Analysis

  • max time kernel
    150s
  • max time network
    65s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    07/11/2022, 20:14

General

  • Target

    46701ac049a08be0f12a7a563b4304edacca6aea9f0e54a4f497edb8b3d513da.exe

  • Size

    939KB

  • MD5

    0b1a8a3af1e535c380e1e381403bdc26

  • SHA1

    57a21c1a15633fccdf44e5e90586697fcf06845e

  • SHA256

    46701ac049a08be0f12a7a563b4304edacca6aea9f0e54a4f497edb8b3d513da

  • SHA512

    d046fb6e1777203ceeda01043049cc2ea0ec12b66a30a5beed3d07f8fdee697dc13099b71f9eddd9b17cd570826c0d0ce1b72be2054c2c1b94e8143f046ca6d3

  • SSDEEP

    24576:qtAR6eiZjTtzR6/Hlx8rdUZYUqdmW+WxF:qtAR6/tr6/Hc5wQ6gF

Malware Config

Extracted

Family

cybergate

Version

2.6

Botnet

vítima

C2

longinos000.no-ip.org:880

Mutex

Jackal

Attributes
  • enable_keylogger

    true

  • enable_message_box

    true

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    install

  • install_file

    win33.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Visite mais vezes meu site e fique à vontade! Forte abraço!

  • message_box_title

    Parabéns!

  • password

    jmp007

  • regkey_hkcu

    win33

  • regkey_hklm

    win33

Signatures

  • CyberGate, Rebhip

    CyberGate is a lightweight remote administration tool with a wide array of functionalities.

  • Adds policy Run key to start application 2 TTPs 4 IoCs
  • Executes dropped EXE 6 IoCs
  • Modifies Installed Components in the registry 2 TTPs 4 IoCs
  • UPX packed file 25 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 8 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • AutoIT Executable 2 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 4 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1204
      • C:\Users\Admin\AppData\Local\Temp\46701ac049a08be0f12a7a563b4304edacca6aea9f0e54a4f497edb8b3d513da.exe
        "C:\Users\Admin\AppData\Local\Temp\46701ac049a08be0f12a7a563b4304edacca6aea9f0e54a4f497edb8b3d513da.exe"
        2⤵
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1768
        • C:\Users\Admin\AppData\Local\Temp\atfmon.exe
          "C:\Users\Admin\AppData\Local\Temp\atfmon.exe"
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:2040
          • C:\Users\Admin\AppData\Local\Temp\atfmon.exe
            "C:\Users\Admin\AppData\Local\Temp\atfmon.exe"
            4⤵
            • Adds policy Run key to start application
            • Executes dropped EXE
            • Modifies Installed Components in the registry
            • Loads dropped DLL
            • Adds Run key to start application
            • Drops file in System32 directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of WriteProcessMemory
            PID:856
            • C:\Windows\SysWOW64\explorer.exe
              explorer.exe
              5⤵
              • Modifies Installed Components in the registry
              PID:1640
            • C:\Program Files\Internet Explorer\iexplore.exe
              "C:\Program Files\Internet Explorer\iexplore.exe"
              5⤵
                PID:1744
              • C:\Users\Admin\AppData\Local\Temp\atfmon.exe
                "C:\Users\Admin\AppData\Local\Temp\atfmon.exe"
                5⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Drops file in System32 directory
                • Suspicious behavior: GetForegroundWindowSpam
                • Suspicious use of AdjustPrivilegeToken
                PID:580
                • C:\Windows\SysWOW64\install\win33.exe
                  "C:\Windows\system32\install\win33.exe"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  PID:1428
                  • C:\Windows\SysWOW64\install\win33.exe
                    "C:\Windows\SysWOW64\install\win33.exe"
                    7⤵
                    • Executes dropped EXE
                    PID:1616
          • C:\Users\Admin\AppData\Local\Temp\Project1.exe
            "C:\Users\Admin\AppData\Local\Temp\Project1.exe"
            3⤵
            • Executes dropped EXE
            PID:1812

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\Project1.exe

        Filesize

        382KB

        MD5

        7330c45953580f5c5f1370ec581d2a86

        SHA1

        8bf107bd9095250e7bdfdb3e045f4d57a1ec060e

        SHA256

        257101420b298663a6b8bd060a08c94709d6d8ef1e59d1225b7da28cb689379d

        SHA512

        0c454feb498a9cc5e57016c947708a19c8cb73803d66137e03b14cc31b86ae3e7055233c9bffbced35f8a441a8a4934fc7fb1e8d471d6b60d3744570dafe493e

