Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
155s -
max time network
164s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 15:10
Behavioral task
behavioral1
Sample
780529b1f2597df7c84798d957bb07c5.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
780529b1f2597df7c84798d957bb07c5.exe
Resource
win10v2004-20231215-en
General
-
Target
780529b1f2597df7c84798d957bb07c5.exe
-
Size
500KB
-
MD5
780529b1f2597df7c84798d957bb07c5
-
SHA1
440d9a6ab4bcb3771d19cf6b2ee76b45ebaf2c0f
-
SHA256
20ba9344a62e3a39ffbb3c3dfce6a591271afbc6985228e0555bac3dec472a48
-
SHA512
d9c54c833ddf480afe7f4181be2b8e1667f975dcfa8364ad1ce003872158cbd52ebd7dfc3e9296f6fb71a39d4e0f525175d9bb565c9e2f304218f6546642df50
-
SSDEEP
12288:3xexIc4ZzqNFpDo6eTtPPbQ0iVuAqpc1pZMrlwXq3Mi:MxZHNFpDo7tPEMAUc1pZSwD
Malware Config
Extracted
cybergate
v1.07.5
lstreeet.no-ip.biz:15963
OAKTI06NWO4PTL
-
enable_keylogger
false
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
install
-
install_file
winlogone.exe
-
install_flag
false
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
whore1
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Control Panel\International\Geo\Nation 780529b1f2597df7c84798d957bb07c5.exe Key value queried \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Control Panel\International\Geo\Nation real.exe -
Executes dropped EXE 5 IoCs
pid Process 964 real.exe 1920 real.exe 1340 real.exe 2968 real.exe 2016 real.exe -
resource yara_rule behavioral2/memory/868-0-0x0000000000400000-0x0000000000580000-memory.dmp upx behavioral2/memory/868-5-0x0000000000400000-0x0000000000580000-memory.dmp upx behavioral2/memory/4808-13-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/868-17-0x0000000000400000-0x0000000000580000-memory.dmp upx behavioral2/memory/4808-16-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/4808-19-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/files/0x0006000000023268-35.dat upx behavioral2/memory/964-43-0x0000000000400000-0x0000000000580000-memory.dmp upx behavioral2/memory/4808-46-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/964-47-0x0000000000400000-0x0000000000580000-memory.dmp upx behavioral2/memory/964-69-0x0000000000400000-0x0000000000580000-memory.dmp upx behavioral2/memory/4808-77-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/1340-81-0x0000000010410000-0x0000000010475000-memory.dmp upx behavioral2/memory/2968-89-0x0000000000400000-0x0000000000580000-memory.dmp upx behavioral2/memory/1920-149-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/2968-151-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral2/memory/1920-161-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Key Name real = "C:\\Users\\Admin\\AppData\\Roaming\\FolderName@OFF@\\real.exe" reg.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 868 set thread context of 4808 868 780529b1f2597df7c84798d957bb07c5.exe 104 PID 964 set thread context of 1920 964 real.exe 111 PID 964 set thread context of 1340 964 real.exe 112 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 13 IoCs
