Analysis
-
max time kernel
163s -
max time network
174s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
01/12/2022, 20:04
Static task
static1
Behavioral task
behavioral1
Sample
a613a1a58bc2a4c06bcae7c8e0bc70b7c343faae7562953ed81e4bf2d312c95a.exe
Resource
win7-20221111-en
General
-
Target
a613a1a58bc2a4c06bcae7c8e0bc70b7c343faae7562953ed81e4bf2d312c95a.exe
-
Size
906KB
-
MD5
82623b811594c71f9a5d3f65e0e7c3bb
-
SHA1
12f01eb6ceb50e33cdd506336ece14d4f026160b
-
SHA256
a613a1a58bc2a4c06bcae7c8e0bc70b7c343faae7562953ed81e4bf2d312c95a
-
SHA512
2868332a6308cd44a5bff4777191fe236f374e29b053d8e7d1578f3217cbc8570f380b1ca436b1aa8243d01937d4b2eb9959019e5e46763ea1d1ebf80c71bf3e
-
SSDEEP
12288:Tl0255SUOet4yyuBHWrUPKMXxUJXifRxn1YmYyVpBceIm94FjeDo/4/aap1rMWu4:TnVuX67tLDar2hpp
Malware Config
Extracted
cybergate
v1.11.0 - Public Version
1
justme.dyndns-server.com:998
H42S4U10568VEF
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
firefox
-
install_file
firefox.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
2
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Signatures
-
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run vbc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Program Files (x86)\\firefox\\firefox.exe" vbc.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run vbc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Program Files (x86)\\firefox\\firefox.exe" vbc.exe -
Modifies Installed Components in the registry 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{F4QMNVD6-7BS6-3520-30N6-D67JTD314J1D} vbc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F4QMNVD6-7BS6-3520-30N6-D67JTD314J1D}\StubPath = "C:\\Program Files (x86)\\firefox\\firefox.exe Restart" vbc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{F4QMNVD6-7BS6-3520-30N6-D67JTD314J1D} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F4QMNVD6-7BS6-3520-30N6-D67JTD314J1D}\StubPath = "C:\\Program Files (x86)\\firefox\\firefox.exe" explorer.exe -
resource yara_rule behavioral2/memory/3876-140-0x0000000010410000-0x0000000010482000-memory.dmp upx behavioral2/memory/3876-145-0x0000000010490000-0x0000000010502000-memory.dmp upx behavioral2/memory/4172-148-0x0000000010490000-0x0000000010502000-memory.dmp upx behavioral2/memory/4172-151-0x0000000010490000-0x0000000010502000-memory.dmp upx behavioral2/memory/3876-153-0x0000000010510000-0x0000000010582000-memory.dmp upx behavioral2/memory/3876-158-0x0000000010590000-0x0000000010602000-memory.dmp upx behavioral2/memory/212-161-0x0000000010590000-0x0000000010602000-memory.dmp upx behavioral2/memory/212-162-0x0000000010590000-0x0000000010602000-memory.dmp upx behavioral2/memory/212-164-0x0000000010590000-0x0000000010602000-memory.dmp upx -
