Analysis

  • max time kernel
    152s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 17:44

General

  • Target

    2f28791775bba1d9481563d8c40c9665298a9aa06fccef01eae63f27eb2cb926.exe

  • Size

    308KB

  • MD5

    d255a9cc1c1fa4a08e322543673bcb7e

  • SHA1

    b3ea990c7f730eb61ff4ed87748b150e34dbc76c

  • SHA256

    2f28791775bba1d9481563d8c40c9665298a9aa06fccef01eae63f27eb2cb926

  • SHA512

    a84b58693e1d5fe4e9d734b058c965a0bd1b0e64894c7dc301929eff31001fd39d31e0ee8d39e31122cf4e6b45def9ea38c5a1535c691fc6a53ceec86fcf1bd7

  • SSDEEP

    6144:ikIZp16d70R3eArX76KRoGOAGw1nYCAtIRJNTu+SnumvMS1leV6EITBsllw:ikLdgR3e2GKKGOsUI0+VS10VCal

Malware Config

Extracted

Family

cybergate

Version

v1.07.5

Botnet

victima

C2

mayi100.zapto.org:82

Mutex

3RPDD4J3LU7HW3

Attributes
  • enable_keylogger

    true

  • enable_message_box

    true

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    SyStem32

  • install_file

    winzip.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    error framework '.net framework 4.0 client profile' not installed

  • message_box_title

    Autoclick faller

  • password

    smail

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Signatures

  • CyberGate, Rebhip

    CyberGate is a lightweight remote administration tool with a wide array of functionalities.

  • Adds policy Run key to start application 2 TTPs 4 IoCs
  • Executes dropped EXE 4 IoCs
  • Modifies Installed Components in the registry 2 TTPs 4 IoCs
  • UPX packed file 18 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 6 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1272
      • C:\Users\Admin\AppData\Local\Temp\2f28791775bba1d9481563d8c40c9665298a9aa06fccef01eae63f27eb2cb926.exe
        "C:\Users\Admin\AppData\Local\Temp\2f28791775bba1d9481563d8c40c9665298a9aa06fccef01eae63f27eb2cb926.exe"
        2⤵
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1952
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
          "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\tcfmk8tw.cmdline"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1940
          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
            C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESC38F.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCC2F2.tmp"
            4⤵
              PID:1420
          • C:\Users\Admin\AppData\Roaming\2f28791775bba1d9481563d8c40c9665298a9aa06fccef01eae63f27eb2cb926.exe
            C:\Users\Admin\AppData\Roaming\2f28791775bba1d9481563d8c40c9665298a9aa06fccef01eae63f27eb2cb926.exe
            3⤵
            • Adds policy Run key to start application
            • Executes dropped EXE
            • Modifies Installed Components in the registry
            • Loads dropped DLL
            • Adds Run key to start application
            • Drops file in System32 directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of WriteProcessMemory
            PID:748
            • C:\Windows\SysWOW64\explorer.exe
              explorer.exe
              4⤵
              • Modifies Installed Components in the registry
              • Suspicious use of AdjustPrivilegeToken
              PID:1812
            • C:\Program Files\Internet Explorer\iexplore.exe
              "C:\Program Files\Internet Explorer\iexplore.exe"
              4⤵
                PID:652
              • C:\Users\Admin\AppData\Roaming\2f28791775bba1d9481563d8c40c9665298a9aa06fccef01eae63f27eb2cb926.exe
                "C:\Users\Admin\AppData\Roaming\2f28791775bba1d9481563d8c40c9665298a9aa06fccef01eae63f27eb2cb926.exe"
                4⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Drops file in System32 directory
                • Modifies system certificate store
                • Suspicious behavior: GetForegroundWindowSpam
                • Suspicious use of AdjustPrivilegeToken
                PID:1440
                • C:\Windows\SysWOW64\SyStem32\winzip.exe
                  "C:\Windows\system32\SyStem32\winzip.exe"
                  5⤵
                  • Executes dropped EXE
                  PID:1752
              • C:\Windows\SysWOW64\SyStem32\winzip.exe
                "C:\Windows\system32\SyStem32\winzip.exe"
                4⤵
                • Executes dropped EXE
                PID:904

        Network

        MITRE ATT&CK Matrix ATT&CK v6

        Persistence

        Registry Run Keys / Startup Folder

        3
        T1060

        Defense Evasion

        Modify Registry

        4
        T1112

        Install Root Certificate

        1
        T1130

        Discovery

        System Information Discovery

        1
        T1082

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\Admin2.txt
          Filesize

