Analysis
-
max time kernel
28s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
11-10-2022 01:44
Static task
static1
Behavioral task
behavioral1
Sample
a863503b3ade528eb3985046b4b9b324528eea8bed9a22569c0ba3b5189e0dd6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a863503b3ade528eb3985046b4b9b324528eea8bed9a22569c0ba3b5189e0dd6.exe
Resource
win10v2004-20220812-en
General
-
Target
a863503b3ade528eb3985046b4b9b324528eea8bed9a22569c0ba3b5189e0dd6.exe
-
Size
356KB
-
MD5
7bf7a3959ad1b024a2b22ccd5d4387a0
-
SHA1
34a0476e3339707a75c4b852c535a3177ad4da51
-
SHA256
a863503b3ade528eb3985046b4b9b324528eea8bed9a22569c0ba3b5189e0dd6
-
SHA512
b254a0cdead57e7a28784ce402b4424f19a33c5ffe457d67ba35d174795f670257d124a9d0133d22107f1e287bc6635f8944bfdd5407b7477e436a9d68d7cf47
-
SSDEEP
6144:VTfq8aL+jyORFsyRw5nVgOrkTxPcv/BnAtTHIw2hPVd+t3kfWeIDvxH5wCK/VVRA:Vi83ayaHkTOHETHz2fm8RIjxZU/VVRXw
Malware Config
Extracted
cybergate
2.6
victime
moi1000.no-ip.biz:1000
***MUTEX***
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
svchost.exe
-
install_dir
system32
-
install_file
win32.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
texto da mensagem
-
message_box_title
t?tulo da mensagem
-
password
abcd1234
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
1.exe1.exepid process 1740 1.exe 1648 1.exe -
Modifies Installed Components in the registry 2 TTPs 2 IoCs
Processes:
1.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{23D13804-45T6-234L-70IB-PD4GC24DWNN8} 1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{23D13804-45T6-234L-70IB-PD4GC24DWNN8}\StubPath = "C:\\Windows\\system32\\system32\\win32.exe Restart" 1.exe -
Processes:
resource yara_rule behavioral1/memory/1648-63-0x0000000000400000-0x0000000000500000-memory.dmp upx behavioral1/memory/1648-65-0x0000000000400000-0x0000000000500000-memory.dmp upx behavioral1/memory/1648-67-0x0000000000400000-0x0000000000500000-memory.dmp upx behavioral1/memory/1648-70-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/1648-73-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/1648-74-0x0000000000400000-0x0000000000500000-memory.dmp upx behavioral1/memory/1648-78-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/1648-84-0x0000000024010000-0x0000000024072000-memory.dmp upx behavioral1/memory/1648-89-0x0000000000400000-0x000000000045C000-memory.dmp upx -
Loads dropped DLL 2 IoCs
Processes:
a863503b3ade528eb3985046b4b9b324528eea8bed9a22569c0ba3b5189e0dd6.exepid process 1480 a863503b3ade528eb3985046b4b9b324528eea8bed9a22569c0ba3b5189e0dd6.exe 1480 a863503b3ade528eb3985046b4b9b324528eea8bed9a22569c0ba3b5189e0dd6.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
1.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run 1.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\system32\\system32\\win32.exe" 1.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run 1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\system32\\system32\\win32.exe" 1.exe -
Drops file in System32 directory 2 IoCs
Processes:
1.exedescription ioc process File created C:\Windows\SysWOW64\system32\win32.exe 1.exe File opened for modification C:\Windows\SysWOW64\system32\win32.exe 1.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
1.exedescription pid process target process PID 1740 set thread context of 1648 1740 1.exe 1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
