Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 16:33
Static task
static1
Behavioral task
behavioral1
Sample
9ec3eaae73c82ae5ec7824232d6c388b1a1893b543c46716c81daa98e18a7f46.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
9ec3eaae73c82ae5ec7824232d6c388b1a1893b543c46716c81daa98e18a7f46.exe
Resource
win10v2004-20220901-en
General
-
Target
9ec3eaae73c82ae5ec7824232d6c388b1a1893b543c46716c81daa98e18a7f46.exe
-
Size
310KB
-
MD5
78f3514c55b4d72c47a0fb5c6e3e488b
-
SHA1
c427be9654f956cdc30b8595491466f06c89d807
-
SHA256
9ec3eaae73c82ae5ec7824232d6c388b1a1893b543c46716c81daa98e18a7f46
-
SHA512
da5b79b20bcdd03886d8667d799cf46098d0315b82cd06bd76fcf7be2e00917c6aed4917ccd5283e6fd04785b7ef1f77b27f2fc5e8828950e1556711eb9f5ae9
-
SSDEEP
6144:hYd37j+80/kxQXMy37mdlZGg3PvUszYFyaIhLkYBtjYaNiE:hY5UJb7mhGFMFhxBFYao
Malware Config
Extracted
cybergate
2.6
Server
sorry.no-ip.biz:5555
***MUTEX***
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
systim
-
install_file
windwos.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
texto da mensagem
-
message_box_title
tÃtulo da mensagem
-
password
abcd1234
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Signatures
-
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\systim\\windwos.exe" 9ec3eaae73c82ae5ec7824232d6c388b1a1893b543c46716c81daa98e18a7f46.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 9ec3eaae73c82ae5ec7824232d6c388b1a1893b543c46716c81daa98e18a7f46.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\systim\\windwos.exe" 9ec3eaae73c82ae5ec7824232d6c388b1a1893b543c46716c81daa98e18a7f46.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 9ec3eaae73c82ae5ec7824232d6c388b1a1893b543c46716c81daa98e18a7f46.exe -
Executes dropped EXE 2 IoCs
pid Process 2012 windwos.exe 1292 windwos.exe -
Modifies Installed Components in the registry 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{603M2AR2-074T-L56C-7CAC-0S6MN10U17G0} 9ec3eaae73c82ae5ec7824232d6c388b1a1893b543c46716c81daa98e18a7f46.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{603M2AR2-074T-L56C-7CAC-0S6MN10U17G0}\StubPath = "C:\\systim\\windwos.exe Restart" 9ec3eaae73c82ae5ec7824232d6c388b1a1893b543c46716c81daa98e18a7f46.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{603M2AR2-074T-L56C-7CAC-0S6MN10U17G0} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{603M2AR2-074T-L56C-7CAC-0S6MN10U17G0}\StubPath = "C:\\systim\\windwos.exe" explorer.exe -
resource yara_rule behavioral1/memory/1716-72-0x0000000024010000-0x0000000024072000-memory.dmp upx behavioral1/memory/892-86-0x0000000024080000-0x00000000240E2000-memory.dmp upx behavioral1/memory/1716-81-0x0000000024080000-0x00000000240E2000-memory.dmp upx behavioral1/memory/892-89-0x0000000024080000-0x00000000240E2000-memory.dmp upx behavioral1/memory/1716-91-0x00000000240F0000-0x0000000024152000-memory.dmp upx behavioral1/memory/1716-97-0x0000000024160000-0x00000000241C2000-memory.dmp upx behavioral1/memory/856-102-0x0000000024160000-0x00000000241C2000-memory.dmp upx behavioral1/memory/856-123-0x0000000024160000-0x00000000241C2000-memory.dmp upx behavioral1/memory/856-124-0x0000000024160000-0x00000000241C2000-memory.dmp upx -
Loads dropped DLL 1 IoCs
