Analysis
-
max time kernel
164s -
max time network
172s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01/12/2022, 02:17
Static task
static1
Behavioral task
behavioral1
Sample
84c8370b0e52006c9e132261b3064bca0bf186a23f3d08526929198577e85b8e.exe
Resource
win7-20220901-en
General
-
Target
84c8370b0e52006c9e132261b3064bca0bf186a23f3d08526929198577e85b8e.exe
-
Size
440KB
-
MD5
31dd3a5285d12a359039ddd7e3f3bab1
-
SHA1
e4340ea43c59b9ef9d537faddbd7ab0910b3f4ed
-
SHA256
84c8370b0e52006c9e132261b3064bca0bf186a23f3d08526929198577e85b8e
-
SHA512
058a85156b11da947e7ad86f44260cbfe51e88c445ad6f155952a5fce7e1cd201cf17e99cdefb373861b7d71d48c768df11e59d5cde2d6448babbeec283cf77b
-
SSDEEP
6144:qVoynDCGxPeRyslt9QFJZFuyPKonFVZMa9AhKLxDkCY4J1mqyGW/0+VErb+42kP/:EDCGxPDsH9QFnFJ7Zx9TwqyG+CZj
Malware Config
Extracted
cybergate
v1.07.5
Cyber
Cyberjack.zapto.org:8499
0J40358QU07X55
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
WinDir
-
install_file
Svchost.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
123456
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Signatures
-
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\WinDir\\Svchost.exe" 84c8370b0e52006c9e132261b3064bca0bf186a23f3d08526929198577e85b8e.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 84c8370b0e52006c9e132261b3064bca0bf186a23f3d08526929198577e85b8e.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\WinDir\\Svchost.exe" 84c8370b0e52006c9e132261b3064bca0bf186a23f3d08526929198577e85b8e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 84c8370b0e52006c9e132261b3064bca0bf186a23f3d08526929198577e85b8e.exe -
Executes dropped EXE 2 IoCs
pid Process 1280 Svchost.exe 1856 Svchost.exe -
Modifies Installed Components in the registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{7KKVD7DX-5181-8888-08BB-2825J3085E76} 84c8370b0e52006c9e132261b3064bca0bf186a23f3d08526929198577e85b8e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7KKVD7DX-5181-8888-08BB-2825J3085E76}\StubPath = "C:\\Windows\\system32\\WinDir\\Svchost.exe Restart" 84c8370b0e52006c9e132261b3064bca0bf186a23f3d08526929198577e85b8e.exe -
resource yara_rule behavioral2/memory/3436-138-0x0000000010410000-0x0000000010475000-memory.dmp upx behavioral2/memory/3436-144-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral2/memory/1544-147-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral2/memory/1544-151-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral2/memory/1544-154-0x0000000010480000-0x00000000104E5000-memory.dmp upx -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run 84c8370b0e52006c9e132261b3064bca0bf186a23f3d08526929198577e85b8e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\system32\\WinDir\\Svchost.exe" 84c8370b0e52006c9e132261b3064bca0bf186a23f3d08526929198577e85b8e.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run 84c8370b0e52006c9e132261b3064bca0bf186a23f3d08526929198577e85b8e.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\system32\\WinDir\\Svchost.exe" 84c8370b0e52006c9e132261b3064bca0bf186a23f3d08526929198577e85b8e.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\WinDir\Svchost.exe 84c8370b0e52006c9e132261b3064bca0bf186a23f3d08526929198577e85b8e.exe File opened for modification C:\Windows\SysWOW64\WinDir\Svchost.exe explorer.exe File opened for modification C:\Windows\SysWOW64\WinDir\ explorer.exe File created C:\Windows\SysWOW64\WinDir\Svchost.exe 84c8370b0e52006c9e132261b3064bca0bf186a23f3d08526929198577e85b8e.