      • C:\Users\Admin\AppData\Local\Temp\XX--XX--XX.txt

        Filesize

        229KB

        MD5

        8971290bf33174b3f56e1b77cb594646

        SHA1

        29db22c7b1cb86edace85b01d09aba0817225be4

        SHA256

        5b5606a080e6850193336faaa26f157edb0e1a1bb9b2b4fa4c7f2b029c2878d2

        SHA512

        71c54e0beb798ad6056251da3ec9f31352da8c2405b7ca30cfaa41a119b00bd8408b385bcec4c604c425b0a5b0edcaec2be2df63d0f575cb77a7ebec423d4b48

      • C:\Users\Admin\AppData\Local\Temp\atfmon.exe

        Filesize

        544KB

        MD5

        7c4a40ce4680ca75278dc9739c7325e1

        SHA1

        361e247336a706bec835bf4246b3db134f9e30f2

        SHA256

        53e043141bbd84d47175f00eee3a8df7915a8317ab1c66b8a0f002a20d3a7c6a

        SHA512

        fd2efa97852428ba16961da36837c5fd245d2bbe73c5c005334c74aca11b1657130665c532a1c8dd8b300dc4b75bc9aafcafce66ae4b0e09fad4b6155b7addc2

      • C:\Users\Admin\AppData\Local\Temp\atfmon.exe

        Filesize

        544KB

        MD5

        7c4a40ce4680ca75278dc9739c7325e1

        SHA1

        361e247336a706bec835bf4246b3db134f9e30f2

        SHA256

        53e043141bbd84d47175f00eee3a8df7915a8317ab1c66b8a0f002a20d3a7c6a

        SHA512

        fd2efa97852428ba16961da36837c5fd245d2bbe73c5c005334c74aca11b1657130665c532a1c8dd8b300dc4b75bc9aafcafce66ae4b0e09fad4b6155b7addc2

      • C:\Users\Admin\AppData\Local\Temp\atfmon.exe

        Filesize

        544KB

        MD5

        7c4a40ce4680ca75278dc9739c7325e1

        SHA1

        361e247336a706bec835bf4246b3db134f9e30f2

        SHA256

        53e043141bbd84d47175f00eee3a8df7915a8317ab1c66b8a0f002a20d3a7c6a

        SHA512

        fd2efa97852428ba16961da36837c5fd245d2bbe73c5c005334c74aca11b1657130665c532a1c8dd8b300dc4b75bc9aafcafce66ae4b0e09fad4b6155b7addc2

      • C:\Users\Admin\AppData\Local\Temp\atfmon.exe

        Filesize

        544KB

        MD5

        7c4a40ce4680ca75278dc9739c7325e1

        SHA1

        361e247336a706bec835bf4246b3db134f9e30f2

        SHA256

        53e043141bbd84d47175f00eee3a8df7915a8317ab1c66b8a0f002a20d3a7c6a

        SHA512

        fd2efa97852428ba16961da36837c5fd245d2bbe73c5c005334c74aca11b1657130665c532a1c8dd8b300dc4b75bc9aafcafce66ae4b0e09fad4b6155b7addc2

      • C:\Windows\SysWOW64\install\win33.exe

        Filesize

        544KB

        MD5

        7c4a40ce4680ca75278dc9739c7325e1

        SHA1

        361e247336a706bec835bf4246b3db134f9e30f2

        SHA256

        53e043141bbd84d47175f00eee3a8df7915a8317ab1c66b8a0f002a20d3a7c6a

        SHA512

        fd2efa97852428ba16961da36837c5fd245d2bbe73c5c005334c74aca11b1657130665c532a1c8dd8b300dc4b75bc9aafcafce66ae4b0e09fad4b6155b7addc2

      • C:\Windows\SysWOW64\install\win33.exe

        Filesize

        544KB

        MD5

        7c4a40ce4680ca75278dc9739c7325e1

        SHA1

        361e247336a706bec835bf4246b3db134f9e30f2

        SHA256

        53e043141bbd84d47175f00eee3a8df7915a8317ab1c66b8a0f002a20d3a7c6a

        SHA512

        fd2efa97852428ba16961da36837c5fd245d2bbe73c5c005334c74aca11b1657130665c532a1c8dd8b300dc4b75bc9aafcafce66ae4b0e09fad4b6155b7addc2

