Analysis
-
max time kernel
1s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26-12-2023 10:47
Static task
static1
Behavioral task
behavioral1
Sample
6887df54f455b1d9b464a6aef08eb0b8.exe
Resource
win7-20231215-en
General
-
Target
6887df54f455b1d9b464a6aef08eb0b8.exe
-
Size
423KB
-
MD5
6887df54f455b1d9b464a6aef08eb0b8
-
SHA1
1c23a777c9e6561dd11c6c565bb4f35802e59824
-
SHA256
c612c5a50499a052fad2e859f91527e5008fc5044da80e095774ae342ea60ca8
-
SHA512
791169bee6c2170618ea8e853ad4bb0855eae7ca9c4ec079eca9f491cd64c2c429f8f96d47461635bf1678ac81ae7ca1fa524a258081c0081d5b22ab5fce339d
-
SSDEEP
12288:MQm21U8OnCnAeJa9bRNXr2McxSMXfZkHqf6Ccd9O:MQVU8Uz9l5r2MASMXBk8cHO
Malware Config
Extracted
cybergate
v1.05.1
Victima
lolazoz.no-ip.org:2000
8V1L4JB8L848B4
-
enable_keylogger
true
-
enable_message_box
true
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
install
-
install_file
server.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Como dice Melcochita: iimmmmbeeziiLL!! xD
-
message_box_title
BugleGLS
-
password
1234
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Signatures
-
Adds policy Run key to start application 2 TTPs 4 IoCs
Processes:
6887df54f455b1d9b464a6aef08eb0b8.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 6887df54f455b1d9b464a6aef08eb0b8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "c:\\directory\\CyberGate\\install\\server.exe" 6887df54f455b1d9b464a6aef08eb0b8.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 6887df54f455b1d9b464a6aef08eb0b8.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "c:\\directory\\CyberGate\\install\\server.exe" 6887df54f455b1d9b464a6aef08eb0b8.exe -
Modifies Installed Components in the registry 2 TTPs 2 IoCs
Processes:
6887df54f455b1d9b464a6aef08eb0b8.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{T0S6PGMX-7TJ8-2Y3Y-7A2S-854OH171SBS7} 6887df54f455b1d9b464a6aef08eb0b8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{T0S6PGMX-7TJ8-2Y3Y-7A2S-854OH171SBS7}\StubPath = "c:\\directory\\CyberGate\\install\\server.exe Restart" 6887df54f455b1d9b464a6aef08eb0b8.exe -
Executes dropped EXE 1 IoCs
Processes:
server.exepid process 1884 server.exe -
Loads dropped DLL 2 IoCs
Processes:
6887df54f455b1d9b464a6aef08eb0b8.exepid process 584 6887df54f455b1d9b464a6aef08eb0b8.exe 584 6887df54f455b1d9b464a6aef08eb0b8.exe -
Processes:
resource yara_rule behavioral1/memory/2112-16-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2112-15-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2112-14-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2112-13-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2112-12-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2112-10-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2112-6-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2112-4-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2112-313-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/1556-357-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/1556-353-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/584-312-0x0000000010480000-0x00000000104E1000-memory.dmp upx behavioral1/memory/2112-20-0x0000000010410000-0x0000000010471000-memory.dmp upx behavioral1/memory/1556-360-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/584-1169-0x0000000010480000-0x00000000104E1000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
