Analysis
-
max time kernel
171s -
max time network
175s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
24/11/2022, 08:03
Behavioral task
behavioral1
Sample
0982da02928063236c393b8aa728d2ff9150e6f24d319deb29fc2fc7ed0818c0.exe
Resource
win7-20220812-en
General
-
Target
0982da02928063236c393b8aa728d2ff9150e6f24d319deb29fc2fc7ed0818c0.exe
-
Size
417KB
-
MD5
9aa6b8dff34aaf1a956c20be95cc2999
-
SHA1
e5ec85ec21f5663e4e548775a38595e25c799770
-
SHA256
0982da02928063236c393b8aa728d2ff9150e6f24d319deb29fc2fc7ed0818c0
-
SHA512
86c8140e36f9a11730c8ca257393493b9199c1c40f9c733e8624e234d725440271bd76ce0b509118974ef88b973dbaa1262c2a9b0d83b1b6c370b82cf0db4584
-
SSDEEP
6144:0icOq5+ZyQmGBzzymcD66RRjs5JGmrpQsK3RD2u270jupCJsCxCT2:0icMoGBfcD663pZ2zkPaCxw
Malware Config
Extracted
cybergate
2.6
ÖÍíÉ
hacker-psm.zapto.org:81
***MUTEX***
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
svchost.exe
-
install_file
windows.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
texto da mensagem
-
message_box_title
t?tulo da mensagem
-
password
abcd1234
Signatures
-
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\windows.exe" Tempserver.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run Tempserver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\windows.exe" Tempserver.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run Tempserver.exe -
Executes dropped EXE 3 IoCs
pid Process 3944 Tempserver.exe 1092 Tempserver.exe 4528 windows.exe -
Modifies Installed Components in the registry 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{PX38T317-JEYX-0E86-68Q7-7G1D0156SS2J} Tempserver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{PX38T317-JEYX-0E86-68Q7-7G1D0156SS2J}\StubPath = "C:\\Windows\\system32\\windows.exe Restart" Tempserver.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{PX38T317-JEYX-0E86-68Q7-7G1D0156SS2J} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{PX38T317-JEYX-0E86-68Q7-7G1D0156SS2J}\StubPath = "C:\\Windows\\system32\\windows.exe" explorer.exe -
resource yara_rule behavioral2/memory/3944-137-0x0000000024010000-0x0000000024072000-memory.dmp upx behavioral2/memory/3944-142-0x0000000024080000-0x00000000240E2000-memory.dmp upx behavioral2/memory/4728-145-0x0000000024080000-0x00000000240E2000-memory.dmp upx behavioral2/memory/4728-148-0x0000000024080000-0x00000000240E2000-memory.dmp upx behavioral2/memory/3944-150-0x00000000240F0000-0x0000000024152000-memory.dmp upx behavioral2/memory/3944-156-0x0000000024160000-0x00000000241C2000-memory.dmp upx behavioral2/memory/1092-160-0x0000000024160000-0x00000000241C2000-memory.dmp upx behavioral2/memory/1092-163-0x0000000024160000-0x00000000241C2000-memory.dmp upx -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 0982da02928063236c393b8aa728d2ff9150e6f24d319deb29fc2fc7ed0818c0.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation Tempserver.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\windows.exe Tempserver.exe File opened for modification C:\Windows\SysWOW64\ Tempserver.exe File created C:\Windows\SysWOW64\windows.exe Tempserver.exe File opened for modification C:\Windows\SysWOW64\windows.exe Tempserver.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 3528 4528 WerFault.exe 86 -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Tempserver.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3944 Tempserver.exe 3944 Tempserver.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1092 Tempserver.