NTFS ADS 1 IoCs
Processes:
a863503b3ade528eb3985046b4b9b324528eea8bed9a22569c0ba3b5189e0dd6.exedescription ioc process File opened for modification C:\Extracted\.L:x”QbŸ*V Ÿã5\G´;CK(P5*M{'ŠÝŰϪt¦®£ H50cxl+ºå©Fb=½•8—[5÷|>Y±úØðŸ+Ì"Ζ„LÕþt¿K}ìÏÎl2‘ÙŽÈ~ß7ÐKtÆvàƒžÁò÷Ú;p´²ÁÙ=²ëc÷³µ‰ªµ–1!„* 0Mjˆ8ÁÉø{<Šd†ý>\¸YªŽI6…£ÙâdÇJf¹{°ÁøÐ㥡GŒïMFá,Ì)ò“ê5béÖuÉÇÒ°ô[K ‘¼œ a863503b3ade528eb3985046b4b9b324528eea8bed9a22569c0ba3b5189e0dd6.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
1.exepid process 1648 1.exe 1648 1.exe -
Suspicious behavior: MapViewOfSection 23 IoCs
Processes:
1.exepid process 1648 1.exe 1648 1.exe 1648 1.exe 1648 1.exe 1648 1.exe 1648 1.exe 1648 1.exe 1648 1.exe 1648 1.exe 1648 1.exe 1648 1.exe 1648 1.exe 1648 1.exe 1648 1.exe 1648 1.exe 1648 1.exe 1648 1.exe 1648 1.exe 1648 1.exe 1648 1.exe 1648 1.exe 1648 1.exe 1648 1.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
1.exedescription pid process Token: SeDebugPrivilege 1648 1.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
1.exeDllHost.exepid process 1648 1.exe 1836 DllHost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
1.exepid process 1740 1.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
a863503b3ade528eb3985046b4b9b324528eea8bed9a22569c0ba3b5189e0dd6.exe1.exe1.exedescription pid process target process PID 1480 wrote to memory of 1740 1480 a863503b3ade528eb3985046b4b9b324528eea8bed9a22569c0ba3b5189e0dd6.exe 1.exe PID 1480 wrote to memory of 1740 1480 a863503b3ade528eb3985046b4b9b324528eea8bed9a22569c0ba3b5189e0dd6.exe 1.exe PID 1480 wrote to memory of 1740 1480 a863503b3ade528eb3985046b4b9b324528eea8bed9a22569c0ba3b5189e0dd6.exe 1.exe PID 1480 wrote to memory of 1740 1480 a863503b3ade528eb3985046b4b9b324528eea8bed9a22569c0ba3b5189e0dd6.exe 1.exe PID 1740 wrote to memory of 1648 1740 1.exe 1.exe PID 1740 wrote to memory of 1648 1740 1.exe 1.exe PID 1740 wrote to memory of 1648 1740 1.exe 1.exe PID 1740 wrote to memory of 1648 1740 1.exe 1.exe PID 1740 wrote to memory of 1648 1740 1.exe 1.exe PID 1740 wrote to memory of 1648 1740 1.exe 1.exe PID 1740 wrote to memory of 1648 1740 1.exe 1.exe PID 1740 wrote to memory of 1648 1740 1.exe 1.exe PID 1648 wrote to memory of 368 1648 1.exe wininit.exe PID 1648 wrote to memory of 368 1648 1.exe wininit.exe PID 1648 wrote to memory of 368 1648 1.exe wininit.exe PID 1648 wrote to memory of 368 1648 1.exe wininit.exe PID 1648 wrote to memory of 368 1648 1.exe wininit.exe PID 1648 wrote to memory of 368 1648 1.exe wininit.exe PID 1648 wrote to memory of 376 1648 1.exe csrss.exe PID 1648 wrote to memory of 376 1648 1.exe csrss.exe PID 1648 wrote to memory of 376 1648 1.exe csrss.exe PID 1648 wrote to memory of 376 1648 1.exe csrss.exe PID 1648 wrote to memory of 376 1648 1.exe csrss.exe PID 1648 wrote to memory of 376 1648 1.exe csrss.exe PID 1648 wrote to memory of 416 1648 1.exe winlogon.exe PID 1648 wrote to memory of 416 1648 1.exe winlogon.exe PID 1648 wrote to memory of 416 1648 1.exe winlogon.exe PID 1648 wrote to memory of 416 1648 1.exe winlogon.exe PID 1648 wrote to memory of 416 1648 1.exe winlogon.exe PID 1648 wrote to memory of 416 1648 1.exe winlogon.exe PID 1648 wrote to memory of 460 1648 1.exe services.exe PID 1648 wrote to memory of 460 1648 1.exe services.exe PID 1648 wrote to