Analysis

  • max time kernel
    23s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    25-12-2023 15:09

General

  • Target

    2828c4977fdb872e14709b83894ed3ca.exe

  • Size

    584KB

  • MD5

    2828c4977fdb872e14709b83894ed3ca

  • SHA1

    2cac8e1a02f141238a5270f8d3ed77fe6acb8ea2

  • SHA256

    5f0bed1e14ba2e7d3f54162f1ad5c9d4145e7fb55b9b26466627a3068652fb0e

  • SHA512

    890dd4ab7af1131fc5839c5a1a5fa43937aded7abf6d5067aac346910bfe9a302c49da3c2c4a8d88a62f7533ee81700ce067f1258eb321fb548520368e355740

  • SSDEEP

    12288:v6Wq4aaE6KwyF5L0Y2D1PqLOjev3wR/oBWGd0ZczIvnvLVx:tthEVaPqLOLRBWIbVx

Malware Config

Extracted

Family

cybergate

Version

2.6

Botnet

Bot

C2

pablohacker.no-ip.org:83

Mutex

m809u80932uj890d

Attributes
  • enable_keylogger

    true

  • enable_message_box

    true

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    Microsoft

  • install_file

    MSvchost.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    \\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\

  • message_box_title

    Error

  • password

    abcd1234

  • regkey_hkcu

    Windows

  • regkey_hklm

    Microsoft

Signatures

  • CyberGate, Rebhip

    CyberGate is a lightweight remote administration tool with a wide array of functionalities.

  • Adds policy Run key to start application 2 TTPs 4 IoCs
  • Modifies Installed Components in the registry 2 TTPs 4 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 10 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • AutoIT Executable 2 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2828c4977fdb872e14709b83894ed3ca.exe
    "C:\Users\Admin\AppData\Local\Temp\2828c4977fdb872e14709b83894ed3ca.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2368
    • C:\Users\Admin\AppData\Local\Temp\2828c4977fdb872e14709b83894ed3ca.exe
      "C:\Users\Admin\AppData\Local\Temp\2828c4977fdb872e14709b83894ed3ca.exe"
      2⤵
      • Adds policy Run key to start application
      • Modifies Installed Components in the registry
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:2876
      • C:\Windows\SysWOW64\explorer.exe
        explorer.exe
        3⤵
        • Modifies Installed Components in the registry
        PID:324
      • C:\Windows\SysWOW64\explorer.exe
        explorer.exe
        3⤵
        • Loads dropped DLL
        • Drops file in Windows directory
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        PID:1708
        • C:\Windows\Microsoft\MSvchost.exe
          "C:\Windows\Microsoft\MSvchost.exe"
          4⤵
          • Executes dropped EXE
          PID:2336
          • C:\Windows\Microsoft\MSvchost.exe
            "C:\Windows\Microsoft\MSvchost.exe"
            5⤵
            • Executes dropped EXE
            PID:2372
  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1360

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Persistence

    Boot or Logon Autostart Execution

    3
    T1547

    Registry Run Keys / Startup Folder

    3
    T1547.001

    Privilege Escalation

    Boot or Logon Autostart Execution

    3
    T1547

    Registry Run Keys / Startup Folder

    3
    T1547.001

    Defense Evasion

    Modify Registry

    3
    T1112

    Discovery

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\XX--XX--XX.txt
      Filesize

      230KB

      MD5

      429a73da0359e92d7094dc8f573a00fa

      SHA1

      ef3816a798f9e43d3e9d1b004a8713354c4ccafc

      SHA256

      2046ca8227d6f0b63fbe8153327b498a88021d1ca911b17365eb0e4c0a13993b

      SHA512

      47d2d52706508c1bb90e3d6f2c6a1cb0e74d591a50e55e049b3a8537cd5c6392f2493b8cfb7afc86e092d2ea34abf36ad0175c6ed7ec5bb00b52c153342876f3

