Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    253s
  • max time network
    336s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    06/12/2022, 07:34 UTC

General

  • Target

    e2aaf2355bd00dd156caf87118892fd613aa5a1b09de7fc4444d5af4a5d6b1a5.exe

  • Size

    1.5MB

  • MD5

    3f78d6f43146ed45f14ce8834468c5f0

  • SHA1

    f76ee4856301c54d0a47a77570ca3ad344c3dada

  • SHA256

    e2aaf2355bd00dd156caf87118892fd613aa5a1b09de7fc4444d5af4a5d6b1a5

  • SHA512

    0fa8e169ce4fe935300c575a451ec6bbc98d56045f36d2a5426ce29c998c76470831f05215f437ef3de92c1afa67b1bfad331f0a85b17b90f07c842f2e17fb39

  • SSDEEP

    24576:8xMq0R9RYSelkG1IORAHRXlXHMSCGv+UX4+btlvrimK:RxR9RYNloHRXlcOvfxbtlDim

Malware Config

Extracted

Family

cybergate

Version

v1.11.0 - Public Version

Botnet

1

C2

justme.dyndns-server.com:998

Mutex

4860IWIX3LYF24

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    firefox

  • install_file

    firefox.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    2

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Signatures

  • CyberGate, Rebhip

    CyberGate is a lightweight remote administration tool with a wide array of functionalities.

  • Adds policy Run key to start application 2 TTPs 4 IoCs
  • Modifies Installed Components in the registry 2 TTPs 4 IoCs
  • UPX packed file 9 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops startup file 3 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 5 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1260
      • C:\Users\Admin\AppData\Local\Temp\e2aaf2355bd00dd156caf87118892fd613aa5a1b09de7fc4444d5af4a5d6b1a5.exe
        "C:\Users\Admin\AppData\Local\Temp\e2aaf2355bd00dd156caf87118892fd613aa5a1b09de7fc4444d5af4a5d6b1a5.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:828
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
          C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
          3⤵
          • Adds policy Run key to start application
          • Modifies Installed Components in the registry
          • Adds Run key to start application
          • Drops file in Program Files directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:976
          • C:\Windows\SysWOW64\explorer.exe
            explorer.exe
            4⤵
            • Modifies Installed Components in the registry
            • Suspicious use of AdjustPrivilegeToken
            PID:848
          • C:\Windows\SysWOW64\explorer.exe
            explorer.exe
            4⤵
            • Drops startup file
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of AdjustPrivilegeToken
            PID:1936
    • C:\Windows\SysWOW64\DllHost.exe
      C:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}
      1⤵
      • Suspicious use of FindShellTrayWindow
      PID:924

    Network

    • flag-unknown
      DNS
      justme.dyndns-server.com
      explorer.exe
      Remote address:
      8.8.8.8:53
      Request
      justme.dyndns-server.com
      IN A
      Response
    No results found
    • 8.8.8.8:53
      justme.dyndns-server.com
      dns
      explorer.exe
      70 B
      131 B
      1
      1

      DNS Request

      justme.dyndns-server.com

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\firefox\firefox.exe

      Filesize

      1.1MB

      MD5

      34aa912defa18c2c129f1e09d75c1d7e

      SHA1

      9c3046324657505a30ecd9b1fdb46c05bde7d470

      SHA256

      6df94b7fa33f1b87142adc39b3db0613fc520d9e7a5fd6a5301dd7f51f8d0386

      SHA512

      d1ea9368f5d7166180612fd763c87afb647d088498887961f5e7fb0a10f4a808bd5928e8a3666d70ff794093c51ecca8816f75dd47652fd4eb23dce7f9aa1f98

    • C:\Users\Admin\AppData\Local\Temp\Admin2.txt

      Filesize

      238KB

      MD5

      684fd57f87bf17971965d5f3cfaf46cb

      SHA1

      9c01d71d980d0a921e5a121b5dfb4bc25e0173d6

      SHA256

      138d2ef003bf4c2b9437cfd492c8011b713ecf0e56fafd2df58fa5b35fd401b9

      SHA512

      622967477b01ae327d062cc46b2ec17b325aef559d1e82263df644f5838c720a456f34894b3688a5bce9e0df9ebf5da8d81663fd2279be20b921ea8adcea2662