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 4716 0982da02928063236c393b8aa728d2ff9150e6f24d319deb29fc2fc7ed0818c0.exe Token: 33 4716 0982da02928063236c393b8aa728d2ff9150e6f24d319deb29fc2fc7ed0818c0.exe Token: SeIncBasePriorityPrivilege 4716 0982da02928063236c393b8aa728d2ff9150e6f24d319deb29fc2fc7ed0818c0.exe Token: SeDebugPrivilege 1092 Tempserver.exe Token: SeDebugPrivilege 1092 Tempserver.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3944 Tempserver.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4716 wrote to memory of 3944 4716 0982da02928063236c393b8aa728d2ff9150e6f24d319deb29fc2fc7ed0818c0.exe 82 PID 4716 wrote to memory of 3944 4716 0982da02928063236c393b8aa728d2ff9150e6f24d319deb29fc2fc7ed0818c0.exe 82 PID 4716 wrote to memory of 3944 4716 0982da02928063236c393b8aa728d2ff9150e6f24d319deb29fc2fc7ed0818c0.exe 82 PID 3944 wrote to memory of 2832 3944 Tempserver.exe 48 PID 3944 wrote to memory of 2832 3944 Tempserver.exe 48 PID 3944 wrote to memory of 2832 3944 Tempserver.exe 48 PID 3944 wrote to memory of 2832 3944 Tempserver.exe 48 PID 3944 wrote to memory of 2832 3944 Tempserver.exe 48 PID 3944 wrote to memory of 2832 3944 Tempserver.exe 48 PID 3944 wrote to memory of 2832 3944 Tempserver.exe 48 PID 3944 wrote to memory of 2832 3944 Tempserver.exe 48 PID 3944 wrote to memory of 2832 3944 Tempserver.exe 48 PID 3944 wrote to memory of 2832 3944 Tempserver.exe 48 PID 3944 wrote to memory of 2832 3944 Tempserver.exe 48 PID 3944 wrote to memory of 2832 3944 Tempserver.exe 48 PID 3944 wrote to memory of 2832 3944 Tempserver.exe 48 PID 3944 wrote to memory of 2832 3944 Tempserver.exe 48 PID 3944 wrote to memory of 2832 3944 Tempserver.exe 48 PID 3944 wrote to memory of 2832 3944 Tempserver.exe 48 PID 3944 wrote to memory of 2832 3944 Tempserver.exe 48 PID 3944 wrote to memory of 2832 3944 Tempserver.exe 48 PID 3944 wrote to memory of 2832 3944 Tempserver.exe 48 PID 3944 wrote to memory of 2832 3944 Tempserver.exe 48 PID 3944 wrote to memory of 2832 3944 Tempserver.exe 48 PID 3944 wrote to memory of 2832 3944 Tempserver.exe 48 PID 3944 wrote to memory of 2832 3944 Tempserver.exe 48 PID 3944 wrote to memory of 2832 3944 Tempserver.exe 48 PID 3944 wrote to memory of 2832 3944 Tempserver.exe 48 PID 3944 wrote to memory of 2832 3944 Tempserver.exe 48 PID 3944 wrote to memory of 2832 3944 Tempserver.exe 48 PID 3944 wrote to memory of 2832 3944 Tempserver.exe 48 PID 3944 wrote to memory of 2832 3944 Tempserver.exe 48 PID 3944 wrote to memory of 2832 3944 Tempserver.exe 48 PID 3944 wrote to memory of 2832 3944 Tempserver.exe 48 PID 3944 wrote to memory of 2832 3944 Tempserver.exe 48 PID 3944 wrote to memory of 2832 3944 Tempserver.exe 48 PID 3944 wrote to memory of 2832 3944 Tempserver.exe 48 PID 3944 wrote to memory of 2832 3944 Tempserver.exe 48 PID 3944 wrote to memory of 2832 3944 Tempserver.exe 48 PID 3944 wrote to memory of 2832 3944 Tempserver.exe 48 PID 3944 wrote to memory of 2832 3944 Tempserver.exe 48 PID 3944 wrote to memory of 2832 3944 Tempserver.exe 48 PID 3944 wrote to memory of 2832 3944 Tempserver.exe 48 PID 3944 wrote to memory of 2832 3944 Tempserver.exe 48 PID 3944 wrote to memory of 2832 3944 Tempserver.exe 48 PID 3944 wrote to memory of 2832 3944 Tempserver.exe 48 PID 3944 wrote to memory of 2832 3944 Tempserver.exe 48 PID 3944 wrote to memory of 2832 3944 Tempserver.exe 48 PID 3944 wrote to memory of 2832 3944 Tempserver.exe 48 PID 3944 wrote to memory of 2832 3944 Tempserver.exe 48 PID 3944 wrote to memory of 2832 3944 Tempserver.exe 48 PID 3944 wrote to memory of 2832 3944 Tempserver.exe 48 PID 3944 wrote to memory of 2832 3944 Tempserver.exe 48 PID 3944 wrote to memory of 2832 3944 Tempserver.exe 48 PID 3944 