Analysis
-
max time kernel
151s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06/11/2022, 09:14
Static task
static1
Behavioral task
behavioral1
Sample
382f1fbf4cb0931d5f5feed2f5ad68fa37764acb8a7ab1c8c5cb72b6fb51068c.exe
Resource
win7-20220901-en
General
-
Target
382f1fbf4cb0931d5f5feed2f5ad68fa37764acb8a7ab1c8c5cb72b6fb51068c.exe
-
Size
300KB
-
MD5
213674aa3d3ba4b83a004bc853cf3090
-
SHA1
c416499e3faeb20628a4bafdb5c9e502f4266375
-
SHA256
382f1fbf4cb0931d5f5feed2f5ad68fa37764acb8a7ab1c8c5cb72b6fb51068c
-
SHA512
95087bc50fd967608cf17c0b5d3374cb474663a3b6ed089f2c4d6e6ea35a63f27ad7679383136dedf1437286902cf7b07332e7e354643b21631c1629d522730e
-
SSDEEP
6144:EoECH11rlICQND2od4U8x2WFLk9WlCRjTViLMwTlg38So:EAVgCaq0dhkM1M3
Malware Config
Extracted
cybergate
2.7 Beta 02
vítima
ghgh.zapto.org:82
***MUTEX***
-
enable_keylogger
true
-
enable_message_box
true
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
install
-
install_file
server.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
you must instal flash player !
-
message_box_title
windows
-
password
abcd1234
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Signatures
-
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run vbc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\install\\server.exe" vbc.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run vbc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\install\\server.exe" vbc.exe -
Executes dropped EXE 2 IoCs
pid Process 4292 server.exe 4984 server.exe -
Modifies Installed Components in the registry 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{08B0E5JF-4FCB-11CF-AAA5-00401C6XX500} vbc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{08B0E5JF-4FCB-11CF-AAA5-00401C6XX500}\StubPath = "C:\\Windows\\system32\\install\\server.exe Restart" vbc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{08B0E5JF-4FCB-11CF-AAA5-00401C6XX500} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{08B0E5JF-4FCB-11CF-AAA5-00401C6XX500}\StubPath = "C:\\Windows\\system32\\install\\server.exe" explorer.exe -
resource yara_rule behavioral2/memory/1304-134-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral2/memory/1304-137-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral2/memory/1304-138-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral2/memory/1304-139-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral2/memory/1304-141-0x0000000024010000-0x0000000024072000-memory.dmp upx behavioral2/memory/1304-146-0x0000000024080000-0x00000000240E2000-memory.dmp upx behavioral2/memory/3316-149-0x0000000024080000-0x00000000240E2000-memory.dmp upx behavioral2/memory/3316-152-0x0000000024080000-0x00000000240E2000-memory.dmp upx behavioral2/memory/1304-154-0x00000000240F0000-0x0000000024152000-memory.dmp upx behavioral2/memory/1304-161-0x0000000024160000-0x00000000241C2000-memory.dmp upx behavioral2/memory/1304-164-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral2/memory/4812-165-0x0000000024160000-0x00000000241C2000-memory.dmp upx behavioral2/memory/4812-166-0x0000000024160000-0x00000000241C2000-memory.dmp upx behavioral2/memory/4812-169-0x0000000024160000-0x00000000241C2000-memory.dmp upx -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run vbc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\system32\\install\\server.exe" vbc.