Analysis
-
max time kernel
151s -
max time network
72s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
25-11-2022 15:40
Static task
static1
Behavioral task
behavioral1
Sample
1ffeb2424534a4512c7494113f4ff3c33c30da42cc9a614c7ffbfa1e0146632f.exe
Resource
win7-20220812-en
General
-
Target
1ffeb2424534a4512c7494113f4ff3c33c30da42cc9a614c7ffbfa1e0146632f.exe
-
Size
931KB
-
MD5
ebeefe34d85cc36dff078ee50c3ed82b
-
SHA1
2516399edee81f906aa1750ffe2b34f36c4b6348
-
SHA256
1ffeb2424534a4512c7494113f4ff3c33c30da42cc9a614c7ffbfa1e0146632f
-
SHA512
6d9692c7edd72a100a519647fcdb8446a154d77cdc775c2e7703157ee6f1a1188aae02861e2490800ce104a7d1880e0cdc73c79e6cfbd6775f1ae77fb5c9015c
-
SSDEEP
24576:hYMrMImtsYgc0FgjGli6Zx7ZBvV+LLmDLwhe/9YmaDn6rr/qKoS:hT1mtsYr0VZBvgYLhYmaDnoqKoS
Malware Config
Extracted
cybergate
v1.07.5
Clients
abapaul.ddns.net:3450
MQ17T531JROJ0H
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
MUI
-
install_file
svchost.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
12345678A
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Signatures
-
Adds policy Run key to start application 2 TTPs 4 IoCs
Processes:
tmp.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run tmp.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\MUI\\svchost.exe" tmp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run tmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\MUI\\svchost.exe" tmp.exe -
Executes dropped EXE 4 IoCs
Processes:
tmp.exetmp.exesvchost.exenotepad .exepid process 944 tmp.exe 1672 tmp.exe 1728 svchost.exe 1184 notepad .exe -
Modifies Installed Components in the registry 2 TTPs 4 IoCs
Processes:
tmp.exeexplorer.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y7FF2K65-1JOS-88G4-BTS0-7F8W7KP24522} tmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y7FF2K65-1JOS-88G4-BTS0-7F8W7KP24522}\StubPath = "C:\\Windows\\MUI\\svchost.exe Restart" tmp.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y7FF2K65-1JOS-88G4-BTS0-7F8W7KP24522} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y7FF2K65-1JOS-88G4-BTS0-7F8W7KP24522}\StubPath = "C:\\Windows\\MUI\\svchost.exe" explorer.exe -
Processes:
resource yara_rule behavioral1/memory/944-73-0x0000000010410000-0x0000000010475000-memory.dmp upx behavioral1/memory/944-82-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral1/memory/1760-87-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral1/memory/1760-90-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral1/memory/944-92-0x00000000104F0000-0x0000000010555000-memory.dmp upx behavioral1/memory/944-99-0x0000000010560000-0x00000000105C5000-memory.dmp upx behavioral1/memory/1672-104-0x0000000010560000-0x00000000105C5000-memory.dmp upx behavioral1/memory/1672-105-0x0000000010560000-0x00000000105C5000-memory.dmp upx behavioral1/memory/1672-113-0x0000000010560000-0x00000000105C5000-memory.dmp upx -
Loads dropped DLL 5 IoCs
Processes:
