Analysis

  • max time kernel
    151s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-12-2022 20:56

General

  • Target

    ae4f162271057efdc8b9b6b9c257e9a046ff775634e64570208748789ae66229.exe

  • Size

    788KB

  • MD5

    a40a9412af18bb74847a6bd4f5a74337

  • SHA1

    dd7382e9494a46a80f80f77840082b2c0cd15585

  • SHA256

    ae4f162271057efdc8b9b6b9c257e9a046ff775634e64570208748789ae66229

  • SHA512

    be13ffb71b05f7b7697896ed0f8a7672ac7477028be6c57d9d8520bbed1af35f26280931b8fa107db7e4728f89a001574f46ff121060207c42ff09898edb0348

  • SSDEEP

    12288:UttGK6yTjskwQIFtdEQ0t3qrluBGpM47u4nCC3u8GjmhfoI/I4I6cm1fSDf9xe0K:Od3SUDxB8csZcY

Malware Config

Extracted

Family

cybergate

Version

2.6

Botnet

victima

C2

albertiktn.no-ip.org:81

Mutex

***egbuiertbi***

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    WinDir

  • install_file

    svchost.exe

  • install_flag

    false

  • keylogger_enable_ftp

    false

  • message_box_caption

    texto da mensagem

  • message_box_title

    título da mensagem

  • password

    abcd1234

Signatures

  • CyberGate, Rebhip

    CyberGate is a lightweight remote administration tool with a wide array of functionalities.

  • UPX packed file 10 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Uses the VBS compiler for execution 1 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:2724
      • C:\Users\Admin\AppData\Local\Temp\ae4f162271057efdc8b9b6b9c257e9a046ff775634e64570208748789ae66229.exe
        "C:\Users\Admin\AppData\Local\Temp\ae4f162271057efdc8b9b6b9c257e9a046ff775634e64570208748789ae66229.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:4308
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
          C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
          3⤵
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:1084
          • C:\Windows\SysWOW64\explorer.exe
            explorer.exe
            4⤵
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of AdjustPrivilegeToken
            PID:396
            • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
              "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"
              5⤵
                PID:2348

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Execution

      Scripting

      1
      T1064

      Defense Evasion

      Scripting

      1
      T1064

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\XX--XX--XX.txt
        Filesize

        236KB

        MD5

        cb53e3180caf8ab556d9addd2d7213bf

        SHA1

        4ca356e05cae90f2e89b7bb422bd40ce6e150f94

        SHA256

        79025bb393a294673fbdd704abff04b303152711b8efcc43645af1d7de575413

        SHA512

        f13b1601a93f8c339a3d7e09a8ef4c2d96d7cf8f148a31acf28638e87bb634a84427a4eef16d96c8d7baede2a3381d035700e6f1668b59a3455b5d65740e087d

      • memory/396-145-0x0000000000000000-mapping.dmp
      • memory/396-149-0x0000000024080000-0x00000000240E2000-memory.dmp
        Filesize

        392KB

      • memory/396-154-0x0000000024080000-0x00000000240E2000-memory.dmp
        Filesize

        392KB

      • memory/396-153-0x0000000024080000-0x00000000240E2000-memory.dmp
        Filesize

        392KB

      • memory/1084-146-0x0000000024080000-0x00000000240E2000-memory.dmp
        Filesize

        392KB

      • memory/1084-139-0x0000000000400000-0x0000000000459000-memory.dmp
        Filesize

        356KB

      • memory/1084-134-0x0000000000400000-0x0000000000459000-memory.dmp
        Filesize

        356KB

      • memory/1084-141-0x0000000024010000-0x0000000024072000-memory.dmp
        Filesize

        392KB

      • memory/1084-137-0x0000000000400000-0x0000000000459000-memory.dmp
        Filesize

        356KB

      • memory/1084-150-0x0000000000400000-0x0000000000459000-memory.dmp
        Filesize

        356KB

      • memory/1084-133-0x0000000000000000-mapping.dmp
      • memory/1084-136-0x0000000000400000-0x0000000000459000-memory.dmp
        Filesize

        356KB

      • memory/2348-152-0x0000000000000000-mapping.dmp
      • memory/4308-132-0x0000000075510000-0x0000000075AC1000-memory.dmp
        Filesize

        5.7MB

      • memory/4308-138-0x0000000075510000-0x0000000075AC1000-memory.dmp
        Filesize

        5.7MB