Analysis

  • max time kernel
    149s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2023, 08:50

General

  • Target

    131cd33741ecd765120cdfac28527736.exe

  • Size

    927KB

  • MD5

    131cd33741ecd765120cdfac28527736

  • SHA1

    1ab0b0e5517a9a01c148220e7cc28c07242214d5

  • SHA256

    08fbfb7ea3fbf9acc391bb69030b09816d1992169af08b63bba885ac8f0cb2f8

  • SHA512

    0d02fc6b74345ca02cbed955e49caeb41faee09b9b8e37e7621e3b60f611671cf271172624896a3f1c6c1717e7b619c69c12b2a6541e38da90a4d9b9b2aac106

  • SSDEEP

    24576:PAlf+mjRLEdhbTUmjB8SNPJ7ugZIb+f6V6a2M7P/rae/7DV+q:P+jpoTUmS6+R3/wq

Malware Config

Extracted

Family

cybergate

Version

v1.07.5

Botnet

cyber

C2

captainherp.no-ip.biz:100

Mutex

X636Y37C32E6V1

Attributes
  • enable_keylogger

    true

  • enable_message_box

    true

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    WinDir

  • install_file

    Svchost.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    you said it this guy is fucked

  • message_box_title

    Your fucked basically

  • password

    123456

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Signatures

  • CyberGate, Rebhip

    CyberGate is a lightweight remote administration tool with a wide array of functionalities.

  • Adds policy Run key to start application 2 TTPs 4 IoCs
  • Modifies Installed Components in the registry 2 TTPs 4 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in System32 directory 4 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1208
      • C:\Users\Admin\AppData\Local\Temp\131cd33741ecd765120cdfac28527736.exe
        "C:\Users\Admin\AppData\Local\Temp\131cd33741ecd765120cdfac28527736.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2288
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
          C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
          3⤵
          • Adds policy Run key to start application
          • Modifies Installed Components in the registry
          • Adds Run key to start application
          • Drops file in System32 directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:2688
          • C:\Windows\SysWOW64\explorer.exe
            explorer.exe
            4⤵
            • Modifies Installed Components in the registry
            • Suspicious use of AdjustPrivilegeToken
            PID:1276
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            4⤵
              PID:680
            • C:\Users\Admin\AppData\Local\Temp\131cd33741ecd765120cdfac28527736.exe
              "C:\Users\Admin\AppData\Local\Temp\131cd33741ecd765120cdfac28527736.exe"
              4⤵
              • Loads dropped DLL
              • Drops file in System32 directory
              • Suspicious behavior: GetForegroundWindowSpam
              • Suspicious use of AdjustPrivilegeToken
              PID:1164
              • C:\Windows\SysWOW64\WinDir\Svchost.exe
                "C:\Windows\system32\WinDir\Svchost.exe"
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2068
                • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
                  C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
                  6⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:2820
      • C:\Windows\SysWOW64\DllHost.exe
        C:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}
        1⤵
        • Suspicious use of FindShellTrayWindow
        PID:2692

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\Admin2.txt

        Filesize

        224KB

        MD5

        5b39b1ed0ab6723f238d08129108c2fe

        SHA1

        34391aafbf8e5bb2a7b35069cca62bfb62d23f3e

        SHA256

        87a5afc4eceaa2acc8488c38b9be50e745f9fe62518f9ffd97f20a26d5685355

        SHA512

        777e6506d86d30ee2236e3da8914e071866f0fab4249a5037cc28f2f0a020ae570c7a9752cac3db3a561c2a7be801d1db18211d1348e51dc718d12ee5f3f5386

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        f27a9db78929ab206a9a8330792b8f77

        SHA1

        7d89112bda38518c9214118b3e3634a58363e9a2

        SHA256

        f2f0e90f7876c61c553dcca9279969ca7f275969f24897013c6eb9ef9fc1dc08

        SHA512

        c306607b31d540c1bc11cf31ce9b11eee6748a28bcf17076360566525106e2d90a22ab0a216e5ac6fa15f3a08c44833fd010f9f23ba71ed8840acdbcf307a1dd

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        c546cf3036e3586becd6e6fd7e985b67

        SHA1

        e060680e85d01c706c237c542bae15c95fdad0a1

        SHA256

        8852c8ae53b26df91b0bbb807f63253c39ebc100038e6fc7a8a334c3e2a5475a

        SHA512

        e1f1fa3d4b7fe74bbf99ad2c14945124831db35e55fbe4d3f6f0986128cb20fc2343f587caa79f4daa3385f6211c688ad4cd62a540d9a5c91099c06376628d64