memory of 460 1648 1.exe services.exe PID 1648 wrote to memory of 460 1648 1.exe services.exe PID 1648 wrote to memory of 460 1648 1.exe services.exe PID 1648 wrote to memory of 460 1648 1.exe services.exe PID 1648 wrote to memory of 476 1648 1.exe lsass.exe PID 1648 wrote to memory of 476 1648 1.exe lsass.exe PID 1648 wrote to memory of 476 1648 1.exe lsass.exe PID 1648 wrote to memory of 476 1648 1.exe lsass.exe PID 1648 wrote to memory of 476 1648 1.exe lsass.exe PID 1648 wrote to memory of 476 1648 1.exe lsass.exe PID 1648 wrote to memory of 484 1648 1.exe lsm.exe PID 1648 wrote to memory of 484 1648 1.exe lsm.exe PID 1648 wrote to memory of 484 1648 1.exe lsm.exe PID 1648 wrote to memory of 484 1648 1.exe lsm.exe PID 1648 wrote to memory of 484 1648 1.exe lsm.exe PID 1648 wrote to memory of 484 1648 1.exe lsm.exe PID 1648 wrote to memory of 596 1648 1.exe svchost.exe PID 1648 wrote to memory of 596 1648 1.exe svchost.exe PID 1648 wrote to memory of 596 1648 1.exe svchost.exe PID 1648 wrote to memory of 596 1648 1.exe svchost.exe PID 1648 wrote to memory of 596 1648 1.exe svchost.exe PID 1648 wrote to memory of 596 1648 1.exe svchost.exe PID 1648 wrote to memory of 672 1648 1.exe svchost.exe PID 1648 wrote to memory of 672 1648 1.exe svchost.exe PID 1648 wrote to memory of 672 1648 1.exe svchost.exe PID 1648 wrote to memory of 672 1648 1.exe svchost.exe PID 1648 wrote to memory of 672 1648 1.exe svchost.exe PID 1648 wrote to memory of 672 1648 1.exe svchost.exe PID 1648 wrote to memory of 724 1648 1.exe svchost.exe PID 1648 wrote to memory of 724 1648 1.exe svchost.exe PID 1648 wrote to memory of 724 1648 1.exe svchost.exe PID 1648 wrote to memory of 724 1648 1.exe svchost.exe
Processes
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe1⤵
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe2⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation2⤵
-
C:\Windows\system32\taskhost.exe"taskhost.exe"2⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork2⤵
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe2⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService2⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs2⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService2⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted2⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted2⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS2⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch2⤵
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}3⤵
- Suspicious use of FindShellTrayWindow
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵
-
C:\Windows\system32\wininit.exewininit.exe1⤵
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe2⤵
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe1⤵
-
C:\Users\Admin\AppData\Local\Temp\a863503b3ade528eb3985046b4b9b324528eea8bed9a22569c0ba3b5189e0dd6.exe"C:\Users\Admin\AppData\Local\Temp\a863503b3ade528eb3985046b4b9b324528eea8bed9a22569c0ba3b5189e0dd6.exe"1⤵
- Loads dropped DLL
- NTFS ADS
- Suspicious use of WriteProcessMemory
-
C:\Extracted\1.exe"C:\Extracted\1.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Extracted\1.exe"C:\Extracted\1.exe"3⤵
- Executes dropped EXE
- Modifies Installed Components in the registry
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
