Analysis
-
max time kernel
151s -
max time network
64s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 00:42
Behavioral task
behavioral1
Sample
CALLOF~1.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
CALLOF~1.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
PerX.exe
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
PerX.exe
Resource
win10v2004-20220901-en
General
-
Target
CALLOF~1.exe
-
Size
270KB
-
MD5
e14244a052136335c003492c75cedcbe
-
SHA1
c7a73e6efbe3c44a42dbdd8dde0fd2cb7bb000ee
-
SHA256
f4a501d135d291fd0d23dea3faf2640e9ea7dcc1a48402e55634775e32203f48
-
SHA512
dba313f60734ac8c4891dd68b83d82182404344450223988684d449deebff6c5b1cd098bc729b267a237b800d1ee23ceaff8b292e26133b8bbc1ef74475be24f
-
SSDEEP
6144:TMq0ftzddwSbRnY8EhscQE8uNaWiyULbYsXarJo5H:TFIt5jKRKrZ2a7yWbYaarJo5
Malware Config
Extracted
cybergate
v1.07.5
remote
ikhackjou.no-ip.org:1540
LP5QFHQ655CF72
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
services.exe
-
install_dir
Systeem32
-
install_file
explorer.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
hoi123
-
regkey_hkcu
SearchIndexer
-
regkey_hklm
SearchIndexer
Signatures
-
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run CALLOF~1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\windows\\Systeem32\\explorer.exe" CALLOF~1.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run CALLOF~1.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\windows\\Systeem32\\explorer.exe" CALLOF~1.exe -
Executes dropped EXE 1 IoCs
pid Process 1308 explorer.exe -
Modifies Installed Components in the registry 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{7RIE18L8-5D74-0IV3-7P4J-XK3476X887JQ} CALLOF~1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7RIE18L8-5D74-0IV3-7P4J-XK3476X887JQ}\StubPath = "C:\\windows\\Systeem32\\explorer.exe Restart" CALLOF~1.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{7RIE18L8-5D74-0IV3-7P4J-XK3476X887JQ} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7RIE18L8-5D74-0IV3-7P4J-XK3476X887JQ}\StubPath = "C:\\windows\\Systeem32\\explorer.exe" explorer.exe -
resource yara_rule behavioral1/memory/1760-55-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/1760-57-0x0000000010410000-0x0000000010475000-memory.dmp upx behavioral1/memory/1760-66-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral1/memory/840-71-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral1/files/0x000b00000001231c-73.dat upx behavioral1/memory/840-74-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral1/memory/1760-76-0x0000000000220000-0x0000000000285000-memory.dmp upx behavioral1/memory/1760-82-0x00000000104F0000-0x0000000010555000-memory.dmp upx behavioral1/memory/1760-88-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/1288-87-0x00000000104F0000-0x0000000010555000-memory.dmp upx behavioral1/files/0x000b00000001231c-89.dat upx behavioral1/files/0x000b00000001231c-90.dat upx behavioral1/files/0x000b00000001231c-92.dat upx behavioral1/memory/1288-95-0x0000000005160000-0x00000000051B6000-memory.dmp upx behavioral1/memory/1288-96-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/1288-97-0x00000000104F0000-0x0000000010555000-memory.dmp upx behavioral1/memory/1308-98-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/1308-99-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/1288-100-0x0000000005160000-0x00000000051B6000-memory.dmp upx behavioral1/memory/1288-102-0x00000000104F0000-0x0000000010555000-memory.dmp upx -