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run vbc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\system32\\install\\server.exe" vbc.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\install\server.exe vbc.exe File opened for modification C:\Windows\SysWOW64\install\server.exe vbc.exe File opened for modification C:\Windows\SysWOW64\install\server.exe vbc.exe File opened for modification C:\Windows\SysWOW64\install\ vbc.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5116 set thread context of 1304 5116 382f1fbf4cb0931d5f5feed2f5ad68fa37764acb8a7ab1c8c5cb72b6fb51068c.exe 81 -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ vbc.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1304 vbc.exe 1304 vbc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4812 vbc.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4812 vbc.exe Token: SeDebugPrivilege 4812 vbc.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1304 vbc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5116 wrote to memory of 1304 5116 382f1fbf4cb0931d5f5feed2f5ad68fa37764acb8a7ab1c8c5cb72b6fb51068c.exe 81 PID 5116 wrote to memory of 1304 5116 382f1fbf4cb0931d5f5feed2f5ad68fa37764acb8a7ab1c8c5cb72b6fb51068c.exe 81 PID 5116 wrote to memory of 1304 5116 382f1fbf4cb0931d5f5feed2f5ad68fa37764acb8a7ab1c8c5cb72b6fb51068c.exe 81 PID 5116 wrote to memory of 1304 5116 382f1fbf4cb0931d5f5feed2f5ad68fa37764acb8a7ab1c8c5cb72b6fb51068c.exe 81 PID 5116 wrote to memory of 1304 5116 382f1fbf4cb0931d5f5feed2f5ad68fa37764acb8a7ab1c8c5cb72b6fb51068c.exe 81 PID 5116 wrote to memory of 1304 5116 382f1fbf4cb0931d5f5feed2f5ad68fa37764acb8a7ab1c8c5cb72b6fb51068c.exe 81 PID 5116 wrote to memory of 1304 5116 382f1fbf4cb0931d5f5feed2f5ad68fa37764acb8a7ab1c8c5cb72b6fb51068c.exe 81 PID 5116 wrote to memory of 1304 5116 382f1fbf4cb0931d5f5feed2f5ad68fa37764acb8a7ab1c8c5cb72b6fb51068c.exe 81 PID 1304 wrote to memory of 3092 1304 vbc.exe 54 PID 1304 wrote to memory of 3092 1304 vbc.exe 54 PID 1304 wrote to memory of 3092 1304 vbc.exe 54 PID 1304 wrote to memory of 3092 1304 vbc.exe 54 PID 1304 wrote to memory of 3092 1304 vbc.exe 54 PID 1304 wrote to memory of 3092 1304 vbc.exe 54 PID 1304 wrote to memory of 3092 1304 vbc.exe 54 PID 1304 wrote to memory of 3092 1304 vbc.exe 54 PID 1304 wrote to memory of 3092 1304 vbc.exe 54 PID 1304 wrote to memory of 3092 1304 vbc.exe 54 PID 1304 wrote to memory of 3092 1304 vbc.exe 54 PID 1304 wrote to memory of 3092 1304 vbc.exe 54 PID 1304 wrote to memory of 3092 1304 vbc.exe 54 PID 1304 wrote to memory of 3092 1304 vbc.exe 54 PID 1304 wrote to memory of 3092 1304 vbc.exe 54 PID 1304 wrote to memory of 3092 1304 vbc.exe 54 PID 1304 wrote to memory of 3092 1304 vbc.exe 54 PID 1304 wrote to memory of 3092 1304 vbc.exe 54 PID 1304 wrote to memory of 3092 1304 vbc.exe 54 PID 1304 wrote to memory of 3092 1304 vbc.exe 54 PID 1304 wrote to memory of 3092 1304 vbc.exe 54 PID 1304 wrote to memory of 3092 1304 vbc.exe 54 PID 1304 wrote to memory of 3092 1304 vbc.exe 54 PID 1304 wrote to memory of 3092 1304 vbc.exe 54 PID 1304 wrote to memory of 3092 1304 vbc.exe 54 PID 1304 wrote to memory of 3092 1304 vbc.exe 54 PID 1304 wrote to memory of 3092 1304 vbc.exe 54 PID 1304 wrote to memory of 3092 1304 vbc.exe 54 PID 1304 wrote to memory of 3092 1304 vbc.exe 54 PID 1304 wrote to memory of 3092 1304 vbc.exe 54 PID 1304 wrote to memory of 3092 1304 vbc.exe 54 PID 1304 wrote to memory of 