          225KB

          MD5

          8ea1994dd8b598e65cc052118859d5f5

          SHA1

          b335111c6e8e7700d8422b6a50c78364bea760ba

          SHA256

          8a80ee972e96e1f94f92e7b5b53309ac6b1ec1dcbdfaf875170cbaa1ea5dacc1

          SHA512

          c37b331033140ad42efe5d65fa6ca661aa96dd7225ddb9c232fa427e1cc2b904aba7431e84f55f9298bb1a5ec6a2a9c82f675171420ff404e59c82f047b15906

        • C:\Users\Admin\AppData\Local\Temp\RESC38F.tmp
          Filesize

          1KB

          MD5

          3b4f0b2808c15ce250e8471f5d9e7a0a

          SHA1

          9da524db8b83e6bd15b4578daf2a0c6bf9a371ab

          SHA256

          8c04d23a3821820acccfaaed2ac730ba2f22d6f62e80c0e494ed9fa14fa29372

          SHA512

          00c18347433fa7986b7b4c7f2b718f8ed459390501e132bacf718880774acd44413382c823dab5b88262ad9d9195a0b3a025cce5e6ad90c2d826688b4f9224bf

        • C:\Users\Admin\AppData\Local\Temp\tcfmk8tw.dll
          Filesize

          5KB

          MD5

          a81d36a5f738df4a152aa8614af89996

          SHA1

          dddb5701ad2f06110fe9e98a3a838c39fa165c84

          SHA256

          10ca9182fe4355bf94141e7081cbf2e8facfd6fb8e487897ad1e25012b5c0938

          SHA512

          2e96660ae0a128166f71529e8243f2e621b07f1d416b4ce6747f924dca4a87647b7dc846295ac8426636f7480666edaa411a93cc18633ea9af6e848808cb26d1

        • C:\Users\Admin\AppData\Roaming\2f28791775bba1d9481563d8c40c9665298a9aa06fccef01eae63f27eb2cb926.exe
          Filesize

          6KB

          MD5

          d89fdbb4172cee2b2f41033e62c677d6

          SHA1

          c1917b579551f0915f1a0a8e8e3c7a6809284e6b

          SHA256

          2cbdc0ddc7901a9b89615cc338f63e1800f864db431e7a7a85749f73cba0b383

          SHA512

          48941f08ae00d342b52e3255b99ce36abb4e46a48075a760869bc86b1a32c0737eb2bd5e43d5ee665303ab134282f9732738755c4027043ed2d4f414faab63ed

        • C:\Users\Admin\AppData\Roaming\2f28791775bba1d9481563d8c40c9665298a9aa06fccef01eae63f27eb2cb926.exe
          Filesize

          6KB

          MD5

          d89fdbb4172cee2b2f41033e62c677d6

          SHA1

          c1917b579551f0915f1a0a8e8e3c7a6809284e6b

          SHA256

          2cbdc0ddc7901a9b89615cc338f63e1800f864db431e7a7a85749f73cba0b383

          SHA512

          48941f08ae00d342b52e3255b99ce36abb4e46a48075a760869bc86b1a32c0737eb2bd5e43d5ee665303ab134282f9732738755c4027043ed2d4f414faab63ed

        • C:\Users\Admin\AppData\Roaming\2f28791775bba1d9481563d8c40c9665298a9aa06fccef01eae63f27eb2cb926.exe
          Filesize

          6KB

          MD5

          d89fdbb4172cee2b2f41033e62c677d6

          SHA1

          c1917b579551f0915f1a0a8e8e3c7a6809284e6b

          SHA256

          2cbdc0ddc7901a9b89615cc338f63e1800f864db431e7a7a85749f73cba0b383

          SHA512

          48941f08ae00d342b52e3255b99ce36abb4e46a48075a760869bc86b1a32c0737eb2bd5e43d5ee665303ab134282f9732738755c4027043ed2d4f414faab63ed

        • C:\Windows\SysWOW64\SyStem32\winzip.exe
          Filesize

          6KB

          MD5

          d89fdbb4172cee2b2f41033e62c677d6

          SHA1

          c1917b579551f0915f1a0a8e8e3c7a6809284e6b

          SHA256

          2cbdc0ddc7901a9b89615cc338f63e1800f864db431e7a7a85749f73cba0b383

          SHA512

          48941f08ae00d342b52e3255b99ce36abb4e46a48075a760869bc86b1a32c0737eb2bd5e43d5ee665303ab134282f9732738755c4027043ed2d4f414faab63ed

        • C:\Windows\SysWOW64\SyStem32\winzip.exe
          Filesize

          6KB

          MD5

          d89fdbb4172cee2b2f41033e62c677d6

          SHA1

          c1917b579551f0915f1a0a8e8e3c7a6809284e6b

          SHA256

          2cbdc0ddc7901a9b89615cc338f63e1800f864db431e7a7a85749f73cba0b383

          SHA512

          48941f08ae00d342b52e3255b99ce36abb4e46a48075a760869bc86b1a32c0737eb2bd5e43d5ee665303ab134282f9732738755c4027043ed2d4f414faab63ed

