Analysis
-
max time kernel
151s -
max time network
157s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
20-10-2022 08:01
Static task
static1
Behavioral task
behavioral1
Sample
d9f3b1c1c711bf673104d56810d4b1da201d80380d416702cd8f4e756d4f8eae.exe
Resource
win7-20220812-en
General
-
Target
d9f3b1c1c711bf673104d56810d4b1da201d80380d416702cd8f4e756d4f8eae.exe
-
Size
503KB
-
MD5
80a46e98cfa4fc8d93fdb5ab42913e8e
-
SHA1
840c5193fd1d1569db809db8081f3c3a40928727
-
SHA256
d9f3b1c1c711bf673104d56810d4b1da201d80380d416702cd8f4e756d4f8eae
-
SHA512
264134075a3830d8058564f0effe3ca86decf3e9bbb54472a79fe028bb7427dafb19bbaf465a5dc6aa326bdb59b496d1ce1fad0cee646332c686da3116533e20
-
SSDEEP
12288:uFXS2fxugbRlyVL8wsjSo82v4MhCUMEOs3fDN8s3zAwqL/5No:XCHUgqoh9Oi58tNo
Malware Config
Extracted
cybergate
v1.07.5
h
rushaan.no-ip.org:80
127.0.0.1:80
127.0.0.1:100
8TAV3B23760774
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
kernel
-
install_file
svhost
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
9425012255
Signatures
-
Adds policy Run key to start application 2 TTPs 4 IoCs
Processes:
vbc.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run vbc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\kernel\\svhost" vbc.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run vbc.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\kernel\\svhost" vbc.exe -
Modifies Installed Components in the registry 2 TTPs 4 IoCs
Processes:
vbc.exeexplorer.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{24V8N4NC-HO22-W6MY-HR4U-0ULDBKQ42KOI}\StubPath = "C:\\Windows\\kernel\\svhost Restart" vbc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{24V8N4NC-HO22-W6MY-HR4U-0ULDBKQ42KOI} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{24V8N4NC-HO22-W6MY-HR4U-0ULDBKQ42KOI}\StubPath = "C:\\Windows\\kernel\\svhost" explorer.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{24V8N4NC-HO22-W6MY-HR4U-0ULDBKQ42KOI} vbc.exe -
Processes:
resource yara_rule behavioral1/memory/1080-73-0x0000000010410000-0x0000000010475000-memory.dmp upx behavioral1/memory/1080-82-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral1/memory/1340-87-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral1/memory/1340-88-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral1/memory/1080-90-0x00000000104F0000-0x0000000010555000-memory.dmp upx behavioral1/memory/1080-96-0x0000000010560000-0x00000000105C5000-memory.dmp upx behavioral1/memory/1056-101-0x0000000010560000-0x00000000105C5000-memory.dmp upx behavioral1/memory/1056-105-0x0000000010560000-0x00000000105C5000-memory.dmp upx behavioral1/memory/1340-106-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral1/memory/1056-107-0x0000000010560000-0x00000000105C5000-memory.dmp upx -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
d9f3b1c1c711bf673104d56810d4b1da201d80380d416702cd8f4e756d4f8eae.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\Java Update = "C:\\Users\\Admin\\AppData\\Roaming\\L3G!T-Labs\\jdvs\\0.0.0.0\\Java Update.exe" d9f3b1c1c711bf673104d56810d4b1da201d80380d416702cd8f4e756d4f8eae.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\rundll32 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\rundll32.exe" d9f3b1c1c711bf673104d56810d4b1da201d80380d416702cd8f4e756d4f8eae.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