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1240 set thread context of 3436 1240 84c8370b0e52006c9e132261b3064bca0bf186a23f3d08526929198577e85b8e.exe 82 PID 1280 set thread context of 1856 1280 Svchost.exe 86 -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explorer.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3436 84c8370b0e52006c9e132261b3064bca0bf186a23f3d08526929198577e85b8e.exe 3436 84c8370b0e52006c9e132261b3064bca0bf186a23f3d08526929198577e85b8e.exe 1856 Svchost.exe 1856 Svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1544 explorer.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeBackupPrivilege 1544 explorer.exe Token: SeRestorePrivilege 1544 explorer.exe Token: SeDebugPrivilege 1544 explorer.exe Token: SeDebugPrivilege 1544 explorer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3436 84c8370b0e52006c9e132261b3064bca0bf186a23f3d08526929198577e85b8e.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1240 wrote to memory of 3436 1240 84c8370b0e52006c9e132261b3064bca0bf186a23f3d08526929198577e85b8e.exe 82 PID 1240 wrote to memory of 3436 1240 84c8370b0e52006c9e132261b3064bca0bf186a23f3d08526929198577e85b8e.exe 82 PID 1240 wrote to memory of 3436 1240 84c8370b0e52006c9e132261b3064bca0bf186a23f3d08526929198577e85b8e.exe 82 PID 1240 wrote to memory of 3436 1240 84c8370b0e52006c9e132261b3064bca0bf186a23f3d08526929198577e85b8e.exe 82 PID 1240 wrote to memory of 3436 1240 84c8370b0e52006c9e132261b3064bca0bf186a23f3d08526929198577e85b8e.exe 82 PID 1240 wrote to memory of 3436 1240 84c8370b0e52006c9e132261b3064bca0bf186a23f3d08526929198577e85b8e.exe 82 PID 1240 wrote to memory of 3436 1240 84c8370b0e52006c9e132261b3064bca0bf186a23f3d08526929198577e85b8e.exe 82 PID 1240 wrote to memory of 3436 1240 84c8370b0e52006c9e132261b3064bca0bf186a23f3d08526929198577e85b8e.exe 82 PID 1240 wrote to memory of 3436 1240 84c8370b0e52006c9e132261b3064bca0bf186a23f3d08526929198577e85b8e.exe 82 PID 1240 wrote to memory of 3436 1240 84c8370b0e52006c9e132261b3064bca0bf186a23f3d08526929198577e85b8e.exe 82 PID 1240 wrote to memory of 3436 1240 84c8370b0e52006c9e132261b3064bca0bf186a23f3d08526929198577e85b8e.exe 82 PID 1240 wrote to memory of 3436 1240 84c8370b0e52006c9e132261b3064bca0bf186a23f3d08526929198577e85b8e.exe 82 PID 3436 wrote to memory of 760 3436 84c8370b0e52006c9e132261b3064bca0bf186a23f3d08526929198577e85b8e.exe 35 PID 3436 wrote to memory of 760 3436 84c8370b0e52006c9e132261b3064bca0bf186a23f3d08526929198577e85b8e.exe 35 PID 3436 wrote to memory of 760 3436 84c8370b0e52006c9e132261b3064bca0bf186a23f3d08526929198577e85b8e.exe 35 PID 3436 wrote to memory of 760 3436 84c8370b0e52006c9e132261b3064bca0bf186a23f3d08526929198577e85b8e.exe 35 PID 3436 wrote to memory of 760 3436 84c8370b0e52006c9e132261b3064bca0bf186a23f3d08526929198577e85b8e.exe 35 PID 3436 wrote to memory of 760 3436 84c8370b0e52006c9e132261b3064bca0bf186a23f3d08526929198577e85b8e.exe 35 PID 3436 wrote to memory of 760 3436 84c8370b0e52006c9e132261b3064bca0bf186a23f3d08526929198577e85b8e.exe 35 PID 3436 wrote to memory of 760 3436 84c8370b0e52006c9e132261b3064bca0bf186a23f3d08526929198577e85b8e.exe 35 PID 3436 wrote to memory of 760 3436 84c8370b0e52006c9e132261b3064bca0bf186a23f3d08526929198577e85b8e.exe 35 PID 3436 wrote to memory of 760 3436 84c8370b0e52006c9e132261b3064bca0bf186a23f3d08526929198577e85b8e.exe 35 PID 