Analysis
-
max time kernel
150s -
max time network
71s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
06/11/2022, 08:19
Static task
static1
Behavioral task
behavioral1
Sample
82097d404206d7bab01e840503ec6c908882ac66e0ae0fc2b8cc0cbf7a5c167f.exe
Resource
win7-20220812-en
General
-
Target
82097d404206d7bab01e840503ec6c908882ac66e0ae0fc2b8cc0cbf7a5c167f.exe
-
Size
616KB
-
MD5
117cdfd840a715a341c63d32ef7d3210
-
SHA1
92f9e1e9ccbbe8268a61396a3e26aa07d2d22259
-
SHA256
82097d404206d7bab01e840503ec6c908882ac66e0ae0fc2b8cc0cbf7a5c167f
-
SHA512
6b1860f81a49843ff76e37f53b2dfea8b411f0cb61a52ccbbdbb45635ccb7f239746130d1abbbabf1ea86c12f2bafb8872a42be1398900e2a28b63471f419655
-
SSDEEP
12288:5AjM04hHvAQSiXsgPLS9WNk9WvAtdoyE3eH:WMoQTPGgC9XdzE3eH
Malware Config
Extracted
cybergate
v3.4.2.2
remote
poojacute281.redirectme.net:999
QKA175O855N45J
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
install
-
install_file
server.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
cybergate
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Signatures
-
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run vbc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\install\\server.exe" vbc.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run vbc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\install\\server.exe" vbc.exe -
Executes dropped EXE 1 IoCs
pid Process 924 server.exe -
Modifies Installed Components in the registry 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{P2S84100-061R-0IS4-7858-65732B2N2T0U} vbc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{P2S84100-061R-0IS4-7858-65732B2N2T0U}\StubPath = "C:\\Windows\\system32\\install\\server.exe Restart" vbc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{P2S84100-061R-0IS4-7858-65732B2N2T0U} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{P2S84100-061R-0IS4-7858-65732B2N2T0U}\StubPath = "C:\\Windows\\system32\\install\\server.exe" explorer.exe -
resource yara_rule behavioral1/memory/960-71-0x0000000010410000-0x0000000010480000-memory.dmp upx behavioral1/memory/960-81-0x0000000010480000-0x00000000104F0000-memory.dmp upx behavioral1/memory/844-86-0x0000000010480000-0x00000000104F0000-memory.dmp upx behavioral1/memory/844-89-0x0000000010480000-0x00000000104F0000-memory.dmp upx behavioral1/memory/960-94-0x00000000104F0000-0x0000000010560000-memory.dmp upx behavioral1/memory/800-99-0x00000000104F0000-0x0000000010560000-memory.dmp upx behavioral1/memory/800-100-0x00000000104F0000-0x0000000010560000-memory.dmp upx behavioral1/memory/800-106-0x00000000104F0000-0x0000000010560000-memory.dmp upx -
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\server.exe explorer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\server.exe explorer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ explorer.exe -
Loads dropped DLL 1 IoCs