wrote to memory of 2832 3944 Tempserver.exe 48 PID 3944 wrote to memory of 2832 3944 Tempserver.exe 48 PID 3944 wrote to memory of 2832 3944 Tempserver.exe 48 PID 3944 wrote to memory of 2832 3944 Tempserver.exe 48 PID 3944 wrote to memory of 2832 3944 Tempserver.exe 48 PID 3944 wrote to memory of 2832 3944 Tempserver.exe 48 PID 3944 wrote to memory of 2832 3944 Tempserver.exe 48 PID 3944 wrote to memory of 2832 3944 Tempserver.exe 48 PID 3944 wrote to memory of 2832 3944 Tempserver.exe 48 PID 3944 wrote to memory of 2832 3944 Tempserver.exe 48
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:2832
-
C:\Users\Admin\AppData\Local\Temp\0982da02928063236c393b8aa728d2ff9150e6f24d319deb29fc2fc7ed0818c0.exe"C:\Users\Admin\AppData\Local\Temp\0982da02928063236c393b8aa728d2ff9150e6f24d319deb29fc2fc7ed0818c0.exe"2⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4716 -
C:\Users\Admin\AppData\Local\Tempserver.exe"C:\Users\Admin\AppData\Local\Tempserver.exe"3⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Modifies Installed Components in the registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3944 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
- Modifies Installed Components in the registry
PID:4728
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:4316
-
-
C:\Users\Admin\AppData\Local\Tempserver.exe"C:\Users\Admin\AppData\Local\Tempserver.exe"4⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:1092 -
C:\Windows\SysWOW64\windows.exe"C:\Windows\system32\windows.exe"5⤵
- Executes dropped EXE
PID:4528 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4528 -s 5726⤵
- Program crash
PID:3528
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4528 -ip 45281⤵PID:3324
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
229KB
MD5b5b3e9bde34607b61b30097f15175266
SHA1d22bd2cdf1be738b0d87815ba4e88e1d02df1ce9
SHA2568ae8d3cbb3d6161f5e1b19fe430d527d89b309dd2cfa07cd0510fd717664cd53
SHA5127010db780ad244defe3a4736b584d31b4fc00e652d671fdaaac7da79729cb8a90a8ebc1963b4e6165e07ce9467e8cff7a506cde3148ee697e99c4c7a9781da57
-
Filesize
283KB
MD55027c6ef2dc10fba6755ec8320ff3e02
SHA15e4fa25c04c96f9af5242f38403e892ee28931e1
SHA256786b2e5e71b8c802d956993ecc42ff2d6f6b79920ca2511df98e625db4482123
SHA512bcbeddf6c691a501366197e89a54bc5c7027519244eb304bab5d7fe6522b549c6168630155152ea713105aefb11dbff171a97554b92fd1d78ea3fa2142d27d20
-
Filesize
283KB
MD55027c6ef2dc10fba6755ec8320ff3e02
SHA15e4fa25c04c96f9af5242f38403e892ee28931e1
SHA256786b2e5e71b8c802d956993ecc42ff2d6f6b79920ca2511df98e625db4482123
SHA512bcbeddf6c691a501366197e89a54bc5c7027519244eb304bab5d7fe6522b549c6168630155152ea713105aefb11dbff171a97554b92fd1d78ea3fa2142d27d20
-
Filesize
283KB
MD55027c6ef2dc10fba6755ec8320ff3e02
SHA15e4fa25c04c96f9af5242f38403e892ee28931e1
SHA256786b2e5e71b8c802d956993ecc42ff2d6f6b79920ca2511df98e625db4482123
SHA512bcbeddf6c691a501366197e89a54bc5c7027519244eb304bab5d7fe6522b549c6168630155152ea713105aefb11dbff171a97554b92fd1d78ea3fa2142d27d20
-
Filesize
283KB
MD55027c6ef2dc10fba6755ec8320ff3e02
SHA15e4fa25c04c96f9af5242f38403e892ee28931e1
SHA256786b2e5e71b8c802d956993ecc42ff2d6f6b79920ca2511df98e625db4482123
SHA512bcbeddf6c691a501366197e89a54bc5c7027519244eb304bab5d7fe6522b549c6168630155152ea713105aefb11dbff171a97554b92fd1d78ea3fa2142d27d20
-
Filesize
283KB
MD55027c6ef2dc10fba6755ec8320ff3e02
SHA15e4fa25c04c96f9af5242f38403e892ee28931e1
SHA256786b2e5e71b8c802d956993ecc42ff2d6f6b79920ca2511df98e625db4482123
SHA512bcbeddf6c691a501366197e89a54bc5c7027519244eb304bab5d7fe6522b549c6168630155152ea713105aefb11dbff171a97554b92fd1d78ea3fa2142d27d20