Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 22:16
Static task
static1
Behavioral task
behavioral1
Sample
3f6c54a9f85391e4dd50846190189032.exe
Resource
win7-20231215-en
General
-
Target
3f6c54a9f85391e4dd50846190189032.exe
-
Size
896KB
-
MD5
3f6c54a9f85391e4dd50846190189032
-
SHA1
686e909d5fb30943a1b34cc6719e2ef76efe2e99
-
SHA256
7df42715e9ac3291391fee47cdd2d17953f08b446b115a20057c6f5597d04c7a
-
SHA512
9394b47b27145659108d8ecc60df2b74a1340e66b267de666c4f4fc0ad60c2844a5c88e10691fd5b548b19ff92f33923f6735df1375a88edcb8f19f3c2ae581f
-
SSDEEP
24576:U+9jpSIR/998CGPMAkqAyt9kkQ1bNWxMbG:DjQBDAyt9ktUn
Malware Config
Extracted
cybergate
v1.05.1
remote
127.0.0.1:81
fenerli1907.no-ip.biz:81
6HTML1R8472C5Q
-
enable_keylogger
true
-
enable_message_box
true
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
install
-
install_file
server.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
filevw61.OCX Error
-
message_box_title
Error
-
password
1234
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Signatures
-
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run Crypted.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\install\\server.exe" Crypted.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run Crypted.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\install\\server.exe" Crypted.exe -
Modifies Installed Components in the registry 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{3J8WYFF1-W284-8QF4-BA65-4664XG65L25P} Crypted.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3J8WYFF1-W284-8QF4-BA65-4664XG65L25P}\StubPath = "C:\\Windows\\install\\server.exe Restart" Crypted.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{3J8WYFF1-W284-8QF4-BA65-4664XG65L25P} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3J8WYFF1-W284-8QF4-BA65-4664XG65L25P}\StubPath = "C:\\Windows\\install\\server.exe" explorer.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 3f6c54a9f85391e4dd50846190189032.exe -
Executes dropped EXE 2 IoCs
pid Process 2796 Crypted.exe 4760 server.exe -
resource yara_rule behavioral2/files/0x000700000002321e-13.dat upx behavioral2/memory/2796-16-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral2/memory/2796-23-0x0000000010410000-0x0000000010471000-memory.dmp upx behavioral2/memory/2796-83-0x0000000010480000-0x00000000104E1000-memory.dmp upx behavioral2/memory/864-88-0x0000000010480000-0x00000000104E1000-memory.dmp upx behavioral2/memory/864-87-0x0000000010480000-0x00000000104E1000-memory.dmp upx behavioral2/memory/4408-153-0x00000000104F0000-0x0000000010551000-memory.dmp upx behavioral2/memory/2796-155-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral2/memory/4760-175-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral2/memory/864-396-0x0000000010480000-0x00000000104E1000-memory.dmp upx behavioral2/memory/4408-400-0x00000000104F0000-0x0000000010551000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\install\\server.exe" Crypted.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\install\\server.exe" Crypted.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\install\server.exe Crypted.exe File opened for modification C:\Windows\install\server.exe Crypted.