Analysis
-
max time kernel
146s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
27/11/2022, 09:46
Static task
static1
Behavioral task
behavioral1
Sample
7672a5945d18c13509ad0872e28dd2ffcb14115d26a2938b4a3be2624fa00f34.exe
Resource
win7-20220812-en
General
-
Target
7672a5945d18c13509ad0872e28dd2ffcb14115d26a2938b4a3be2624fa00f34.exe
-
Size
654KB
-
MD5
67998cc5c7716d03aad09e73ae305859
-
SHA1
678ee856ab863ec48a6969a5e6d993ef99cc4850
-
SHA256
7672a5945d18c13509ad0872e28dd2ffcb14115d26a2938b4a3be2624fa00f34
-
SHA512
61e291c9b9872dda26589dce8035e6d3b8e28aec27e691c8067cc06fa70578a6b87255ce86dacd9815221103f4383dec0169bc48f444396af2635bcc9ec7c733
-
SSDEEP
12288:CwDhAOxtf3XNPWDVRQ/UtK9BJ3pAEX8KrfBtmFZRBLYCQd23sCJ:CwFAO792Q/TjpAEsgpA3UJAvJ
Malware Config
Extracted
cybergate
v1.07.5
Cyber
rsmacroing.no-ip.biz:101
rsmacroing.no-ip.biz:100
40S23881623UTP
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
install
-
install_file
server.exe
-
install_flag
false
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
123456
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 4688 Service.exe 4672 Service.exe 2140 Service.exe -
resource yara_rule behavioral2/memory/4688-142-0x0000000010410000-0x0000000010475000-memory.dmp upx behavioral2/memory/4688-148-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral2/memory/4672-151-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral2/memory/4672-154-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral2/memory/4672-157-0x0000000010480000-0x00000000104E5000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation Service.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\FacbookUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\FacbookUpdate.exe" 7672a5945d18c13509ad0872e28dd2ffcb14115d26a2938b4a3be2624fa00f34.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3144 set thread context of 4688 3144 7672a5945d18c13509ad0872e28dd2ffcb14115d26a2938b4a3be2624fa00f34.exe 82 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Service.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4672 Service.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeBackupPrivilege 4672 Service.exe Token: SeRestorePrivilege 4672 Service.exe Token: SeDebugPrivilege 4672 Service.exe Token: SeDebugPrivilege 4672 Service.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3144 wrote to memory of 4688 3144 7672a5945d18c13509ad0872e28dd2ffcb14115d26a2938b4a3be2624fa00f34.exe 82 PID 3144 wrote to memory of 4688 3144 7672a5945d18c13509ad0872e28dd2ffcb14115d26a2938b4a3be2624fa00f34.exe 82 PID 3144 wrote to memory of 4688 3144 7672a5945d18c13509ad0872e28dd2ffcb14115d26a2938b4a3be2624fa00f34.exe 82 PID 3144 wrote to memory of 4688 3144 7672a5945d18c13509ad0872e28dd2ffcb14115d26a2938b4a3be2624fa00f34.exe 82 PID 3144 wrote to memory of 4688 3144 7672a5945d18c13509ad0872e28dd2ffcb14115d26a2938b4a3be2624fa00f34.exe 82 PID 3144 wrote to memory of 4688 3144 