    • C:\Users\Admin\AppData\Local\Temp\XxX.xXx
      Filesize

      8B

      MD5

      22510a1666765ebe53f4f22e2aa5585d

      SHA1

      352baf07570096eef53ef05a712226b91f59a8e2

      SHA256

      a793120ce0e30f0445e2fd0dbbd8fcaa58f291f47e53e141c7f0251dc8628c77

      SHA512

      6df00f1ee3fa943768f5ac2e345c9df5299476fd1e18ee2a0a72b1fc6cd36bf35972e98aaaf50a09de0d7219877e584837e677f7c270646cdba99d0ed134fdd2

    • C:\Users\Admin\AppData\Local\Temp\XxX.xXx
      Filesize

      8B

      MD5

      9636224f67537c5ea2a44a5abd993aa0

      SHA1

      81424eb7336afb44b1ca120fdd5b8c994f3c42e3

      SHA256

      5777220b529796f3346ac677a16d968c9504a30e800a05a5137a358527dfe088

      SHA512

      de61fda872e43bd7dd3d78e0df28f3f99f5654f22f1c630bd70afdc374035c482e10771745dcd95f28327308d302190e2b7998cfe34614483361d4b7776aa05a

    • C:\Users\Admin\AppData\Local\Temp\XxX.xXx
      Filesize

      8B

      MD5

      98b78cf44f8f678844790d8ffc6b39cc

      SHA1

      4a9218e5d44b67d9a4c95a7526ef048a37a3f828

      SHA256

      a42ed6d7b9f9cabe2e1a17a790f3dad3d76b1273b2c4380645e7cbdd5a7ac3d6

      SHA512

      29f6ccd8f1ab46c65e7fb9b388193011eefddbe1724a938a2ea873f75ffb6cd12dd8f7ec92b9608ecc204bcaa4b82cfabe64d1606440c0b6427498c433784e7c

    • C:\Users\Admin\AppData\Local\Temp\XxX.xXx
      Filesize

      8B

      MD5

      6db11159248bf130d66381509916e0f6

      SHA1

      0cfdd91237cfaf0204b35839bd29a7e8c6f656f3

      SHA256

      effcda772f4ddd51080462fdb749cdb9102ca6a5779b576e65912a13da4597f0

      SHA512

      284cff43f31c8cd39cd6ba64f63a46309f92d1f9a0be65ee8f506cd8a02f163691a81b992b27a20c71af521f730de1215b85fcd7bf7a59c6d47dfa35cc866c6c

    • C:\Users\Admin\AppData\Local\Temp\XxX.xXx
      Filesize

      8B

      MD5

      ce82c60b139486aaef794e206181d248

      SHA1

      3220d5933cf8d1f34e132ac7012c2c9cab7a2457

      SHA256

      762f80661074f6e2199875d4b9f7595515b707fa771f2a84450d9d98a7313de3

      SHA512

      c5376f4670789850db838253ccd5163acf9beaa441378787e2fdb7bf76f7207617404aac0c33c72822c4460cbeec8da9bf987c8029504206b37a59ea4a26def9

    • C:\Users\Admin\AppData\Local\Temp\XxX.xXx
      Filesize

      8B

      MD5

      8e483cd76c2e159254f7a7430ec53b24

      SHA1

      c859824a39b04e69e4a9b1a4099eb78365124fb3

      SHA256

      33954285bb127b1f28e83a52186d92cd4cd8a2e2d5148c8897e83df5a5916964

      SHA512

      17f39e9b54ab05581dbe12b38bbfab75c18a5c066fe380adf334b571c587509696444f2b2fe8ce0d52ae4c52ba7512d5261ed0b1f39748bf423f735dc7ebd137

    • C:\Users\Admin\AppData\Local\Temp\XxX.xXx
      Filesize

      8B

      MD5

      c62b3844c0fbecfb754aca1cf488f1fc

      SHA1

      831e7bf91f203564a4a440187c7774d43b013a32

      SHA256

      5cbbdfc5fc90a0b209dc68e45b37e95ede9046eb10283fc2e9ce102ca8929ebe

      SHA512

      b25335516867e81f8c048a1bbc0908788f803cddc1e5fcdf50a077c09a74c6aa1eb102663ab7b570eeb7c464d58e3f24ff14fed2b477fb0e21279c2ec23458bf