d9f3b1c1c711bf673104d56810d4b1da201d80380d416702cd8f4e756d4f8eae.exedescription pid process target process PID 1476 set thread context of 1080 1476 d9f3b1c1c711bf673104d56810d4b1da201d80380d416702cd8f4e756d4f8eae.exe vbc.exe -
Drops file in Windows directory 2 IoCs
Processes:
vbc.exedescription ioc process File created C:\Windows\kernel\svhost vbc.exe File opened for modification C:\Windows\kernel\svhost vbc.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
vbc.exepid process 1080 vbc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
vbc.exepid process 1056 vbc.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
explorer.exevbc.exedescription pid process Token: SeBackupPrivilege 1340 explorer.exe Token: SeRestorePrivilege 1340 explorer.exe Token: SeBackupPrivilege 1056 vbc.exe Token: SeRestorePrivilege 1056 vbc.exe Token: SeDebugPrivilege 1056 vbc.exe Token: SeDebugPrivilege 1056 vbc.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
vbc.exepid process 1080 vbc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
d9f3b1c1c711bf673104d56810d4b1da201d80380d416702cd8f4e756d4f8eae.exevbc.exedescription pid process target process PID 1476 wrote to memory of 1080 1476 d9f3b1c1c711bf673104d56810d4b1da201d80380d416702cd8f4e756d4f8eae.exe vbc.exe PID 1476 wrote to memory of 1080 1476 d9f3b1c1c711bf673104d56810d4b1da201d80380d416702cd8f4e756d4f8eae.exe vbc.exe PID 1476 wrote to memory of 1080 1476 d9f3b1c1c711bf673104d56810d4b1da201d80380d416702cd8f4e756d4f8eae.exe vbc.exe PID 1476 wrote to memory of 1080 1476 d9f3b1c1c711bf673104d56810d4b1da201d80380d416702cd8f4e756d4f8eae.exe vbc.exe PID 1476 wrote to memory of 1080 1476 d9f3b1c1c711bf673104d56810d4b1da201d80380d416702cd8f4e756d4f8eae.exe vbc.exe PID 1476 wrote to memory of 1080 1476 d9f3b1c1c711bf673104d56810d4b1da201d80380d416702cd8f4e756d4f8eae.exe vbc.exe PID 1476 wrote to memory of 1080 1476 d9f3b1c1c711bf673104d56810d4b1da201d80380d416702cd8f4e756d4f8eae.exe vbc.exe PID 1476 wrote to memory of 1080 1476 d9f3b1c1c711bf673104d56810d4b1da201d80380d416702cd8f4e756d4f8eae.exe vbc.exe PID 1476 wrote to memory of 1080 1476 d9f3b1c1c711bf673104d56810d4b1da201d80380d416702cd8f4e756d4f8eae.exe vbc.exe PID 1476 wrote to memory of 1080 1476 d9f3b1c1c711bf673104d56810d4b1da201d80380d416702cd8f4e756d4f8eae.exe vbc.exe PID 1476 wrote to memory of 1080 1476 d9f3b1c1c711bf673104d56810d4b1da201d80380d416702cd8f4e756d4f8eae.exe vbc.exe PID 1476 wrote to memory of 1080 1476 d9f3b1c1c711bf673104d56810d4b1da201d80380d416702cd8f4e756d4f8eae.exe vbc.exe PID 1080 wrote to memory of 1380 1080 vbc.exe Explorer.EXE PID 1080 wrote to memory of 1380 1080 vbc.exe Explorer.EXE PID 1080 wrote to memory of 1380 1080 vbc.exe Explorer.EXE PID 1080 wrote to memory of 1380 1080 vbc.exe Explorer.EXE PID 1080 wrote to memory of 1380 1080 vbc.exe Explorer.EXE PID 1080 wrote to memory of 1380 1080 vbc.exe Explorer.EXE PID 