Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
30/11/2022, 23:54
Static task
static1
Behavioral task
behavioral1
Sample
a5f6ddb0c13d00fe9194e6f58e4e0e6adb05acae621271ac91698c0dc13a6f4c.exe
Resource
win7-20220901-en
General
-
Target
a5f6ddb0c13d00fe9194e6f58e4e0e6adb05acae621271ac91698c0dc13a6f4c.exe
-
Size
382KB
-
MD5
b8c17ccca22fd21439330484d11b5afd
-
SHA1
63772570981db9602b2cba620890c805c48bec25
-
SHA256
a5f6ddb0c13d00fe9194e6f58e4e0e6adb05acae621271ac91698c0dc13a6f4c
-
SHA512
beb6454374c1a3d4071c231cccf53335518ea954c952413dd4946bf5acccc81b59c62c36073e99c5769038901069cd56e2d29537d201e3674f7da6f54db2e548
-
SSDEEP
6144:gkDhZbmvGrOk0IImGo3Br+BstcbTxnU0A+0eBj9V9O0bnH:ntAEOkDEu1mnU+jnpbn
Malware Config
Extracted
cybergate
v1.07.5
Cyber
lcode.no-ip.org:82
Updater
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
.//domains/steam.us.lt/public_html/v0.1/
-
ftp_interval
30
-
ftp_password
l37w9hukp6
-
ftp_port
21
-
ftp_server
steam.us.lt
-
ftp_username
steam
-
injected_process
explorer.exe
-
install_dir
Winlog
-
install_file
Winlogon.exe
-
install_flag
true
-
keylogger_enable_ftp
true
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
123456
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Signatures
-
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run tmpFA18.tmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\Winlog\\Winlogon.exe" tmpFA18.tmp.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run tmpFA18.tmp.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\Winlog\\Winlogon.exe" tmpFA18.tmp.exe -
Executes dropped EXE 3 IoCs
pid Process 556 tmpFA18.tmp.exe 1948 tmpFA18.tmp.exe 628 Winlogon.exe -
Modifies Installed Components in the registry 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{653D22SH-21O8-B100-5130-V0PB0R55U5I4} tmpFA18.tmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{653D22SH-21O8-B100-5130-V0PB0R55U5I4}\StubPath = "C:\\Windows\\system32\\Winlog\\Winlogon.exe Restart" tmpFA18.tmp.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{653D22SH-21O8-B100-5130-V0PB0R55U5I4} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{653D22SH-21O8-B100-5130-V0PB0R55U5I4}\StubPath = "C:\\Windows\\system32\\Winlog\\Winlogon.exe" explorer.exe -
resource yara_rule behavioral1/files/0x000b0000000122eb-57.dat upx behavioral1/memory/556-59-0x0000000000400000-0x000000000049B000-memory.dmp upx behavioral1/files/0x000b0000000122eb-60.dat upx behavioral1/memory/556-62-0x0000000010410000-0x0000000010475000-memory.dmp upx behavioral1/memory/556-71-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral1/memory/576-76-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral1/files/0x00090000000122f9-78.dat upx behavioral1/memory/576-79-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral1/memory/556-81-0x00000000104F0000-0x0000000010555000-memory.dmp upx behavioral1/files/0x000b0000000122eb-84.dat upx behavioral1/files/0x000b0000000122eb-87.dat upx behavioral1/memory/556-89-0x0000000010560000-0x00000000105C5000-memory.dmp upx behavioral1/memory/1948-96-0x0000000010560000-0x00000000105C5000-memory.dmp upx behavioral1/memory/1948-97-0x0000000000400000-0x000000000049B000-memory.dmp upx