pid Process 960 vbc.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run vbc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\system32\\install\\server.exe" vbc.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run vbc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\system32\\install\\server.exe" vbc.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\install\server.exe vbc.exe File opened for modification C:\Windows\SysWOW64\install\server.exe vbc.exe File opened for modification C:\Windows\SysWOW64\install\server.exe explorer.exe File opened for modification C:\Windows\SysWOW64\install\ explorer.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 864 set thread context of 960 864 82097d404206d7bab01e840503ec6c908882ac66e0ae0fc2b8cc0cbf7a5c167f.exe 27 -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe explorer.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 960 vbc.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 800 explorer.exe Token: SeDebugPrivilege 800 explorer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 960 vbc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 864 wrote to memory of 960 864 82097d404206d7bab01e840503ec6c908882ac66e0ae0fc2b8cc0cbf7a5c167f.exe 27 PID 864 wrote to memory of 960 864 82097d404206d7bab01e840503ec6c908882ac66e0ae0fc2b8cc0cbf7a5c167f.exe 27 PID 864 wrote to memory of 960 864 82097d404206d7bab01e840503ec6c908882ac66e0ae0fc2b8cc0cbf7a5c167f.exe 27 PID 864 wrote to memory of 960 864 82097d404206d7bab01e840503ec6c908882ac66e0ae0fc2b8cc0cbf7a5c167f.exe 27 PID 864 wrote to memory of 960 864 82097d404206d7bab01e840503ec6c908882ac66e0ae0fc2b8cc0cbf7a5c167f.exe 27 PID 864 wrote to memory of 960 864 82097d404206d7bab01e840503ec6c908882ac66e0ae0fc2b8cc0cbf7a5c167f.exe 27 PID 864 wrote to memory of 960 864 82097d404206d7bab01e840503ec6c908882ac66e0ae0fc2b8cc0cbf7a5c167f.exe 27 PID 864 wrote to memory of 960 864 82097d404206d7bab01e840503ec6c908882ac66e0ae0fc2b8cc0cbf7a5c167f.exe 27 PID 864 wrote to memory of 960 864 82097d404206d7bab01e840503ec6c908882ac66e0ae0fc2b8cc0cbf7a5c167f.exe 27 PID 864 wrote to memory of 960 864 82097d404206d7bab01e840503ec6c908882ac66e0ae0fc2b8cc0cbf7a5c167f.exe 27 PID 864 wrote to memory of 960 864 82097d404206d7bab01e840503ec6c908882ac66e0ae0fc2b8cc0cbf7a5c167f.exe 27 PID 864 wrote to memory of 960 864 82097d404206d7bab01e840503ec6c908882ac66e0ae0fc2b8cc0cbf7a5c167f.exe 27 PID 960 wrote to memory of 1296 960 vbc.exe 11 PID 960 wrote to memory of 1296 960 vbc.exe 11 PID 960 wrote to memory of 1296 960 vbc.exe 11 PID 960 wrote to memory of 1296 960 vbc.exe 11 PID 960 wrote to memory of 1296 960 vbc.exe 11 PID 960 wrote to memory of 1296 960 vbc.exe 11 PID 960 wrote to memory of 1296 960 vbc.exe 11 PID 960 wrote to memory of 1296 960 vbc.exe 11 PID 960 wrote to memory of 1296 960 vbc.exe 11 PID 960 wrote to memory of 1296 960 vbc.exe 11 PID 960 wrote to memory of 1296 960 vbc.exe 11 PID 960 wrote to memory of 1296 960 vbc.exe 11 PID 960 wrote to memory of 1296 960 vbc.exe 11 PID 960 wrote to memory of 1296 960 vbc.exe 11 PID 960 wrote to memory of 1296 960 vbc.exe 11 PID 960 wrote to memory of 1296 960 vbc.exe 11 PID 960 wrote to memory of 1296 960 vbc.exe 11 PID 960 wrote to memory of 1296 960 vbc.exe 11 PID 960 wrote to memory of 1296 960 vbc.exe 11 PID 960 wrote to memory of 1296 960 vbc.exe 11 PID 960 wrote to memory of 1296 960 vbc.exe 11 PID 960 wrote to memory of 1296 960 vbc.exe 11 PID 960 wrote to memory of 1296 960 vbc.exe 11 PID 960 wrote to memory of 1296 960 vbc.exe 11 PID 960 wrote to memory of 1296 960 vbc.exe 11 PID 960 wrote to memory of 1296 960 vbc.exe 11 