      • C:\Windows\SysWOW64\install\win33.exe

        Filesize

        544KB

        MD5

        7c4a40ce4680ca75278dc9739c7325e1

        SHA1

        361e247336a706bec835bf4246b3db134f9e30f2

        SHA256

        53e043141bbd84d47175f00eee3a8df7915a8317ab1c66b8a0f002a20d3a7c6a

        SHA512

        fd2efa97852428ba16961da36837c5fd245d2bbe73c5c005334c74aca11b1657130665c532a1c8dd8b300dc4b75bc9aafcafce66ae4b0e09fad4b6155b7addc2

      • \Users\Admin\AppData\Local\Temp\Project1.exe

        Filesize

        382KB

        MD5

        7330c45953580f5c5f1370ec581d2a86

        SHA1

        8bf107bd9095250e7bdfdb3e045f4d57a1ec060e

        SHA256

        257101420b298663a6b8bd060a08c94709d6d8ef1e59d1225b7da28cb689379d

        SHA512

        0c454feb498a9cc5e57016c947708a19c8cb73803d66137e03b14cc31b86ae3e7055233c9bffbced35f8a441a8a4934fc7fb1e8d471d6b60d3744570dafe493e

      • \Users\Admin\AppData\Local\Temp\Project1.exe

        Filesize

        382KB

        MD5

        7330c45953580f5c5f1370ec581d2a86

        SHA1

        8bf107bd9095250e7bdfdb3e045f4d57a1ec060e

        SHA256

        257101420b298663a6b8bd060a08c94709d6d8ef1e59d1225b7da28cb689379d

        SHA512

        0c454feb498a9cc5e57016c947708a19c8cb73803d66137e03b14cc31b86ae3e7055233c9bffbced35f8a441a8a4934fc7fb1e8d471d6b60d3744570dafe493e

      • \Users\Admin\AppData\Local\Temp\atfmon.exe

        Filesize

        544KB

        MD5

        7c4a40ce4680ca75278dc9739c7325e1

        SHA1

        361e247336a706bec835bf4246b3db134f9e30f2

        SHA256

        53e043141bbd84d47175f00eee3a8df7915a8317ab1c66b8a0f002a20d3a7c6a

        SHA512

        fd2efa97852428ba16961da36837c5fd245d2bbe73c5c005334c74aca11b1657130665c532a1c8dd8b300dc4b75bc9aafcafce66ae4b0e09fad4b6155b7addc2

      • \Users\Admin\AppData\Local\Temp\atfmon.exe

        Filesize

        544KB

        MD5

        7c4a40ce4680ca75278dc9739c7325e1

        SHA1

        361e247336a706bec835bf4246b3db134f9e30f2

        SHA256

        53e043141bbd84d47175f00eee3a8df7915a8317ab1c66b8a0f002a20d3a7c6a

        SHA512

        fd2efa97852428ba16961da36837c5fd245d2bbe73c5c005334c74aca11b1657130665c532a1c8dd8b300dc4b75bc9aafcafce66ae4b0e09fad4b6155b7addc2

      • \Users\Admin\AppData\Local\Temp\atfmon.exe

        Filesize

        544KB

        MD5

        7c4a40ce4680ca75278dc9739c7325e1

        SHA1

        361e247336a706bec835bf4246b3db134f9e30f2

        SHA256

        53e043141bbd84d47175f00eee3a8df7915a8317ab1c66b8a0f002a20d3a7c6a

        SHA512

        fd2efa97852428ba16961da36837c5fd245d2bbe73c5c005334c74aca11b1657130665c532a1c8dd8b300dc4b75bc9aafcafce66ae4b0e09fad4b6155b7addc2

      • \Users\Admin\AppData\Local\Temp\atfmon.exe

        Filesize

        544KB

        MD5

        7c4a40ce4680ca75278dc9739c7325e1

        SHA1

        361e247336a706bec835bf4246b3db134f9e30f2

        SHA256

        53e043141bbd84d47175f00eee3a8df7915a8317ab1c66b8a0f002a20d3a7c6a

        SHA512

        fd2efa97852428ba16961da36837c5fd245d2bbe73c5c005334c74aca11b1657130665c532a1c8dd8b300dc4b75bc9aafcafce66ae4b0e09fad4b6155b7addc2