behavioral1/memory/556-94-0x0000000000400000-0x000000000049B000-memory.dmp upx behavioral1/files/0x00090000000122f9-98.dat upx behavioral1/files/0x00090000000122f9-99.dat upx behavioral1/files/0x00090000000122f9-101.dat upx behavioral1/memory/1948-103-0x0000000010560000-0x00000000105C5000-memory.dmp upx behavioral1/memory/628-105-0x0000000000400000-0x000000000049B000-memory.dmp upx behavioral1/memory/628-106-0x0000000000400000-0x000000000049B000-memory.dmp upx behavioral1/memory/1948-107-0x0000000010560000-0x00000000105C5000-memory.dmp upx -
Loads dropped DLL 3 IoCs
pid Process 556 tmpFA18.tmp.exe 1948 tmpFA18.tmp.exe 1948 tmpFA18.tmp.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run tmpFA18.tmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\system32\\Winlog\\Winlogon.exe" tmpFA18.tmp.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run tmpFA18.tmp.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\system32\\Winlog\\Winlogon.exe" tmpFA18.tmp.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\Winlog\Winlogon.exe tmpFA18.tmp.exe File opened for modification C:\Windows\SysWOW64\Winlog\Winlogon.exe tmpFA18.tmp.exe File opened for modification C:\Windows\SysWOW64\Winlog\Winlogon.exe tmpFA18.tmp.exe File opened for modification C:\Windows\SysWOW64\Winlog\ tmpFA18.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 556 tmpFA18.tmp.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1948 tmpFA18.tmp.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 960 a5f6ddb0c13d00fe9194e6f58e4e0e6adb05acae621271ac91698c0dc13a6f4c.exe Token: SeBackupPrivilege 576 explorer.exe Token: SeRestorePrivilege 576 explorer.exe Token: SeBackupPrivilege 1948 tmpFA18.tmp.exe Token: SeRestorePrivilege 1948 tmpFA18.tmp.exe Token: SeDebugPrivilege 1948 tmpFA18.tmp.exe Token: SeDebugPrivilege 1948 tmpFA18.tmp.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 556 tmpFA18.tmp.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 960 wrote to memory of 556 960 a5f6ddb0c13d00fe9194e6f58e4e0e6adb05acae621271ac91698c0dc13a6f4c.exe 27 PID 960 wrote to memory of 556 960 a5f6ddb0c13d00fe9194e6f58e4e0e6adb05acae621271ac91698c0dc13a6f4c.exe 27 PID 960 wrote to memory of 556 960 a5f6ddb0c13d00fe9194e6f58e4e0e6adb05acae621271ac91698c0dc13a6f4c.exe 27 PID 960 wrote to memory of 556 960 a5f6ddb0c13d00fe9194e6f58e4e0e6adb05acae621271ac91698c0dc13a6f4c.exe 27 PID 556 wrote to memory of 1220 556 tmpFA18.tmp.exe 17 PID 556 wrote to memory of 1220 556 tmpFA18.tmp.exe 17 PID 556 wrote to memory of 1220 556 tmpFA18.tmp.exe 17 PID 556 wrote to memory of 1220 556 tmpFA18.tmp.exe 17 PID 556 wrote to memory of 1220 556 tmpFA18.tmp.exe 17 PID 556 wrote to memory of 1220 556 tmpFA18.tmp.exe 17 PID 556 wrote to memory of 1220 556 tmpFA18.tmp.exe 17 PID 556 wrote to memory of 1220 556 tmpFA18.tmp.exe 17 PID 556 wrote to memory of 1220 556 tmpFA18.tmp.exe 17 PID 556 wrote to memory of 1220 556 tmpFA18.tmp.exe 17 PID 556 wrote to memory of 1220 556 tmpFA18.tmp.exe 17 PID 556 wrote to memory of 1220 556 tmpFA18.tmp.exe 17 PID 556 wrote to memory of 1220 556 tmpFA18.tmp.exe 17 PID 556 wrote to memory of 1220 556 tmpFA18.tmp.exe 17 PID 556 wrote to memory of 