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        91cd303785f670bbab269e99f1639fd3

        SHA1

        6647b1f81baa76244f3a81f93aef211b9f939332

        SHA256

        c158b9a5e62c6999c3bef80f07e37616deb91b0c38ea82a87bc41d6426ce8131

        SHA512

        74233c21629d043f4cea529a45d78cb35f953f94270685e2aa0ba164303b3860e70e1915396bc895c2e8e5f27432e906368387e451ec315006fefde0c2e4820a

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        8e604815d3ba2364bb04bd90a04a5fe0

        SHA1

        42062d9eb84d54e50c0758d8f5c4b38e3fe20aa7

        SHA256

        e3e3a5273e5bb97e69b5b71a97156f645aae785114c1f11ea384d7fefdfaee2c

        SHA512

        9c9066e92bf28572644239a489a1a874bdfa7eddbe06cce782680f8b00f52710734511a5fe3e3a13f16aaa50f9554733bfe29d12ba6a890840ccbde914af231a

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        06996b28962b2b7535ad7c2291a3a891

        SHA1

        290a559801efa2307f65b2b2abb964cdb0dbbab8

        SHA256

        3c9393b957aca0e75f6014d07c477f3575c1fe96c06febf766ae66b2fda666f0

        SHA512

        714aac9988d04671beddfa810c6f8e3aacf6869b3d0d0f3873d1da69fdc653def8b91ff175c8c2e343e7d76b778c905896c8ed468025153853b62d5dac7da8f8

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        6b9d6cfcfcf20640f81a7551a1f3665d

        SHA1

        7bc7044f88674fed9d4e83185269ef49c554a62b

        SHA256

        8bc8d31197ef13b8e1d73fcbf993036ebaace14be644cd7b4011ab09055bd460

        SHA512

        93c9bf60edca7e2c95ff85c6df63ccc4438b6045cd9ba2d70f4608d78cdb15a805e73e7f2a6868f9a96918b6bb79ab8f58d9a941a360d1ffb41217cb968dbf1b

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        5da5ebef7c6916c7da0f058f671cb983

        SHA1

        e7993d5a414585673a2c098a6659e9f66fb8d81e

        SHA256

        bfc891aa71475237a09c493cae343deede8a7eba87ed2596133f6e722aa821e4

        SHA512

        999fceb2c7a28d239ed9a340e1cd762ca9981c84991e84fdea6ee2ad40481bb65eec2198a705167b2ad3c8288a8748f96e7b71d8babe03efde1626b0813a4a15

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        ea2165164609c10e3d65387f9e57bfb4

        SHA1

        62bd2fd83a3f4c7f9e62cd5854843e489f91e4f0

        SHA256

        213fadf0fd3cc4a3327637296a0def4f2eb77da1c4e94111d54c4ce489297af5

        SHA512

        a2d8d04611cee86dc66799853ebf990f26049e61a4c03df9af6277eb3c09a096afccd2077398fbc7ca74aaf496ff9194c25115f9a0385a793372abc6e3149f3b

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        9bcb7e3f73e81a33a4667ae0f1db1fac

        SHA1

        7412e1f47ce19253f3abae803decec560bbba5c4

        SHA256

        dd1e5fa8867a08262948112240132c67bc452fb064d877801b15effa911245fb

        SHA512

        af2c6c812448c0208779c2e917f55cff823a22c3c79b95fa9ea4da8653070b055a57e6a99be86f2d2889e3ceed2fd996d0be39bcaa41805f8206703ccd520330

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        7f1a24c9b8f16abf715210826518bdfc

        SHA1

        daaf81a0bc0ff3806c0b00998fe040bb2043d5d4

        SHA256

        ffab51241ce1832c177dd355ed0884c8a36076bf4233ffe2c7db0efb59326023

        SHA512

        eb5eef269cd4e22f5ea5f87168df376a0096996e1368f3a348522ebe3837331e4844deb038465f5a9632b2a3123786ed497c91cd3c0697d7a50c9b51e3f04853

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        b8871cfe5fac010b24a974d30d41212e

        SHA1

        b8c013c41384490834251a666a30e06be18b752d

        SHA256

        3e6d9d9a88e6bdee36f3524e6f32485c8d73c9951b6c67f3fe120db77b196cef

        SHA512

        4aa395a05527cd0fa9deb485beec1add0c13ed935289a40b9ff991fa74d0a5e35f8ee9e4676744d3afd167f06b063f548eafe2161e3c2bb86362ce576a936e1e

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        d0c61ad7a6409bba3979d1f600848c20

