Analysis
-
max time kernel
288s -
max time network
309s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
27-11-2022 16:31
Static task
static1
Behavioral task
behavioral1
Sample
c07c0ff42073d5568e8bc07ab0ead445779c9f11b86f6b87ad2a849790a83ded.exe
Resource
win7-20221111-en
General
-
Target
c07c0ff42073d5568e8bc07ab0ead445779c9f11b86f6b87ad2a849790a83ded.exe
-
Size
477KB
-
MD5
0a439518508b71a31e998795f18f295b
-
SHA1
563284a57eb6cd232ab48e87f9a939c92c787092
-
SHA256
c07c0ff42073d5568e8bc07ab0ead445779c9f11b86f6b87ad2a849790a83ded
-
SHA512
9ab7179dc6b636b1b0a753e31160e14dac488c2a53c50c19207dc6d869f0d661119b6bbfa8b0a9a522aa8f7869bea0a5a7e1cb5b10efeabad36123a9dd25fb1b
-
SSDEEP
12288:uSWoLbZA5VA34r6i8V0TxgkY5vpXxR8nJOf0bM+FBE8YSTKNfXj:uSWckVAIv8V0KzlP2wc5jIfz
Malware Config
Extracted
cybergate
v1.18.0 - Crack Version
remote
takutaku.no-ip.biz:3002
2T662FOSL4A557
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
install
-
install_file
server.exe
-
install_flag
false
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
nevermind
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
vbc.exevbc.exepid process 4344 vbc.exe 1696 vbc.exe -
Processes:
resource yara_rule behavioral2/memory/4344-142-0x0000000010410000-0x0000000010482000-memory.dmp upx -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
c07c0ff42073d5568e8bc07ab0ead445779c9f11b86f6b87ad2a849790a83ded.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WinUpdtr = "C:\\Users\\Admin\\AppData\\Roaming\\WinUpdtr\\c07c0ff42073d5568e8bc07ab0ead445779c9f11b86f6b87ad2a849790a83ded.exe" c07c0ff42073d5568e8bc07ab0ead445779c9f11b86f6b87ad2a849790a83ded.exe -
Drops desktop.ini file(s) 2 IoCs
Processes:
c07c0ff42073d5568e8bc07ab0ead445779c9f11b86f6b87ad2a849790a83ded.exedescription ioc process File created C:\Windows\assembly\Desktop.ini c07c0ff42073d5568e8bc07ab0ead445779c9f11b86f6b87ad2a849790a83ded.exe File opened for modification C:\Windows\assembly\Desktop.ini c07c0ff42073d5568e8bc07ab0ead445779c9f11b86f6b87ad2a849790a83ded.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
c07c0ff42073d5568e8bc07ab0ead445779c9f11b86f6b87ad2a849790a83ded.exedescription pid process target process PID 2600 set thread context of 4344 2600 c07c0ff42073d5568e8bc07ab0ead445779c9f11b86f6b87ad2a849790a83ded.exe vbc.exe -
Drops file in Windows directory 3 IoCs
Processes:
c07c0ff42073d5568e8bc07ab0ead445779c9f11b86f6b87ad2a849790a83ded.exedescription ioc process File opened for modification C:\Windows\assembly c07c0ff42073d5568e8bc07ab0ead445779c9f11b86f6b87ad2a849790a83ded.exe File created C:\Windows\assembly\Desktop.ini c07c0ff42073d5568e8bc07ab0ead445779c9f11b86f6b87ad2a849790a83ded.exe File opened for modification C:\Windows\assembly\Desktop.ini c07c0ff42073d5568e8bc07ab0ead445779c9f11b86f6b87ad2a849790a83ded.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
vbc.exepid process 4344 vbc.exe 4344 vbc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
