Analysis
-
max time kernel
41s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
20/10/2022, 08:07
Behavioral task
behavioral1
Sample
c88a7e24489fb9cc2e90804c012ee09df4bb46e961529c572e80655441745328.exe
Resource
win7-20220812-en
4 signatures
150 seconds
General
-
Target
c88a7e24489fb9cc2e90804c012ee09df4bb46e961529c572e80655441745328.exe
-
Size
272KB
-
MD5
79ac5e21ed23e485c45b0e15dd812780
-
SHA1
1a695332b457738f843c13ef9639275db0fc4181
-
SHA256
c88a7e24489fb9cc2e90804c012ee09df4bb46e961529c572e80655441745328
-
SHA512
e138c3ebcb3f833014ca8f25b9ea2e51f3a9d3ef83bfe23d0149e6d79b04641895d1d2437ead938c7a6412fe9ccf4ba9ba572f77929df0f1cc15620b7dea8631
-
SSDEEP
6144:Mk4qmr73P0MqUgOtiehS+jjr4vVdG/08yG2UIz:/9gPq7jajHqtUI
Malware Config
Extracted
Family
cybergate
Version
2.6
Botnet
ÖÍíÉ
C2
bestfoox.no-ip.info:83
Mutex
***MUTEX***
Attributes
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
svchost.exe
-
install_dir
install
-
install_file
server.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
texto da mensagem
-
message_box_title
t?tulo da mensagem
-
password
123ab
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Signatures
-
resource yara_rule behavioral1/memory/316-56-0x0000000000400000-0x0000000000455000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 2004 316 WerFault.exe 26 -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 316 wrote to memory of 2004 316 c88a7e24489fb9cc2e90804c012ee09df4bb46e961529c572e80655441745328.exe 27 PID 316 wrote to memory of 2004 316 c88a7e24489fb9cc2e90804c012ee09df4bb46e961529c572e80655441745328.exe 27 PID 316 wrote to memory of 2004 316 c88a7e24489fb9cc2e90804c012ee09df4bb46e961529c572e80655441745328.exe 27 PID 316 wrote to memory of 2004 316 c88a7e24489fb9cc2e90804c012ee09df4bb46e961529c572e80655441745328.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\c88a7e24489fb9cc2e90804c012ee09df4bb46e961529c572e80655441745328.exe"C:\Users\Admin\AppData\Local\Temp\c88a7e24489fb9cc2e90804c012ee09df4bb46e961529c572e80655441745328.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 316 -s 1602⤵
- Program crash
PID:2004
-