pid Process 856 9ec3eaae73c82ae5ec7824232d6c388b1a1893b543c46716c81daa98e18a7f46.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run 9ec3eaae73c82ae5ec7824232d6c388b1a1893b543c46716c81daa98e18a7f46.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\systim\\windwos.exe" 9ec3eaae73c82ae5ec7824232d6c388b1a1893b543c46716c81daa98e18a7f46.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run 9ec3eaae73c82ae5ec7824232d6c388b1a1893b543c46716c81daa98e18a7f46.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\systim\\windwos.exe" 9ec3eaae73c82ae5ec7824232d6c388b1a1893b543c46716c81daa98e18a7f46.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1444 set thread context of 1716 1444 windwos.exe 28 PID 2012 set thread context of 1292 2012 windwos.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 856 9ec3eaae73c82ae5ec7824232d6c388b1a1893b543c46716c81daa98e18a7f46.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1444 windwos.exe Token: SeDebugPrivilege 856 9ec3eaae73c82ae5ec7824232d6c388b1a1893b543c46716c81daa98e18a7f46.exe Token: SeDebugPrivilege 856 9ec3eaae73c82ae5ec7824232d6c388b1a1893b543c46716c81daa98e18a7f46.exe Token: SeDebugPrivilege 2012 windwos.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1716 9ec3eaae73c82ae5ec7824232d6c388b1a1893b543c46716c81daa98e18a7f46.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1444 wrote to memory of 1088 1444 windwos.exe 27 PID 1444 wrote to memory of 1088 1444 windwos.exe 27 PID 1444 wrote to memory of 1088 1444 windwos.exe 27 PID 1444 wrote to memory of 1088 1444 windwos.exe 27 PID 1444 wrote to memory of 1716 1444 windwos.exe 28 PID 1444 wrote to memory of 1716 1444 windwos.exe 28 PID 1444 wrote to memory of 1716 1444 windwos.exe 28 PID 1444 wrote to memory of 1716 1444 windwos.exe 28 PID 1444 wrote to memory of 1716 1444 windwos.exe 28 PID 1444 wrote to memory of 1716 1444 windwos.exe 28 PID 1444 wrote to memory of 1716 1444 windwos.exe 28 PID 1444 wrote to memory of 1716 1444 windwos.exe 28 PID 1444 wrote to memory of 1716 1444 windwos.exe 28 PID 1444 wrote to memory of 1716 1444 windwos.exe 28 PID 1444 wrote to memory of 1716 1444 windwos.exe 28 PID 1444 wrote to memory of 1716 1444 windwos.exe 28 PID 1716 wrote to memory of 1344 1716 9ec3eaae73c82ae5ec7824232d6c388b1a1893b543c46716c81daa98e18a7f46.exe 11 PID 1716 wrote to memory of 1344 1716 9ec3eaae73c82ae5ec7824232d6c388b1a1893b543c46716c81daa98e18a7f46.exe 11 PID 1716 wrote to memory of 1344 1716 9ec3eaae73c82ae5ec7824232d6c388b1a1893b543c46716c81daa98e18a7f46.exe 11 PID 1716 wrote to memory of 1344 1716 9ec3eaae73c82ae5ec7824232d6c388b1a1893b543c46716c81daa98e18a7f46.exe 11 PID 1716 wrote to memory of 1344 1716 9ec3eaae73c82ae5ec7824232d6c388b1a1893b543c46716c81daa98e18a7f46.exe 11 PID 1716 wrote to memory of 1344 1716 9ec3eaae73c82ae5ec7824232d6c388b1a1893b543c46716c81daa98e18a7f46.exe 11 PID 1716 wrote to memory of 1344 1716 9ec3eaae73c82ae5ec7824232d6c388b1a1893b543c46716c81daa98e18a7f46.exe 11 PID 1716 wrote to memory of 1344 1716 9ec3eaae73c82ae5ec7824232d6c388b1a1893b543c46716c81daa98e18a7f46.exe 11 PID 1716 wrote to memory of 1344 1716 9ec3eaae73c82ae5ec7824232d6c388b1a1893b543c46716c81daa98e18a7f46.exe 11 PID 1716 wrote to memory of 1344 1716 9ec3eaae73c82ae5ec7824232d6c388b1a1893b543c46716c81daa98e18a7f46.exe 11 PID 1716 wrote to memory of 1344 1716 9ec3eaae73c82ae5ec7824232d6c388b1a1893b543c46716c81daa98e18a7f46.exe 11 PID 1716 wrote to memory of 1344 1716 9ec3eaae73c82ae5ec7824232d6c388b1a1893b543c46716c81daa98e18a7f46.exe 11 PID 1716 wrote to memory of 1344 1716 9ec3eaae73c82ae5ec7824232d6c388b1a1893b543c46716c81daa98e18a7f46.exe 11 PID 1716 wrote to memory of 1344 1716 