Drops startup file 3 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ vbc.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\firefox.exe vbc.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\firefox.exe vbc.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Program Files (x86)\\firefox\\firefox.exe" vbc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run vbc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Program Files (x86)\\firefox\\firefox.exe" vbc.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Windows\CurrentVersion\Run vbc.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4188 set thread context of 3876 4188 a613a1a58bc2a4c06bcae7c8e0bc70b7c343faae7562953ed81e4bf2d312c95a.exe 83 -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\firefox\firefox.exe vbc.exe File created C:\Program Files (x86)\firefox\firefox.exe vbc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3876 vbc.exe 3876 vbc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 212 vbc.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeBackupPrivilege 4172 explorer.exe Token: SeRestorePrivilege 4172 explorer.exe Token: SeBackupPrivilege 212 vbc.exe Token: SeRestorePrivilege 212 vbc.exe Token: SeDebugPrivilege 212 vbc.exe Token: SeDebugPrivilege 212 vbc.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3876 vbc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4188 wrote to memory of 3876 4188 a613a1a58bc2a4c06bcae7c8e0bc70b7c343faae7562953ed81e4bf2d312c95a.exe 83 PID 4188 wrote to memory of 3876 4188 a613a1a58bc2a4c06bcae7c8e0bc70b7c343faae7562953ed81e4bf2d312c95a.exe 83 PID 4188 wrote to memory of 3876 4188 a613a1a58bc2a4c06bcae7c8e0bc70b7c343faae7562953ed81e4bf2d312c95a.exe 83 PID 4188 wrote to memory of 3876 4188 a613a1a58bc2a4c06bcae7c8e0bc70b7c343faae7562953ed81e4bf2d312c95a.exe 83 PID 4188 wrote to memory of 3876 4188 a613a1a58bc2a4c06bcae7c8e0bc70b7c343faae7562953ed81e4bf2d312c95a.exe 83 PID 4188 wrote to memory of 3876 4188 a613a1a58bc2a4c06bcae7c8e0bc70b7c343faae7562953ed81e4bf2d312c95a.exe 83 PID 4188 wrote to memory of 3876 4188 a613a1a58bc2a4c06bcae7c8e0bc70b7c343faae7562953ed81e4bf2d312c95a.exe 83 PID 4188 wrote to memory of 3876 4188 a613a1a58bc2a4c06bcae7c8e0bc70b7c343faae7562953ed81e4bf2d312c95a.exe 83 PID 4188 wrote to memory of 3876 4188 a613a1a58bc2a4c06bcae7c8e0bc70b7c343faae7562953ed81e4bf2d312c95a.exe 83 PID 4188 wrote to memory of 3876 4188 a613a1a58bc2a4c06bcae7c8e0bc70b7c343faae7562953ed81e4bf2d312c95a.exe 83 PID 4188 wrote to memory of 3876 4188 a613a1a58bc2a4c06bcae7c8e0bc70b7c343faae7562953ed81e4bf2d312c95a.exe 83 PID 4188 wrote to memory of 3876 4188 a613a1a58bc2a4c06bcae7c8e0bc70b7c343faae7562953ed81e4bf2d312c95a.exe 83 PID 4188 wrote to memory of 3876 4188 a613a1a58bc2a4c06bcae7c8e0bc70b7c343faae7562953ed81e4bf2d312c95a.exe 83 PID 3876 wrote to memory of 2528 3876 vbc.exe 48 PID 3876 wrote to memory of 2528 3876 vbc.exe 48 PID 3876 wrote to memory of 2528 3876 vbc.exe 48 PID 3876 wrote to memory of 2528 3876 vbc.exe 48 PID 3876 wrote to memory of 2528 3876 vbc.exe 48 PID 3876 wrote to memory of 2528 3876 vbc.exe 48 PID 3876 wrote to memory of 2528 3876 vbc.exe 48 PID 3876 wrote to memory of 2528 3876 vbc.exe 48 PID 3876 wrote to memory of 2528 3876 vbc.exe 48 PID 3876 wrote to memory of 2528 3876 vbc.exe 48 PID 3876 wrote to memory of 2528 3876 vbc.exe 48 PID 3876 wrote to memory of 2528 3876 vbc.exe 48 PID 3876 wrote to memory of 2528 3876 vbc.exe 48 PID 3876 wrote to memory of 2528 3876 vbc.exe 48 PID 3876 wrote to memory of 2528 3876 vbc.exe 48 PID 3876 wrote to memory of 2528 3876 vbc.exe 48 PID 3876 wrote to memory of 2528 3876 vbc.exe 