        SHA1

        92a22167088521b144c1c2a379f976be71bf92d2

        SHA256

        df5047dcbb4e341e3fccc2f3c54ef6128549b0710441eba7c0b398514862b797

        SHA512

        dc195f757debc5bc6801aa2ac093545da059858c5b72f0c9a4392b36ce85c987f4e7dc83335cd51b23d5c6a4c316b96b0e35a93dcb7844f2256482d96fdc10c3

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        e481d99dd1fc1de62971344684b8f102

        SHA1

        559372203968eec6ab1a1044dbdacc2d03559e11

        SHA256

        4d9978353aa15f925df2914a92015e3f9d48c0b415d3bb8bb26063b9950104fc

        SHA512

        cbce4021b80a4d0d206ad5d8b0ffc17909b3b1988ec9127c3597dc7e25efa9c06a967a6dd1170245c561e510aadf725201dc77588cc0081ff10a812d094299c7

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        abb3c23402556b9fa27c599b82209fc6

        SHA1

        af691ef48276a0315f9ca46cbc3434e60e1fdf5d

        SHA256

        d821bf6043750fb70a1a755c10da2767b1935036271d3c4882086dc5858953ad

        SHA512

        b486f31e6b65ad0a0188c27c2fe65a8a109a7cfa1f84163616c48a8d6f9403baf4eea231cc548ad7ecf09a01012049446064554cde4fc3ea6f447296c88b3c7a

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        aa8739189d5a2f3d0414f9b71cb7e556

        SHA1

        255644324f5528e1bbcc1d0f84755989eec59814

        SHA256

        0b121530de4e9c53b6c95375d12d7f915ab85e5c45d331b01fbc0754e6313df4

        SHA512

        ce898665f82cb8e203e4bdf5a8c4329a12806187745a4cdededcf6726f1fb49d50fc14618b263fdb8681b4943a563e5e6f3b3ab652db4805341e8db7de726ea6

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        26cc40a65b471adc937354c006455f48

        SHA1

        aad589d4575279d42c7445d63fc0babc40f205e5

        SHA256

        1f2e6ac1e952db3a015ff41c21102a05d2d0192b63b6f74dbe38e42ac61a6a1f

        SHA512

        afcaf0fa021e4fe219847b58db4b2f5171a02a074e270cc12dfd2dfc222541ace3930358d8d027e47e71127c937688edee1e3c0813e456fadf4df2516b9fe97d

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        16450560ca0b4f905a50138183872e03

        SHA1

        fc3c5476d8ee2cef8fda9f95fede789897d0f243

        SHA256

        9fc8b3234a3ce711d3ff84e73e239c1f5e6471441ea6b969de11c7de7f0aaf79

        SHA512

        633fdfc7b6d7af53b3ea395da7798a74fcf22423e60a20c6813a3877281b69f541aff702f1347194d61648f3d674328edb4f50159dca205cd4a3ba68dbc82688

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        3730b4689cabc97d5081251fb293a95c

        SHA1

        e44e96cac41e1b2827ead836faea25ff7ee01e6f

        SHA256

        2731f80af0808c6ef45cc0e64477b84345d0b2165f7f9f7995b079b9568ca5b4

        SHA512

        c0cff17d31aa8c45e4921d3acd248cff275d45239699219101521a0dc1aa8b8f42668c6d6b34c7bbff9a7a4f3fdd9bc322a11804e0ea8a2ba328b529dec77301

      • C:\Users\Admin\AppData\Local\Temp\set1_1.jpg

        Filesize

        117KB

        MD5

        eaee7226994f7566f09f715130dfcc55

        SHA1

        0d1021e127e247c17d6fb4412ab63047db15ebfd

        SHA256

        af52bfc3d241d915153ed2b5c2dc1e38aa3741d86cca4bf46ed26ccd6376e808

        SHA512

        e791ef886fb819bf35fda6f8758299ef7d0d93a0715b4907c255bc3dbef03faf882c9d8b41b9c3bfcc6ca858f3460a6e257ce7758213e3b3a3ed220b4faf1212

      • C:\Users\Admin\AppData\Roaming\Adminlog.dat

        Filesize

        15B

        MD5

        bf3dba41023802cf6d3f8c5fd683a0c7

        SHA1

        466530987a347b68ef28faad238d7b50db8656a5

        SHA256

        4a8e75390856bf822f492f7f605ca0c21f1905172f6d3ef610162533c140507d

        SHA512

        fec60f447dcc90753d693014135e24814f6e8294f6c0f436bc59d892b24e91552108dba6cf5a6fa7c0421f6d290d1bafee9f9f2d95ea8c4c05c2ad0f7c1bb314

