Analysis
-
max time kernel
187s -
max time network
193s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
05/12/2022, 15:42
Static task
static1
Behavioral task
behavioral1
Sample
1a6cac274ff9b751f141dda173209b9c52f9eb1141d4cd712919050fceb805d4.exe
Resource
win7-20220812-en
General
-
Target
1a6cac274ff9b751f141dda173209b9c52f9eb1141d4cd712919050fceb805d4.exe
-
Size
972KB
-
MD5
0019a6892f759b7fe99190f09e0a53ac
-
SHA1
8e0b0ed696443ca197a663dbc4e188646f0c82c3
-
SHA256
1a6cac274ff9b751f141dda173209b9c52f9eb1141d4cd712919050fceb805d4
-
SHA512
1abc4dc883f81075e061ceb2e1255038dca2335f730a662a27c6aed8ebc191f8a125bfebe0651cc4a8d1214a093af21f84a75c850b03c899818a191a8b5dd885
-
SSDEEP
12288:da2ghIns7Dsw1z60yeyKT3Kr/w3jcs5ET4D2WPuuEPBZMZ95fHr6ojUqZ5OLQVPK:dy6szWrIjwUD5y5WLwMRttg7EOOuH
Malware Config
Extracted
cybergate
v1.03.0
wessel234
wessel234.zapto.org:80
5E0QG1FI732DK0
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
WinDir
-
install_file
Svchost.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
fcassend1
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Signatures
-
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\WinDir\\Svchost.exe" vbc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run vbc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\WinDir\\Svchost.exe" vbc.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run vbc.exe -
Executes dropped EXE 2 IoCs
pid Process 1340 Svchost.exe 4852 Svchost.exe -
Modifies Installed Components in the registry 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{0C02F356-48CE-8T77-O7XA-42Q38K1FS46E} vbc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0C02F356-48CE-8T77-O7XA-42Q38K1FS46E}\StubPath = "C:\\Windows\\system32\\WinDir\\Svchost.exe Restart" vbc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{0C02F356-48CE-8T77-O7XA-42Q38K1FS46E} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0C02F356-48CE-8T77-O7XA-42Q38K1FS46E}\StubPath = "C:\\Windows\\system32\\WinDir\\Svchost.exe" explorer.exe -
resource yara_rule behavioral2/memory/2136-141-0x0000000024010000-0x0000000024071000-memory.dmp upx behavioral2/memory/2136-146-0x0000000024080000-0x00000000240E1000-memory.dmp upx behavioral2/memory/4432-149-0x0000000024080000-0x00000000240E1000-memory.dmp upx behavioral2/memory/4432-152-0x0000000024080000-0x00000000240E1000-memory.dmp upx behavioral2/memory/2136-154-0x00000000240F0000-0x0000000024151000-memory.dmp upx behavioral2/memory/2136-159-0x0000000024160000-0x00000000241C1000-memory.dmp upx behavioral2/memory/3592-162-0x0000000024160000-0x00000000241C1000-memory.dmp upx behavioral2/memory/3592-166-0x0000000024160000-0x00000000241C1000-memory.dmp upx behavioral2/memory/3592-169-0x0000000024160000-0x00000000241C1000-memory.dmp upx -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Windows\CurrentVersion\Run vbc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\system32\\WinDir\\Svchost.exe" vbc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\1Hack = "C:\\Users\\Admin\\AppData\\Roaming\\1a6cac274ff9b751f141dda173209b9c52f9eb1141d4cd712919050fceb805d4.exe" 1a6cac274ff9b751f141dda173209b9c52f9eb1141d4cd712919050fceb805d4.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Svchost = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1a6cac274ff9b751f141dda173209b9c52f9eb1141d4cd712919050fceb805d4.exe" 1a6cac274ff9b751f141dda173209b9c52f9eb1141d4cd712919050fceb805d4.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run vbc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\system32\\WinDir\\Svchost.exe" vbc.