        • C:\Windows\SysWOW64\SyStem32\winzip.exe
          Filesize

          6KB

          MD5

          d89fdbb4172cee2b2f41033e62c677d6

          SHA1

          c1917b579551f0915f1a0a8e8e3c7a6809284e6b

          SHA256

          2cbdc0ddc7901a9b89615cc338f63e1800f864db431e7a7a85749f73cba0b383

          SHA512

          48941f08ae00d342b52e3255b99ce36abb4e46a48075a760869bc86b1a32c0737eb2bd5e43d5ee665303ab134282f9732738755c4027043ed2d4f414faab63ed

        • \??\c:\Users\Admin\AppData\Local\Temp\CSCC2F2.tmp
          Filesize

          652B

          MD5

          6b3d5765e340ceebb2f94ae0c2f39c11

          SHA1

          e0dd45422d3861cc05bab404e05a30d965386067

          SHA256

          19665c0a9c0ef483c5c700d47d5ff6ec95512935d62369ff2938c8fc809b8168

          SHA512

          3edb74b6dcb93b3349c38db8bde5f5c5cbb307f6160308d5035d5e94790879cf921ded50440033469d9ec505446e01a38096c55dd87e3ef496f014852d81a27b

        • \??\c:\Users\Admin\AppData\Local\Temp\tcfmk8tw.0.cs
          Filesize

          5KB

          MD5

          cb25540570735d26bf391e8b54579396

          SHA1

          135651d49409214d21348bb879f7973384a7a8cb

          SHA256

          922ec415710a6e1465ed8553838ddf19c8deb32b75da6dfaca372c1067d2d743

          SHA512

          553ce9d3647b196ccbd6612c06d301afac992130ec5c80fe8fa8a42bab4250053fad651227ff97d9fab4ba8aaff562d421236dc0b2b5d0d4a17430985dd07080

        • \??\c:\Users\Admin\AppData\Local\Temp\tcfmk8tw.cmdline
          Filesize

          206B

          MD5

          6ffdefcf5b8ffb7b2f5d9d5c67a82c81

          SHA1

          e8f4d3a672fc9966dd80272b9d3902c352eeb30d

          SHA256

          e4c6aa3c5295ff61ffa1365529f4b7888374d42c7bf47800b7c62fb008c09986

          SHA512

          b397fd4b79a4b91d45d702a0c1a4cc54a50f3e7e88acb6d4e0479508158ac34e5d4189584b0676261661b23e890deaa0b67ff5eb99e308ea3f2c28136514faed

        • \Users\Admin\AppData\Roaming\2f28791775bba1d9481563d8c40c9665298a9aa06fccef01eae63f27eb2cb926.exe
          Filesize

          6KB

          MD5

          d89fdbb4172cee2b2f41033e62c677d6

          SHA1

          c1917b579551f0915f1a0a8e8e3c7a6809284e6b

          SHA256

          2cbdc0ddc7901a9b89615cc338f63e1800f864db431e7a7a85749f73cba0b383

          SHA512

          48941f08ae00d342b52e3255b99ce36abb4e46a48075a760869bc86b1a32c0737eb2bd5e43d5ee665303ab134282f9732738755c4027043ed2d4f414faab63ed

        • \Users\Admin\AppData\Roaming\2f28791775bba1d9481563d8c40c9665298a9aa06fccef01eae63f27eb2cb926.exe
          Filesize

          6KB

          MD5

          d89fdbb4172cee2b2f41033e62c677d6

          SHA1

          c1917b579551f0915f1a0a8e8e3c7a6809284e6b

          SHA256

          2cbdc0ddc7901a9b89615cc338f63e1800f864db431e7a7a85749f73cba0b383

          SHA512

          48941f08ae00d342b52e3255b99ce36abb4e46a48075a760869bc86b1a32c0737eb2bd5e43d5ee665303ab134282f9732738755c4027043ed2d4f414faab63ed

        • \Windows\SysWOW64\SyStem32\winzip.exe
          Filesize

          6KB

          MD5

          d89fdbb4172cee2b2f41033e62c677d6

          SHA1

          c1917b579551f0915f1a0a8e8e3c7a6809284e6b

          SHA256

          2cbdc0ddc7901a9b89615cc338f63e1800f864db431e7a7a85749f73cba0b383

          SHA512

          48941f08ae00d342b52e3255b99ce36abb4e46a48075a760869bc86b1a32c0737eb2bd5e43d5ee665303ab134282f9732738755c4027043ed2d4f414faab63ed