1ffeb2424534a4512c7494113f4ff3c33c30da42cc9a614c7ffbfa1e0146632f.exetmp.exepid process 1060 1ffeb2424534a4512c7494113f4ff3c33c30da42cc9a614c7ffbfa1e0146632f.exe 1060 1ffeb2424534a4512c7494113f4ff3c33c30da42cc9a614c7ffbfa1e0146632f.exe 1060 1ffeb2424534a4512c7494113f4ff3c33c30da42cc9a614c7ffbfa1e0146632f.exe 1672 tmp.exe 1672 tmp.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
tmp.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run tmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\MUI\\svchost.exe" tmp.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run tmp.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\MUI\\svchost.exe" tmp.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
1ffeb2424534a4512c7494113f4ff3c33c30da42cc9a614c7ffbfa1e0146632f.exedescription pid process target process PID 1060 set thread context of 1184 1060 1ffeb2424534a4512c7494113f4ff3c33c30da42cc9a614c7ffbfa1e0146632f.exe notepad .exe -
Drops file in Windows directory 4 IoCs
Processes:
tmp.exetmp.exedescription ioc process File opened for modification C:\Windows\MUI\svchost.exe tmp.exe File opened for modification C:\Windows\MUI\ tmp.exe File created C:\Windows\MUI\svchost.exe tmp.exe File opened for modification C:\Windows\MUI\svchost.exe tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
1ffeb2424534a4512c7494113f4ff3c33c30da42cc9a614c7ffbfa1e0146632f.exepid process 1060 1ffeb2424534a4512c7494113f4ff3c33c30da42cc9a614c7ffbfa1e0146632f.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
tmp.exepid process 1672 tmp.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
Processes:
1ffeb2424534a4512c7494113f4ff3c33c30da42cc9a614c7ffbfa1e0146632f.exeexplorer.exetmp.exedescription pid process Token: SeDebugPrivilege 1060 1ffeb2424534a4512c7494113f4ff3c33c30da42cc9a614c7ffbfa1e0146632f.exe Token: 33 1060 1ffeb2424534a4512c7494113f4ff3c33c30da42cc9a614c7ffbfa1e0146632f.exe Token: SeIncBasePriorityPrivilege 1060 1ffeb2424534a4512c7494113f4ff3c33c30da42cc9a614c7ffbfa1e0146632f.exe Token: SeBackupPrivilege 1760 explorer.exe Token: SeRestorePrivilege 1760 explorer.exe Token: SeBackupPrivilege 1672 tmp.exe Token: SeRestorePrivilege 1672 tmp.exe Token: SeDebugPrivilege 1672 tmp.exe Token: SeDebugPrivilege 1672 tmp.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
tmp.exepid process 944 tmp.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
1ffeb2424534a4512c7494113f4ff3c33c30da42cc9a614c7ffbfa1e0146632f.exetmp.exedescription pid process target process PID 1060 wrote to memory of 944 1060 1ffeb2424534a4512c7494113f4ff3c33c30da42cc9a614c7ffbfa1e0146632f.exe tmp.exe PID 1060 wrote to memory of 944 1060 1ffeb2424534a4512c7494113f4ff3c33c30da42cc9a614c7ffbfa1e0146632f.exe tmp.exe PID 1060 wrote to memory of 944 1060 1ffeb2424534a4512c7494113f4ff3c33c30da42cc9a614c7ffbfa1e0146632f.exe tmp.exe PID 1060 wrote to memory of 944 1060 1ffeb2424534a4512c7494113f4ff3c33c30da42cc9a614c7ffbfa1e0146632f.exe tmp.exe PID 1060 wrote to memory of 1184 1060 1ffeb2424534a4512c7494113f4ff3c33c30da42cc9a614c7ffbfa1e0146632f.exe