7672a5945d18c13509ad0872e28dd2ffcb14115d26a2938b4a3be2624fa00f34.exe 82 PID 3144 wrote to memory of 4688 3144 7672a5945d18c13509ad0872e28dd2ffcb14115d26a2938b4a3be2624fa00f34.exe 82 PID 3144 wrote to memory of 4688 3144 7672a5945d18c13509ad0872e28dd2ffcb14115d26a2938b4a3be2624fa00f34.exe 82 PID 3144 wrote to memory of 4688 3144 7672a5945d18c13509ad0872e28dd2ffcb14115d26a2938b4a3be2624fa00f34.exe 82 PID 3144 wrote to memory of 4688 3144 7672a5945d18c13509ad0872e28dd2ffcb14115d26a2938b4a3be2624fa00f34.exe 82 PID 3144 wrote to memory of 4688 3144 7672a5945d18c13509ad0872e28dd2ffcb14115d26a2938b4a3be2624fa00f34.exe 82 PID 3144 wrote to memory of 4688 3144 7672a5945d18c13509ad0872e28dd2ffcb14115d26a2938b4a3be2624fa00f34.exe 82 PID 3144 wrote to memory of 4688 3144 7672a5945d18c13509ad0872e28dd2ffcb14115d26a2938b4a3be2624fa00f34.exe 82 PID 4688 wrote to memory of 4764 4688 Service.exe 84 PID 4688 wrote to memory of 4764 4688 Service.exe 84 PID 4688 wrote to memory of 4764 4688 Service.exe 84 PID 4688 wrote to memory of 4764 4688 Service.exe 84 PID 4688 wrote to memory of 4764 4688 Service.exe 84 PID 4688 wrote to memory of 4764 4688 Service.exe 84 PID 4688 wrote to memory of 4764 4688 Service.exe 84 PID 4688 wrote to memory of 4764 4688 Service.exe 84 PID 4688 wrote to memory of 4764 4688 Service.exe 84 PID 4688 wrote to memory of 4764 4688 Service.exe 84 PID 4688 wrote to memory of 4764 4688 Service.exe 84 PID 4688 wrote to memory of 4764 4688 Service.exe 84 PID 4688 wrote to memory of 4764 4688 Service.exe 84 PID 4688 wrote to memory of 4764 4688 Service.exe 84 PID 4688 wrote to memory of 4764 4688 Service.exe 84 PID 4688 wrote to memory of 4764 4688 Service.exe 84 PID 4688 wrote to memory of 4764 4688 Service.exe 84 PID 4688 wrote to memory of 4764 4688 Service.exe 84 PID 4688 wrote to memory of 4764 4688 Service.exe 84 PID 4688 wrote to memory of 4764 4688 Service.exe 84 PID 4688 wrote to memory of 4764 4688 Service.exe 84 PID 4688 wrote to memory of 4764 4688 Service.exe 84 PID 4688 wrote to memory of 4764 4688 Service.exe 84 PID 4688 wrote to memory of 4764 4688 Service.exe 84 PID 4688 wrote to memory of 4764 4688 Service.exe 84 PID 4688 wrote to memory of 4764 4688 Service.exe 84 PID 4688 wrote to memory of 4764 4688 Service.exe 84 PID 4688 wrote to memory of 4764 4688 Service.exe 84 PID 4688 wrote to memory of 4764 4688 Service.exe 84 PID 4688 wrote to memory of 4764 4688 Service.exe 84 PID 4688 wrote to memory of 4764 4688 Service.exe 84 PID 4688 wrote to memory of 4764 4688 Service.exe 84 PID 4688 wrote to memory of 4764 4688 Service.exe 84 PID 4688 wrote to memory of 4764 4688 Service.exe 84 PID 4688 wrote to memory of 4764 4688 Service.exe 84 PID 4688 wrote to memory of 4764 4688 Service.exe 84 PID 4688 wrote to memory of 4764 4688 Service.exe 84 PID 4688 wrote to memory of 4764 4688 Service.exe 84 PID 4688 wrote to memory of 4764 4688 Service.exe 84 PID 4688 wrote to memory of 4764 4688 Service.exe 84 PID 