Analysis
-
max time kernel
242s -
max time network
262s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
01-12-2022 06:10
Static task
static1
Behavioral task
behavioral1
Sample
2541bdf4ff55581fc7a49c99c3d7ddde481af73752abebe3f29ff03aa91e4b93.exe
Resource
win7-20221111-en
General
-
Target
2541bdf4ff55581fc7a49c99c3d7ddde481af73752abebe3f29ff03aa91e4b93.exe
-
Size
388KB
-
MD5
92104d3df8e766cb6ae8e102640edae3
-
SHA1
de894d2df723f599a325ba70e9e07fb0410b1900
-
SHA256
2541bdf4ff55581fc7a49c99c3d7ddde481af73752abebe3f29ff03aa91e4b93
-
SHA512
f8935bb481d49ff78749d8cd4f262ff196e1b8602a5a39f1cfddd284eb3cee0e1af7d251848025707a3961dba2cf478783fbcf240299873afd66c3fd7607edf1
-
SSDEEP
6144:ei6En6VEtw2Ix/aSgm6gw0K7iVx8q6vyHI+mPxnGAaYrwF+Hpws:Wa6VEtw2A9jFc+mpnP+0
Malware Config
Extracted
cybergate
v1.07.5
dude
bluewolf2.zapto.org:81
7R0I771J45G5P2
-
enable_keylogger
false
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
install
-
install_file
Server.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
asdasd
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Signatures
-
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run cvtres.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "c:\\directory\\CyberGate\\install\\Server.exe" cvtres.exe Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run cvtres.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "c:\\directory\\CyberGate\\install\\Server.exe" cvtres.exe -
Modifies Installed Components in the registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{G30J68SE-172C-714M-0472-752IP16XMSA5} cvtres.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{G30J68SE-172C-714M-0472-752IP16XMSA5}\StubPath = "c:\\directory\\CyberGate\\install\\Server.exe Restart" cvtres.exe -
resource yara_rule behavioral2/memory/1740-141-0x0000000010410000-0x0000000010475000-memory.dmp upx -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run cvtres.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "c:\\directory\\CyberGate\\install\\Server.exe" cvtres.exe Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Software\Microsoft\Windows\CurrentVersion\Run cvtres.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "c:\\directory\\CyberGate\\install\\Server.exe" cvtres.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 212 set thread context of 1740 212 2541bdf4ff55581fc7a49c99c3d7ddde481af73752abebe3f29ff03aa91e4b93.exe 81 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1740 cvtres.exe 1740 cvtres.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 212 wrote to memory of 1740 212 2541bdf4ff55581fc7a49c99c3d7ddde481af73752abebe3f29ff03aa91e4b93.exe 81 PID 212 wrote to memory of 1740 212 2541bdf4ff55581fc7a49c99c3d7ddde481af73752abebe3f29ff03aa91e4b93.exe 81 PID 212 wrote to memory of 1740 212 2541bdf4ff55581fc7a49c99c3d7ddde481af73752abebe3f29ff03aa91e4b93.exe 81 PID 212 wrote to memory of 1740 212 2541bdf4ff55581fc7a49c99c3d7ddde481af73752abebe3f29ff03aa91e4b93.exe 81 PID 212 wrote to memory of 1740 212 2541bdf4ff55581fc7a49c99c3d7ddde481af73752abebe3f29ff03aa91e4b93.exe 81 PID 212 wrote to memory of 1740 212 2541bdf4ff55581fc7a49c99c3d7ddde481af73752abebe3f29ff03aa91e4b93.exe 81 PID 212 wrote to memory of 1740 212 2541bdf4ff55581fc7a49c99c3d7ddde481af73752abebe3f29ff03aa91e4b93.exe 81 PID 212 wrote to memory of 1740 212 2541bdf4ff55581fc7a49c99c3d7ddde481af73752abebe3f29ff03aa91e4b93.exe 81 PID 212 wrote to memory of 1740 212 2541bdf4ff55581fc7a49c99c3d7ddde481af73752abebe3f29ff03aa91e4b93.exe 81 PID 212 