Analysis

  • max time kernel
    145s
  • max time network
    161s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-12-2022 17:20

General

  • Target

    cf8224172d3e69621810e0e20de8544b773c574c5327106831289f8e42b6a851.exe

  • Size

    656KB

  • MD5

    de1c223fd850968507195255982efee3

  • SHA1

    bf8b7083cc8343310d7600d7f48831d252ab8484

  • SHA256

    cf8224172d3e69621810e0e20de8544b773c574c5327106831289f8e42b6a851

  • SHA512

    8efa6e07672ad8aaa7b730da5455896f40f89b032fb104ff872a31ae2b67a7dc67d089f3db543a49308ccf3bbb7a2ef5a9e43576d88ee569d17e0437a1a4f5be

  • SSDEEP

    12288:vep8gmYrC7upQwG6nxMqQ7zDOPc3mJ4J8E0Sk5WAn0/iYjzZUb9mDE8k:mpmK4jKnKqAq48zSkMAn0fmIDk

Malware Config

Extracted

Family

cybergate

Version

2.7 Final

Botnet

1

C2

127.0.0.1:81

looost.no-ip.biz:82

jarjeer.no-ip.biz:288

Mutex

***dll***

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    dll

  • install_file

    dll.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    texto da mensagem

  • message_box_title

    título da mensagem

  • password

    a7mdrat

Signatures

  • CyberGate, Rebhip

    CyberGate is a lightweight remote administration tool with a wide array of functionalities.

  • Adds policy Run key to start application 2 TTPs 4 IoCs
  • Modifies Installed Components in the registry 2 TTPs 2 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Program crash 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cf8224172d3e69621810e0e20de8544b773c574c5327106831289f8e42b6a851.exe
    "C:\Users\Admin\AppData\Local\Temp\cf8224172d3e69621810e0e20de8544b773c574c5327106831289f8e42b6a851.exe"
    1⤵
    • Adds policy Run key to start application
    • Modifies Installed Components in the registry
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:4812
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe"
      2⤵
        PID:2436
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4812 -s 596
        2⤵
        • Program crash
        PID:4388
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4812 -s 648
        2⤵
        • Program crash
        PID:2536
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 192 -p 4812 -ip 4812
      1⤵
        PID:456
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4812 -ip 4812
        1⤵
          PID:3408

        Network

        MITRE ATT&CK Matrix ATT&CK v6

        Persistence

        Registry Run Keys / Startup Folder

        2
        T1060

        Defense Evasion

        Modify Registry

        2
        T1112

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/4812-132-0x0000000000950000-0x000000000099E000-memory.dmp
          Filesize

          312KB

        • memory/4812-133-0x0000000000400000-0x00000000004B6000-memory.dmp
          Filesize

          728KB

        • memory/4812-135-0x0000000010410000-0x000000001046C000-memory.dmp
          Filesize

          368KB

        • memory/4812-141-0x0000000000950000-0x000000000099E000-memory.dmp
          Filesize

          312KB

        • memory/4812-142-0x0000000000400000-0x00000000004B6000-memory.dmp
          Filesize

          728KB