Analysis
-
max time kernel
143s -
max time network
90s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
27/11/2022, 04:20
Static task
static1
Behavioral task
behavioral1
Sample
ee5d6a092ef6fab92c5ce097705b052defb56bd0a6c6650ec2c92f030680a5d4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ee5d6a092ef6fab92c5ce097705b052defb56bd0a6c6650ec2c92f030680a5d4.exe
Resource
win10v2004-20221111-en
General
-
Target
ee5d6a092ef6fab92c5ce097705b052defb56bd0a6c6650ec2c92f030680a5d4.exe
-
Size
499KB
-
MD5
20bb9a2e5abdc1b1fbd20de5a16a53be
-
SHA1
3ba89aed16fc48b4d64a8217c693bf5539507004
-
SHA256
ee5d6a092ef6fab92c5ce097705b052defb56bd0a6c6650ec2c92f030680a5d4
-
SHA512
f5f79629901ef735ea45d4eb9beb3e0bde9141a5df1a55a8212f9123969248ccacd141a5079367793dca5a5acdd8782bbeaf858992fdc502d41361b9e8c54793
-
SSDEEP
12288:8s5U0eL+KsXN+DFTzBCjkoPuNsp8DUAwLf0XRho0Z/56:r5U0W+vXmFT4gomep8DdwAXrp/56
Malware Config
Extracted
cybergate
v3.4.2.2
remote
akv007.no-ip.org:1900
150BVDH3M8R0V8
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
install
-
install_file
server.exe
-
install_flag
false
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
cybergate
Signatures
-
Executes dropped EXE 7 IoCs
pid Process 268 vlc32.exe 1792 vlc32.exe 1908 vlc32.exe 684 vlc32.exe 1880 vlc32.exe 988 vlc32.exe 568 vlc32.exe -
resource yara_rule behavioral1/memory/1792-86-0x0000000010410000-0x0000000010480000-memory.dmp upx behavioral1/memory/1908-91-0x0000000010410000-0x0000000010480000-memory.dmp upx behavioral1/memory/1908-93-0x0000000010410000-0x0000000010480000-memory.dmp upx behavioral1/memory/1908-96-0x0000000010410000-0x0000000010480000-memory.dmp upx -
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\VLC Service and Management.com.url vlc32.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\VLC Service and Management.com.url vlc32.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\VLC Service and Management.com.url vlc32.exe -
Loads dropped DLL 1 IoCs
pid Process 1884 ee5d6a092ef6fab92c5ce097705b052defb56bd0a6c6650ec2c92f030680a5d4.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\VLC Service and Management = "C:\\ProgramData\\vlc32.exe" reg.exe -
Maps connected drives based on registry 3 TTPs 8 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum vlc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 vlc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum ee5d6a092ef6fab92c5ce097705b052defb56bd0a6c6650ec2c92f030680a5d4.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 ee5d6a092ef6fab92c5ce097705b052defb56bd0a6c6650ec2c92f030680a5d4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum vlc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 vlc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum vlc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 vlc32.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 268 set thread context of 1792 268 vlc32.exe 32 PID 684 set thread context of 1880 684 vlc32.exe 35 PID 988 set thread context of 568 988 vlc32.exe 37 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 40 IoCs
