Analysis
-
max time kernel
153s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
27/11/2022, 04:20
Static task
static1
Behavioral task
behavioral1
Sample
ee5d6a092ef6fab92c5ce097705b052defb56bd0a6c6650ec2c92f030680a5d4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ee5d6a092ef6fab92c5ce097705b052defb56bd0a6c6650ec2c92f030680a5d4.exe
Resource
win10v2004-20221111-en
General
-
Target
ee5d6a092ef6fab92c5ce097705b052defb56bd0a6c6650ec2c92f030680a5d4.exe
-
Size
499KB
-
MD5
20bb9a2e5abdc1b1fbd20de5a16a53be
-
SHA1
3ba89aed16fc48b4d64a8217c693bf5539507004
-
SHA256
ee5d6a092ef6fab92c5ce097705b052defb56bd0a6c6650ec2c92f030680a5d4
-
SHA512
f5f79629901ef735ea45d4eb9beb3e0bde9141a5df1a55a8212f9123969248ccacd141a5079367793dca5a5acdd8782bbeaf858992fdc502d41361b9e8c54793
-
SSDEEP
12288:8s5U0eL+KsXN+DFTzBCjkoPuNsp8DUAwLf0XRho0Z/56:r5U0W+vXmFT4gomep8DdwAXrp/56
Malware Config
Extracted
cybergate
v3.4.2.2
remote
akv007.no-ip.org:1900
150BVDH3M8R0V8
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
install
-
install_file
server.exe
-
install_flag
false
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
cybergate
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2844 vlc32.exe 1016 vlc32.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation ee5d6a092ef6fab92c5ce097705b052defb56bd0a6c6650ec2c92f030680a5d4.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\VLC Service and Management.com.url vlc32.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\VLC Service and Management = "C:\\ProgramData\\vlc32.exe" reg.exe -
Maps connected drives based on registry 3 TTPs 4 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum ee5d6a092ef6fab92c5ce097705b052defb56bd0a6c6650ec2c92f030680a5d4.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 ee5d6a092ef6fab92c5ce097705b052defb56bd0a6c6650ec2c92f030680a5d4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum vlc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 vlc32.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2844 set thread context of 1016 2844 vlc32.exe 90 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4020 1016 WerFault.exe 90 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2844 vlc32.exe 2844 vlc32.exe 2844 vlc32.exe 2844 vlc32.exe 2844 vlc32.exe 2844 vlc32.exe 2844 vlc32.exe 2844 vlc32.exe 2844 vlc32.exe 2844 vlc32.exe 2844 vlc32.exe 2844 vlc32.exe 2844 vlc32.exe 2844 vlc32.exe 2844 vlc32.exe 2844 vlc32.exe 2844 vlc32.exe 2844 vlc32.exe 2844 vlc32.exe 2844 vlc32.exe 2844 vlc32.exe 2844 vlc32.exe 2844 vlc32.exe 2844 vlc32.exe 2844 vlc32.exe 2844 vlc32.exe 2844 vlc32.exe 2844 vlc32.exe 2844 vlc32.exe 2844 vlc32.exe 2844 vlc32.exe 2844 vlc32.exe 2844 vlc32.exe 2844 vlc32.exe 2844 vlc32.exe 2844 vlc32.exe 2844 vlc32.exe 2844 vlc32.exe 2844 vlc32.exe 2844 vlc32.exe 2844 vlc32.exe 2844 vlc32.exe 2844 vlc32.exe 2844 vlc32.exe 2844 vlc32.exe 2844 vlc32.exe 2844 vlc32.exe 2844 vlc32.exe 2844 vlc32.exe 2844 vlc32.exe 2844 vlc32.exe 2844 vlc32.exe 2844 vlc32.exe 2844 vlc32.exe 2844 vlc32.exe 2844 vlc32.exe 2844 vlc32.exe 2844 vlc32.exe 2844 vlc32.exe 2844 vlc32.exe 2844 vlc32.exe 2844 vlc32.exe 2844 vlc32.exe 2844 vlc32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2064 ee5d6a092ef6fab92c5ce097705b052defb56bd0a6c6650ec2c92f030680a5d4.exe Token: SeDebugPrivilege 2844 vlc32.