1080 wrote to memory of 1380 1080 vbc.exe Explorer.EXE PID 1080 wrote to memory of 1380 1080 vbc.exe Explorer.EXE PID 1080 wrote to memory of 1380 1080 vbc.exe Explorer.EXE PID 1080 wrote to memory of 1380 1080 vbc.exe Explorer.EXE PID 1080 wrote to memory of 1380 1080 vbc.exe Explorer.EXE PID 1080 wrote to memory of 1380 1080 vbc.exe Explorer.EXE PID 1080 wrote to memory of 1380 1080 vbc.exe Explorer.EXE PID 1080 wrote to memory of 1380 1080 vbc.exe Explorer.EXE PID 1080 wrote to memory of 1380 1080 vbc.exe Explorer.EXE PID 1080 wrote to memory of 1380 1080 vbc.exe Explorer.EXE PID 1080 wrote to memory of 1380 1080 vbc.exe Explorer.EXE PID 1080 wrote to memory of 1380 1080 vbc.exe Explorer.EXE PID 1080 wrote to memory of 1380 1080 vbc.exe Explorer.EXE PID 1080 wrote to memory of 1380 1080 vbc.exe Explorer.EXE PID 1080 wrote to memory of 1380 1080 vbc.exe Explorer.EXE PID 1080 wrote to memory of 1380 1080 vbc.exe Explorer.EXE PID 1080 wrote to memory of 1380 1080 vbc.exe Explorer.EXE PID 1080 wrote to memory of 1380 1080 vbc.exe Explorer.EXE PID 1080 wrote to memory of 1380 1080 vbc.exe Explorer.EXE PID 1080 wrote to memory of 1380 1080 vbc.exe Explorer.EXE PID 1080 wrote to memory of 1380 1080 vbc.exe Explorer.EXE PID 1080 wrote to memory of 1380 1080 vbc.exe Explorer.EXE PID 1080 wrote to memory of 1380 1080 vbc.exe Explorer.EXE PID 1080 wrote to memory of 1380 1080 vbc.exe Explorer.EXE PID 1080 wrote to memory of 1380 1080 vbc.exe Explorer.EXE PID 1080 wrote to memory of 1380 1080 vbc.exe Explorer.EXE PID 1080 wrote to memory of 1380 1080 vbc.exe Explorer.EXE PID 1080 wrote to memory of 1380 1080 vbc.exe Explorer.EXE PID 1080 wrote to memory of 1380 1080 vbc.exe Explorer.EXE PID 1080 wrote to memory of 1380 1080 vbc.exe Explorer.EXE PID 1080 wrote to memory of 1380 1080 vbc.exe Explorer.EXE PID 1080 wrote to memory of 1380 1080 vbc.exe Explorer.EXE PID 1080 wrote to memory of 1380 1080 vbc.exe Explorer.EXE PID 1080 wrote to memory of 1380 1080 vbc.exe Explorer.EXE PID 1080 wrote to memory of 1380 1080 vbc.exe Explorer.EXE PID 1080 wrote to memory of 1380 1080 vbc.exe Explorer.EXE PID 1080 wrote to memory of 1380 1080 vbc.exe Explorer.EXE PID 1080 wrote to memory of 1380 1080 vbc.exe Explorer.EXE PID 1080 wrote to memory of 1380 1080 vbc.exe Explorer.EXE PID 1080 wrote to memory of 1380 1080 vbc.exe Explorer.EXE PID 1080 wrote to memory of 1380 1080 vbc.exe Explorer.EXE PID 1080 wrote to memory of 1380 1080 vbc.exe Explorer.EXE PID 1080 wrote to memory of 1380 1080 vbc.exe Explorer.EXE PID 1080 wrote to memory of 1380 1080 vbc.exe Explorer.EXE PID 1080 wrote to memory of 1380 1080 vbc.exe Explorer.EXE PID 1080 wrote to memory of 1380 1080 vbc.exe Explorer.EXE
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Users\Admin\AppData\Local\Temp\d9f3b1c1c711bf673104d56810d4b1da201d80380d416702cd8f4e756d4f8eae.exe"C:\Users\Admin\AppData\Local\Temp\d9f3b1c1c711bf673104d56810d4b1da201d80380d416702cd8f4e756d4f8eae.exe"2⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵
- Adds policy Run key to start application
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