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\WinDir\Svchost.exe vbc.exe File opened for modification C:\Windows\SysWOW64\WinDir\Svchost.exe vbc.exe File opened for modification C:\Windows\SysWOW64\WinDir\ vbc.exe File created C:\Windows\SysWOW64\WinDir\Svchost.exe vbc.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3208 set thread context of 2136 3208 1a6cac274ff9b751f141dda173209b9c52f9eb1141d4cd712919050fceb805d4.exe 83 -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ vbc.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 3208 1a6cac274ff9b751f141dda173209b9c52f9eb1141d4cd712919050fceb805d4.exe 2136 vbc.exe 2136 vbc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3592 vbc.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3208 1a6cac274ff9b751f141dda173209b9c52f9eb1141d4cd712919050fceb805d4.exe Token: SeDebugPrivilege 3592 vbc.exe Token: SeDebugPrivilege 3592 vbc.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2136 vbc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3208 wrote to memory of 2136 3208 1a6cac274ff9b751f141dda173209b9c52f9eb1141d4cd712919050fceb805d4.exe 83 PID 3208 wrote to memory of 2136 3208 1a6cac274ff9b751f141dda173209b9c52f9eb1141d4cd712919050fceb805d4.exe 83 PID 3208 wrote to memory of 2136 3208 1a6cac274ff9b751f141dda173209b9c52f9eb1141d4cd712919050fceb805d4.exe 83 PID 3208 wrote to memory of 2136 3208 1a6cac274ff9b751f141dda173209b9c52f9eb1141d4cd712919050fceb805d4.exe 83 PID 3208 wrote to memory of 2136 3208 1a6cac274ff9b751f141dda173209b9c52f9eb1141d4cd712919050fceb805d4.exe 83 PID 3208 wrote to memory of 2136 3208 1a6cac274ff9b751f141dda173209b9c52f9eb1141d4cd712919050fceb805d4.exe 83 PID 3208 wrote to memory of 2136 3208 1a6cac274ff9b751f141dda173209b9c52f9eb1141d4cd712919050fceb805d4.exe 83 PID 3208 wrote to memory of 2136 3208 1a6cac274ff9b751f141dda173209b9c52f9eb1141d4cd712919050fceb805d4.exe 83 PID 3208 wrote to memory of 2136 3208 1a6cac274ff9b751f141dda173209b9c52f9eb1141d4cd712919050fceb805d4.exe 83 PID 3208 wrote to memory of 2136 3208 1a6cac274ff9b751f141dda173209b9c52f9eb1141d4cd712919050fceb805d4.exe 83 PID 3208 wrote to memory of 2136 3208 1a6cac274ff9b751f141dda173209b9c52f9eb1141d4cd712919050fceb805d4.exe 83 PID 3208 wrote to memory of 2136 3208 1a6cac274ff9b751f141dda173209b9c52f9eb1141d4cd712919050fceb805d4.exe 83 PID 3208 wrote to memory of 2136 3208 1a6cac274ff9b751f141dda173209b9c52f9eb1141d4cd712919050fceb805d4.exe 83 PID 2136 wrote to memory of 372 2136 vbc.exe 41 PID 2136 wrote to memory of 372 2136 vbc.exe 41 PID 2136 wrote to memory of 372 2136 vbc.exe 41 PID 2136 wrote to memory of 372 2136 vbc.exe 41 PID 2136 wrote to memory of 372 2136 vbc.exe 41 PID 2136 wrote to memory of 372 2136 vbc.exe 41 PID 2136 wrote to memory of 372 2136 vbc.exe 41 PID 2136 wrote to memory of 372 2136 vbc.exe 41 PID 2136 wrote to memory of 372 2136 vbc.exe 41 PID 2136 wrote to memory of 372 2136 vbc.exe 41 PID 2136 wrote to memory of 372 2136 vbc.exe 41 PID 2136 wrote to memory of 372 2136 vbc.exe 41 PID 2136 wrote to memory of 372 2136 vbc.exe 41 PID 2136 wrote to memory of 372 2136 vbc.exe 41 PID 2136 wrote to memory of 372 2136 vbc.exe 41 PID 2136 wrote to memory of 372 2136 vbc.exe 41 PID 2136 wrote to memory of 372 2136 vbc.exe 41 PID 2136 wrote to memory of 372 2136 vbc.exe 41 PID 2136 wrote to memory of 372 2136 vbc.exe 41 PID 2136 wrote to memory of 372 2136 vbc.exe 41 PID 2136 wrote to memory of 372 2136 vbc.exe 41 PID 2136 wrote to memory of 372 2136 vbc.exe 41 PID 2136 wrote to memory of 372 2136 vbc.exe 41 PID 2136 wrote to memory