6887df54f455b1d9b464a6aef08eb0b8.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "c:\\directory\\CyberGate\\install\\server.exe" 6887df54f455b1d9b464a6aef08eb0b8.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "c:\\directory\\CyberGate\\install\\server.exe" 6887df54f455b1d9b464a6aef08eb0b8.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
6887df54f455b1d9b464a6aef08eb0b8.exedescription pid process target process PID 1984 set thread context of 2112 1984 6887df54f455b1d9b464a6aef08eb0b8.exe 6887df54f455b1d9b464a6aef08eb0b8.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
6887df54f455b1d9b464a6aef08eb0b8.exepid process 2112 6887df54f455b1d9b464a6aef08eb0b8.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
6887df54f455b1d9b464a6aef08eb0b8.exedescription pid process Token: SeDebugPrivilege 584 6887df54f455b1d9b464a6aef08eb0b8.exe Token: SeDebugPrivilege 584 6887df54f455b1d9b464a6aef08eb0b8.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
6887df54f455b1d9b464a6aef08eb0b8.exepid process 1984 6887df54f455b1d9b464a6aef08eb0b8.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
6887df54f455b1d9b464a6aef08eb0b8.exe6887df54f455b1d9b464a6aef08eb0b8.exedescription pid process target process PID 1984 wrote to memory of 2112 1984 6887df54f455b1d9b464a6aef08eb0b8.exe 6887df54f455b1d9b464a6aef08eb0b8.exe PID 1984 wrote to memory of 2112 1984 6887df54f455b1d9b464a6aef08eb0b8.exe 6887df54f455b1d9b464a6aef08eb0b8.exe PID 1984 wrote to memory of 2112 1984 6887df54f455b1d9b464a6aef08eb0b8.exe 6887df54f455b1d9b464a6aef08eb0b8.exe PID 1984 wrote to memory of 2112 1984 6887df54f455b1d9b464a6aef08eb0b8.exe 6887df54f455b1d9b464a6aef08eb0b8.exe PID 1984 wrote to memory of 2112 1984 6887df54f455b1d9b464a6aef08eb0b8.exe 6887df54f455b1d9b464a6aef08eb0b8.exe PID 1984 wrote to memory of 2112 1984 6887df54f455b1d9b464a6aef08eb0b8.exe 6887df54f455b1d9b464a6aef08eb0b8.exe PID 1984 wrote to memory of 2112 1984 6887df54f455b1d9b464a6aef08eb0b8.exe 6887df54f455b1d9b464a6aef08eb0b8.exe PID 1984 wrote to memory of 2112 1984 6887df54f455b1d9b464a6aef08eb0b8.exe 6887df54f455b1d9b464a6aef08eb0b8.exe PID 2112 wrote to memory of 2060 2112 6887df54f455b1d9b464a6aef08eb0b8.exe iexplore.exe PID 2112 wrote to memory of 2060 2112 6887df54f455b1d9b464a6aef08eb0b8.exe iexplore.exe PID 2112 wrote to memory of 2060 2112 6887df54f455b1d9b464a6aef08eb0b8.exe iexplore.exe PID 2112 wrote to memory of 2060 2112 6887df54f455b1d9b464a6aef08eb0b8.exe iexplore.exe PID 2112 wrote to memory of 2060 2112 6887df54f455b1d9b464a6aef08eb0b8.exe iexplore.exe PID 2112 wrote to memory of 2060 2112 6887df54f455b1d9b464a6aef08eb0b8.exe iexplore.exe PID 2112 wrote to memory of 2060 2112 6887df54f455b1d9b464a6aef08eb0b8.exe iexplore.exe PID 2112 wrote to memory of 2060 2112 6887df54f455b1d9b464a6aef08eb0b8.exe iexplore.exe PID 2112 wrote to memory of 2060 2112 6887df54f455b1d9b464a6aef08eb0b8.exe iexplore.exe PID 2112 wrote to memory of 2060 2112 6887df54f455b1d9b464a6aef08eb0b8.exe iexplore.exe