\\?\C:\Windows\system32\wbem\WMIADAP.EXEwmiadap.exe /F /T /R1⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Extracted\1.exeFilesize
303KB
MD5f6e6fcab82bab9eaa5521a07bb5c3713
SHA1fdf70d41897ee5d8e62993c2b1300e1743483262
SHA2565453da881f5383035d5c3ed4ab4e4aaad5bf1ed2bfdd960cf5ac0db9fc02d38d
SHA512a8457c866d9ce246d2569fceddbd1c29ade3973262e84805093315adb9ed621ce339c0846d0d3a461a1f910de9c9b92806645546a52b02dd9f072b65151145ae
-
C:\Extracted\1.exeFilesize
303KB
MD5f6e6fcab82bab9eaa5521a07bb5c3713
SHA1fdf70d41897ee5d8e62993c2b1300e1743483262
SHA2565453da881f5383035d5c3ed4ab4e4aaad5bf1ed2bfdd960cf5ac0db9fc02d38d
SHA512a8457c866d9ce246d2569fceddbd1c29ade3973262e84805093315adb9ed621ce339c0846d0d3a461a1f910de9c9b92806645546a52b02dd9f072b65151145ae
-
C:\Extracted\1.exeFilesize
303KB
MD5f6e6fcab82bab9eaa5521a07bb5c3713
SHA1fdf70d41897ee5d8e62993c2b1300e1743483262
SHA2565453da881f5383035d5c3ed4ab4e4aaad5bf1ed2bfdd960cf5ac0db9fc02d38d
SHA512a8457c866d9ce246d2569fceddbd1c29ade3973262e84805093315adb9ed621ce339c0846d0d3a461a1f910de9c9b92806645546a52b02dd9f072b65151145ae
-
\Extracted\1.exeFilesize
303KB
MD5f6e6fcab82bab9eaa5521a07bb5c3713
SHA1fdf70d41897ee5d8e62993c2b1300e1743483262
SHA2565453da881f5383035d5c3ed4ab4e4aaad5bf1ed2bfdd960cf5ac0db9fc02d38d
SHA512a8457c866d9ce246d2569fceddbd1c29ade3973262e84805093315adb9ed621ce339c0846d0d3a461a1f910de9c9b92806645546a52b02dd9f072b65151145ae
-
\Extracted\1.exeFilesize
303KB
MD5f6e6fcab82bab9eaa5521a07bb5c3713
SHA1fdf70d41897ee5d8e62993c2b1300e1743483262
SHA2565453da881f5383035d5c3ed4ab4e4aaad5bf1ed2bfdd960cf5ac0db9fc02d38d
SHA512a8457c866d9ce246d2569fceddbd1c29ade3973262e84805093315adb9ed621ce339c0846d0d3a461a1f910de9c9b92806645546a52b02dd9f072b65151145ae
-
memory/1212-87-0x0000000024010000-0x0000000024072000-memory.dmpFilesize
392KB
-
memory/1480-54-0x0000000076261000-0x0000000076263000-memory.dmpFilesize
8KB
-
memory/1480-82-0x000000007EFA0000-0x000000007EFA9000-memory.dmpFilesize
36KB
-
memory/1480-81-0x0000000000400000-0x000000000041B000-memory.dmpFilesize
108KB
-
memory/1480-79-0x000000007EFA0000-0x000000007EFA9000-memory.dmpFilesize
36KB
-
memory/1480-76-0x0000000000020000-0x0000000000023000-memory.dmpFilesize
12KB
-
memory/1480-77-0x0000000001F50000-0x0000000001F5C000-memory.dmpFilesize
48KB
-
memory/1480-75-0x0000000000400000-0x000000000041B000-memory.dmpFilesize
108KB
-
memory/1648-62-0x0000000000400000-0x0000000000500000-memory.dmpFilesize
1024KB
-
memory/1648-73-0x0000000000400000-0x000000000045C000-memory.dmpFilesize
368KB
-
memory/1648-74-0x0000000000400000-0x0000000000500000-memory.dmpFilesize
1024KB
-
memory/1648-70-0x0000000000400000-0x000000000045C000-memory.dmpFilesize
368KB
-
memory/1648-68-0x000000000045B214-mapping.dmp
-
memory/1648-78-0x0000000000400000-0x000000000045C000-memory.dmpFilesize
368KB
-
memory/1648-67-0x0000000000400000-0x0000000000500000-memory.dmpFilesize
1024KB
-
memory/1648-65-0x0000000000400000-0x0000000000500000-memory.dmpFilesize
1024KB
-
memory/1648-63-0x0000000000400000-0x0000000000500000-memory.dmpFilesize
1024KB
-
memory/1648-84-0x0000000024010000-0x0000000024072000-memory.dmpFilesize
392KB
-
memory/1648-89-0x0000000000400000-0x000000000045C000-memory.dmpFilesize
368KB
-
memory/1740-71-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/1740-57-0x0000000000000000-mapping.dmp