    • C:\Users\Admin\AppData\Local\Temp\XxX.xXx
      MD5

      d41d8cd98f00b204e9800998ecf8427e

      SHA1

      da39a3ee5e6b4b0d3255bfef95601890afd80709

      SHA256

      e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

      SHA512

      cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

    • C:\Users\Admin\AppData\Roaming\logs.dat
      Filesize

      15B

      MD5

      e21bd9604efe8ee9b59dc7605b927a2a

      SHA1

      3240ecc5ee459214344a1baac5c2a74046491104

      SHA256

      51a3fe220229aa3fdddc909e20a4b107e7497320a00792a280a03389f2eacb46

      SHA512

      42052ad5744ad76494bfa71d78578e545a3b39bfed4c4232592987bd28064b6366a423084f1193d137493c9b13d9ae1faac4cf9cc75eb715542fa56e13ca1493

    • C:\Windows\Microsoft\MSvchost.exe
      Filesize

      584KB

      MD5

      2828c4977fdb872e14709b83894ed3ca

      SHA1

      2cac8e1a02f141238a5270f8d3ed77fe6acb8ea2

      SHA256

      5f0bed1e14ba2e7d3f54162f1ad5c9d4145e7fb55b9b26466627a3068652fb0e

      SHA512

      890dd4ab7af1131fc5839c5a1a5fa43937aded7abf6d5067aac346910bfe9a302c49da3c2c4a8d88a62f7533ee81700ce067f1258eb321fb548520368e355740

    • memory/324-308-0x00000000000E0000-0x00000000000E1000-memory.dmp
      Filesize

      4KB

    • memory/324-539-0x0000000024080000-0x00000000240E2000-memory.dmp
      Filesize

      392KB

    • memory/324-897-0x0000000024080000-0x00000000240E2000-memory.dmp
      Filesize

      392KB

    • memory/324-257-0x00000000000A0000-0x00000000000A1000-memory.dmp
      Filesize

      4KB

    • memory/1360-8-0x0000000002B00000-0x0000000002B01000-memory.dmp
      Filesize

      4KB

    • memory/1708-1956-0x00000000060B0000-0x0000000006172000-memory.dmp
      Filesize

      776KB

    • memory/1708-867-0x00000000060B0000-0x0000000006172000-memory.dmp
      Filesize

      776KB

    • memory/1708-844-0x00000000240F0000-0x0000000024152000-memory.dmp
      Filesize

      392KB

    • memory/1708-1742-0x00000000240F0000-0x0000000024152000-memory.dmp
      Filesize

      392KB

    • memory/2336-868-0x0000000000400000-0x00000000004C2000-memory.dmp
      Filesize

      776KB

    • memory/2336-873-0x0000000000400000-0x00000000004C2000-memory.dmp
      Filesize

      776KB

    • memory/2368-1-0x0000000000400000-0x00000000004C2000-memory.dmp
      Filesize

      776KB

    • memory/2368-0-0x0000000000400000-0x00000000004C2000-memory.dmp
      Filesize

      776KB

    • memory/2372-874-0x0000000000400000-0x000000000044E000-memory.dmp
      Filesize

      312KB

    • memory/2372-879-0x0000000000400000-0x000000000044E000-memory.dmp
      Filesize

      312KB

    • memory/2876-3-0x0000000000400000-0x000000000044E000-memory.dmp
      Filesize

      312KB

    • memory/2876-2-0x0000000000400000-0x000000000044E000-memory.dmp
      Filesize

      312KB

    • memory/2876-4-0x0000000000400000-0x000000000044E000-memory.dmp
      Filesize

      312KB

    • memory/2876-845-0x0000000000400000-0x000000000044E000-memory.dmp
      Filesize

      312KB