48 PID 3876 wrote to memory of 2528 3876 vbc.exe 48 PID 3876 wrote to memory of 2528 3876 vbc.exe 48 PID 3876 wrote to memory of 2528 3876 vbc.exe 48 PID 3876 wrote to memory of 2528 3876 vbc.exe 48 PID 3876 wrote to memory of 2528 3876 vbc.exe 48 PID 3876 wrote to memory of 2528 3876 vbc.exe 48 PID 3876 wrote to memory of 2528 3876 vbc.exe 48 PID 3876 wrote to memory of 2528 3876 vbc.exe 48 PID 3876 wrote to memory of 2528 3876 vbc.exe 48 PID 3876 wrote to memory of 2528 3876 vbc.exe 48 PID 3876 wrote to memory of 2528 3876 vbc.exe 48 PID 3876 wrote to memory of 2528 3876 vbc.exe 48 PID 3876 wrote to memory of 2528 3876 vbc.exe 48 PID 3876 wrote to memory of 2528 3876 vbc.exe 48 PID 3876 wrote to memory of 2528 3876 vbc.exe 48 PID 3876 wrote to memory of 2528 3876 vbc.exe 48 PID 3876 wrote to memory of 2528 3876 vbc.exe 48 PID 3876 wrote to memory of 2528 3876 vbc.exe 48 PID 3876 wrote to memory of 2528 3876 vbc.exe 48 PID 3876 wrote to memory of 2528 3876 vbc.exe 48 PID 3876 wrote to memory of 2528 3876 vbc.exe 48 PID 3876 wrote to memory of 2528 3876 vbc.exe 48 PID 3876 wrote to memory of 2528 3876 vbc.exe 48 PID 3876 wrote to memory of 2528 3876 vbc.exe 48 PID 3876 wrote to memory of 2528 3876 vbc.exe 48 PID 3876 wrote to memory of 2528 3876 vbc.exe 48 PID 3876 wrote to memory of 2528 3876 vbc.exe 48 PID 3876 wrote to memory of 2528 3876 vbc.exe 48 PID 3876 wrote to memory of 2528 3876 vbc.exe 48 PID 3876 wrote to memory of 2528 3876 vbc.exe 48 PID 3876 wrote to memory of 2528 3876 vbc.exe 48 PID 3876 wrote to memory of 2528 3876 vbc.exe 48 PID 3876 wrote to memory of 2528 3876 vbc.exe 48 PID 3876 wrote to memory of 2528 3876 vbc.exe 48
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:2528
-
C:\Users\Admin\AppData\Local\Temp\a613a1a58bc2a4c06bcae7c8e0bc70b7c343faae7562953ed81e4bf2d312c95a.exe"C:\Users\Admin\AppData\Local\Temp\a613a1a58bc2a4c06bcae7c8e0bc70b7c343faae7562953ed81e4bf2d312c95a.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4188 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵
- Adds policy Run key to start application
- Modifies Installed Components in the registry
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3876 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
- Modifies Installed Components in the registry
- Suspicious use of AdjustPrivilegeToken
PID:4172
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2484
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"4⤵
- Drops startup file
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:212
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5d881de17aa8f2e2c08cbb7b265f928f9
SHA108936aebc87decf0af6e8eada191062b5e65ac2a
SHA256b3a37093609f9a20ad60b85a9fa9de2ba674cba9b5bd687729440c70ba619ca0
SHA5125f23bfb1b8740247b36ed0ab741738c7d4c949736129e767213e321607d1ccd3e3a8428e4ba44bd28a275b5e3f6206285b1a522514b7ef7ea5e698d90a713d34
-
Filesize
238KB
MD50b3718b656702d41e3626c8c6c67f341
SHA16a66a2a2ac97103f3d7ab96a6a24302b3d6b2a2e
SHA256b9a39bb8c8d48245649b6c112db4504217fb7acfbfebed3114ec3a22478ceaf8
SHA512dd9eb6a52ce2a91f2bf75f650df5a0c643c4e98799ab026df02538469c02ec7ce6a034f19b3e7eb4e2dbbd403e02eb8b7adc81545cc9ae132f1152c323d4b5bb