wrote to memory of 1740 212 2541bdf4ff55581fc7a49c99c3d7ddde481af73752abebe3f29ff03aa91e4b93.exe 81 PID 212 wrote to memory of 1740 212 2541bdf4ff55581fc7a49c99c3d7ddde481af73752abebe3f29ff03aa91e4b93.exe 81 PID 212 wrote to memory of 1740 212 2541bdf4ff55581fc7a49c99c3d7ddde481af73752abebe3f29ff03aa91e4b93.exe 81 PID 212 wrote to memory of 1740 212 2541bdf4ff55581fc7a49c99c3d7ddde481af73752abebe3f29ff03aa91e4b93.exe 81 PID 1740 wrote to memory of 908 1740 cvtres.exe 82 PID 1740 wrote to memory of 908 1740 cvtres.exe 82 PID 1740 wrote to memory of 908 1740 cvtres.exe 82 PID 1740 wrote to memory of 908 1740 cvtres.exe 82 PID 1740 wrote to memory of 908 1740 cvtres.exe 82 PID 1740 wrote to memory of 908 1740 cvtres.exe 82 PID 1740 wrote to memory of 908 1740 cvtres.exe 82 PID 1740 wrote to memory of 908 1740 cvtres.exe 82 PID 1740 wrote to memory of 908 1740 cvtres.exe 82 PID 1740 wrote to memory of 908 1740 cvtres.exe 82 PID 1740 wrote to memory of 908 1740 cvtres.exe 82 PID 1740 wrote to memory of 908 1740 cvtres.exe 82 PID 1740 wrote to memory of 908 1740 cvtres.exe 82 PID 1740 wrote to memory of 908 1740 cvtres.exe 82 PID 1740 wrote to memory of 908 1740 cvtres.exe 82 PID 1740 wrote to memory of 908 1740 cvtres.exe 82 PID 1740 wrote to memory of 908 1740 cvtres.exe 82 PID 1740 wrote to memory of 908 1740 cvtres.exe 82 PID 1740 wrote to memory of 908 1740 cvtres.exe 82 PID 1740 wrote to memory of 908 1740 cvtres.exe 82 PID 1740 wrote to memory of 908 1740 cvtres.exe 82 PID 1740 wrote to memory of 908 1740 cvtres.exe 82 PID 1740 wrote to memory of 908 1740 cvtres.exe 82 PID 1740 wrote to memory of 908 1740 cvtres.exe 82 PID 1740 wrote to memory of 908 1740 cvtres.exe 82 PID 1740 wrote to memory of 908 1740 cvtres.exe 82 PID 1740 wrote to memory of 908 1740 cvtres.exe 82 PID 1740 wrote to memory of 908 1740 cvtres.exe 82 PID 1740 wrote to memory of 908 1740 cvtres.exe 82 PID 1740 wrote to memory of 908 1740 cvtres.exe 82 PID 1740 wrote to memory of 908 1740 cvtres.exe 82 PID 1740 wrote to memory of 908 1740 cvtres.exe 82 PID 1740 wrote to memory of 908 1740 cvtres.exe 82 PID 1740 wrote to memory of 908 1740 cvtres.exe 82 PID 1740 wrote to memory of 908 1740 cvtres.exe 82 PID 1740 wrote to memory of 908 1740 cvtres.exe 82 PID 1740 wrote to memory of 908 1740 cvtres.exe 82 PID 1740 wrote to memory of 908 1740 cvtres.exe 82 PID 1740 wrote to memory of 908 1740 cvtres.exe 82 PID 1740 wrote to memory of 908 1740 cvtres.exe 82 PID 1740 wrote to memory of 908 1740 cvtres.exe 82 PID 1740 wrote to memory of 908 1740 cvtres.exe 82 PID 1740 wrote to memory of 908 1740 cvtres.exe 82 PID 1740 wrote to memory of 908 1740 cvtres.exe 82 PID 1740 wrote to memory of 908 1740 cvtres.exe 82 PID 1740 wrote to memory of 908 1740 cvtres.exe 82 PID 1740 wrote to memory of 908 1740 cvtres.exe 82 PID 1740 wrote to memory of 908 1740 cvtres.exe 82 PID 1740 wrote to memory of 908 1740 cvtres.exe 82 PID 1740 wrote to memory of 908 1740 cvtres.exe 82 PID 1740 wrote to memory of 908 1740 cvtres.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\2541bdf4ff55581fc7a49c99c3d7ddde481af73752abebe3f29ff03aa91e4b93.exe"C:\Users\Admin\AppData\Local\Temp\2541bdf4ff55581fc7a49c99c3d7ddde481af73752abebe3f29ff03aa91e4b93.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe2⤵
- Adds policy Run key to start application
- Modifies Installed Components in the registry
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:908
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe"3⤵PID:4184
-
-