Analysis
-
max time kernel
163s -
max time network
184s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
04/12/2022, 03:04
Static task
static1
Behavioral task
behavioral1
Sample
d71511f5bdf3650aab13257a79eb9e671cc6899a16c5a80f7a25ff493d4b3a14.exe
Resource
win7-20220901-en
General
-
Target
d71511f5bdf3650aab13257a79eb9e671cc6899a16c5a80f7a25ff493d4b3a14.exe
-
Size
724KB
-
MD5
44bc01c744de98e18361fe106b1c9dff
-
SHA1
c3ac3d184c8e17e95e10aa1dd0d708030b56b16d
-
SHA256
d71511f5bdf3650aab13257a79eb9e671cc6899a16c5a80f7a25ff493d4b3a14
-
SHA512
317ee338393d35396fefb29ea3cc853ea913586892dbbfa055baa219656686975552395e31a6721c964a76fb9ba798fe3eca6422127e7dc3c01c107b02475f24
-
SSDEEP
12288:MRVoAWJ66wzAHai3SvL6ZruLRn0wofWFZIk9IF3/cYf/qZB6vP:qCXRjakST61Q0bWztIF30kqPyP
Malware Config
Extracted
cybergate
v1.07.5
remote
lesmona.no-ip.biz:1324
03J6BLT0A17F86
-
enable_keylogger
false
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
Winlog
-
install_file
Winlogon.exe
-
install_flag
false
-
keylogger_enable_ftp
false
-
message_box_title
memory error
-
password
lesmona
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 4460 svchost.exe 2572 svchost.exe 2940 svchost.exe -
resource yara_rule behavioral2/memory/4460-142-0x0000000010410000-0x0000000010475000-memory.dmp upx behavioral2/memory/4460-148-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral2/memory/2572-152-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral2/memory/2572-154-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral2/memory/2572-157-0x0000000010480000-0x00000000104E5000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation svchost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\System Service = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Service.exe" d71511f5bdf3650aab13257a79eb9e671cc6899a16c5a80f7a25ff493d4b3a14.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1992 set thread context of 4460 1992 d71511f5bdf3650aab13257a79eb9e671cc6899a16c5a80f7a25ff493d4b3a14.exe 86 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeBackupPrivilege 2572 svchost.exe Token: SeRestorePrivilege 2572 svchost.exe Token: SeDebugPrivilege 2572 svchost.exe Token: SeDebugPrivilege 2572 svchost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1992 wrote to memory of 4460 1992 d71511f5bdf3650aab13257a79eb9e671cc6899a16c5a80f7a25ff493d4b3a14.exe 86 PID 1992 wrote to memory of 4460 1992 d71511f5bdf3650aab13257a79eb9e671cc6899a16c5a80f7a25ff493d4b3a14.exe 86 PID 1992 wrote to memory of 4460 1992 d71511f5bdf3650aab13257a79eb9e671cc6899a16c5a80f7a25ff493d4b3a14.exe 86 PID 1992 wrote to memory of 4460 1992 d71511f5bdf3650aab13257a79eb9e671cc6899a16c5a80f7a25ff493d4b3a14.exe 86 PID 1992 wrote to memory of 4460 1992 d71511f5bdf3650aab13257a79eb9e671cc6899a16c5a80f7a25ff493d4b3a14.exe 86 PID 1992 wrote to memory of 4460 1992 d71511f5bdf3650aab13257a79eb9e671cc6899a16c5a80f7a25ff493d4b3a14.exe 86 PID 1992 wrote to memory of 4460 1992 d71511f5bdf3650aab13257a79eb9e671cc6899a16c5a80f7a25ff493d4b3a14.exe 86 PID 1992 wrote to memory of 4460 1992 d71511f5bdf3650aab13257a79eb9e671cc6899a16c5a80f7a25ff493d4b3a14.exe 86 PID 1992 wrote to memory of 4460 1992 d71511f5bdf3650aab13257a79eb9e671cc6899a16c5a80f7a25ff493d4b3a14.exe 86 PID 1992 wrote to memory of 4460 1992 d71511f5bdf3650aab13257a79eb9e671cc6899a16c5a80f7a25ff493d4b3a14.exe 86 PID 1992 wrote to memory of 4460 1992 d71511f5bdf3650aab13257a79eb9e671cc6899a16c5a80f7a25ff493d4b3a14.exe 86 PID 1992 wrote to memory of 4460 1992 d71511f5bdf3650aab13257a79eb9e671cc6899a16c5a80f7a25ff493d4b3a14.exe 86 PID 1992 wrote to memory of 4460 1992 d71511f5bdf3650aab13257a79eb9e671cc6899a16c5a80f7a25ff493d4b3a14.exe 86 PID 4460 wrote to memory of 536 4460 svchost.exe 88 PID 4460 wrote to memory of 536 4460 svchost.exe 88 PID 4460 wrote to memory of 536 4460 svchost.exe 88 PID 4460 wrote to memory of 536 4460 svchost.exe 88 PID 4460 wrote to memory of 536 4460 svchost.exe 88 PID 4460 wrote to memory of 536 4460 svchost.exe 88 PID 4460 wrote to memory of 536 4460 svchost.exe 88 PID 4460 wrote to memory of 536 4460 svchost.exe 88 PID 4460 wrote to memory of 536 4460 svchost.exe 88 PID 4460 wrote to memory of 536 4460 svchost.exe 88 PID 4460 wrote to memory of 536 4460 svchost.exe 88 PID 