c07c0ff42073d5568e8bc07ab0ead445779c9f11b86f6b87ad2a849790a83ded.exevbc.exedescription pid process target process PID 2600 wrote to memory of 4344 2600 c07c0ff42073d5568e8bc07ab0ead445779c9f11b86f6b87ad2a849790a83ded.exe vbc.exe PID 2600 wrote to memory of 4344 2600 c07c0ff42073d5568e8bc07ab0ead445779c9f11b86f6b87ad2a849790a83ded.exe vbc.exe PID 2600 wrote to memory of 4344 2600 c07c0ff42073d5568e8bc07ab0ead445779c9f11b86f6b87ad2a849790a83ded.exe vbc.exe PID 2600 wrote to memory of 4344 2600 c07c0ff42073d5568e8bc07ab0ead445779c9f11b86f6b87ad2a849790a83ded.exe vbc.exe PID 2600 wrote to memory of 4344 2600 c07c0ff42073d5568e8bc07ab0ead445779c9f11b86f6b87ad2a849790a83ded.exe vbc.exe PID 2600 wrote to memory of 4344 2600 c07c0ff42073d5568e8bc07ab0ead445779c9f11b86f6b87ad2a849790a83ded.exe vbc.exe PID 2600 wrote to memory of 4344 2600 c07c0ff42073d5568e8bc07ab0ead445779c9f11b86f6b87ad2a849790a83ded.exe vbc.exe PID 2600 wrote to memory of 4344 2600 c07c0ff42073d5568e8bc07ab0ead445779c9f11b86f6b87ad2a849790a83ded.exe vbc.exe PID 2600 wrote to memory of 4344 2600 c07c0ff42073d5568e8bc07ab0ead445779c9f11b86f6b87ad2a849790a83ded.exe vbc.exe PID 2600 wrote to memory of 4344 2600 c07c0ff42073d5568e8bc07ab0ead445779c9f11b86f6b87ad2a849790a83ded.exe vbc.exe PID 2600 wrote to memory of 4344 2600 c07c0ff42073d5568e8bc07ab0ead445779c9f11b86f6b87ad2a849790a83ded.exe vbc.exe PID 2600 wrote to memory of 4344 2600 c07c0ff42073d5568e8bc07ab0ead445779c9f11b86f6b87ad2a849790a83ded.exe vbc.exe PID 2600 wrote to memory of 4344 2600 c07c0ff42073d5568e8bc07ab0ead445779c9f11b86f6b87ad2a849790a83ded.exe vbc.exe PID 4344 wrote to memory of 2012 4344 vbc.exe iexplore.exe PID 4344 wrote to memory of 2012 4344 vbc.exe iexplore.exe PID 4344 wrote to memory of 2012 4344 vbc.exe iexplore.exe PID 4344 wrote to memory of 2012 4344 vbc.exe iexplore.exe PID 4344 wrote to memory of 2012 4344 vbc.exe iexplore.exe PID 4344 wrote to memory of 2012 4344 vbc.exe iexplore.exe PID 4344 wrote to memory of 2012 4344 vbc.exe iexplore.exe PID 4344 wrote to memory of 2012 4344 vbc.exe iexplore.exe PID 4344 wrote to memory of 2012 4344 vbc.exe iexplore.exe PID 4344 wrote to memory of 2012 4344 vbc.exe iexplore.exe PID 4344 wrote to memory of 2012 4344 vbc.exe iexplore.exe PID 4344 wrote to memory of 2012 4344 vbc.exe iexplore.exe PID 4344 wrote to memory of 2012 4344 vbc.exe iexplore.exe PID 4344 wrote to memory of 2012 4344 vbc.exe iexplore.exe PID 4344 wrote to memory of 2012 4344 vbc.exe iexplore.exe PID 4344 wrote to memory of 2012 4344 vbc.exe iexplore.exe PID 4344 wrote to memory of 2012 4344 vbc.exe iexplore.exe PID 4344 wrote to memory of 2012 4344 vbc.exe iexplore.exe PID 4344 wrote to memory of 2012 4344 vbc.exe iexplore.exe PID 4344 wrote to memory of 2012 4344 vbc.exe iexplore.exe PID 4344 wrote to memory of 2012 4344 vbc.exe iexplore.exe PID 4344 wrote to memory of 2012 4344 vbc.exe iexplore.exe PID 4344 wrote to memory of 2012 4344 vbc.exe iexplore.exe PID 4344 wrote to memory of 2012 4344 vbc.exe iexplore.exe PID 4344 wrote to memory of 2012 4344 vbc.exe iexplore.exe PID 4344 wrote to memory of 2012 4344 vbc.exe iexplore.exe PID 4344 wrote to memory of 2012 4344 vbc.exe iexplore.exe PID 4344 wrote to memory of 2012 4344 vbc.exe iexplore.exe PID 4344 wrote to memory of 2012 4344 vbc.exe iexplore.exe PID 4344 wrote to memory of 2012 4344 vbc.exe iexplore.exe PID 4344 wrote to memory of 2012 4344 vbc.exe iexplore.exe PID 4344 wrote to memory of 2012 4344 vbc.exe iexplore.exe PID 4344 wrote to memory of 2012 4344 vbc.exe iexplore.exe PID 4344 wrote to memory of 2012 4344 vbc.exe iexplore.exe PID 4344 wrote to memory of 2012 4344 