description pid Process Token: SeDebugPrivilege 1920 real.exe Token: SeBackupPrivilege 2968 real.exe Token: SeRestorePrivilege 2968 real.exe Token: SeDebugPrivilege 2968 real.exe Token: SeDebugPrivilege 2968 real.exe Token: SeDebugPrivilege 1920 real.exe Token: SeDebugPrivilege 1920 real.exe Token: SeDebugPrivilege 1920 real.exe Token: SeDebugPrivilege 1920 real.exe Token: SeDebugPrivilege 1920 real.exe Token: SeDebugPrivilege 1920 real.exe Token: SeDebugPrivilege 1920 real.exe Token: SeDebugPrivilege 1920 real.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 868 780529b1f2597df7c84798d957bb07c5.exe 4808 780529b1f2597df7c84798d957bb07c5.exe 964 real.exe 1920 real.exe 2016 real.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 868 wrote to memory of 4808 868 780529b1f2597df7c84798d957bb07c5.exe 104 PID 868 wrote to memory of 4808 868 780529b1f2597df7c84798d957bb07c5.exe 104 PID 868 wrote to memory of 4808 868 780529b1f2597df7c84798d957bb07c5.exe 104 PID 868 wrote to memory of 4808 868 780529b1f2597df7c84798d957bb07c5.exe 104 PID 868 wrote to memory of 4808 868 780529b1f2597df7c84798d957bb07c5.exe 104 PID 868 wrote to memory of 4808 868 780529b1f2597df7c84798d957bb07c5.exe 104 PID 868 wrote to memory of 4808 868 780529b1f2597df7c84798d957bb07c5.exe 104 PID 868 wrote to memory of 4808 868 780529b1f2597df7c84798d957bb07c5.exe 104 PID 4808 wrote to memory of 3800 4808 780529b1f2597df7c84798d957bb07c5.exe 105 PID 4808 wrote to memory of 3800 4808 780529b1f2597df7c84798d957bb07c5.exe 105 PID 4808 wrote to memory of 3800 4808 780529b1f2597df7c84798d957bb07c5.exe 105 PID 3800 wrote to memory of 228 3800 cmd.exe 108 PID 3800 wrote to memory of 228 3800 cmd.exe 108 PID 3800 wrote to memory of 228 3800 cmd.exe 108 PID 4808 wrote to memory of 964 4808 780529b1f2597df7c84798d957bb07c5.exe 109 PID 4808 wrote to memory of 964 4808 780529b1f2597df7c84798d957bb07c5.exe 109 PID 4808 wrote to memory of 964 4808 780529b1f2597df7c84798d957bb07c5.exe 109 PID 964 wrote to memory of 1920 964 real.exe 111 PID 964 wrote to memory of 1920 964 real.exe 111 PID 964 wrote to memory of 1920 964 real.exe 111 PID 964 wrote to memory of 1920 964 real.exe 111 PID 964 wrote to memory of 1920 964 real.exe 111 PID 964 wrote to memory of 1920 964 real.exe 111 PID 964 wrote to memory of 1920 964 real.exe 111 PID 964 wrote to memory of 1920 964 real.exe 111 PID 964 wrote to memory of 1340 964 real.exe 112 PID 964 wrote to memory of 1340 964 real.exe 112 PID 964 wrote to memory of 1340 964 real.exe 112 PID 964 wrote to memory of 1340 964 real.exe 112 PID 964 wrote to memory of 1340 964 real.exe 112 PID 964 wrote to memory of 1340 964 real.exe 112 PID 964 wrote to memory of 1340 964 real.exe 112 PID 964 wrote to memory of 1340 964 real.exe 112 PID 964 wrote to memory of 1340 964 real.exe 112 PID 964 wrote to memory of 1340 964 real.exe 112 PID 964 wrote to memory of 1340 964 real.exe 112 PID 964 wrote to memory of 1340 964 real.exe 112 PID 964 wrote to memory of 1340 964 real.exe 112 PID 1340 wrote to memory of 4032 1340 real.exe 113 PID 1340 wrote to memory of 4032 1340 real.exe 113 PID 1340 wrote to memory of 4032 1340 real.exe 113 PID 1340 wrote to memory of 4032 1340 real.exe 113 PID 1340 wrote to memory of 4032 1340 real.exe 113 PID 1340 wrote to memory of 4032 1340 real.exe 113 PID 1340 wrote to memory of 4032 1340 real.exe 113 PID 1340 wrote to memory of 4032 1340 real.exe 113 PID 1340 wrote to memory of 4032 1340 real.exe 113 PID 1340 wrote to memory of 4032 1340 real.exe 113 PID 1340 wrote to memory of 4032 1340 real.exe 113 PID 1340 wrote to memory of 4032 1340 real.exe 113 PID 1340 wrote to memory of 4032 1340 real.exe 113 PID 1340 wrote to memory of 4032 1340 real.exe 113 PID 1340 wrote to memory of 4032 1340 real.exe 113 PID 1340 wrote to memory of 4032 1340 real.exe 113 PID 1340 wrote to memory of 4032 1340 real.exe 113 PID 1340 wrote to memory of 4032 1340 real.exe 113 PID 1340 wrote to memory of 4032 1340 real.exe 113 PID 1340 wrote to memory of 4032 1340 real.exe 113 PID 1340 wrote to memory of 4032 1340 real.exe 113 PID 1340 wrote to memory of 4032 1340 real.exe 113 PID 1340 wrote to memory of 4032 1340 real.exe 113 PID 1340 wrote to memory of 4032 1340 real.exe 113 PID 1340 wrote to memory of 4032 1340 real.exe 113 PID 1340 wrote to memory of 4032 1340 real.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\780529b1f2597df7c84798d957bb07c5.exe"C:\Users\Admin\AppData\Local\Temp\780529b1f2597df7c84798d957bb07c5.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:868 -