PID 960 wrote to memory of 1296 960 vbc.exe 11 PID 960 wrote to memory of 1296 960 vbc.exe 11 PID 960 wrote to memory of 1296 960 vbc.exe 11 PID 960 wrote to memory of 1296 960 vbc.exe 11 PID 960 wrote to memory of 1296 960 vbc.exe 11 PID 960 wrote to memory of 1296 960 vbc.exe 11 PID 960 wrote to memory of 1296 960 vbc.exe 11 PID 960 wrote to memory of 1296 960 vbc.exe 11 PID 960 wrote to memory of 1296 960 vbc.exe 11 PID 960 wrote to memory of 1296 960 vbc.exe 11 PID 960 wrote to memory of 1296 960 vbc.exe 11 PID 960 wrote to memory of 1296 960 vbc.exe 11 PID 960 wrote to memory of 1296 960 vbc.exe 11 PID 960 wrote to memory of 1296 960 vbc.exe 11 PID 960 wrote to memory of 1296 960 vbc.exe 11 PID 960 wrote to memory of 1296 960 vbc.exe 11 PID 960 wrote to memory of 1296 960 vbc.exe 11 PID 960 wrote to memory of 1296 960 vbc.exe 11 PID 960 wrote to memory of 1296 960 vbc.exe 11 PID 960 wrote to memory of 1296 960 vbc.exe 11 PID 960 wrote to memory of 1296 960 vbc.exe 11 PID 960 wrote to memory of 1296 960 vbc.exe 11 PID 960 wrote to memory of 1296 960 vbc.exe 11 PID 960 wrote to memory of 1296 960 vbc.exe 11 PID 960 wrote to memory of 1296 960 vbc.exe 11 PID 960 wrote to memory of 1296 960 vbc.exe 11
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1296
-
C:\Users\Admin\AppData\Local\Temp\82097d404206d7bab01e840503ec6c908882ac66e0ae0fc2b8cc0cbf7a5c167f.exe"C:\Users\Admin\AppData\Local\Temp\82097d404206d7bab01e840503ec6c908882ac66e0ae0fc2b8cc0cbf7a5c167f.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵
- Adds policy Run key to start application
- Modifies Installed Components in the registry
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
- Modifies Installed Components in the registry
PID:844
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
- Drops startup file
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:800
-
-
C:\Windows\SysWOW64\install\server.exe"C:\Windows\system32\install\server.exe"4⤵
- Executes dropped EXE
PID:924
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD5df082d933f7c9e3ad4a42dd4cd00cd35
SHA116f9b2380f41d041548ab3f1dead701b0d92f69a
SHA256717f48b3510b5c578289e569ff3f9e796b419e5313e32820053dd8b224fd3a75
SHA5120f23becb88a6b88c9fc0a88178c2f6a8c839e6ebcc122f31ed1b38191065100d6880d6e3d64a3b7e133295ab513a78134e3283cde2216c28315c1816215a4e25
-
Filesize
1.1MB
MD534aa912defa18c2c129f1e09d75c1d7e
SHA19c3046324657505a30ecd9b1fdb46c05bde7d470
SHA2566df94b7fa33f1b87142adc39b3db0613fc520d9e7a5fd6a5301dd7f51f8d0386
SHA512d1ea9368f5d7166180612fd763c87afb647d088498887961f5e7fb0a10f4a808bd5928e8a3666d70ff794093c51ecca8816f75dd47652fd4eb23dce7f9aa1f98
-
Filesize
1.1MB
MD534aa912defa18c2c129f1e09d75c1d7e
SHA19c3046324657505a30ecd9b1fdb46c05bde7d470
SHA2566df94b7fa33f1b87142adc39b3db0613fc520d9e7a5fd6a5301dd7f51f8d0386
SHA512d1ea9368f5d7166180612fd763c87afb647d088498887961f5e7fb0a10f4a808bd5928e8a3666d70ff794093c51ecca8816f75dd47652fd4eb23dce7f9aa1f98
-
Filesize
1.1MB
MD534aa912defa18c2c129f1e09d75c1d7e
SHA19c3046324657505a30ecd9b1fdb46c05bde7d470
SHA2566df94b7fa33f1b87142adc39b3db0613fc520d9e7a5fd6a5301dd7f51f8d0386
SHA512d1ea9368f5d7166180612fd763c87afb647d088498887961f5e7fb0a10f4a808bd5928e8a3666d70ff794093c51ecca8816f75dd47652fd4eb23dce7f9aa1f98