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1952 4760 WerFault.exe 98 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4408 explorer.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4408 explorer.exe Token: SeDebugPrivilege 4408 explorer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2796 Crypted.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3324 wrote to memory of 2796 3324 3f6c54a9f85391e4dd50846190189032.exe 94 PID 3324 wrote to memory of 2796 3324 3f6c54a9f85391e4dd50846190189032.exe 94 PID 3324 wrote to memory of 2796 3324 3f6c54a9f85391e4dd50846190189032.exe 94 PID 2796 wrote to memory of 3444 2796 Crypted.exe 42 PID 2796 wrote to memory of 3444 2796 Crypted.exe 42 PID 2796 wrote to memory of 3444 2796 Crypted.exe 42 PID 2796 wrote to memory of 3444 2796 Crypted.exe 42 PID 2796 wrote to memory of 3444 2796 Crypted.exe 42 PID 2796 wrote to memory of 3444 2796 Crypted.exe 42 PID 2796 wrote to memory of 3444 2796 Crypted.exe 42 PID 2796 wrote to memory of 3444 2796 Crypted.exe 42 PID 2796 wrote to memory of 3444 2796 Crypted.exe 42 PID 2796 wrote to memory of 3444 2796 Crypted.exe 42 PID 2796 wrote to memory of 3444 2796 Crypted.exe 42 PID 2796 wrote to memory of 3444 2796 Crypted.exe 42 PID 2796 wrote to memory of 3444 2796 Crypted.exe 42 PID 2796 wrote to memory of 3444 2796 Crypted.exe 42 PID 2796 wrote to memory of 3444 2796 Crypted.exe 42 PID 2796 wrote to memory of 3444 2796 Crypted.exe 42 PID 2796 wrote to memory of 3444 2796 Crypted.exe 42 PID 2796 wrote to memory of 3444 2796 Crypted.exe 42 PID 2796 wrote to memory of 3444 2796 Crypted.exe 42 PID 2796 wrote to memory of 3444 2796 Crypted.exe 42 PID 2796 wrote to memory of 3444 2796 Crypted.exe 42 PID 2796 wrote to memory of 3444 2796 Crypted.exe 42 PID 2796 wrote to memory of 3444 2796 Crypted.exe 42 PID 2796 wrote to memory of 3444 2796 Crypted.exe 42 PID 2796 wrote to memory of 3444 2796 Crypted.exe 42 PID 2796 wrote to memory of 3444 2796 Crypted.exe 42 PID 2796 wrote to memory of 3444 2796 Crypted.exe 42 PID 2796 wrote to memory of 3444 2796 Crypted.exe 42 PID 2796 wrote to memory of 3444 2796 Crypted.exe 42 PID 2796 wrote to memory of 3444 2796 Crypted.exe 42 PID 2796 wrote to memory of 3444 2796 Crypted.exe 42 PID 2796 wrote to memory of 3444 2796 Crypted.exe 42 PID 2796 wrote to memory of 3444 2796 Crypted.exe 42 PID 2796 wrote to memory of 3444 2796 Crypted.exe 42 PID 2796 wrote to memory of 3444 2796 Crypted.exe 42 PID 2796 wrote to memory of 3444 2796 Crypted.exe 42 PID 2796 wrote to memory of 3444 2796 Crypted.exe 42 PID 2796 wrote to memory of 3444 2796 Crypted.exe 42 PID 2796 wrote to memory of 3444 2796 Crypted.exe 42 PID 2796 wrote to memory of 3444 2796 Crypted.exe 42 PID 2796 wrote to memory of 3444 2796 Crypted.exe 42 PID 2796 wrote to memory of 3444 2796 Crypted.exe 42 PID 2796 wrote to memory of 3444 2796 Crypted.exe 42 PID 2796 wrote to memory of 3444 2796 Crypted.exe 42 PID 2796 wrote to memory of 3444 2796 Crypted.exe 42 PID 2796 wrote to memory of 3444 2796 Crypted.exe 42 PID 2796 wrote to memory of 3444 2796 Crypted.exe 42 PID 2796 wrote to memory of 3444 2796 Crypted.exe 42 PID 2796 wrote to memory of 3444 2796 Crypted.exe 42 PID 2796 wrote to memory of 3444 2796 Crypted.exe 42 PID 2796 wrote to memory of 3444 2796 