        • \Windows\SysWOW64\SyStem32\winzip.exe
          Filesize

          6KB

          MD5

          d89fdbb4172cee2b2f41033e62c677d6

          SHA1

          c1917b579551f0915f1a0a8e8e3c7a6809284e6b

          SHA256

          2cbdc0ddc7901a9b89615cc338f63e1800f864db431e7a7a85749f73cba0b383

          SHA512

          48941f08ae00d342b52e3255b99ce36abb4e46a48075a760869bc86b1a32c0737eb2bd5e43d5ee665303ab134282f9732738755c4027043ed2d4f414faab63ed

        • \Windows\SysWOW64\SyStem32\winzip.exe
          Filesize

          6KB

          MD5

          d89fdbb4172cee2b2f41033e62c677d6

          SHA1

          c1917b579551f0915f1a0a8e8e3c7a6809284e6b

          SHA256

          2cbdc0ddc7901a9b89615cc338f63e1800f864db431e7a7a85749f73cba0b383

          SHA512

          48941f08ae00d342b52e3255b99ce36abb4e46a48075a760869bc86b1a32c0737eb2bd5e43d5ee665303ab134282f9732738755c4027043ed2d4f414faab63ed

        • \Windows\SysWOW64\SyStem32\winzip.exe
          Filesize

          6KB

          MD5

          d89fdbb4172cee2b2f41033e62c677d6

          SHA1

          c1917b579551f0915f1a0a8e8e3c7a6809284e6b

          SHA256

          2cbdc0ddc7901a9b89615cc338f63e1800f864db431e7a7a85749f73cba0b383

          SHA512

          48941f08ae00d342b52e3255b99ce36abb4e46a48075a760869bc86b1a32c0737eb2bd5e43d5ee665303ab134282f9732738755c4027043ed2d4f414faab63ed

        • memory/748-66-0x0000000000400000-0x0000000000457000-memory.dmp
          Filesize

          348KB

        • memory/748-69-0x0000000000400000-0x0000000000457000-memory.dmp
          Filesize

          348KB

        • memory/748-77-0x0000000000400000-0x0000000000457000-memory.dmp
          Filesize

          348KB

        • memory/748-78-0x0000000000400000-0x0000000000457000-memory.dmp
          Filesize

          348KB

        • memory/748-118-0x0000000000400000-0x0000000000457000-memory.dmp
          Filesize

          348KB

        • memory/748-81-0x0000000010410000-0x0000000010475000-memory.dmp
          Filesize

          404KB

        • memory/748-73-0x0000000000400000-0x0000000000457000-memory.dmp
          Filesize

          348KB

        • memory/748-100-0x00000000104F0000-0x0000000010555000-memory.dmp
          Filesize

          404KB

        • memory/748-70-0x0000000000455140-mapping.dmp
        • memory/748-90-0x0000000010480000-0x00000000104E5000-memory.dmp
          Filesize

          404KB

        • memory/748-76-0x0000000000400000-0x0000000000457000-memory.dmp
          Filesize

          348KB

        • memory/748-107-0x0000000010560000-0x00000000105C5000-memory.dmp
          Filesize

          404KB

        • memory/748-68-0x0000000000400000-0x0000000000457000-memory.dmp
          Filesize

          348KB

        • memory/748-65-0x0000000000400000-0x0000000000457000-memory.dmp
          Filesize

          348KB

        • memory/904-116-0x0000000000000000-mapping.dmp
        • memory/1272-84-0x0000000010410000-0x0000000010475000-memory.dmp
          Filesize

          404KB

        • memory/1420-59-0x0000000000000000-mapping.dmp
        • memory/1440-124-0x0000000010560000-0x00000000105C5000-memory.dmp
          Filesize

          404KB

        • memory/1440-112-0x0000000010560000-0x00000000105C5000-memory.dmp
          Filesize

          404KB

        • memory/1440-104-0x0000000000000000-mapping.dmp
        • memory/1440-114-0x0000000010560000-0x00000000105C5000-memory.dmp
          Filesize

          404KB

        • memory/1752-121-0x0000000000000000-mapping.dmp
        • memory/1812-95-0x0000000010480000-0x00000000104E5000-memory.dmp
          Filesize

          404KB

        • memory/1812-87-0x0000000000000000-mapping.dmp
        • memory/1812-89-0x00000000746D1000-0x00000000746D3000-memory.dmp
          Filesize

          8KB

        • memory/1812-123-0x0000000010480000-0x00000000104E5000-memory.dmp
          Filesize

          404KB

        • memory/1812-96-0x0000000010480000-0x00000000104E5000-memory.dmp
          Filesize

          404KB

        • memory/1940-56-0x0000000000000000-mapping.dmp
        • memory/1952-54-0x00000000750A1000-0x00000000750A3000-memory.dmp
          Filesize

          8KB

        • memory/1952-74-0x0000000074290000-0x000000007483B000-memory.dmp
          Filesize

          5.7MB

        • memory/1952-55-0x0000000074290000-0x000000007483B000-memory.dmp
          Filesize

          5.7MB