3436 wrote to memory of 760 3436 84c8370b0e52006c9e132261b3064bca0bf186a23f3d08526929198577e85b8e.exe 35 PID 3436 wrote to memory of 760 3436 84c8370b0e52006c9e132261b3064bca0bf186a23f3d08526929198577e85b8e.exe 35 PID 3436 wrote to memory of 760 3436 84c8370b0e52006c9e132261b3064bca0bf186a23f3d08526929198577e85b8e.exe 35 PID 3436 wrote to memory of 760 3436 84c8370b0e52006c9e132261b3064bca0bf186a23f3d08526929198577e85b8e.exe 35 PID 3436 wrote to memory of 760 3436 84c8370b0e52006c9e132261b3064bca0bf186a23f3d08526929198577e85b8e.exe 35 PID 3436 wrote to memory of 760 3436 84c8370b0e52006c9e132261b3064bca0bf186a23f3d08526929198577e85b8e.exe 35 PID 3436 wrote to memory of 760 3436 84c8370b0e52006c9e132261b3064bca0bf186a23f3d08526929198577e85b8e.exe 35 PID 3436 wrote to memory of 760 3436 84c8370b0e52006c9e132261b3064bca0bf186a23f3d08526929198577e85b8e.exe 35 PID 3436 wrote to memory of 760 3436 84c8370b0e52006c9e132261b3064bca0bf186a23f3d08526929198577e85b8e.exe 35 PID 3436 wrote to memory of 760 3436 84c8370b0e52006c9e132261b3064bca0bf186a23f3d08526929198577e85b8e.exe 35 PID 3436 wrote to memory of 760 3436 84c8370b0e52006c9e132261b3064bca0bf186a23f3d08526929198577e85b8e.exe 35 PID 3436 wrote to memory of 760 3436 84c8370b0e52006c9e132261b3064bca0bf186a23f3d08526929198577e85b8e.exe 35 PID 3436 wrote to memory of 760 3436 84c8370b0e52006c9e132261b3064bca0bf186a23f3d08526929198577e85b8e.exe 35 PID 3436 wrote to memory of 760 3436 84c8370b0e52006c9e132261b3064bca0bf186a23f3d08526929198577e85b8e.exe 35 PID 3436 wrote to memory of 760 3436 84c8370b0e52006c9e132261b3064bca0bf186a23f3d08526929198577e85b8e.exe 35 PID 3436 wrote to memory of 760 3436 84c8370b0e52006c9e132261b3064bca0bf186a23f3d08526929198577e85b8e.exe 35 PID 3436 wrote to memory of 760 3436 84c8370b0e52006c9e132261b3064bca0bf186a23f3d08526929198577e85b8e.exe 35 PID 3436 wrote to memory of 760 3436 84c8370b0e52006c9e132261b3064bca0bf186a23f3d08526929198577e85b8e.exe 35 PID 3436 wrote to memory of 760 3436 84c8370b0e52006c9e132261b3064bca0bf186a23f3d08526929198577e85b8e.exe 35 PID 3436 wrote to memory of 760 3436 84c8370b0e52006c9e132261b3064bca0bf186a23f3d08526929198577e85b8e.exe 35 PID 3436 wrote to memory of 760 3436 84c8370b0e52006c9e132261b3064bca0bf186a23f3d08526929198577e85b8e.exe 35 PID 3436 wrote to memory of 760 3436 84c8370b0e52006c9e132261b3064bca0bf186a23f3d08526929198577e85b8e.exe 35 PID 3436 wrote to memory of 760 3436 84c8370b0e52006c9e132261b3064bca0bf186a23f3d08526929198577e85b8e.exe 35 PID 3436 wrote to memory of 760 3436 84c8370b0e52006c9e132261b3064bca0bf186a23f3d08526929198577e85b8e.exe 35 PID 3436 wrote to memory of 760 3436 84c8370b0e52006c9e132261b3064bca0bf186a23f3d08526929198577e85b8e.exe 35 PID 3436 wrote to memory of 760 3436 84c8370b0e52006c9e132261b3064bca0bf186a23f3d08526929198577e85b8e.exe 35 PID 3436 wrote to memory of 760 3436 84c8370b0e52006c9e132261b3064bca0bf186a23f3d08526929198577e85b8e.exe 35 PID 3436 wrote to memory of 760 3436 84c8370b0e52006c9e132261b3064bca0bf186a23f3d08526929198577e85b8e.exe 35 PID 3436 wrote to memory of 760 3436 84c8370b0e52006c9e132261b3064bca0bf186a23f3d08526929198577e85b8e.exe 35 PID 3436 wrote to memory of 760 3436 84c8370b0e52006c9e132261b3064bca0bf186a23f3d08526929198577e85b8e.exe 35 PID 3436 wrote to memory of 760 3436 84c8370b0e52006c9e132261b3064bca0bf186a23f3d08526929198577e85b8e.exe 35 PID 3436 wrote to memory of 760 3436 