Loads dropped DLL 2 IoCs
pid Process 1288 CALLOF~1.exe 1288 CALLOF~1.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run CALLOF~1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SearchIndexer = "C:\\windows\\Systeem32\\explorer.exe" CALLOF~1.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run CALLOF~1.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\SearchIndexer = "C:\\windows\\Systeem32\\explorer.exe" CALLOF~1.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\windows\Systeem32\explorer.exe CALLOF~1.exe File opened for modification C:\windows\Systeem32\explorer.exe CALLOF~1.exe File opened for modification C:\windows\Systeem32\explorer.exe CALLOF~1.exe File opened for modification C:\windows\Systeem32\ CALLOF~1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1760 CALLOF~1.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1288 CALLOF~1.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeBackupPrivilege 840 explorer.exe Token: SeRestorePrivilege 840 explorer.exe Token: SeBackupPrivilege 1288 CALLOF~1.exe Token: SeRestorePrivilege 1288 CALLOF~1.exe Token: SeDebugPrivilege 1288 CALLOF~1.exe Token: SeDebugPrivilege 1288 CALLOF~1.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1760 CALLOF~1.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1760 wrote to memory of 1204 1760 CALLOF~1.exe 4 PID 1760 wrote to memory of 1204 1760 CALLOF~1.exe 4 PID 1760 wrote to memory of 1204 1760 CALLOF~1.exe 4 PID 1760 wrote to memory of 1204 1760 CALLOF~1.exe 4 PID 1760 wrote to memory of 1204 1760 CALLOF~1.exe 4 PID 1760 wrote to memory of 1204 1760 CALLOF~1.exe 4 PID 1760 wrote to memory of 1204 1760 CALLOF~1.exe 4 PID 1760 wrote to memory of 1204 1760 CALLOF~1.exe 4 PID 1760 wrote to memory of 1204 1760 CALLOF~1.exe 4 PID 1760 wrote to memory of 1204 1760 CALLOF~1.exe 4 PID 1760 wrote to memory of 1204 1760 CALLOF~1.exe 4 PID 1760 wrote to memory of 1204 1760 CALLOF~1.exe 4 PID 1760 wrote to memory of 1204 1760 CALLOF~1.exe 4 PID 1760 wrote to memory of 1204 1760 CALLOF~1.exe 4 PID 1760 wrote to memory of 1204 1760 CALLOF~1.exe 4 PID 1760 wrote to memory of 1204 1760 CALLOF~1.exe 4 PID 1760 wrote to memory of 1204 1760 CALLOF~1.exe 4 PID 1760 wrote to memory of 1204 1760 CALLOF~1.exe 4 PID 1760 wrote to memory of 1204 1760 CALLOF~1.exe 4 PID 1760 wrote to memory of 1204 1760 CALLOF~1.exe 4 PID 1760 wrote to memory of 1204 1760 CALLOF~1.exe 4 PID 1760 wrote to memory of 1204 1760 CALLOF~1.exe 4 PID 1760 wrote to memory of 1204 1760 CALLOF~1.exe 4 PID 1760 wrote to memory of 1204 1760 CALLOF~1.exe 4 PID 1760 wrote to memory of 1204 1760 CALLOF~1.exe 4 PID 1760 wrote to memory of 1204 1760 CALLOF~1.exe 4 PID 1760 wrote to memory of 1204 1760 CALLOF~1.exe 4 PID 1760 wrote to memory of 1204 1760 CALLOF~1.exe 4 PID 1760 wrote to memory of 1204 1760 CALLOF~1.exe 4 PID 1760 wrote to memory of 1204 1760 CALLOF~1.exe 4 PID 1760 wrote to memory of 1204 1760 CALLOF~1.exe 4 PID 1760 wrote to memory of 1204 1760 CALLOF~1.exe 4 PID 1760 wrote to memory of 1204 1760 CALLOF~1.exe 4 PID 1760 wrote to memory of 1204 1760 CALLOF~1.exe 4 PID 1760 wrote to memory of 1204 1760 CALLOF~1.exe 4 PID 1760 wrote to memory of 1204 1760 CALLOF~1.exe 4 PID 1760 wrote to memory of 1204 1760 CALLOF~1.exe 4 PID 1760 wrote to memory of 1204 1760 CALLOF~1.exe 4 PID 1760 wrote to memory of 1204 1760 CALLOF~1.exe 4 PID 1760 wrote to memory of 1204 1760 CALLOF~1.exe 4 PID 1760 wrote to memory of 1204 1760 