9ec3eaae73c82ae5ec7824232d6c388b1a1893b543c46716c81daa98e18a7f46.exe 11 PID 1716 wrote to memory of 1344 1716 9ec3eaae73c82ae5ec7824232d6c388b1a1893b543c46716c81daa98e18a7f46.exe 11 PID 1716 wrote to memory of 1344 1716 9ec3eaae73c82ae5ec7824232d6c388b1a1893b543c46716c81daa98e18a7f46.exe 11 PID 1716 wrote to memory of 1344 1716 9ec3eaae73c82ae5ec7824232d6c388b1a1893b543c46716c81daa98e18a7f46.exe 11 PID 1716 wrote to memory of 1344 1716 9ec3eaae73c82ae5ec7824232d6c388b1a1893b543c46716c81daa98e18a7f46.exe 11 PID 1716 wrote to memory of 1344 1716 9ec3eaae73c82ae5ec7824232d6c388b1a1893b543c46716c81daa98e18a7f46.exe 11 PID 1716 wrote to memory of 1344 1716 9ec3eaae73c82ae5ec7824232d6c388b1a1893b543c46716c81daa98e18a7f46.exe 11 PID 1716 wrote to memory of 1344 1716 9ec3eaae73c82ae5ec7824232d6c388b1a1893b543c46716c81daa98e18a7f46.exe 11 PID 1716 wrote to memory of 1344 1716 9ec3eaae73c82ae5ec7824232d6c388b1a1893b543c46716c81daa98e18a7f46.exe 11 PID 1716 wrote to memory of 1344 1716 9ec3eaae73c82ae5ec7824232d6c388b1a1893b543c46716c81daa98e18a7f46.exe 11 PID 1716 wrote to memory of 1344 1716 9ec3eaae73c82ae5ec7824232d6c388b1a1893b543c46716c81daa98e18a7f46.exe 11 PID 1716 wrote to memory of 1344 1716 9ec3eaae73c82ae5ec7824232d6c388b1a1893b543c46716c81daa98e18a7f46.exe 11 PID 1716 wrote to memory of 1344 1716 9ec3eaae73c82ae5ec7824232d6c388b1a1893b543c46716c81daa98e18a7f46.exe 11 PID 1716 wrote to memory of 1344 1716 9ec3eaae73c82ae5ec7824232d6c388b1a1893b543c46716c81daa98e18a7f46.exe 11 PID 1716 wrote to memory of 1344 1716 9ec3eaae73c82ae5ec7824232d6c388b1a1893b543c46716c81daa98e18a7f46.exe 11 PID 1716 wrote to memory of 1344 1716 9ec3eaae73c82ae5ec7824232d6c388b1a1893b543c46716c81daa98e18a7f46.exe 11 PID 1716 wrote to memory of 1344 1716 9ec3eaae73c82ae5ec7824232d6c388b1a1893b543c46716c81daa98e18a7f46.exe 11 PID 1716 wrote to memory of 1344 1716 9ec3eaae73c82ae5ec7824232d6c388b1a1893b543c46716c81daa98e18a7f46.exe 11 PID 1716 wrote to memory of 1344 1716 9ec3eaae73c82ae5ec7824232d6c388b1a1893b543c46716c81daa98e18a7f46.exe 11 PID 1716 wrote to memory of 1344 1716 9ec3eaae73c82ae5ec7824232d6c388b1a1893b543c46716c81daa98e18a7f46.exe 11 PID 1716 wrote to memory of 1344 1716 9ec3eaae73c82ae5ec7824232d6c388b1a1893b543c46716c81daa98e18a7f46.exe 11 PID 1716 wrote to memory of 1344 1716 9ec3eaae73c82ae5ec7824232d6c388b1a1893b543c46716c81daa98e18a7f46.exe 11 PID 1716 wrote to memory of 1344 1716 9ec3eaae73c82ae5ec7824232d6c388b1a1893b543c46716c81daa98e18a7f46.exe 11 PID 1716 wrote to memory of 1344 1716 9ec3eaae73c82ae5ec7824232d6c388b1a1893b543c46716c81daa98e18a7f46.exe 11 PID 1716 wrote to memory of 1344 1716 9ec3eaae73c82ae5ec7824232d6c388b1a1893b543c46716c81daa98e18a7f46.exe 11 PID 1716 wrote to memory of 1344 1716 9ec3eaae73c82ae5ec7824232d6c388b1a1893b543c46716c81daa98e18a7f46.exe 11 PID 1716 wrote to memory of 1344 1716 9ec3eaae73c82ae5ec7824232d6c388b1a1893b543c46716c81daa98e18a7f46.exe 11 PID 1716 wrote to memory of 1344 1716 9ec3eaae73c82ae5ec7824232d6c388b1a1893b543c46716c81daa98e18a7f46.exe 11 PID 1716 wrote to memory of 1344 1716 9ec3eaae73c82ae5ec7824232d6c388b1a1893b543c46716c81daa98e18a7f46.exe 11 PID 1716 wrote to memory of 1344 1716 9ec3eaae73c82ae5ec7824232d6c388b1a1893b543c46716c81daa98e18a7f46.exe 11 PID 1716 wrote to memory of 1344 1716 9ec3eaae73c82ae5ec7824232d6c388b1a1893b543c46716c81daa98e18a7f46.exe 11 PID 1716 wrote to memory of 1344 1716 9ec3eaae73c82ae5ec7824232d6c388b1a1893b543c46716c81daa98e18a7f46.exe 11 PID 1716 wrote to memory of 1344 1716 9ec3eaae73c82ae5ec7824232d6c388b1a1893b543c46716c81daa98e18a7f46.exe 11 PID 1716 wrote to memory of 1344 1716 9ec3eaae73c82ae5ec7824232d6c388b1a1893b543c46716c81daa98e18a7f46.exe 11 PID 1716 wrote to memory of 1344 1716 9ec3eaae73c82ae5ec7824232d6c388b1a1893b543c46716c81daa98e18a7f46.exe 11