1220 556 tmpFA18.tmp.exe 17 PID 556 wrote to memory of 1220 556 tmpFA18.tmp.exe 17 PID 556 wrote to memory of 1220 556 tmpFA18.tmp.exe 17 PID 556 wrote to memory of 1220 556 tmpFA18.tmp.exe 17 PID 556 wrote to memory of 1220 556 tmpFA18.tmp.exe 17 PID 556 wrote to memory of 1220 556 tmpFA18.tmp.exe 17 PID 556 wrote to memory of 1220 556 tmpFA18.tmp.exe 17 PID 556 wrote to memory of 1220 556 tmpFA18.tmp.exe 17 PID 556 wrote to memory of 1220 556 tmpFA18.tmp.exe 17 PID 556 wrote to memory of 1220 556 tmpFA18.tmp.exe 17 PID 556 wrote to memory of 1220 556 tmpFA18.tmp.exe 17 PID 556 wrote to memory of 1220 556 tmpFA18.tmp.exe 17 PID 556 wrote to memory of 1220 556 tmpFA18.tmp.exe 17 PID 556 wrote to memory of 1220 556 tmpFA18.tmp.exe 17 PID 556 wrote to memory of 1220 556 tmpFA18.tmp.exe 17 PID 556 wrote to memory of 1220 556 tmpFA18.tmp.exe 17 PID 556 wrote to memory of 1220 556 tmpFA18.tmp.exe 17 PID 556 wrote to memory of 1220 556 tmpFA18.tmp.exe 17 PID 556 wrote to memory of 1220 556 tmpFA18.tmp.exe 17 PID 556 wrote to memory of 1220 556 tmpFA18.tmp.exe 17 PID 556 wrote to memory of 1220 556 tmpFA18.tmp.exe 17 PID 556 wrote to memory of 1220 556 tmpFA18.tmp.exe 17 PID 556 wrote to memory of 1220 556 tmpFA18.tmp.exe 17 PID 556 wrote to memory of 1220 556 tmpFA18.tmp.exe 17 PID 556 wrote to memory of 1220 556 tmpFA18.tmp.exe 17 PID 556 wrote to memory of 1220 556 tmpFA18.tmp.exe 17 PID 556 wrote to memory of 1220 556 tmpFA18.tmp.exe 17 PID 556 wrote to memory of 1220 556 tmpFA18.tmp.exe 17 PID 556 wrote to memory of 1220 556 tmpFA18.tmp.exe 17 PID 556 wrote to memory of 1220 556 tmpFA18.tmp.exe 17 PID 556 wrote to memory of 1220 556 tmpFA18.tmp.exe 17 PID 556 wrote to memory of 1220 556 tmpFA18.tmp.exe 17 PID 556 wrote to memory of 1220 556 tmpFA18.tmp.exe 17 PID 556 wrote to memory of 1220 556 tmpFA18.tmp.exe 17 PID 556 wrote to memory of 1220 556 tmpFA18.tmp.exe 17 PID 556 wrote to memory of 1220 556 tmpFA18.tmp.exe 17 PID 556 wrote to memory of 1220 556 tmpFA18.tmp.exe 17 PID 556 wrote to memory of 1220 556 tmpFA18.tmp.exe 17 PID 556 wrote to memory of 1220 556 tmpFA18.tmp.exe 17 PID 556 wrote to memory of 1220 556 tmpFA18.tmp.exe 17 PID 556 wrote to memory of 1220 556 tmpFA18.tmp.exe 17 PID 556 wrote to memory of 1220 556 tmpFA18.tmp.exe 17 PID 556 wrote to memory of 1220 556 tmpFA18.tmp.exe 17 PID 556 wrote to memory of 1220 556 tmpFA18.tmp.exe 17 PID 556 wrote to memory of 1220 556 tmpFA18.tmp.exe 17 PID 556 wrote to memory of 1220 556 tmpFA18.tmp.exe 17
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1220
-
C:\Users\Admin\AppData\Local\Temp\a5f6ddb0c13d00fe9194e6f58e4e0e6adb05acae621271ac91698c0dc13a6f4c.exe"C:\Users\Admin\AppData\Local\Temp\a5f6ddb0c13d00fe9194e6f58e4e0e6adb05acae621271ac91698c0dc13a6f4c.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Users\Admin\AppData\Local\Temp\tmpFA18.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpFA18.tmp.exe"3⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Modifies Installed Components in the registry
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:556 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
- Modifies Installed Components in the registry