    • C:\Users\Admin\AppData\Roaming\1.jpg

      Filesize

      13KB

      MD5

      3b29c923da1b1fb338f3b84b0cd3641d

      SHA1

      8579ba6b8c53767a24917274991379181a8616a3

      SHA256

      4beb2fdcf822511528a1b4cecb620a4dafbf75c21d7d7b8c784b7bfbbcd4839e

      SHA512

      d2ae58a3b4a658df2f78bfc4664cbfb424909086b932ae56a5b0c81004ef614f8be91bd3ec6cb99b7d972fb3c8582b75326263b4ddb79f116c6e324ac9538fda

    • C:\Users\Admin\AppData\Roaming\2.jpg

      Filesize

      14KB

      MD5

      3c070565dc2fb1a51c3996c77d00e5b3

      SHA1

      295d01cb6ecf84a4e8557b6203f26ac275ef1814

      SHA256

      4a1dcf17874854489ae22f71c7ec826fe3410ebd3f7c5851670fe93d09073eec

      SHA512

      0687a2a7961901951d630a80fb500a227544f85975a6c83c70cf368ee369edbdf7c0ee0b8eff21e5714a3c4b5fb4e2fc13813b4fc30bd7fc6fc1c93120b22c3d

    • C:\Users\Admin\AppData\Roaming\5.jpg

      Filesize

      233KB

      MD5

      860be40e11304d627de55b4ab8829e20

      SHA1

      468135c06ccf3c3fabfe213700807a30af6862fc

      SHA256

      f6f54d473ec78bf322d15050bab5af379e55e64bdc8fcc9e007fa1f68dfa915d

      SHA512

      71b00187aafb8eed3e85768bc5d2579a15af277db8a37aca88051a1126564fff73fe88806c42180d3a043ca553d9c5975a2656595ce044178a28f4bbdbad09e7

    • C:\Users\Admin\AppData\Roaming\6.jpg

      Filesize

      309KB

      MD5

      bc4212c863b74ece21ca446ac5382441

      SHA1

      4790bab1dddb87d4cf824f65fcfd66a9f562e9fe

      SHA256

      ff88503178e47193bc190da4b38bf8581146d05202402c9230f7734579ab8289

      SHA512

      4ecaa893a7ae6a9bb75b314c5a8f5b2350ca74b60314b9a43793a1d23c18a258c7861349f65e26a44c74696d66287d6e5428a3f275e179af227f82ac3169261d

    • memory/828-55-0x0000000074900000-0x0000000074EAB000-memory.dmp

      Filesize

      5.7MB

    • memory/828-60-0x0000000074900000-0x0000000074EAB000-memory.dmp

      Filesize

      5.7MB

    • memory/828-54-0x0000000075491000-0x0000000075493000-memory.dmp

      Filesize

      8KB

    • memory/848-97-0x0000000010490000-0x0000000010502000-memory.dmp

      Filesize

      456KB

    • memory/848-79-0x0000000010490000-0x0000000010502000-memory.dmp

      Filesize

      456KB

    • memory/848-82-0x0000000010490000-0x0000000010502000-memory.dmp

      Filesize

      456KB

    • memory/848-73-0x0000000074D41000-0x0000000074D43000-memory.dmp

      Filesize

      8KB

    • memory/976-62-0x0000000000400000-0x000000000044C000-memory.dmp

      Filesize

      304KB

    • memory/976-59-0x0000000000400000-0x000000000044C000-memory.dmp

      Filesize

      304KB

    • memory/976-72-0x0000000000400000-0x000000000044C000-memory.dmp

      Filesize

      304KB

    • memory/976-74-0x0000000010490000-0x0000000010502000-memory.dmp

      Filesize

      456KB

    • memory/976-87-0x0000000010510000-0x0000000010582000-memory.dmp

      Filesize

      456KB

    • memory/976-57-0x0000000000400000-0x000000000044C000-memory.dmp

      Filesize

      304KB

    • memory/976-94-0x0000000000400000-0x000000000044C000-memory.dmp

      Filesize

      304KB

    • memory/976-64-0x0000000010410000-0x0000000010482000-memory.dmp

      Filesize

      456KB

    • memory/976-61-0x0000000000400000-0x000000000044C000-memory.dmp

      Filesize

      304KB

    • memory/1260-67-0x0000000010410000-0x0000000010482000-memory.dmp

      Filesize

      456KB

    • memory/1936-93-0x0000000010510000-0x0000000010582000-memory.dmp

      Filesize

      456KB

    • memory/1936-92-0x0000000010510000-0x0000000010582000-memory.dmp

      Filesize

      456KB

    • memory/1936-100-0x0000000010510000-0x0000000010582000-memory.dmp

      Filesize

      456KB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.