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1344
-
C:\Users\Admin\AppData\Local\Temp\9ec3eaae73c82ae5ec7824232d6c388b1a1893b543c46716c81daa98e18a7f46.exe"C:\Users\Admin\AppData\Local\Temp\9ec3eaae73c82ae5ec7824232d6c388b1a1893b543c46716c81daa98e18a7f46.exe"2⤵PID:1444
-
C:\Users\Admin\AppData\Local\Temp\9ec3eaae73c82ae5ec7824232d6c388b1a1893b543c46716c81daa98e18a7f46.exe9ec3eaae73c82ae5ec7824232d6c388b1a1893b543c46716c81daa98e18a7f46.exe3⤵PID:1088
-
-
C:\Users\Admin\AppData\Local\Temp\9ec3eaae73c82ae5ec7824232d6c388b1a1893b543c46716c81daa98e18a7f46.exe9ec3eaae73c82ae5ec7824232d6c388b1a1893b543c46716c81daa98e18a7f46.exe3⤵
- Adds policy Run key to start application
- Modifies Installed Components in the registry
- Adds Run key to start application
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
- Modifies Installed Components in the registry
PID:892
-
-
C:\Users\Admin\AppData\Local\Temp\9ec3eaae73c82ae5ec7824232d6c388b1a1893b543c46716c81daa98e18a7f46.exe"C:\Users\Admin\AppData\Local\Temp\9ec3eaae73c82ae5ec7824232d6c388b1a1893b543c46716c81daa98e18a7f46.exe"4⤵
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:856 -
C:\systim\windwos.exe"C:\systim\windwos.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:2012
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:1908
-
-
-
-
C:\systim\windwos.exewindwos.exe1⤵
- Executes dropped EXE
PID:1292
-
C:\systim\windwos.exewindwos.exe1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1444
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
229KB
MD59900c7eafe3b6bdf66a3adb9b23a357f
SHA1fafc6d804a987090d956321430f893b2dbd93c00
SHA2568aff1c1a37048ed6bb025a87ed82fad91c1633233f4bd03b0686c72aba39ed94
SHA5123c928fb74d5f21a5e574ec72aab4ade83ad8b2bfda7151630bd86c974395eafcf61db3e88165edd2ac1eceff6b86a7b84f101fc4d0de84f99995b68dbde04eea
-
Filesize
310KB
MD578f3514c55b4d72c47a0fb5c6e3e488b
SHA1c427be9654f956cdc30b8595491466f06c89d807
SHA2569ec3eaae73c82ae5ec7824232d6c388b1a1893b543c46716c81daa98e18a7f46
SHA512da5b79b20bcdd03886d8667d799cf46098d0315b82cd06bd76fcf7be2e00917c6aed4917ccd5283e6fd04785b7ef1f77b27f2fc5e8828950e1556711eb9f5ae9
-
Filesize
310KB
MD578f3514c55b4d72c47a0fb5c6e3e488b
SHA1c427be9654f956cdc30b8595491466f06c89d807
SHA2569ec3eaae73c82ae5ec7824232d6c388b1a1893b543c46716c81daa98e18a7f46
SHA512da5b79b20bcdd03886d8667d799cf46098d0315b82cd06bd76fcf7be2e00917c6aed4917ccd5283e6fd04785b7ef1f77b27f2fc5e8828950e1556711eb9f5ae9
-
Filesize
310KB
MD578f3514c55b4d72c47a0fb5c6e3e488b
SHA1c427be9654f956cdc30b8595491466f06c89d807
SHA2569ec3eaae73c82ae5ec7824232d6c388b1a1893b543c46716c81daa98e18a7f46
SHA512da5b79b20bcdd03886d8667d799cf46098d0315b82cd06bd76fcf7be2e00917c6aed4917ccd5283e6fd04785b7ef1f77b27f2fc5e8828950e1556711eb9f5ae9
-
Filesize
310KB
MD578f3514c55b4d72c47a0fb5c6e3e488b
SHA1c427be9654f956cdc30b8595491466f06c89d807
SHA2569ec3eaae73c82ae5ec7824232d6c388b1a1893b543c46716c81daa98e18a7f46
SHA512da5b79b20bcdd03886d8667d799cf46098d0315b82cd06bd76fcf7be2e00917c6aed4917ccd5283e6fd04785b7ef1f77b27f2fc5e8828950e1556711eb9f5ae9