notepad .exe PID 1060 wrote to memory of 1184 1060 1ffeb2424534a4512c7494113f4ff3c33c30da42cc9a614c7ffbfa1e0146632f.exe notepad .exe PID 1060 wrote to memory of 1184 1060 1ffeb2424534a4512c7494113f4ff3c33c30da42cc9a614c7ffbfa1e0146632f.exe notepad .exe PID 1060 wrote to memory of 1184 1060 1ffeb2424534a4512c7494113f4ff3c33c30da42cc9a614c7ffbfa1e0146632f.exe notepad .exe PID 1060 wrote to memory of 1184 1060 1ffeb2424534a4512c7494113f4ff3c33c30da42cc9a614c7ffbfa1e0146632f.exe notepad .exe PID 1060 wrote to memory of 1184 1060 1ffeb2424534a4512c7494113f4ff3c33c30da42cc9a614c7ffbfa1e0146632f.exe notepad .exe PID 1060 wrote to memory of 1184 1060 1ffeb2424534a4512c7494113f4ff3c33c30da42cc9a614c7ffbfa1e0146632f.exe notepad .exe PID 1060 wrote to memory of 1184 1060 1ffeb2424534a4512c7494113f4ff3c33c30da42cc9a614c7ffbfa1e0146632f.exe notepad .exe PID 1060 wrote to memory of 1184 1060 1ffeb2424534a4512c7494113f4ff3c33c30da42cc9a614c7ffbfa1e0146632f.exe notepad .exe PID 1060 wrote to memory of 1184 1060 1ffeb2424534a4512c7494113f4ff3c33c30da42cc9a614c7ffbfa1e0146632f.exe notepad .exe PID 1060 wrote to memory of 1184 1060 1ffeb2424534a4512c7494113f4ff3c33c30da42cc9a614c7ffbfa1e0146632f.exe notepad .exe PID 1060 wrote to memory of 1184 1060 1ffeb2424534a4512c7494113f4ff3c33c30da42cc9a614c7ffbfa1e0146632f.exe notepad .exe PID 944 wrote to memory of 1244 944 tmp.exe Explorer.EXE PID 944 wrote to memory of 1244 944 tmp.exe Explorer.EXE PID 944 wrote to memory of 1244 944 tmp.exe Explorer.EXE PID 944 wrote to memory of 1244 944 tmp.exe Explorer.EXE PID 944 wrote to memory of 1244 944 tmp.exe Explorer.EXE PID 944 wrote to memory of 1244 944 tmp.exe Explorer.EXE PID 944 wrote to memory of 1244 944 tmp.exe Explorer.EXE PID 944 wrote to memory of 1244 944 tmp.exe Explorer.EXE PID 944 wrote to memory of 1244 944 tmp.exe Explorer.EXE PID 944 wrote to memory of 1244 944 tmp.exe Explorer.EXE PID 944 wrote to memory of 1244 944 tmp.exe Explorer.EXE PID 944 wrote to memory of 1244 944 tmp.exe Explorer.EXE PID 944 wrote to memory of 1244 944 tmp.exe Explorer.EXE PID 944 wrote to memory of 1244 944 tmp.exe Explorer.EXE PID 944 wrote to memory of 1244 944 tmp.exe Explorer.EXE PID 944 wrote to memory of 1244 944 tmp.exe Explorer.EXE PID 944 wrote to memory of 1244 944 tmp.exe Explorer.EXE PID 944 wrote to memory of 1244 944 tmp.exe Explorer.EXE PID 944 wrote to memory of 1244 944 tmp.exe Explorer.EXE PID 944 wrote to memory of 1244 944 tmp.exe Explorer.EXE PID 944 wrote to memory of 1244 944 tmp.exe Explorer.EXE PID 944 wrote to memory of 1244 944 tmp.exe Explorer.EXE PID 944 wrote to memory of 1244 944 tmp.exe Explorer.EXE PID 944 wrote to memory of 1244 944 tmp.exe Explorer.EXE PID 944 wrote to memory of 1244 944 tmp.exe Explorer.EXE PID 944 wrote to memory of 1244 944 tmp.exe Explorer.EXE PID 944 wrote to memory of 1244 944 tmp.exe Explorer.EXE PID 944 wrote to memory of 1244 944 tmp.exe Explorer.EXE PID 