- Suspicious use of AdjustPrivilegeToken
PID:576
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:1280
-
-
C:\Users\Admin\AppData\Local\Temp\tmpFA18.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpFA18.tmp.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:1948 -
C:\Windows\SysWOW64\Winlog\Winlogon.exe"C:\Windows\system32\Winlog\Winlogon.exe"5⤵
- Executes dropped EXE
PID:628
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD55f7af6a9af101ff3b46246345f20cca1
SHA1a389823a8ad5688a7bfaef10995e002120224020
SHA25684bfaee2772dcca50b00e17a88bf309b92e7e9c872334980ca0be9caa9c5c29b
SHA512ab567d399f588f8ee2048cf4e4ce83b27dc6ffc0ff091c0e1f82972fa986f786869dc164f71e98ac48787eb5f49fcbdf498b01375d980fce9bdd81ae232aa4f7
-
Filesize
373KB
MD5bc8b1938ae921daf721e9c5899102534
SHA13e7bbc011dc3f2ebd512b5df35102cc056dc742a
SHA2562c98d4b8c7a570cf258342c9119ff720fea17be44fcd3b1abeebbecc3914fadd
SHA512b92b87480745cca4859f7d5de1f036b65df92f7004fd107784b20e9135bb241646c34a61b1eae4df13ea3c750bc403e2b6248ef1e360d6658bc7c684c44b2ebd
-
Filesize
373KB
MD5bc8b1938ae921daf721e9c5899102534
SHA13e7bbc011dc3f2ebd512b5df35102cc056dc742a
SHA2562c98d4b8c7a570cf258342c9119ff720fea17be44fcd3b1abeebbecc3914fadd
SHA512b92b87480745cca4859f7d5de1f036b65df92f7004fd107784b20e9135bb241646c34a61b1eae4df13ea3c750bc403e2b6248ef1e360d6658bc7c684c44b2ebd
-
Filesize
373KB
MD5bc8b1938ae921daf721e9c5899102534
SHA13e7bbc011dc3f2ebd512b5df35102cc056dc742a
SHA2562c98d4b8c7a570cf258342c9119ff720fea17be44fcd3b1abeebbecc3914fadd
SHA512b92b87480745cca4859f7d5de1f036b65df92f7004fd107784b20e9135bb241646c34a61b1eae4df13ea3c750bc403e2b6248ef1e360d6658bc7c684c44b2ebd
-
Filesize
373KB
MD5bc8b1938ae921daf721e9c5899102534
SHA13e7bbc011dc3f2ebd512b5df35102cc056dc742a
SHA2562c98d4b8c7a570cf258342c9119ff720fea17be44fcd3b1abeebbecc3914fadd
SHA512b92b87480745cca4859f7d5de1f036b65df92f7004fd107784b20e9135bb241646c34a61b1eae4df13ea3c750bc403e2b6248ef1e360d6658bc7c684c44b2ebd
-
Filesize
373KB
MD5bc8b1938ae921daf721e9c5899102534
SHA13e7bbc011dc3f2ebd512b5df35102cc056dc742a
SHA2562c98d4b8c7a570cf258342c9119ff720fea17be44fcd3b1abeebbecc3914fadd
SHA512b92b87480745cca4859f7d5de1f036b65df92f7004fd107784b20e9135bb241646c34a61b1eae4df13ea3c750bc403e2b6248ef1e360d6658bc7c684c44b2ebd
-
Filesize
373KB
MD5bc8b1938ae921daf721e9c5899102534
SHA13e7bbc011dc3f2ebd512b5df35102cc056dc742a
SHA2562c98d4b8c7a570cf258342c9119ff720fea17be44fcd3b1abeebbecc3914fadd
SHA512b92b87480745cca4859f7d5de1f036b65df92f7004fd107784b20e9135bb241646c34a61b1eae4df13ea3c750bc403e2b6248ef1e360d6658bc7c684c44b2ebd
-
Filesize
373KB
MD5bc8b1938ae921daf721e9c5899102534
SHA13e7bbc011dc3f2ebd512b5df35102cc056dc742a
SHA2562c98d4b8c7a570cf258342c9119ff720fea17be44fcd3b1abeebbecc3914fadd
SHA512b92b87480745cca4859f7d5de1f036b65df92f7004fd107784b20e9135bb241646c34a61b1eae4df13ea3c750bc403e2b6248ef1e360d6658bc7c684c44b2ebd
-
Filesize
373KB
MD5bc8b1938ae921daf721e9c5899102534
SHA13e7bbc011dc3f2ebd512b5df35102cc056dc742a
SHA2562c98d4b8c7a570cf258342c9119ff720fea17be44fcd3b1abeebbecc3914fadd
SHA512b92b87480745cca4859f7d5de1f036b65df92f7004fd107784b20e9135bb241646c34a61b1eae4df13ea3c750bc403e2b6248ef1e360d6658bc7c684c44b2ebd