PID 2112 wrote to memory of 2060 2112 6887df54f455b1d9b464a6aef08eb0b8.exe iexplore.exe PID 2112 wrote to memory of 2060 2112 6887df54f455b1d9b464a6aef08eb0b8.exe iexplore.exe PID 2112 wrote to memory of 2060 2112 6887df54f455b1d9b464a6aef08eb0b8.exe iexplore.exe PID 2112 wrote to memory of 2060 2112 6887df54f455b1d9b464a6aef08eb0b8.exe iexplore.exe PID 2112 wrote to memory of 2060 2112 6887df54f455b1d9b464a6aef08eb0b8.exe iexplore.exe PID 2112 wrote to memory of 2060 2112 6887df54f455b1d9b464a6aef08eb0b8.exe iexplore.exe PID 2112 wrote to memory of 2060 2112 6887df54f455b1d9b464a6aef08eb0b8.exe iexplore.exe PID 2112 wrote to memory of 2060 2112 6887df54f455b1d9b464a6aef08eb0b8.exe iexplore.exe PID 2112 wrote to memory of 2060 2112 6887df54f455b1d9b464a6aef08eb0b8.exe iexplore.exe PID 2112 wrote to memory of 2060 2112 6887df54f455b1d9b464a6aef08eb0b8.exe iexplore.exe PID 2112 wrote to memory of 2060 2112 6887df54f455b1d9b464a6aef08eb0b8.exe iexplore.exe PID 2112 wrote to memory of 2060 2112 6887df54f455b1d9b464a6aef08eb0b8.exe iexplore.exe PID 2112 wrote to memory of 2060 2112 6887df54f455b1d9b464a6aef08eb0b8.exe iexplore.exe PID 2112 wrote to memory of 2060 2112 6887df54f455b1d9b464a6aef08eb0b8.exe iexplore.exe PID 2112 wrote to memory of 2060 2112 6887df54f455b1d9b464a6aef08eb0b8.exe iexplore.exe PID 2112 wrote to memory of 2060 2112 6887df54f455b1d9b464a6aef08eb0b8.exe iexplore.exe PID 2112 wrote to memory of 2060 2112 6887df54f455b1d9b464a6aef08eb0b8.exe iexplore.exe PID 2112 wrote to memory of 2060 2112 6887df54f455b1d9b464a6aef08eb0b8.exe iexplore.exe PID 2112 wrote to memory of 2060 2112 6887df54f455b1d9b464a6aef08eb0b8.exe iexplore.exe PID 2112 wrote to memory of 2060 2112 6887df54f455b1d9b464a6aef08eb0b8.exe iexplore.exe PID 2112 wrote to memory of 2060 2112 6887df54f455b1d9b464a6aef08eb0b8.exe iexplore.exe PID 2112 wrote to memory of 2060 2112 6887df54f455b1d9b464a6aef08eb0b8.exe iexplore.exe PID 2112 wrote to memory of 2060 2112 6887df54f455b1d9b464a6aef08eb0b8.exe iexplore.exe PID 2112 wrote to memory of 2060 2112 6887df54f455b1d9b464a6aef08eb0b8.exe iexplore.exe PID 2112 wrote to memory of 2060 2112 6887df54f455b1d9b464a6aef08eb0b8.exe iexplore.exe PID 2112 wrote to memory of 2060 2112 6887df54f455b1d9b464a6aef08eb0b8.exe iexplore.exe PID 2112 wrote to memory of 2060 2112 6887df54f455b1d9b464a6aef08eb0b8.exe iexplore.exe PID 2112 wrote to memory of 2060 2112 6887df54f455b1d9b464a6aef08eb0b8.exe iexplore.exe PID 2112 wrote to memory of 2060 2112 6887df54f455b1d9b464a6aef08eb0b8.exe iexplore.exe PID 2112 wrote to memory of 2060 2112 6887df54f455b1d9b464a6aef08eb0b8.exe iexplore.exe PID 2112 wrote to memory of 2060 2112 6887df54f455b1d9b464a6aef08eb0b8.exe iexplore.exe PID 2112 wrote to memory of 2060 2112 6887df54f455b1d9b464a6aef08eb0b8.exe iexplore.exe PID 2112 wrote to memory of 2060 2112 6887df54f455b1d9b464a6aef08eb0b8.exe iexplore.exe PID 2112 wrote to memory of 2060 2112 6887df54f455b1d9b464a6aef08eb0b8.exe iexplore.exe PID 2112 wrote to memory of 2060 2112 6887df54f455b1d9b464a6aef08eb0b8.exe iexplore.exe PID 2112 wrote to memory of 2060 2112 6887df54f455b1d9b464a6aef08eb0b8.exe iexplore.exe PID 