395fa063cecdad48daece3a8438facc8ee9bb286ebe946f5fd5434a4e965f3fe6bc789349d4e5410b84