4688 wrote to memory of 4764 4688 Service.exe 84 PID 4688 wrote to memory of 4764 4688 Service.exe 84 PID 4688 wrote to memory of 4764 4688 Service.exe 84 PID 4688 wrote to memory of 4764 4688 Service.exe 84 PID 4688 wrote to memory of 4764 4688 Service.exe 84 PID 4688 wrote to memory of 4764 4688 Service.exe 84 PID 4688 wrote to memory of 4764 4688 Service.exe 84 PID 4688 wrote to memory of 4764 4688 Service.exe 84 PID 4688 wrote to memory of 4764 4688 Service.exe 84 PID 4688 wrote to memory of 4764 4688 Service.exe 84 PID 4688 wrote to memory of 4764 4688 Service.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\7672a5945d18c13509ad0872e28dd2ffcb14115d26a2938b4a3be2624fa00f34.exe"C:\Users\Admin\AppData\Local\Temp\7672a5945d18c13509ad0872e28dd2ffcb14115d26a2938b4a3be2624fa00f34.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3144 -
C:\Users\Admin\AppData\Local\Temp\plugtmp\Service.exeC:\Users\Admin\AppData\Local\Temp\\plugtmp\Service.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4688 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:4764
-
-
C:\Users\Admin\AppData\Local\Temp\plugtmp\Service.exe"C:\Users\Admin\AppData\Local\Temp\plugtmp\Service.exe"3⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:4672 -
C:\Users\Admin\AppData\Local\Temp\plugtmp\Service.exe"C:\Users\Admin\AppData\Local\Temp\plugtmp\Service.exe"4⤵
- Executes dropped EXE
PID:2140
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD55cda37c0ef390534c1a5e9d81c002bd2
SHA149c8b6baffc5a2b54d49e853d4f76bc75e7a1da7
SHA2560bc2ac218277b13e8cdc3d908263c5f83568cf573eb55a7d5e9959341ec447df
SHA51201ec2373efe085901598160b62b9d7118fcfcea05b29d8f75d787ef87264a6e7cb91662d1954e53e8444a99ca7d5f6c27ab1e51e7eebd9864436f0275c739626
-
Filesize
1.1MB
MD5d881de17aa8f2e2c08cbb7b265f928f9
SHA108936aebc87decf0af6e8eada191062b5e65ac2a
SHA256b3a37093609f9a20ad60b85a9fa9de2ba674cba9b5bd687729440c70ba619ca0
SHA5125f23bfb1b8740247b36ed0ab741738c7d4c949736129e767213e321607d1ccd3e3a8428e4ba44bd28a275b5e3f6206285b1a522514b7ef7ea5e698d90a713d34
-
Filesize
1.1MB
MD5d881de17aa8f2e2c08cbb7b265f928f9
SHA108936aebc87decf0af6e8eada191062b5e65ac2a
SHA256b3a37093609f9a20ad60b85a9fa9de2ba674cba9b5bd687729440c70ba619ca0
SHA5125f23bfb1b8740247b36ed0ab741738c7d4c949736129e767213e321607d1ccd3e3a8428e4ba44bd28a275b5e3f6206285b1a522514b7ef7ea5e698d90a713d34
-
Filesize
1.1MB
MD5d881de17aa8f2e2c08cbb7b265f928f9
SHA108936aebc87decf0af6e8eada191062b5e65ac2a
SHA256b3a37093609f9a20ad60b85a9fa9de2ba674cba9b5bd687729440c70ba619ca0
SHA5125f23bfb1b8740247b36ed0ab741738c7d4c949736129e767213e321607d1ccd3e3a8428e4ba44bd28a275b5e3f6206285b1a522514b7ef7ea5e698d90a713d34
-
Filesize
1.1MB
MD5d881de17aa8f2e2c08cbb7b265f928f9
SHA108936aebc87decf0af6e8eada191062b5e65ac2a
SHA256b3a37093609f9a20ad60b85a9fa9de2ba674cba9b5bd687729440c70ba619ca0
SHA5125f23bfb1b8740247b36ed0ab741738c7d4c949736129e767213e321607d1ccd3e3a8428e4ba44bd28a275b5e3f6206285b1a522514b7ef7ea5e698d90a713d34