2112 wrote to memory of 2060 2112 6887df54f455b1d9b464a6aef08eb0b8.exe iexplore.exe PID 2112 wrote to memory of 2060 2112 6887df54f455b1d9b464a6aef08eb0b8.exe iexplore.exe PID 2112 wrote to memory of 2060 2112 6887df54f455b1d9b464a6aef08eb0b8.exe iexplore.exe PID 2112 wrote to memory of 2060 2112 6887df54f455b1d9b464a6aef08eb0b8.exe iexplore.exe PID 2112 wrote to memory of 2060 2112 6887df54f455b1d9b464a6aef08eb0b8.exe iexplore.exe PID 2112 wrote to memory of 2060 2112 6887df54f455b1d9b464a6aef08eb0b8.exe iexplore.exe PID 2112 wrote to memory of 2060 2112 6887df54f455b1d9b464a6aef08eb0b8.exe iexplore.exe PID 2112 wrote to memory of 2060 2112 6887df54f455b1d9b464a6aef08eb0b8.exe iexplore.exe PID 2112 wrote to memory of 2060 2112 6887df54f455b1d9b464a6aef08eb0b8.exe iexplore.exe PID 2112 wrote to memory of 2060 2112 6887df54f455b1d9b464a6aef08eb0b8.exe iexplore.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6887df54f455b1d9b464a6aef08eb0b8.exe"C:\Users\Admin\AppData\Local\Temp\6887df54f455b1d9b464a6aef08eb0b8.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\6887df54f455b1d9b464a6aef08eb0b8.exe
- Adds policy Run key to start application
- Modifies Installed Components in the registry
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\6887df54f455b1d9b464a6aef08eb0b8.exe"C:\Users\Admin\AppData\Local\Temp\6887df54f455b1d9b464a6aef08eb0b8.exe"3⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵
-
C:\directory\CyberGate\install\server.exe
-
C:\directory\CyberGate\install\server.exe"C:\directory\CyberGate\install\server.exe"1⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/584-312-0x0000000010480000-0x00000000104E1000-memory.dmpFilesize
388KB
-
memory/584-1169-0x0000000010480000-0x00000000104E1000-memory.dmpFilesize
388KB
-
memory/584-24-0x00000000001B0000-0x00000000001B1000-memory.dmpFilesize
4KB
-
memory/584-29-0x00000000001D0000-0x00000000001D1000-memory.dmpFilesize
4KB
-
memory/584-35-0x00000000003D0000-0x00000000003D1000-memory.dmpFilesize
4KB
-
memory/1556-360-0x0000000000400000-0x0000000000455000-memory.dmpFilesize
340KB
-
memory/1556-353-0x0000000000400000-0x0000000000455000-memory.dmpFilesize
340KB
-
memory/1556-357-0x0000000000400000-0x0000000000455000-memory.dmpFilesize
340KB
-
memory/2112-10-0x0000000000400000-0x0000000000455000-memory.dmpFilesize
340KB
-
memory/2112-20-0x0000000010410000-0x0000000010471000-memory.dmpFilesize
388KB
-
memory/2112-8-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/2112-6-0x0000000000400000-0x0000000000455000-memory.dmpFilesize
340KB
-
memory/2112-313-0x0000000000400000-0x0000000000455000-memory.dmpFilesize
340KB
-
memory/2112-15-0x0000000000400000-0x0000000000455000-memory.dmpFilesize
340KB
-
memory/2112-12-0x0000000000400000-0x0000000000455000-memory.dmpFilesize
340KB
-
memory/2112-16-0x0000000000400000-0x0000000000455000-memory.dmpFilesize
340KB
-
memory/2112-13-0x0000000000400000-0x0000000000455000-memory.dmpFilesize
340KB
-
memory/2112-2-0x0000000000400000-0x0000000000455000-memory.dmpFilesize
340KB
-
memory/2112-14-0x0000000000400000-0x0000000000455000-memory.dmpFilesize
340KB
-
memory/2112-4-0x0000000000400000-0x0000000000455000-memory.dmpFilesize
340KB