pid Process 268 vlc32.exe 268 vlc32.exe 268 vlc32.exe 268 vlc32.exe 268 vlc32.exe 268 vlc32.exe 268 vlc32.exe 268 vlc32.exe 268 vlc32.exe 268 vlc32.exe 268 vlc32.exe 268 vlc32.exe 268 vlc32.exe 268 vlc32.exe 268 vlc32.exe 268 vlc32.exe 268 vlc32.exe 268 vlc32.exe 268 vlc32.exe 268 vlc32.exe 268 vlc32.exe 268 vlc32.exe 268 vlc32.exe 268 vlc32.exe 268 vlc32.exe 268 vlc32.exe 268 vlc32.exe 268 vlc32.exe 268 vlc32.exe 268 vlc32.exe 268 vlc32.exe 268 vlc32.exe 268 vlc32.exe 268 vlc32.exe 1908 vlc32.exe 684 vlc32.exe 684 vlc32.exe 1908 vlc32.exe 988 vlc32.exe 988 vlc32.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 1884 ee5d6a092ef6fab92c5ce097705b052defb56bd0a6c6650ec2c92f030680a5d4.exe Token: SeDebugPrivilege 268 vlc32.exe Token: SeDebugPrivilege 1908 vlc32.exe Token: SeDebugPrivilege 1908 vlc32.exe Token: SeDebugPrivilege 684 vlc32.exe Token: SeDebugPrivilege 988 vlc32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1884 wrote to memory of 1352 1884 ee5d6a092ef6fab92c5ce097705b052defb56bd0a6c6650ec2c92f030680a5d4.exe 28 PID 1884 wrote to memory of 1352 1884 ee5d6a092ef6fab92c5ce097705b052defb56bd0a6c6650ec2c92f030680a5d4.exe 28 PID 1884 wrote to memory of 1352 1884 ee5d6a092ef6fab92c5ce097705b052defb56bd0a6c6650ec2c92f030680a5d4.exe 28 PID 1884 wrote to memory of 1352 1884 ee5d6a092ef6fab92c5ce097705b052defb56bd0a6c6650ec2c92f030680a5d4.exe 28 PID 1352 wrote to memory of 1872 1352 cmd.exe 30 PID 1352 wrote to memory of 1872 1352 cmd.exe 30 PID 1352 wrote to memory of 1872 1352 cmd.exe 30 PID 1352 wrote to memory of 1872 1352 cmd.exe 30 PID 1884 wrote to memory of 268 1884 ee5d6a092ef6fab92c5ce097705b052defb56bd0a6c6650ec2c92f030680a5d4.exe 31 PID 1884 wrote to memory of 268 1884 ee5d6a092ef6fab92c5ce097705b052defb56bd0a6c6650ec2c92f030680a5d4.exe 31 PID 1884 wrote to memory of 268 1884 ee5d6a092ef6fab92c5ce097705b052defb56bd0a6c6650ec2c92f030680a5d4.exe 31 PID 1884 wrote to memory of 268 1884 ee5d6a092ef6fab92c5ce097705b052defb56bd0a6c6650ec2c92f030680a5d4.exe 31 PID 268 wrote to memory of 1792 268 vlc32.exe 32 PID 268 wrote to memory of 1792 268 vlc32.exe 32 PID 268 wrote to memory of 1792 268 vlc32.exe 32 PID 268 wrote to memory of 1792 268 vlc32.exe 32 PID 268 wrote to memory of 1792 268 vlc32.exe 32 PID 268 wrote to memory of 1792 268 vlc32.exe 32 PID 268 wrote to memory of 1792 268 vlc32.exe 32 PID 268 wrote to memory of 1792 268 vlc32.exe 32 PID 268 wrote to memory of 1792 268 vlc32.exe 32 PID 268 wrote to memory of 1792 268 vlc32.exe 32 PID 268 wrote to memory of 1792 268 vlc32.exe 32 PID 268 wrote to memory of 1792 268 vlc32.exe 32 PID 1792 wrote to memory of 1908 1792 vlc32.exe 33 PID 1792 wrote to memory of 1908 1792 vlc32.exe 33 PID 1792 wrote to memory of 1908 1792 vlc32.exe 33 PID 1792 wrote to memory of 1908 1792 vlc32.exe 33 PID 1792 wrote to memory of 1908 1792 vlc32.exe 33 PID 1792 wrote to memory of 1908 1792 vlc32.exe 33 PID 1792 wrote to memory of 1908 1792 vlc32.exe 33 PID 1792 wrote to memory of 1908 1792 vlc32.exe 33 PID 1792 wrote to memory of 1908 1792 vlc32.exe 33 PID 1792 wrote to memory of 1908 1792 vlc32.exe 33 PID 1792 wrote to memory of 1908 1792 vlc32.exe 33 PID 1792 wrote to memory of 1908 1792 vlc32.exe 33 PID 1792 wrote to memory of 1908 1792 vlc32.exe 33 PID 1792 wrote to memory of 1908 1792 vlc32.exe 33 PID 1792 wrote to memory of 1908 1792 vlc32.exe 33 PID 1792 wrote to memory of 1908 1792 