944 wrote to memory of 1244 944 tmp.exe Explorer.EXE PID 944 wrote to memory of 1244 944 tmp.exe Explorer.EXE PID 944 wrote to memory of 1244 944 tmp.exe Explorer.EXE PID 944 wrote to memory of 1244 944 tmp.exe Explorer.EXE PID 944 wrote to memory of 1244 944 tmp.exe Explorer.EXE PID 944 wrote to memory of 1244 944 tmp.exe Explorer.EXE PID 944 wrote to memory of 1244 944 tmp.exe Explorer.EXE PID 944 wrote to memory of 1244 944 tmp.exe Explorer.EXE PID 944 wrote to memory of 1244 944 tmp.exe Explorer.EXE PID 944 wrote to memory of 1244 944 tmp.exe Explorer.EXE PID 944 wrote to memory of 1244 944 tmp.exe Explorer.EXE PID 944 wrote to memory of 1244 944 tmp.exe Explorer.EXE PID 944 wrote to memory of 1244 944 tmp.exe Explorer.EXE PID 944 wrote to memory of 1244 944 tmp.exe Explorer.EXE PID 944 wrote to memory of 1244 944 tmp.exe Explorer.EXE PID 944 wrote to memory of 1244 944 tmp.exe Explorer.EXE PID 944 wrote to memory of 1244 944 tmp.exe Explorer.EXE PID 944 wrote to memory of 1244 944 tmp.exe Explorer.EXE PID 944 wrote to memory of 1244 944 tmp.exe Explorer.EXE PID 944 wrote to memory of 1244 944 tmp.exe Explorer.EXE
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1244
-
C:\Users\Admin\AppData\Local\Temp\1ffeb2424534a4512c7494113f4ff3c33c30da42cc9a614c7ffbfa1e0146632f.exe"C:\Users\Admin\AppData\Local\Temp\1ffeb2424534a4512c7494113f4ff3c33c30da42cc9a614c7ffbfa1e0146632f.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Users\Admin\AppData\Roaming\tmp.exe"C:\Users\Admin\AppData\Roaming\tmp.exe"3⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Modifies Installed Components in the registry
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
- Modifies Installed Components in the registry
- Suspicious use of AdjustPrivilegeToken
PID:1760
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:1496
-
-
C:\Users\Admin\AppData\Roaming\tmp.exe"C:\Users\Admin\AppData\Roaming\tmp.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:1672 -
C:\Windows\MUI\svchost.exe"C:\Windows\MUI\svchost.exe"5⤵
- Executes dropped EXE
PID:1728
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\#folder#\notepad .exe"C:\Users\Admin\AppData\Local\Temp\#folder#\notepad .exe"3⤵
- Executes dropped EXE
PID:1184
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
54KB
MD50f01571a3e4c71eb4313175aae86488e
SHA12ba648afe2cd52edf5f25e304f77d457abf7ac0e
SHA2568cc51c4c2efc8c6a401aa83a0aeced0925d5d9d2a43192f35561893cdf704022
SHA512159dfbb7d385bf92f4fc48ca389b89d69f6c2616e90dfa056e725d7da78a3702694a28f9c5cab7b55adc4d4dbd7bfe5d272c8b1c9931e3ac95f6326d74576794
-
Filesize
224KB
MD5253682f5e6f8e6d2731f167d2ecd36f1
SHA1db6bdbda1a19498fb458f428ee98c7237e4624f3
SHA256020a6a58906e8798e4503d1d039be815711cc091f49e7dadb8f31bf08d399e81
SHA5125ab903bb87f2ccb3a351eedc3abb111fb73ea7effa0a3d78a2e1f269a7698b61e638f7d2d5adc597f97fb941eccf265e9b541da0da605a0ee9433c37fe72c657
-
Filesize
289KB
MD5f3bf34fbcc5d4d8238c81080feba57c1
SHA10c9c5500054b5e8c90f1e781730a8eee69fc6fb3