84c8370b0e52006c9e132261b3064bca0bf186a23f3d08526929198577e85b8e.exe 35 PID 3436 wrote to memory of 760 3436 84c8370b0e52006c9e132261b3064bca0bf186a23f3d08526929198577e85b8e.exe 35 PID 3436 wrote to memory of 760 3436 84c8370b0e52006c9e132261b3064bca0bf186a23f3d08526929198577e85b8e.exe 35 PID 3436 wrote to memory of 760 3436 84c8370b0e52006c9e132261b3064bca0bf186a23f3d08526929198577e85b8e.exe 35 PID 3436 wrote to memory of 760 3436 84c8370b0e52006c9e132261b3064bca0bf186a23f3d08526929198577e85b8e.exe 35 PID 3436 wrote to memory of 760 3436 84c8370b0e52006c9e132261b3064bca0bf186a23f3d08526929198577e85b8e.exe 35 PID 3436 wrote to memory of 760 3436 84c8370b0e52006c9e132261b3064bca0bf186a23f3d08526929198577e85b8e.exe 35 PID 3436 wrote to memory of 760 3436 84c8370b0e52006c9e132261b3064bca0bf186a23f3d08526929198577e85b8e.exe 35 PID 3436 wrote to memory of 760 3436 84c8370b0e52006c9e132261b3064bca0bf186a23f3d08526929198577e85b8e.exe 35 PID 3436 wrote to memory of 760 3436 84c8370b0e52006c9e132261b3064bca0bf186a23f3d08526929198577e85b8e.exe 35 PID 3436 wrote to memory of 760 3436 84c8370b0e52006c9e132261b3064bca0bf186a23f3d08526929198577e85b8e.exe 35
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:760
-
C:\Users\Admin\AppData\Local\Temp\84c8370b0e52006c9e132261b3064bca0bf186a23f3d08526929198577e85b8e.exe"C:\Users\Admin\AppData\Local\Temp\84c8370b0e52006c9e132261b3064bca0bf186a23f3d08526929198577e85b8e.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Users\Admin\AppData\Local\Temp\84c8370b0e52006c9e132261b3064bca0bf186a23f3d08526929198577e85b8e.exe"C:\Users\Admin\AppData\Local\Temp\84c8370b0e52006c9e132261b3064bca0bf186a23f3d08526929198577e85b8e.exe"3⤵
- Adds policy Run key to start application
- Modifies Installed Components in the registry
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3436 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:1544 -
C:\Windows\SysWOW64\WinDir\Svchost.exe"C:\Windows\system32\WinDir\Svchost.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1280 -
C:\Windows\SysWOW64\WinDir\Svchost.exe"C:\Windows\SysWOW64\WinDir\Svchost.exe"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1856
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
225KB
MD5d7b892b0dfe5a5647eef2bb3e92fa352
SHA19e8d510ac126f7595a9a6b4090ccb4ea908288b6
SHA2569075f56ef940de3666bd2d602affe61944b22c778804308dc89cd87dac32d512
SHA512035a72f29a18b316d5f837e5a81957b09ff60977cadd6327766d1d25ca8fca8819dd426b308963de076d704c3ce663afdb21a42526fede4665a86e471af8dce4
-
Filesize
440KB
MD531dd3a5285d12a359039ddd7e3f3bab1
SHA1e4340ea43c59b9ef9d537faddbd7ab0910b3f4ed
SHA25684c8370b0e52006c9e132261b3064bca0bf186a23f3d08526929198577e85b8e
SHA512058a85156b11da947e7ad86f44260cbfe51e88c445ad6f155952a5fce7e1cd201cf17e99cdefb373861b7d71d48c768df11e59d5cde2d6448babbeec283cf77b
-
Filesize
440KB
MD531dd3a5285d12a359039ddd7e3f3bab1
SHA1e4340ea43c59b9ef9d537faddbd7ab0910b3f4ed
SHA25684c8370b0e52006c9e132261b3064bca0bf186a23f3d08526929198577e85b8e
SHA512058a85156b11da947e7ad86f44260cbfe51e88c445ad6f155952a5fce7e1cd201cf17e99cdefb373861b7d71d48c768df11e59d5cde2d6448babbeec283cf77b
-
Filesize
440KB
MD531dd3a5285d12a359039ddd7e3f3bab1
SHA1e4340ea43c59b9ef9d537faddbd7ab0910b3f4ed
SHA25684c8370b0e52006c9e132261b3064bca0bf186a23f3d08526929198577e85b8e
SHA512058a85156b11da947e7ad86f44260cbfe51e88c445ad6f155952a5fce7e1cd201cf17e99cdefb373861b7d71d48c768df11e59d5cde2d6448babbeec283cf77b