vbc.exe iexplore.exe PID 4344 wrote to memory of 2012 4344 vbc.exe iexplore.exe PID 4344 wrote to memory of 2012 4344 vbc.exe iexplore.exe PID 4344 wrote to memory of 2012 4344 vbc.exe iexplore.exe PID 4344 wrote to memory of 2012 4344 vbc.exe iexplore.exe PID 4344 wrote to memory of 2012 4344 vbc.exe iexplore.exe PID 4344 wrote to memory of 2012 4344 vbc.exe iexplore.exe PID 4344 wrote to memory of 2012 4344 vbc.exe iexplore.exe PID 4344 wrote to memory of 2012 4344 vbc.exe iexplore.exe PID 4344 wrote to memory of 2012 4344 vbc.exe iexplore.exe PID 4344 wrote to memory of 2012 4344 vbc.exe iexplore.exe PID 4344 wrote to memory of 2012 4344 vbc.exe iexplore.exe PID 4344 wrote to memory of 2012 4344 vbc.exe iexplore.exe PID 4344 wrote to memory of 2012 4344 vbc.exe iexplore.exe PID 4344 wrote to memory of 2012 4344 vbc.exe iexplore.exe PID 4344 wrote to memory of 2012 4344 vbc.exe iexplore.exe PID 4344 wrote to memory of 2012 4344 vbc.exe iexplore.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c07c0ff42073d5568e8bc07ab0ead445779c9f11b86f6b87ad2a849790a83ded.exe"C:\Users\Admin\AppData\Local\Temp\c07c0ff42073d5568e8bc07ab0ead445779c9f11b86f6b87ad2a849790a83ded.exe"1⤵
- Adds Run key to start application
- Drops desktop.ini file(s)
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\vbc.exeC:\Users\Admin\AppData\Local\Temp\vbc.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵
-
C:\Users\Admin\AppData\Local\Temp\vbc.exe"C:\Users\Admin\AppData\Local\Temp\vbc.exe"3⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\vbc.exeFilesize
1.1MB
MD5d881de17aa8f2e2c08cbb7b265f928f9
SHA108936aebc87decf0af6e8eada191062b5e65ac2a
SHA256b3a37093609f9a20ad60b85a9fa9de2ba674cba9b5bd687729440c70ba619ca0
SHA5125f23bfb1b8740247b36ed0ab741738c7d4c949736129e767213e321607d1ccd3e3a8428e4ba44bd28a275b5e3f6206285b1a522514b7ef7ea5e698d90a713d34
-
C:\Users\Admin\AppData\Local\Temp\vbc.exeFilesize
1.1MB
MD5d881de17aa8f2e2c08cbb7b265f928f9
SHA108936aebc87decf0af6e8eada191062b5e65ac2a
SHA256b3a37093609f9a20ad60b85a9fa9de2ba674cba9b5bd687729440c70ba619ca0
SHA5125f23bfb1b8740247b36ed0ab741738c7d4c949736129e767213e321607d1ccd3e3a8428e4ba44bd28a275b5e3f6206285b1a522514b7ef7ea5e698d90a713d34
-
C:\Users\Admin\AppData\Local\Temp\vbc.exeFilesize
1.1MB
MD5d881de17aa8f2e2c08cbb7b265f928f9
SHA108936aebc87decf0af6e8eada191062b5e65ac2a
SHA256b3a37093609f9a20ad60b85a9fa9de2ba674cba9b5bd687729440c70ba619ca0
SHA5125f23bfb1b8740247b36ed0ab741738c7d4c949736129e767213e321607d1ccd3e3a8428e4ba44bd28a275b5e3f6206285b1a522514b7ef7ea5e698d90a713d34
-
memory/1696-146-0x0000000000000000-mapping.dmp
-
memory/2600-138-0x0000000075360000-0x0000000075911000-memory.dmpFilesize
5.7MB
-
memory/2600-133-0x0000000075360000-0x0000000075911000-memory.dmpFilesize
5.7MB
-
memory/2600-148-0x0000000075360000-0x0000000075911000-memory.dmpFilesize
5.7MB
-
memory/4344-137-0x0000000000400000-0x000000000044D000-memory.dmpFilesize
308KB
-
memory/4344-132-0x0000000000000000-mapping.dmp
-
memory/4344-139-0x0000000000400000-0x000000000044D000-memory.dmpFilesize
308KB
-
memory/4344-140-0x0000000000400000-0x000000000044D000-memory.dmpFilesize
308KB
-
memory/4344-142-0x0000000010410000-0x0000000010482000-memory.dmpFilesize
456KB
-
memory/4344-134-0x0000000000400000-0x000000000044D000-memory.dmpFilesize
308KB