vlc32.exe 33 PID 1792 wrote to memory of 1908 1792 vlc32.exe 33 PID 1792 wrote to memory of 1908 1792 vlc32.exe 33 PID 1792 wrote to memory of 1908 1792 vlc32.exe 33 PID 1792 wrote to memory of 1908 1792 vlc32.exe 33 PID 1792 wrote to memory of 1908 1792 vlc32.exe 33 PID 1792 wrote to memory of 1908 1792 vlc32.exe 33 PID 1792 wrote to memory of 1908 1792 vlc32.exe 33 PID 1792 wrote to memory of 1908 1792 vlc32.exe 33 PID 1792 wrote to memory of 1908 1792 vlc32.exe 33 PID 1792 wrote to memory of 1908 1792 vlc32.exe 33 PID 1792 wrote to memory of 1908 1792 vlc32.exe 33 PID 1792 wrote to memory of 1908 1792 vlc32.exe 33 PID 1792 wrote to memory of 1908 1792 vlc32.exe 33 PID 1792 wrote to memory of 1908 1792 vlc32.exe 33 PID 1792 wrote to memory of 1908 1792 vlc32.exe 33 PID 1792 wrote to memory of 1908 1792 vlc32.exe 33 PID 1792 wrote to memory of 1908 1792 vlc32.exe 33 PID 1792 wrote to memory of 1908 1792 vlc32.exe 33 PID 1792 wrote to memory of 1908 1792 vlc32.exe 33 PID 1792 wrote to memory of 1908 1792 vlc32.exe 33 PID 1792 wrote to memory of 1908 1792 vlc32.exe 33 PID 1792 wrote to memory of 1908 1792 vlc32.exe 33 PID 1792 wrote to memory of 1908 1792 vlc32.exe 33 PID 1792 wrote to memory of 1908 1792 vlc32.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\ee5d6a092ef6fab92c5ce097705b052defb56bd0a6c6650ec2c92f030680a5d4.exe"C:\Users\Admin\AppData\Local\Temp\ee5d6a092ef6fab92c5ce097705b052defb56bd0a6c6650ec2c92f030680a5d4.exe"1⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "VLC Service and Management" /t REG_SZ /d "C:\ProgramData\vlc32.exe" & exit2⤵
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "VLC Service and Management" /t REG_SZ /d "C:\ProgramData\vlc32.exe"3⤵
- Adds Run key to start application
PID:1872
-
-
-
C:\ProgramData\vlc32.exeC:\ProgramData\vlc32.exe2⤵
- Executes dropped EXE
- Drops startup file
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:268 -
C:\ProgramData\vlc32.exe"C:\ProgramData\vlc32.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\ProgramData\vlc32.exe"C:\ProgramData\vlc32.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1908 -
C:\ProgramData\vlc32.exe"C:\ProgramData\vlc32.exe"5⤵
- Executes dropped EXE
- Drops startup file
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:684 -
C:\ProgramData\vlc32.exe"C:\ProgramData\vlc32.exe"6⤵
- Executes dropped EXE
PID:1880
-
-
-
C:\ProgramData\vlc32.exe"C:\ProgramData\vlc32.exe"5⤵
- Executes dropped EXE
- Drops startup file
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:988 -
C:\ProgramData\vlc32.exe"C:\ProgramData\vlc32.exe"6⤵
- Executes dropped EXE
PID:568
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
499KB
MD520bb9a2e5abdc1b1fbd20de5a16a53be
SHA13ba89aed16fc48b4d64a8217c693bf5539507004
SHA256ee5d6a092ef6fab92c5ce097705b052defb56bd0a6c6650ec2c92f030680a5d4
SHA512f5f79629901ef735ea45d4eb9beb3e0bde9141a5df1a55a8212f9123969248ccacd141a5079367793dca5a5acdd8782bbeaf858992fdc502d41361b9e8c54793
-
Filesize
499KB
MD520bb9a2e5abdc1b1fbd20de5a16a53be
SHA13ba89aed16fc48b4d64a8217c693bf5539507004
SHA256ee5d6a092ef6fab92c5ce097705b052defb56bd0a6c6650ec2c92f030680a5d4
SHA512f5f79629901ef735ea45d4eb9beb3e0bde9141a5df1a55a8212f9123969248ccacd141a5079367793dca5a5acdd8782bbeaf858992fdc502d41361b9e8c54793