- Modifies Installed Components in the registry
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe"4⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\Admin2.txtFilesize
224KB
MD587921c39c3f124d2d214ad1978471264
SHA1d3133a3e6936d72786dc7d97085eecd3a8305904
SHA256faf1ca93f644df52f79cb0913d1dad872f4d9c08a803c60a6ffa8397f3b960d9
SHA512d45cd493ebe41a213efc2095e2d78ab912df4d636140387efb7be2c1c70988988eef6c204ee441f9e31d3f301d07cefc17df6e315910789fcc6b7fdb97b3061e
-
C:\Windows\kernel\svhostFilesize
1.1MB
MD534aa912defa18c2c129f1e09d75c1d7e
SHA19c3046324657505a30ecd9b1fdb46c05bde7d470
SHA2566df94b7fa33f1b87142adc39b3db0613fc520d9e7a5fd6a5301dd7f51f8d0386
SHA512d1ea9368f5d7166180612fd763c87afb647d088498887961f5e7fb0a10f4a808bd5928e8a3666d70ff794093c51ecca8816f75dd47652fd4eb23dce7f9aa1f98
-
memory/1056-94-0x0000000000000000-mapping.dmp
-
memory/1056-107-0x0000000010560000-0x00000000105C5000-memory.dmpFilesize
404KB
-
memory/1056-105-0x0000000010560000-0x00000000105C5000-memory.dmpFilesize
404KB
-
memory/1056-101-0x0000000010560000-0x00000000105C5000-memory.dmpFilesize
404KB
-
memory/1080-96-0x0000000010560000-0x00000000105C5000-memory.dmpFilesize
404KB
-
memory/1080-82-0x0000000010480000-0x00000000104E5000-memory.dmpFilesize
404KB
-
memory/1080-63-0x0000000000400000-0x0000000000451000-memory.dmpFilesize
324KB
-
memory/1080-65-0x0000000000400000-0x0000000000451000-memory.dmpFilesize
324KB
-
memory/1080-66-0x000000000040E1A8-mapping.dmp
-
memory/1080-67-0x0000000000400000-0x0000000000451000-memory.dmpFilesize
324KB
-
memory/1080-56-0x0000000000400000-0x0000000000451000-memory.dmpFilesize
324KB
-
memory/1080-70-0x0000000000400000-0x0000000000451000-memory.dmpFilesize
324KB
-
memory/1080-71-0x0000000000400000-0x0000000000451000-memory.dmpFilesize
324KB
-
memory/1080-73-0x0000000010410000-0x0000000010475000-memory.dmpFilesize
404KB
-
memory/1080-57-0x0000000000400000-0x0000000000451000-memory.dmpFilesize
324KB
-
memory/1080-59-0x0000000000400000-0x0000000000451000-memory.dmpFilesize
324KB
-
memory/1080-60-0x0000000000400000-0x0000000000451000-memory.dmpFilesize
324KB
-
memory/1080-62-0x0000000000400000-0x0000000000451000-memory.dmpFilesize
324KB
-
memory/1080-102-0x0000000000400000-0x0000000000451000-memory.dmpFilesize
324KB
-
memory/1080-61-0x0000000000400000-0x0000000000451000-memory.dmpFilesize
324KB
-
memory/1080-90-0x00000000104F0000-0x0000000010555000-memory.dmpFilesize
404KB
-
memory/1340-88-0x0000000010480000-0x00000000104E5000-memory.dmpFilesize
404KB
-
memory/1340-87-0x0000000010480000-0x00000000104E5000-memory.dmpFilesize
404KB
-
memory/1340-81-0x00000000746A1000-0x00000000746A3000-memory.dmpFilesize
8KB
-
memory/1340-79-0x0000000000000000-mapping.dmp
-
memory/1340-106-0x0000000010480000-0x00000000104E5000-memory.dmpFilesize
404KB
-
memory/1380-76-0x0000000010410000-0x0000000010475000-memory.dmpFilesize
404KB
-
memory/1476-54-0x0000000074C11000-0x0000000074C13000-memory.dmpFilesize
8KB
-
memory/1476-68-0x0000000073EB0000-0x000000007445B000-memory.dmpFilesize
5.7MB
-
memory/1476-55-0x0000000073EB0000-0x000000007445B000-memory.dmpFilesize
5.7MB