3092 1304 vbc.exe 54 PID 1304 wrote to memory of 3092 1304 vbc.exe 54 PID 1304 wrote to memory of 3092 1304 vbc.exe 54 PID 1304 wrote to memory of 3092 1304 vbc.exe 54 PID 1304 wrote to memory of 3092 1304 vbc.exe 54 PID 1304 wrote to memory of 3092 1304 vbc.exe 54 PID 1304 wrote to memory of 3092 1304 vbc.exe 54 PID 1304 wrote to memory of 3092 1304 vbc.exe 54 PID 1304 wrote to memory of 3092 1304 vbc.exe 54 PID 1304 wrote to memory of 3092 1304 vbc.exe 54 PID 1304 wrote to memory of 3092 1304 vbc.exe 54 PID 1304 wrote to memory of 3092 1304 vbc.exe 54 PID 1304 wrote to memory of 3092 1304 vbc.exe 54 PID 1304 wrote to memory of 3092 1304 vbc.exe 54 PID 1304 wrote to memory of 3092 1304 vbc.exe 54 PID 1304 wrote to memory of 3092 1304 vbc.exe 54 PID 1304 wrote to memory of 3092 1304 vbc.exe 54 PID 1304 wrote to memory of 3092 1304 vbc.exe 54 PID 1304 wrote to memory of 3092 1304 vbc.exe 54 PID 1304 wrote to memory of 3092 1304 vbc.exe 54 PID 1304 wrote to memory of 3092 1304 vbc.exe 54 PID 1304 wrote to memory of 3092 1304 vbc.exe 54 PID 1304 wrote to memory of 3092 1304 vbc.exe 54 PID 1304 wrote to memory of 3092 1304 vbc.exe 54 PID 1304 wrote to memory of 3092 1304 vbc.exe 54
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3092
-
C:\Users\Admin\AppData\Local\Temp\382f1fbf4cb0931d5f5feed2f5ad68fa37764acb8a7ab1c8c5cb72b6fb51068c.exe"C:\Users\Admin\AppData\Local\Temp\382f1fbf4cb0931d5f5feed2f5ad68fa37764acb8a7ab1c8c5cb72b6fb51068c.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵
- Adds policy Run key to start application
- Modifies Installed Components in the registry
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
- Modifies Installed Components in the registry
PID:3316 -
C:\Windows\SysWOW64\install\server.exe"C:\Windows\system32\install\server.exe"5⤵
- Executes dropped EXE
PID:4292
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2016
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"4⤵
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:4812 -
C:\Windows\SysWOW64\install\server.exe"C:\Windows\system32\install\server.exe"5⤵
- Executes dropped EXE
PID:4984
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
230KB
MD5e4711dd469de7115c2920f537eaa6c0b
SHA176a6ce9d6736d55cf43841a1241a42b7eb14a178
SHA2565f097ff57355ee103f30873baa6ea9d37f9a0740c49bcfe0165173e590b91083
SHA5128949882554114531d6069e46a19d5296f6777948997e5ef7532f4fded660c2a4da7e4b5a5c799d77b5577764fe562579950f407af8044c8d4adc0f67d8a5a713
-
Filesize
1.1MB
MD5d881de17aa8f2e2c08cbb7b265f928f9
SHA108936aebc87decf0af6e8eada191062b5e65ac2a
SHA256b3a37093609f9a20ad60b85a9fa9de2ba674cba9b5bd687729440c70ba619ca0
SHA5125f23bfb1b8740247b36ed0ab741738c7d4c949736129e767213e321607d1ccd3e3a8428e4ba44bd28a275b5e3f6206285b1a522514b7ef7ea5e698d90a713d34
-
Filesize
1.1MB
MD5d881de17aa8f2e2c08cbb7b265f928f9
SHA108936aebc87decf0af6e8eada191062b5e65ac2a
SHA256b3a37093609f9a20ad60b85a9fa9de2ba674cba9b5bd687729440c70ba619ca0
SHA5125f23bfb1b8740247b36ed0ab741738c7d4c949736129e767213e321607d1ccd3e3a8428e4ba44bd28a275b5e3f6206285b1a522514b7ef7ea5e698d90a713d34
-
Filesize
1.1MB
MD5d881de17aa8f2e2c08cbb7b265f928f9
SHA108936aebc87decf0af6e8eada191062b5e65ac2a
SHA256b3a37093609f9a20ad60b85a9fa9de2ba674cba9b5bd687729440c70ba619ca0
SHA5125f23bfb1b8740247b36ed0ab741738c7d4c949736129e767213e321607d1ccd3e3a8428e4ba44bd28a275b5e3f6206285b1a522514b7ef7ea5e698d90a713d34