CALLOF~1.exe 4 PID 1760 wrote to memory of 1204 1760 CALLOF~1.exe 4 PID 1760 wrote to memory of 1204 1760 CALLOF~1.exe 4 PID 1760 wrote to memory of 1204 1760 CALLOF~1.exe 4 PID 1760 wrote to memory of 1204 1760 CALLOF~1.exe 4 PID 1760 wrote to memory of 1204 1760 CALLOF~1.exe 4 PID 1760 wrote to memory of 1204 1760 CALLOF~1.exe 4 PID 1760 wrote to memory of 1204 1760 CALLOF~1.exe 4 PID 1760 wrote to memory of 1204 1760 CALLOF~1.exe 4 PID 1760 wrote to memory of 1204 1760 CALLOF~1.exe 4 PID 1760 wrote to memory of 1204 1760 CALLOF~1.exe 4 PID 1760 wrote to memory of 1204 1760 CALLOF~1.exe 4 PID 1760 wrote to memory of 1204 1760 CALLOF~1.exe 4 PID 1760 wrote to memory of 1204 1760 CALLOF~1.exe 4 PID 1760 wrote to memory of 1204 1760 CALLOF~1.exe 4 PID 1760 wrote to memory of 1204 1760 CALLOF~1.exe 4 PID 1760 wrote to memory of 1204 1760 CALLOF~1.exe 4 PID 1760 wrote to memory of 1204 1760 CALLOF~1.exe 4 PID 1760 wrote to memory of 1204 1760 CALLOF~1.exe 4 PID 1760 wrote to memory of 1204 1760 CALLOF~1.exe 4 PID 1760 wrote to memory of 1204 1760 CALLOF~1.exe 4 PID 1760 wrote to memory of 1204 1760 CALLOF~1.exe 4 PID 1760 wrote to memory of 1204 1760 CALLOF~1.exe 4 PID 1760 wrote to memory of 1204 1760 CALLOF~1.exe 4
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1204
-
C:\Users\Admin\AppData\Local\Temp\CALLOF~1.exe"C:\Users\Admin\AppData\Local\Temp\CALLOF~1.exe"2⤵
- Adds policy Run key to start application
- Modifies Installed Components in the registry
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵
- Modifies Installed Components in the registry
- Suspicious use of AdjustPrivilegeToken
PID:840
-
-
C:\Users\Admin\AppData\Local\Temp\CALLOF~1.exe"C:\Users\Admin\AppData\Local\Temp\CALLOF~1.exe"3⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:1288 -
C:\windows\Systeem32\explorer.exe"C:\windows\Systeem32\explorer.exe"4⤵
- Executes dropped EXE
PID:1308
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD5a7c8ae77b229559107715fcdd39bb531
SHA10d85a4f1f709c325a6e549b458e816020d30575a
SHA256bde69a357ed93368fb98151b6e6fd63f03962f245594742e379677240eec615d
SHA512ce90f0217ec031fcc2f6da85137312f19d9d12f3e9aab0939d41eafa2db60c70892a99610d49005844e7caaf67b97e54d10d9c9953ea010640ccb6c24bb6ee30
-
Filesize
270KB
MD5e14244a052136335c003492c75cedcbe
SHA1c7a73e6efbe3c44a42dbdd8dde0fd2cb7bb000ee
SHA256f4a501d135d291fd0d23dea3faf2640e9ea7dcc1a48402e55634775e32203f48
SHA512dba313f60734ac8c4891dd68b83d82182404344450223988684d449deebff6c5b1cd098bc729b267a237b800d1ee23ceaff8b292e26133b8bbc1ef74475be24f
-
Filesize
270KB
MD5e14244a052136335c003492c75cedcbe
SHA1c7a73e6efbe3c44a42dbdd8dde0fd2cb7bb000ee
SHA256f4a501d135d291fd0d23dea3faf2640e9ea7dcc1a48402e55634775e32203f48
SHA512dba313f60734ac8c4891dd68b83d82182404344450223988684d449deebff6c5b1cd098bc729b267a237b800d1ee23ceaff8b292e26133b8bbc1ef74475be24f
-
Filesize
270KB
MD5e14244a052136335c003492c75cedcbe
SHA1c7a73e6efbe3c44a42dbdd8dde0fd2cb7bb000ee
SHA256f4a501d135d291fd0d23dea3faf2640e9ea7dcc1a48402e55634775e32203f48
SHA512dba313f60734ac8c4891dd68b83d82182404344450223988684d449deebff6c5b1cd098bc729b267a237b800d1ee23ceaff8b292e26133b8bbc1ef74475be24f
-
Filesize
270KB
MD5e14244a052136335c003492c75cedcbe
SHA1c7a73e6efbe3c44a42dbdd8dde0fd2cb7bb000ee
SHA256f4a501d135d291fd0d23dea3faf2640e9ea7dcc1a48402e55634775e32203f48
SHA512dba313f60734ac8c4891dd68b83d82182404344450223988684d449deebff6c5b1cd098bc729b267a237b800d1ee23ceaff8b292e26133b8bbc1ef74475be24f