      • C:\Windows\SysWOW64\WinDir\Svchost.exe

        Filesize

        927KB

        MD5

        131cd33741ecd765120cdfac28527736

        SHA1

        1ab0b0e5517a9a01c148220e7cc28c07242214d5

        SHA256

        08fbfb7ea3fbf9acc391bb69030b09816d1992169af08b63bba885ac8f0cb2f8

        SHA512

        0d02fc6b74345ca02cbed955e49caeb41faee09b9b8e37e7621e3b60f611671cf271172624896a3f1c6c1717e7b619c69c12b2a6541e38da90a4d9b9b2aac106

      • memory/1164-875-0x0000000010560000-0x00000000105C5000-memory.dmp

        Filesize

        404KB

      • memory/1164-1564-0x0000000010560000-0x00000000105C5000-memory.dmp

        Filesize

        404KB

      • memory/1276-573-0x0000000010480000-0x00000000104E5000-memory.dmp

        Filesize

        404KB

      • memory/1276-281-0x0000000000160000-0x0000000000161000-memory.dmp

        Filesize

        4KB

      • memory/1276-280-0x00000000000A0000-0x00000000000A1000-memory.dmp

        Filesize

        4KB

      • memory/1276-899-0x0000000010480000-0x00000000104E5000-memory.dmp

        Filesize

        404KB

      • memory/2068-900-0x0000000073160000-0x000000007370B000-memory.dmp

        Filesize

        5.7MB

      • memory/2068-929-0x0000000073160000-0x000000007370B000-memory.dmp

        Filesize

        5.7MB

      • memory/2068-901-0x0000000073160000-0x000000007370B000-memory.dmp

        Filesize

        5.7MB

      • memory/2068-902-0x0000000000A10000-0x0000000000A50000-memory.dmp

        Filesize

        256KB

      • memory/2288-29-0x0000000074360000-0x000000007490B000-memory.dmp

        Filesize

        5.7MB

      • memory/2288-4-0x0000000000BC0000-0x0000000000BC2000-memory.dmp

        Filesize

        8KB

      • memory/2288-2-0x0000000000B70000-0x0000000000BB0000-memory.dmp

        Filesize

        256KB

      • memory/2288-1-0x0000000074360000-0x000000007490B000-memory.dmp

        Filesize

        5.7MB

      • memory/2288-0-0x0000000074360000-0x000000007490B000-memory.dmp

        Filesize

        5.7MB

      • memory/2688-7-0x0000000000400000-0x0000000000451000-memory.dmp

        Filesize

        324KB

      • memory/2688-15-0x0000000000400000-0x0000000000451000-memory.dmp

        Filesize

        324KB

      • memory/2688-876-0x0000000000400000-0x0000000000451000-memory.dmp

        Filesize

        324KB

      • memory/2688-24-0x0000000000400000-0x0000000000451000-memory.dmp

        Filesize

        324KB

      • memory/2688-25-0x0000000000020000-0x0000000000021000-memory.dmp

        Filesize

        4KB

      • memory/2688-23-0x0000000000400000-0x0000000000451000-memory.dmp

        Filesize

        324KB

      • memory/2688-21-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

        Filesize

        4KB

      • memory/2688-19-0x0000000000400000-0x0000000000451000-memory.dmp

        Filesize

        324KB

      • memory/2688-17-0x0000000000400000-0x0000000000451000-memory.dmp

        Filesize

        324KB

      • memory/2688-30-0x0000000000400000-0x0000000000451000-memory.dmp

        Filesize

        324KB

      • memory/2688-13-0x0000000000400000-0x0000000000451000-memory.dmp

        Filesize

        324KB

      • memory/2688-572-0x0000000000400000-0x0000000000451000-memory.dmp

        Filesize

        324KB

      • memory/2688-11-0x0000000000400000-0x0000000000451000-memory.dmp

        Filesize

        324KB

      • memory/2688-9-0x0000000000400000-0x0000000000451000-memory.dmp

        Filesize

        324KB

      • memory/2688-31-0x0000000000400000-0x0000000000451000-memory.dmp

        Filesize

        324KB

      • memory/2692-6-0x0000000000280000-0x0000000000281000-memory.dmp

        Filesize

        4KB

      • memory/2692-5-0x0000000000160000-0x0000000000162000-memory.dmp

        Filesize

        8KB

      • memory/2692-571-0x0000000000280000-0x0000000000281000-memory.dmp

        Filesize

        4KB

      • memory/2820-931-0x0000000000400000-0x0000000000451000-memory.dmp

        Filesize

        324KB

      • memory/2820-928-0x0000000000400000-0x0000000000451000-memory.dmp

        Filesize

        324KB