C:\Users\Admin\AppData\Local\Temp\780529b1f2597df7c84798d957bb07c5.exe"C:\Users\Admin\AppData\Local\Temp\780529b1f2597df7c84798d957bb07c5.exe"2⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\CRSPY.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:3800 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Key Name real" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\FolderName@OFF@\real.exe" /f4⤵
- Adds Run key to start application
PID:228
-
-
-
C:\Users\Admin\AppData\Roaming\FolderName@OFF@\real.exe"C:\Users\Admin\AppData\Roaming\FolderName@OFF@\real.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Users\Admin\AppData\Roaming\FolderName@OFF@\real.exe"C:\Users\Admin\AppData\Roaming\FolderName@OFF@\real.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1920
-
-
C:\Users\Admin\AppData\Roaming\FolderName@OFF@\real.exe"C:\Users\Admin\AppData\Roaming\FolderName@OFF@\real.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:4032
-
-
C:\Users\Admin\AppData\Roaming\FolderName@OFF@\real.exe"C:\Users\Admin\AppData\Roaming\FolderName@OFF@\real.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2968 -
C:\Users\Admin\AppData\Roaming\FolderName@OFF@\real.exe"C:\Users\Admin\AppData\Roaming\FolderName@OFF@\real.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2016
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD57f198c345ee51464a78fdce6345155bf
SHA1790df04136ae8251c5f719f93fd0f0411daeba01
SHA256b47ee1e4198cb7864f59b8e56a0c3586ab1fc407ebd870d24e1bf7b6d9f3061f
SHA512854356180d58715b3327b953242bac94d0b5be0aabc29f9aa321ff204c822bd84f8a87999b3e932f9f45899fa6378e2b5633e80715e329f73f1d9362c9978547
-
Filesize
8B
MD5c2674449586cc4e006e3a40e8966c25e
SHA166a55ec39a6f48c28f03dd2c4f8cb280e0ff7a3a
SHA2568df79e3dacc144758d2b01aede67b0b13328150ed6f770cdc890e8fcf721b075
SHA51276dc84cd70330011b51d8ca4c62ba2b910c84d83aa563dbe1e87d182ab0ecc2ea226aaa24e6e2cd86d5e786bb1950a69a1e74d5a162957e27d24a3f56afc167c
-
Filesize
8B
MD54a8cbd9063ca9e43bfed0c14d960fb1e
SHA1b33d8af0679effc251eaa723ff020463c9cd960c
SHA256ea68342725567d2f5b2be55089941262b6e005fadf703aef2d6745f522e687df
SHA5121ca39acba8faef52b7de1e5f203c7f643cad3b5b4ebb9a1c7b18f165b4f067dc9b3817f63dd5d0cb50f423ae8c45a3d743cf8504a79fa2d6008b3de46124c1a2
-
Filesize
8B
MD5a96516cdd9db38ffe97220a46f60387b
SHA1da14f45ff1bc7845eb774c35b3c3ec6d02774739
SHA2562314e6b012cc39d00e8f8bb7c12b63c11b03393d7bb353992cd1b60430078c24
SHA512676f2f83b206532b9276f55c05ba12961cacca6dc4b19bd89d6aa7caddff7c77a5d9034246e6233ae14c3a0337d443279c49f8e55c569cf2a72e5f9e406600f5
-
Filesize
155B
MD5f8c91c062813c5d40d7dad776438c3cc
SHA19db3fbda51c2f872ba693f6be0318b8d842b251c
SHA25613b5540373c481fc4050c54b397e8569589e4a75737889bdb173c3d98343f7ef
SHA5122e137f8920143b6a40a3ac9674e371b8e41f575a02b10765d9146ccc69091d6bc525f600304f1239c895e3a784a2c5caaa86270ebf8fe5c0b616d71eda968baf
-
Filesize
500KB
MD595020041ae43de325f8ab6f1fde65157
SHA18699ed95e9ccc84c8f8bdee3b53768d2474db50d
SHA256fee0910da8667497de7d77c25ba68b6c3c967c31a4579eeccd1a1b96025c839b
SHA512e12a73665364e2ac87ca871b0e9b9736ca457792b25efbb596880edc843e5e9a698123db3624a378e312ae94c7e0cdd9cf64538727fba0b0433b6deed4b685b0