-
Filesize
499KB
MD520bb9a2e5abdc1b1fbd20de5a16a53be
SHA13ba89aed16fc48b4d64a8217c693bf5539507004
SHA256ee5d6a092ef6fab92c5ce097705b052defb56bd0a6c6650ec2c92f030680a5d4
SHA512f5f79629901ef735ea45d4eb9beb3e0bde9141a5df1a55a8212f9123969248ccacd141a5079367793dca5a5acdd8782bbeaf858992fdc502d41361b9e8c54793
-
Filesize
499KB
MD520bb9a2e5abdc1b1fbd20de5a16a53be
SHA13ba89aed16fc48b4d64a8217c693bf5539507004
SHA256ee5d6a092ef6fab92c5ce097705b052defb56bd0a6c6650ec2c92f030680a5d4
SHA512f5f79629901ef735ea45d4eb9beb3e0bde9141a5df1a55a8212f9123969248ccacd141a5079367793dca5a5acdd8782bbeaf858992fdc502d41361b9e8c54793
-
Filesize
499KB
MD520bb9a2e5abdc1b1fbd20de5a16a53be
SHA13ba89aed16fc48b4d64a8217c693bf5539507004
SHA256ee5d6a092ef6fab92c5ce097705b052defb56bd0a6c6650ec2c92f030680a5d4
SHA512f5f79629901ef735ea45d4eb9beb3e0bde9141a5df1a55a8212f9123969248ccacd141a5079367793dca5a5acdd8782bbeaf858992fdc502d41361b9e8c54793
-
Filesize
499KB
MD520bb9a2e5abdc1b1fbd20de5a16a53be
SHA13ba89aed16fc48b4d64a8217c693bf5539507004
SHA256ee5d6a092ef6fab92c5ce097705b052defb56bd0a6c6650ec2c92f030680a5d4
SHA512f5f79629901ef735ea45d4eb9beb3e0bde9141a5df1a55a8212f9123969248ccacd141a5079367793dca5a5acdd8782bbeaf858992fdc502d41361b9e8c54793
-
Filesize
499KB
MD520bb9a2e5abdc1b1fbd20de5a16a53be
SHA13ba89aed16fc48b4d64a8217c693bf5539507004
SHA256ee5d6a092ef6fab92c5ce097705b052defb56bd0a6c6650ec2c92f030680a5d4
SHA512f5f79629901ef735ea45d4eb9beb3e0bde9141a5df1a55a8212f9123969248ccacd141a5079367793dca5a5acdd8782bbeaf858992fdc502d41361b9e8c54793
-
Filesize
499KB
MD520bb9a2e5abdc1b1fbd20de5a16a53be
SHA13ba89aed16fc48b4d64a8217c693bf5539507004
SHA256ee5d6a092ef6fab92c5ce097705b052defb56bd0a6c6650ec2c92f030680a5d4
SHA512f5f79629901ef735ea45d4eb9beb3e0bde9141a5df1a55a8212f9123969248ccacd141a5079367793dca5a5acdd8782bbeaf858992fdc502d41361b9e8c54793
-
Filesize
234KB
MD5d24f5b64a9e44aad7aceecfde5db9552
SHA19b264397f0221b25887cce1286c68056b9750ed9
SHA25681da25241888dbc368329b6edf7f2484f7d2f4045223f001de0c85283fae5c88
SHA51256aa62b3a7318f4b3789dad526df8d11763c042959539dab3a155c54b5313d74be48c8685a75ffef7b527e33c866b572470e87457a0f1cf022c19a71ccc98868
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\VLC Service and Management.com.url
Filesize50B
MD5a37b85042b9d390cd68ef950c59d333c
SHA18e41ce69428e92e7dc993b4462ca89c56ae5e942
SHA2569b683727f4146b0588d12439bf24798c6c5545c946267909602fbbd6e72863d4
SHA512e1dd977604bcb5182c1acf4adb8825982eabad179ffeb686a5f6ad21b246658695c1d8824b8e649bb791b53ad4fb46d7069eb2a1919d6a1740b5b4938d7735dd
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\VLC Service and Management.com.url
Filesize50B
MD5a37b85042b9d390cd68ef950c59d333c
SHA18e41ce69428e92e7dc993b4462ca89c56ae5e942
SHA2569b683727f4146b0588d12439bf24798c6c5545c946267909602fbbd6e72863d4
SHA512e1dd977604bcb5182c1acf4adb8825982eabad179ffeb686a5f6ad21b246658695c1d8824b8e649bb791b53ad4fb46d7069eb2a1919d6a1740b5b4938d7735dd
-
Filesize
499KB
MD520bb9a2e5abdc1b1fbd20de5a16a53be
SHA13ba89aed16fc48b4d64a8217c693bf5539507004
SHA256ee5d6a092ef6fab92c5ce097705b052defb56bd0a6c6650ec2c92f030680a5d4
SHA512f5f79629901ef735ea45d4eb9beb3e0bde9141a5df1a55a8212f9123969248ccacd141a5079367793dca5a5acdd8782bbeaf858992fdc502d41361b9e8c54793