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2064 wrote to memory of 1000 2064 ee5d6a092ef6fab92c5ce097705b052defb56bd0a6c6650ec2c92f030680a5d4.exe 86 PID 2064 wrote to memory of 1000 2064 ee5d6a092ef6fab92c5ce097705b052defb56bd0a6c6650ec2c92f030680a5d4.exe 86 PID 2064 wrote to memory of 1000 2064 ee5d6a092ef6fab92c5ce097705b052defb56bd0a6c6650ec2c92f030680a5d4.exe 86 PID 1000 wrote to memory of 2168 1000 cmd.exe 88 PID 1000 wrote to memory of 2168 1000 cmd.exe 88 PID 1000 wrote to memory of 2168 1000 cmd.exe 88 PID 2064 wrote to memory of 2844 2064 ee5d6a092ef6fab92c5ce097705b052defb56bd0a6c6650ec2c92f030680a5d4.exe 89 PID 2064 wrote to memory of 2844 2064 ee5d6a092ef6fab92c5ce097705b052defb56bd0a6c6650ec2c92f030680a5d4.exe 89 PID 2064 wrote to memory of 2844 2064 ee5d6a092ef6fab92c5ce097705b052defb56bd0a6c6650ec2c92f030680a5d4.exe 89 PID 2844 wrote to memory of 1016 2844 vlc32.exe 90 PID 2844 wrote to memory of 1016 2844 vlc32.exe 90 PID 2844 wrote to memory of 1016 2844 vlc32.exe 90 PID 2844 wrote to memory of 1016 2844 vlc32.exe 90 PID 2844 wrote to memory of 1016 2844 vlc32.exe 90 PID 2844 wrote to memory of 1016 2844 vlc32.exe 90 PID 2844 wrote to memory of 1016 2844 vlc32.exe 90 PID 2844 wrote to memory of 1016 2844 vlc32.exe 90 PID 2844 wrote to memory of 1016 2844 vlc32.exe 90 PID 2844 wrote to memory of 1016 2844 vlc32.exe 90 PID 2844 wrote to memory of 1016 2844 vlc32.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\ee5d6a092ef6fab92c5ce097705b052defb56bd0a6c6650ec2c92f030680a5d4.exe"C:\Users\Admin\AppData\Local\Temp\ee5d6a092ef6fab92c5ce097705b052defb56bd0a6c6650ec2c92f030680a5d4.exe"1⤵
- Checks computer location settings
- Maps connected drives based on registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "VLC Service and Management" /t REG_SZ /d "C:\ProgramData\vlc32.exe" & exit2⤵
- Suspicious use of WriteProcessMemory
PID:1000 -
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "VLC Service and Management" /t REG_SZ /d "C:\ProgramData\vlc32.exe"3⤵
- Adds Run key to start application
PID:2168
-
-
-
C:\ProgramData\vlc32.exeC:\ProgramData\vlc32.exe2⤵
- Executes dropped EXE
- Drops startup file
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\ProgramData\vlc32.exe"C:\ProgramData\vlc32.exe"3⤵
- Executes dropped EXE
PID:1016 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1016 -s 3964⤵
- Program crash
PID:4020
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 1016 -ip 10161⤵PID:4128
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
499KB
MD520bb9a2e5abdc1b1fbd20de5a16a53be
SHA13ba89aed16fc48b4d64a8217c693bf5539507004
SHA256ee5d6a092ef6fab92c5ce097705b052defb56bd0a6c6650ec2c92f030680a5d4
SHA512f5f79629901ef735ea45d4eb9beb3e0bde9141a5df1a55a8212f9123969248ccacd141a5079367793dca5a5acdd8782bbeaf858992fdc502d41361b9e8c54793
-
Filesize
499KB
MD520bb9a2e5abdc1b1fbd20de5a16a53be
SHA13ba89aed16fc48b4d64a8217c693bf5539507004
SHA256ee5d6a092ef6fab92c5ce097705b052defb56bd0a6c6650ec2c92f030680a5d4
SHA512f5f79629901ef735ea45d4eb9beb3e0bde9141a5df1a55a8212f9123969248ccacd141a5079367793dca5a5acdd8782bbeaf858992fdc502d41361b9e8c54793
-
Filesize
499KB
MD520bb9a2e5abdc1b1fbd20de5a16a53be
SHA13ba89aed16fc48b4d64a8217c693bf5539507004
SHA256ee5d6a092ef6fab92c5ce097705b052defb56bd0a6c6650ec2c92f030680a5d4
SHA512f5f79629901ef735ea45d4eb9beb3e0bde9141a5df1a55a8212f9123969248ccacd141a5079367793dca5a5acdd8782bbeaf858992fdc502d41361b9e8c54793