Analysis

  • max time kernel
    150s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    30/11/2022, 23:45

General

  • Target

    8ab366f9d043fbcc5116d9499f70b3d6212d8b4fe76703b7b682197d09686bef.exe

  • Size

    576KB

  • MD5

    161d99b2df30da6c933656acae5b0528

  • SHA1

    e190e92746231e2d572405a0fe4522d6349d51d3

  • SHA256

    8ab366f9d043fbcc5116d9499f70b3d6212d8b4fe76703b7b682197d09686bef

  • SHA512

    0ba6f57a254dc80d8bec6c87df00fcdedcfa2ad93b70ff3c017f7b20f9da02bb8dd0537860735acb3d58859ab8ffe9736a707e53e62bc3ffcf6e27bcac41ee91

  • SSDEEP

    6144:YScrLEjUEFPA4mp8D6WGc/YSlIipBReubLzeh7Yy0DMIdeXijzjUEFPC:pcxE9y78QSVnNyhsFMCeSjcEA

Malware Config

Extracted

Family

cybergate

Version

v1.18.0 - Crack Version

Botnet

zgzag

C2

zgzag.no-ip.biz:2525

zgzag.no-ip.biz:6666

krkrme.no-ip.info:2525

krkrme.no-ip.info:6666

lolome.no-ip.org:2525

lolome.no-ip.org:6666

Mutex

1OWX5O042H0P41

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    install

  • install_file

    dirme.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    1122010

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Signatures

  • CyberGate, Rebhip

    CyberGate is a lightweight remote administration tool with a wide array of functionalities.

  • Adds policy Run key to start application 2 TTPs 4 IoCs
  • Executes dropped EXE 1 IoCs
  • Modifies Installed Components in the registry 2 TTPs 4 IoCs
  • UPX packed file 9 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1220
      • C:\Users\Admin\AppData\Local\Temp\8ab366f9d043fbcc5116d9499f70b3d6212d8b4fe76703b7b682197d09686bef.exe
        "C:\Users\Admin\AppData\Local\Temp\8ab366f9d043fbcc5116d9499f70b3d6212d8b4fe76703b7b682197d09686bef.exe"
        2⤵
        • Adds policy Run key to start application
        • Modifies Installed Components in the registry
        • Loads dropped DLL
        • Adds Run key to start application
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:1536
        • C:\Windows\SysWOW64\explorer.exe
          explorer.exe
          3⤵
          • Modifies Installed Components in the registry
          • Suspicious use of AdjustPrivilegeToken
          PID:1464
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe"
          3⤵
            PID:1832
          • C:\Users\Admin\AppData\Local\Temp\8ab366f9d043fbcc5116d9499f70b3d6212d8b4fe76703b7b682197d09686bef.exe
            "C:\Users\Admin\AppData\Local\Temp\8ab366f9d043fbcc5116d9499f70b3d6212d8b4fe76703b7b682197d09686bef.exe"
            3⤵
            • Drops file in System32 directory
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of AdjustPrivilegeToken
            PID:540
          • C:\Windows\SysWOW64\install\dirme.exe
            "C:\Windows\system32\install\dirme.exe"
            3⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            PID:1036

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\Admin2.txt

        Filesize

        236KB

        MD5

        21134691c0e735816ddabfb529844d24

        SHA1

        8e6d1029df22abb8641660cb040d5b87bdf6a391

        SHA256

        0f5e0cb1415ae0f48598eab1821aef2dcf1d6f71637c2e34e15819dd6f683d08

        SHA512

        2f83afa4ab5b0f7696745b01f315673878f5806838ce5c62a5a8ce39d7bf685e00f8cc80474ca7191f14cde8d1d40937eea45cd5cf18b904a116dfae8b71b1f1

      • C:\Windows\SysWOW64\install\dirme.exe

        Filesize

        576KB

        MD5

        161d99b2df30da6c933656acae5b0528

        SHA1

        e190e92746231e2d572405a0fe4522d6349d51d3

        SHA256

        8ab366f9d043fbcc5116d9499f70b3d6212d8b4fe76703b7b682197d09686bef

        SHA512

        0ba6f57a254dc80d8bec6c87df00fcdedcfa2ad93b70ff3c017f7b20f9da02bb8dd0537860735acb3d58859ab8ffe9736a707e53e62bc3ffcf6e27bcac41ee91

      • C:\Windows\SysWOW64\install\dirme.exe

        Filesize

        576KB

        MD5

        161d99b2df30da6c933656acae5b0528

        SHA1

        e190e92746231e2d572405a0fe4522d6349d51d3

        SHA256

        8ab366f9d043fbcc5116d9499f70b3d6212d8b4fe76703b7b682197d09686bef

        SHA512

        0ba6f57a254dc80d8bec6c87df00fcdedcfa2ad93b70ff3c017f7b20f9da02bb8dd0537860735acb3d58859ab8ffe9736a707e53e62bc3ffcf6e27bcac41ee91

      • \Windows\SysWOW64\install\dirme.exe

        Filesize

        576KB

        MD5

        161d99b2df30da6c933656acae5b0528

        SHA1

        e190e92746231e2d572405a0fe4522d6349d51d3

        SHA256

        8ab366f9d043fbcc5116d9499f70b3d6212d8b4fe76703b7b682197d09686bef

        SHA512

        0ba6f57a254dc80d8bec6c87df00fcdedcfa2ad93b70ff3c017f7b20f9da02bb8dd0537860735acb3d58859ab8ffe9736a707e53e62bc3ffcf6e27bcac41ee91

      • \Windows\SysWOW64\install\dirme.exe

        Filesize

        576KB

        MD5

        161d99b2df30da6c933656acae5b0528

        SHA1

        e190e92746231e2d572405a0fe4522d6349d51d3

        SHA256

        8ab366f9d043fbcc5116d9499f70b3d6212d8b4fe76703b7b682197d09686bef

        SHA512

        0ba6f57a254dc80d8bec6c87df00fcdedcfa2ad93b70ff3c017f7b20f9da02bb8dd0537860735acb3d58859ab8ffe9736a707e53e62bc3ffcf6e27bcac41ee91

      • memory/540-92-0x0000000010590000-0x0000000010602000-memory.dmp

        Filesize

        456KB

      • memory/540-85-0x0000000010590000-0x0000000010602000-memory.dmp

        Filesize

        456KB

      • memory/540-86-0x0000000010590000-0x0000000010602000-memory.dmp

        Filesize

        456KB

      • memory/1220-58-0x0000000010410000-0x0000000010482000-memory.dmp

        Filesize

        456KB

      • memory/1464-69-0x0000000010490000-0x0000000010502000-memory.dmp

        Filesize

        456KB

      • memory/1464-63-0x0000000074C61000-0x0000000074C63000-memory.dmp

        Filesize

        8KB

      • memory/1464-62-0x0000000075681000-0x0000000075683000-memory.dmp

        Filesize

        8KB

      • memory/1464-72-0x0000000010490000-0x0000000010502000-memory.dmp

        Filesize

        456KB

      • memory/1536-64-0x0000000010490000-0x0000000010502000-memory.dmp

        Filesize

        456KB

      • memory/1536-80-0x0000000010590000-0x0000000010602000-memory.dmp

        Filesize

        456KB

      • memory/1536-74-0x0000000010510000-0x0000000010582000-memory.dmp

        Filesize

        456KB

      • memory/1536-55-0x0000000010410000-0x0000000010482000-memory.dmp

        Filesize

        456KB