Analysis

  • max time kernel
    153s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/11/2022, 04:20

General

  • Target

    ee5d6a092ef6fab92c5ce097705b052defb56bd0a6c6650ec2c92f030680a5d4.exe

  • Size

    499KB

  • MD5

    20bb9a2e5abdc1b1fbd20de5a16a53be

  • SHA1

    3ba89aed16fc48b4d64a8217c693bf5539507004

  • SHA256

    ee5d6a092ef6fab92c5ce097705b052defb56bd0a6c6650ec2c92f030680a5d4

  • SHA512

    f5f79629901ef735ea45d4eb9beb3e0bde9141a5df1a55a8212f9123969248ccacd141a5079367793dca5a5acdd8782bbeaf858992fdc502d41361b9e8c54793

  • SSDEEP

    12288:8s5U0eL+KsXN+DFTzBCjkoPuNsp8DUAwLf0XRho0Z/56:r5U0W+vXmFT4gomep8DdwAXrp/56

Malware Config

Extracted

Family

cybergate

Version

v3.4.2.2

Botnet

remote

C2

akv007.no-ip.org:1900

Mutex

150BVDH3M8R0V8

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    install

  • install_file

    server.exe

  • install_flag

    false

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    cybergate

Signatures

  • CyberGate, Rebhip

    CyberGate is a lightweight remote administration tool with a wide array of functionalities.

  • Executes dropped EXE 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Maps connected drives based on registry 3 TTPs 4 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ee5d6a092ef6fab92c5ce097705b052defb56bd0a6c6650ec2c92f030680a5d4.exe
    "C:\Users\Admin\AppData\Local\Temp\ee5d6a092ef6fab92c5ce097705b052defb56bd0a6c6650ec2c92f030680a5d4.exe"
    1⤵
    • Checks computer location settings
    • Maps connected drives based on registry
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2064
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c reg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "VLC Service and Management" /t REG_SZ /d "C:\ProgramData\vlc32.exe" & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1000
      • C:\Windows\SysWOW64\reg.exe
        reg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "VLC Service and Management" /t REG_SZ /d "C:\ProgramData\vlc32.exe"
        3⤵
        • Adds Run key to start application
        PID:2168
    • C:\ProgramData\vlc32.exe
      C:\ProgramData\vlc32.exe
      2⤵
      • Executes dropped EXE
      • Drops startup file
      • Maps connected drives based on registry
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2844
      • C:\ProgramData\vlc32.exe
        "C:\ProgramData\vlc32.exe"
        3⤵
        • Executes dropped EXE
        PID:1016
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1016 -s 396
          4⤵
          • Program crash
          PID:4020
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 1016 -ip 1016
    1⤵
      PID:4128

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\vlc32.exe

      Filesize

      499KB

      MD5

      20bb9a2e5abdc1b1fbd20de5a16a53be

      SHA1

      3ba89aed16fc48b4d64a8217c693bf5539507004

      SHA256

      ee5d6a092ef6fab92c5ce097705b052defb56bd0a6c6650ec2c92f030680a5d4

      SHA512

      f5f79629901ef735ea45d4eb9beb3e0bde9141a5df1a55a8212f9123969248ccacd141a5079367793dca5a5acdd8782bbeaf858992fdc502d41361b9e8c54793

    • C:\ProgramData\vlc32.exe

      Filesize

      499KB

      MD5

      20bb9a2e5abdc1b1fbd20de5a16a53be

      SHA1

      3ba89aed16fc48b4d64a8217c693bf5539507004

      SHA256

      ee5d6a092ef6fab92c5ce097705b052defb56bd0a6c6650ec2c92f030680a5d4

      SHA512

      f5f79629901ef735ea45d4eb9beb3e0bde9141a5df1a55a8212f9123969248ccacd141a5079367793dca5a5acdd8782bbeaf858992fdc502d41361b9e8c54793

    • C:\ProgramData\vlc32.exe

      Filesize

      499KB

      MD5

      20bb9a2e5abdc1b1fbd20de5a16a53be

      SHA1

      3ba89aed16fc48b4d64a8217c693bf5539507004

      SHA256

      ee5d6a092ef6fab92c5ce097705b052defb56bd0a6c6650ec2c92f030680a5d4

      SHA512

      f5f79629901ef735ea45d4eb9beb3e0bde9141a5df1a55a8212f9123969248ccacd141a5079367793dca5a5acdd8782bbeaf858992fdc502d41361b9e8c54793

    • memory/1016-154-0x0000000000160000-0x00000000001AB000-memory.dmp

      Filesize

      300KB

    • memory/1016-153-0x0000000000160000-0x00000000001AB000-memory.dmp

      Filesize

      300KB

    • memory/1016-145-0x0000000000160000-0x00000000001AB000-memory.dmp

      Filesize

      300KB

    • memory/1016-149-0x0000000000160000-0x00000000001AB000-memory.dmp

      Filesize

      300KB

    • memory/2064-133-0x0000000075440000-0x00000000759F1000-memory.dmp

      Filesize

      5.7MB

    • memory/2064-140-0x0000000075440000-0x00000000759F1000-memory.dmp

      Filesize

      5.7MB

    • memory/2064-134-0x0000000075440000-0x00000000759F1000-memory.dmp

      Filesize

      5.7MB

    • memory/2844-141-0x0000000075440000-0x00000000759F1000-memory.dmp

      Filesize

      5.7MB

    • memory/2844-155-0x0000000075440000-0x00000000759F1000-memory.dmp

      Filesize

      5.7MB