SHA25695f8ed76dee24539a80d5e7bc1c16b3cb553e4eff97bf7aeb265e507edbf36ca
SHA512b3142958210017056f06e10db8f32840aff12a2aa36068735614cf818cf6fde7cb0c4a2f67d73996605672467058b064a2b4532acdc1e77020078075e2ea59b3
-
Filesize
289KB
MD5f3bf34fbcc5d4d8238c81080feba57c1
SHA10c9c5500054b5e8c90f1e781730a8eee69fc6fb3
SHA25695f8ed76dee24539a80d5e7bc1c16b3cb553e4eff97bf7aeb265e507edbf36ca
SHA512b3142958210017056f06e10db8f32840aff12a2aa36068735614cf818cf6fde7cb0c4a2f67d73996605672467058b064a2b4532acdc1e77020078075e2ea59b3
-
Filesize
289KB
MD5f3bf34fbcc5d4d8238c81080feba57c1
SHA10c9c5500054b5e8c90f1e781730a8eee69fc6fb3
SHA25695f8ed76dee24539a80d5e7bc1c16b3cb553e4eff97bf7aeb265e507edbf36ca
SHA512b3142958210017056f06e10db8f32840aff12a2aa36068735614cf818cf6fde7cb0c4a2f67d73996605672467058b064a2b4532acdc1e77020078075e2ea59b3
-
Filesize
289KB
MD5f3bf34fbcc5d4d8238c81080feba57c1
SHA10c9c5500054b5e8c90f1e781730a8eee69fc6fb3
SHA25695f8ed76dee24539a80d5e7bc1c16b3cb553e4eff97bf7aeb265e507edbf36ca
SHA512b3142958210017056f06e10db8f32840aff12a2aa36068735614cf818cf6fde7cb0c4a2f67d73996605672467058b064a2b4532acdc1e77020078075e2ea59b3
-
Filesize
289KB
MD5f3bf34fbcc5d4d8238c81080feba57c1
SHA10c9c5500054b5e8c90f1e781730a8eee69fc6fb3
SHA25695f8ed76dee24539a80d5e7bc1c16b3cb553e4eff97bf7aeb265e507edbf36ca
SHA512b3142958210017056f06e10db8f32840aff12a2aa36068735614cf818cf6fde7cb0c4a2f67d73996605672467058b064a2b4532acdc1e77020078075e2ea59b3
-
Filesize
54KB
MD50f01571a3e4c71eb4313175aae86488e
SHA12ba648afe2cd52edf5f25e304f77d457abf7ac0e
SHA2568cc51c4c2efc8c6a401aa83a0aeced0925d5d9d2a43192f35561893cdf704022
SHA512159dfbb7d385bf92f4fc48ca389b89d69f6c2616e90dfa056e725d7da78a3702694a28f9c5cab7b55adc4d4dbd7bfe5d272c8b1c9931e3ac95f6326d74576794
-
Filesize
289KB
MD5f3bf34fbcc5d4d8238c81080feba57c1
SHA10c9c5500054b5e8c90f1e781730a8eee69fc6fb3
SHA25695f8ed76dee24539a80d5e7bc1c16b3cb553e4eff97bf7aeb265e507edbf36ca
SHA512b3142958210017056f06e10db8f32840aff12a2aa36068735614cf818cf6fde7cb0c4a2f67d73996605672467058b064a2b4532acdc1e77020078075e2ea59b3
-
Filesize
289KB
MD5f3bf34fbcc5d4d8238c81080feba57c1
SHA10c9c5500054b5e8c90f1e781730a8eee69fc6fb3
SHA25695f8ed76dee24539a80d5e7bc1c16b3cb553e4eff97bf7aeb265e507edbf36ca
SHA512b3142958210017056f06e10db8f32840aff12a2aa36068735614cf818cf6fde7cb0c4a2f67d73996605672467058b064a2b4532acdc1e77020078075e2ea59b3
-
Filesize
289KB
MD5f3bf34fbcc5d4d8238c81080feba57c1
SHA10c9c5500054b5e8c90f1e781730a8eee69fc6fb3
SHA25695f8ed76dee24539a80d5e7bc1c16b3cb553e4eff97bf7aeb265e507edbf36ca
SHA512b3142958210017056f06e10db8f32840aff12a2aa36068735614cf818cf6fde7cb0c4a2f67d73996605672467058b064a2b4532acdc1e77020078075e2ea59b3
-
Filesize
289KB
MD5f3bf34fbcc5d4d8238c81080feba57c1
SHA10c9c5500054b5e8c90f1e781730a8eee69fc6fb3
SHA25695f8ed76dee24539a80d5e7bc1c16b3cb553e4eff97bf7aeb265e507edbf36ca
SHA512b3142958210017056f06e10db8f32840aff12a2aa36068735614cf818cf6fde7cb0c4a2f67d73996605672467058b064a2b4532acdc1e77020078075e2ea59b3