of 372 2136 vbc.exe 41 PID 2136 wrote to memory of 372 2136 vbc.exe 41 PID 2136 wrote to memory of 372 2136 vbc.exe 41 PID 2136 wrote to memory of 372 2136 vbc.exe 41 PID 2136 wrote to memory of 372 2136 vbc.exe 41 PID 2136 wrote to memory of 372 2136 vbc.exe 41 PID 2136 wrote to memory of 372 2136 vbc.exe 41 PID 2136 wrote to memory of 372 2136 vbc.exe 41 PID 2136 wrote to memory of 372 2136 vbc.exe 41 PID 2136 wrote to memory of 372 2136 vbc.exe 41 PID 2136 wrote to memory of 372 2136 vbc.exe 41 PID 2136 wrote to memory of 372 2136 vbc.exe 41 PID 2136 wrote to memory of 372 2136 vbc.exe 41 PID 2136 wrote to memory of 372 2136 vbc.exe 41 PID 2136 wrote to memory of 372 2136 vbc.exe 41 PID 2136 wrote to memory of 372 2136 vbc.exe 41 PID 2136 wrote to memory of 372 2136 vbc.exe 41 PID 2136 wrote to memory of 372 2136 vbc.exe 41 PID 2136 wrote to memory of 372 2136 vbc.exe 41 PID 2136 wrote to memory of 372 2136 vbc.exe 41 PID 2136 wrote to memory of 372 2136 vbc.exe 41 PID 2136 wrote to memory of 372 2136 vbc.exe 41 PID 2136 wrote to memory of 372 2136 vbc.exe 41 PID 2136 wrote to memory of 372 2136 vbc.exe 41 PID 2136 wrote to memory of 372 2136 vbc.exe 41 PID 2136 wrote to memory of 372 2136 vbc.exe 41 PID 2136 wrote to memory of 372 2136 vbc.exe 41 PID 2136 wrote to memory of 372 2136 vbc.exe 41
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:372
-
C:\Users\Admin\AppData\Local\Temp\1a6cac274ff9b751f141dda173209b9c52f9eb1141d4cd712919050fceb805d4.exe"C:\Users\Admin\AppData\Local\Temp\1a6cac274ff9b751f141dda173209b9c52f9eb1141d4cd712919050fceb805d4.exe"2⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3208 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵
- Adds policy Run key to start application
- Modifies Installed Components in the registry
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
- Modifies Installed Components in the registry
PID:4432 -
C:\Windows\SysWOW64\WinDir\Svchost.exe"C:\Windows\system32\WinDir\Svchost.exe"5⤵
- Executes dropped EXE
PID:1340
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:4048
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"4⤵
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:3592 -
C:\Windows\SysWOW64\WinDir\Svchost.exe"C:\Windows\system32\WinDir\Svchost.exe"5⤵
- Executes dropped EXE
PID:4852
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
221KB
MD5ac7486137d9ef94f7df92570e4be0327
SHA10b2dccf117d72f634f2ee8724e2669c1213b6533
SHA256d96c44531b404044dfd74476c04772cb3fb6905b0f9381e657c6a3b851bc89a4
SHA5125fe85f6c33eff058fbc07fa7a2f164b0f10a64911fab2f0dd8d4d9989806f12fd21dc3454aacc2ec7ae4a4a6aaafc9a857848dcc4d90449b7097f93990e84b17
-
Filesize
1.1MB
MD5d881de17aa8f2e2c08cbb7b265f928f9
SHA108936aebc87decf0af6e8eada191062b5e65ac2a
SHA256b3a37093609f9a20ad60b85a9fa9de2ba674cba9b5bd687729440c70ba619ca0
SHA5125f23bfb1b8740247b36ed0ab741738c7d4c949736129e767213e321607d1ccd3e3a8428e4ba44bd28a275b5e3f6206285b1a522514b7ef7ea5e698d90a713d34
-
Filesize
1.1MB
MD5d881de17aa8f2e2c08cbb7b265f928f9
SHA108936aebc87decf0af6e8eada191062b5e65ac2a
SHA256b3a37093609f9a20ad60b85a9fa9de2ba674cba9b5bd687729440c70ba619ca0
SHA5125f23bfb1b8740247b36ed0ab741738c7d4c949736129e767213e321607d1ccd3e3a8428e4ba44bd28a275b5e3f6206285b1a522514b7ef7ea5e698d90a713d34
-
Filesize
1.1MB
MD5d881de17aa8f2e2c08cbb7b265f928f9
SHA108936aebc87decf0af6e8eada191062b5e65ac2a
SHA256b3a37093609f9a20ad60b85a9fa9de2ba674cba9b5bd687729440c70ba619ca0
SHA5125f23bfb1b8740247b36ed0ab741738c7d4c949736129e767213e321607d1ccd3e3a8428e4ba44bd28a275b5e3f6206285b1a522514b7ef7ea5e698d90a713d34