4460 wrote to memory of 536 4460 svchost.exe 88 PID 4460 wrote to memory of 536 4460 svchost.exe 88 PID 4460 wrote to memory of 536 4460 svchost.exe 88 PID 4460 wrote to memory of 536 4460 svchost.exe 88 PID 4460 wrote to memory of 536 4460 svchost.exe 88 PID 4460 wrote to memory of 536 4460 svchost.exe 88 PID 4460 wrote to memory of 536 4460 svchost.exe 88 PID 4460 wrote to memory of 536 4460 svchost.exe 88 PID 4460 wrote to memory of 536 4460 svchost.exe 88 PID 4460 wrote to memory of 536 4460 svchost.exe 88 PID 4460 wrote to memory of 536 4460 svchost.exe 88 PID 4460 wrote to memory of 536 4460 svchost.exe 88 PID 4460 wrote to memory of 536 4460 svchost.exe 88 PID 4460 wrote to memory of 536 4460 svchost.exe 88 PID 4460 wrote to memory of 536 4460 svchost.exe 88 PID 4460 wrote to memory of 536 4460 svchost.exe 88 PID 4460 wrote to memory of 536 4460 svchost.exe 88 PID 4460 wrote to memory of 536 4460 svchost.exe 88 PID 4460 wrote to memory of 536 4460 svchost.exe 88 PID 4460 wrote to memory of 536 4460 svchost.exe 88 PID 4460 wrote to memory of 536 4460 svchost.exe 88 PID 4460 wrote to memory of 536 4460 svchost.exe 88 PID 4460 wrote to memory of 536 4460 svchost.exe 88 PID 4460 wrote to memory of 536 4460 svchost.exe 88 PID 4460 wrote to memory of 536 4460 svchost.exe 88 PID 4460 wrote to memory of 536 4460 svchost.exe 88 PID 4460 wrote to memory of 536 4460 svchost.exe 88 PID 4460 wrote to memory of 536 4460 svchost.exe 88 PID 4460 wrote to memory of 536 4460 svchost.exe 88 PID 4460 wrote to memory of 536 4460 svchost.exe 88 PID 4460 wrote to memory of 536 4460 svchost.exe 88 PID 4460 wrote to memory of 536 4460 svchost.exe 88 PID 4460 wrote to memory of 536 4460 svchost.exe 88 PID 4460 wrote to memory of 536 4460 svchost.exe 88 PID 4460 wrote to memory of 536 4460 svchost.exe 88 PID 4460 wrote to memory of 536 4460 svchost.exe 88 PID 4460 wrote to memory of 536 4460 svchost.exe 88 PID 4460 wrote to memory of 536 4460 svchost.exe 88 PID 4460 wrote to memory of 536 4460 svchost.exe 88 PID 4460 wrote to memory of 536 4460 svchost.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\d71511f5bdf3650aab13257a79eb9e671cc6899a16c5a80f7a25ff493d4b3a14.exe"C:\Users\Admin\AppData\Local\Temp\d71511f5bdf3650aab13257a79eb9e671cc6899a16c5a80f7a25ff493d4b3a14.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Users\Admin\AppData\Local\Temp\svchost.exeC:\Users\Admin\AppData\Local\Temp\svchost.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:536
-
-
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"3⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
PID:2572 -
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"4⤵
- Executes dropped EXE
PID:2940
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD52fadb52d6e038f8b55aa90fa6049e4cd
SHA10d2cf235a05d70190b3f5b9b4f014500bc659c90
SHA2567ae41c44fc0e29c058fd4c47d3f2f7bacac6856a40bf844cd188452eb1e53c4d
SHA5128d406c852ca4569d5b08f23eea4a8f92da1791be484f4433c1cb96b5b5c674ed27ea9352adec35e19f6d333029272c94098f98dae1e2fd097e90ecf41d2f1892
-
Filesize
1.1MB
MD5d881de17aa8f2e2c08cbb7b265f928f9
SHA108936aebc87decf0af6e8eada191062b5e65ac2a
SHA256b3a37093609f9a20ad60b85a9fa9de2ba674cba9b5bd687729440c70ba619ca0
SHA5125f23bfb1b8740247b36ed0ab741738c7d4c949736129e767213e321607d1ccd3e3a8428e4ba44bd28a275b5e3f6206285b1a522514b7ef7ea5e698d90a713d34
-
Filesize
1.1MB
MD5d881de17aa8f2e2c08cbb7b265f928f9
SHA108936aebc87decf0af6e8eada191062b5e65ac2a
SHA256b3a37093609f9a20ad60b85a9fa9de2ba674cba9b5bd687729440c70ba619ca0
SHA5125f23bfb1b8740247b36ed0ab741738c7d4c949736129e767213e321607d1ccd3e3a8428e4ba44bd28a275b5e3f6206285b1a522514b7ef7ea5e698d90a713d34
-
Filesize
1.1MB
MD5d881de17aa8f2e2c08cbb7b265f928f9
SHA108936aebc87decf0af6e8eada191062b5e65ac2a
SHA256b3a37093609f9a20ad60b85a9fa9de2ba674cba9b5bd687729440c70ba619ca0
SHA5125f23bfb1b8740247b36ed0ab741738c7d4c949736129e767213e321607d1ccd3e3a8428e4ba44bd28a275b5e3f6206285b1a522514b7ef7ea5e698d90a713d34
-
Filesize
1.1MB
MD5d881de17aa8f2e2c08cbb7b265f928f9
SHA108936aebc87decf0af6e8eada191062b5e65ac2a
SHA256b3a37093609f9a20ad60b85a9fa9de2ba674cba9b5bd687729440c70ba619ca0
SHA5125f23bfb1b8740247b36ed0ab741738c7d4c949736129e767213e321607d1ccd3e3a8428e4ba44bd28a275b5e3f6206285b1a522514b7ef7ea5e698d90a713d34