Crypted.exe 42 PID 2796 wrote to memory of 3444 2796 Crypted.exe 42 PID 2796 wrote to memory of 3444 2796 Crypted.exe 42 PID 2796 wrote to memory of 3444 2796 Crypted.exe 42 PID 2796 wrote to memory of 3444 2796 Crypted.exe 42 PID 2796 wrote to memory of 3444 2796 Crypted.exe 42 PID 2796 wrote to memory of 3444 2796 Crypted.exe 42 PID 2796 wrote to memory of 3444 2796 Crypted.exe 42 PID 2796 wrote to memory of 3444 2796 Crypted.exe 42 PID 2796 wrote to memory of 3444 2796 Crypted.exe 42 PID 2796 wrote to memory of 3444 2796 Crypted.exe 42
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3444
-
C:\Users\Admin\AppData\Local\Temp\3f6c54a9f85391e4dd50846190189032.exe"C:\Users\Admin\AppData\Local\Temp\3f6c54a9f85391e4dd50846190189032.exe"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3324 -
C:\Users\Admin\AppData\Local\Temp\Crypted.exe"C:\Users\Admin\AppData\Local\Temp\Crypted.exe"3⤵
- Adds policy Run key to start application
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
- Modifies Installed Components in the registry
PID:864
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:4408 -
C:\Windows\install\server.exe"C:\Windows\install\server.exe"5⤵
- Executes dropped EXE
PID:4760 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4760 -s 5766⤵
- Program crash
PID:1952
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4760 -ip 47601⤵PID:1888
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
267KB
MD588d8e598c89fbec0dcec5436f99e250b
SHA1710a793b01cdfb4a3f68b5d9628edd664014948f
SHA2569e7de1a076834791767207fb07ee73a96592e78f15c618da7c5396fffa3c7d42
SHA512cb6a63f82c2e8f08dc305c4d235cb75c150889469e3a65c93da2d63dbea2190a92faa8f92256cdf6098abb71996fb6fa4842fb4db3965f1b9a988ef202552fe3
-
Filesize
134KB
MD5a8508735d64ba770b59428477e6afb8b
SHA19a1ae01501f2acb053d21132a6b9d6f78b6ca604
SHA25679cb94066033d14a1c7836f5108c8c2e6ea1d0ef21f6c34cdeca29686415b982
SHA5128cb73ddf5b4748e782193050a6b2889b0699505e9eb2408b3d690c42e0da26fb992f245683180790dc9720f63f838d8e48da268d9837feba6205c8dd1dce360a
-
Filesize
8B
MD5bb196e83cfb953227d231e610a39746a
SHA1749820aebe2a44d89cc0e3ee4f3c17ddf78e7e2e
SHA256e09bcee7a2d5c6bf05f25d3c53bfc335d43621e77ff41d87323253192db5f12e
SHA512a824175e154c33ad3ff680574b5b053391f1b84a45afe2d67c6e99000a0c1ca33f2975e7dd63e3e1e09ae78c7e51bd03568db3f19d6d01a4f1768e32868fb296
-
Filesize
8B
MD54f400310c352efc0dc990638f3753b01
SHA163fd39e0d75eee83bc3973a3e38c7d0e74f370ff
SHA256274cfba485ab81687b9e82ceeadaada4c9330f12075d45500dccbb9278c47246
SHA512045e8a3591c690b6f16800984e57fd15cea58993e3ccb2a22ff9ea150319458a7a2a913da4338856b8ab93f427c369413cb9d0245af49cc6a4a06cf2c8fdd04c
-
Filesize
8B
MD5df5ac26638825a5ec6234499e34e595b
SHA1f29ed1fb4f409c693f489ba8717ecb6d65d48c2b
SHA256fbc008e0c7f218cb464ef172df30ca354ead2690bd574f6305740f4dce617cad
SHA51202cbc680ff7102c7f1a2fd833ad15b3040b53dd3e8a09889ebb492216cb70283f74600be034d7e39daf0a200224909ef50834ca8a07d270db20db86f0eb32cff
-
Filesize
15B
MD5bf3dba41023802cf6d3f8c5fd683a0c7
SHA1466530987a347b68ef28faad238d7b50db8656a5
SHA2564a8e75390856bf822f492f7f605ca0c21f1905172f6d3ef610162533c140507d
SHA512fec60f447dcc90753d693014135e24814f6e8294f6c0f436bc59d892b24e91552108dba6cf5a6fa7c0421f6d290d1bafee9f9f2d95ea8c4c05c2ad0f7c1bb314