      • \Windows\SysWOW64\install\win33.exe

        Filesize

        544KB

        MD5

        7c4a40ce4680ca75278dc9739c7325e1

        SHA1

        361e247336a706bec835bf4246b3db134f9e30f2

        SHA256

        53e043141bbd84d47175f00eee3a8df7915a8317ab1c66b8a0f002a20d3a7c6a

        SHA512

        fd2efa97852428ba16961da36837c5fd245d2bbe73c5c005334c74aca11b1657130665c532a1c8dd8b300dc4b75bc9aafcafce66ae4b0e09fad4b6155b7addc2

      • \Windows\SysWOW64\install\win33.exe

        Filesize

        544KB

        MD5

        7c4a40ce4680ca75278dc9739c7325e1

        SHA1

        361e247336a706bec835bf4246b3db134f9e30f2

        SHA256

        53e043141bbd84d47175f00eee3a8df7915a8317ab1c66b8a0f002a20d3a7c6a

        SHA512

        fd2efa97852428ba16961da36837c5fd245d2bbe73c5c005334c74aca11b1657130665c532a1c8dd8b300dc4b75bc9aafcafce66ae4b0e09fad4b6155b7addc2

      • memory/580-121-0x0000000000400000-0x00000000004A8000-memory.dmp

        Filesize

        672KB

      • memory/580-120-0x0000000024160000-0x00000000241C2000-memory.dmp

        Filesize

        392KB

      • memory/580-119-0x0000000024160000-0x00000000241C2000-memory.dmp

        Filesize

        392KB

      • memory/580-143-0x000000000D1A0000-0x000000000D248000-memory.dmp

        Filesize

        672KB

      • memory/580-146-0x0000000024160000-0x00000000241C2000-memory.dmp

        Filesize

        392KB

      • memory/856-113-0x0000000024160000-0x00000000241C2000-memory.dmp

        Filesize

        392KB

      • memory/856-80-0x0000000000400000-0x000000000044E000-memory.dmp

        Filesize

        312KB

      • memory/856-86-0x0000000024010000-0x0000000024072000-memory.dmp

        Filesize

        392KB

      • memory/856-118-0x0000000000400000-0x000000000044E000-memory.dmp

        Filesize

        312KB

      • memory/856-68-0x0000000000400000-0x000000000044E000-memory.dmp

        Filesize

        312KB

      • memory/856-69-0x0000000000400000-0x000000000044E000-memory.dmp

        Filesize

        312KB

      • memory/856-95-0x0000000024080000-0x00000000240E2000-memory.dmp

        Filesize

        392KB

      • memory/856-84-0x0000000000400000-0x000000000044E000-memory.dmp

        Filesize

        312KB

      • memory/856-83-0x0000000000400000-0x000000000044E000-memory.dmp

        Filesize

        312KB

      • memory/856-74-0x0000000000400000-0x000000000044E000-memory.dmp

        Filesize

        312KB

      • memory/856-71-0x0000000000400000-0x000000000044E000-memory.dmp

        Filesize

        312KB

      • memory/856-105-0x00000000240F0000-0x0000000024152000-memory.dmp

        Filesize

        392KB

      • memory/856-72-0x0000000000400000-0x000000000044E000-memory.dmp

        Filesize

        312KB

      • memory/856-77-0x0000000000400000-0x000000000044E000-memory.dmp

        Filesize

        312KB

      • memory/856-73-0x0000000000400000-0x000000000044E000-memory.dmp

        Filesize

        312KB

      • memory/856-75-0x0000000000400000-0x000000000044E000-memory.dmp

        Filesize

        312KB

      • memory/1204-89-0x0000000024010000-0x0000000024072000-memory.dmp

        Filesize

        392KB

      • memory/1428-140-0x0000000000400000-0x00000000004A8000-memory.dmp

        Filesize

        672KB

      • memory/1616-145-0x0000000000400000-0x000000000044E000-memory.dmp

        Filesize

        312KB

      • memory/1616-144-0x0000000000400000-0x000000000044E000-memory.dmp

        Filesize

        312KB

      • memory/1616-142-0x0000000000400000-0x000000000044E000-memory.dmp

        Filesize

        312KB

      • memory/1640-94-0x00000000740E1000-0x00000000740E3000-memory.dmp

        Filesize

        8KB

      • memory/1640-100-0x0000000024080000-0x00000000240E2000-memory.dmp

        Filesize

        392KB

      • memory/1640-103-0x0000000024080000-0x00000000240E2000-memory.dmp

        Filesize

        392KB

      • memory/1768-56-0x0000000075931000-0x0000000075933000-memory.dmp

        Filesize

        8KB

      • memory/2040-81-0x0000000000400000-0x00000000004A8000-memory.dmp

        Filesize

        672KB