Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    155s
  • max time network
    164s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/12/2023, 15:10

General

  • Target

    780529b1f2597df7c84798d957bb07c5.exe

  • Size

    500KB

  • MD5

    780529b1f2597df7c84798d957bb07c5

  • SHA1

    440d9a6ab4bcb3771d19cf6b2ee76b45ebaf2c0f

  • SHA256

    20ba9344a62e3a39ffbb3c3dfce6a591271afbc6985228e0555bac3dec472a48

  • SHA512

    d9c54c833ddf480afe7f4181be2b8e1667f975dcfa8364ad1ce003872158cbd52ebd7dfc3e9296f6fb71a39d4e0f525175d9bb565c9e2f304218f6546642df50

  • SSDEEP

    12288:3xexIc4ZzqNFpDo6eTtPPbQ0iVuAqpc1pZMrlwXq3Mi:MxZHNFpDo7tPEMAUc1pZSwD

Malware Config

Extracted

Family

cybergate

Version

v1.07.5

C2

lstreeet.no-ip.biz:15963

Mutex

OAKTI06NWO4PTL

Attributes
  • enable_keylogger

    false

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    install

  • install_file

    winlogone.exe

  • install_flag

    false

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    whore1

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Signatures

  • CyberGate, Rebhip

    CyberGate is a lightweight remote administration tool with a wide array of functionalities.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • UPX packed file 17 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 13 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\780529b1f2597df7c84798d957bb07c5.exe
    "C:\Users\Admin\AppData\Local\Temp\780529b1f2597df7c84798d957bb07c5.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:868
    • C:\Users\Admin\AppData\Local\Temp\780529b1f2597df7c84798d957bb07c5.exe
      "C:\Users\Admin\AppData\Local\Temp\780529b1f2597df7c84798d957bb07c5.exe"
      2⤵
      • Checks computer location settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4808
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\CRSPY.bat" "
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3800
        • C:\Windows\SysWOW64\reg.exe
          REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Key Name real" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\FolderName@OFF@\real.exe" /f
          4⤵
          • Adds Run key to start application
          PID:228
      • C:\Users\Admin\AppData\Roaming\FolderName@OFF@\real.exe
        "C:\Users\Admin\AppData\Roaming\FolderName@OFF@\real.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:964
        • C:\Users\Admin\AppData\Roaming\FolderName@OFF@\real.exe
          "C:\Users\Admin\AppData\Roaming\FolderName@OFF@\real.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:1920
        • C:\Users\Admin\AppData\Roaming\FolderName@OFF@\real.exe
          "C:\Users\Admin\AppData\Roaming\FolderName@OFF@\real.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:1340
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:4032
            • C:\Users\Admin\AppData\Roaming\FolderName@OFF@\real.exe
              "C:\Users\Admin\AppData\Roaming\FolderName@OFF@\real.exe"
              5⤵
              • Checks computer location settings
              • Executes dropped EXE
              • Suspicious use of AdjustPrivilegeToken
              PID:2968
              • C:\Users\Admin\AppData\Roaming\FolderName@OFF@\real.exe
                "C:\Users\Admin\AppData\Roaming\FolderName@OFF@\real.exe"
                6⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:2016

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\Admin2.txt

      Filesize

      224KB

      MD5

      7f198c345ee51464a78fdce6345155bf

      SHA1

      790df04136ae8251c5f719f93fd0f0411daeba01

      SHA256

      b47ee1e4198cb7864f59b8e56a0c3586ab1fc407ebd870d24e1bf7b6d9f3061f

      SHA512

      854356180d58715b3327b953242bac94d0b5be0aabc29f9aa321ff204c822bd84f8a87999b3e932f9f45899fa6378e2b5633e80715e329f73f1d9362c9978547

    • C:\Users\Admin\AppData\Local\Temp\Admin7

      Filesize

      8B

      MD5

      c2674449586cc4e006e3a40e8966c25e

      SHA1

      66a55ec39a6f48c28f03dd2c4f8cb280e0ff7a3a

      SHA256

      8df79e3dacc144758d2b01aede67b0b13328150ed6f770cdc890e8fcf721b075

      SHA512

      76dc84cd70330011b51d8ca4c62ba2b910c84d83aa563dbe1e87d182ab0ecc2ea226aaa24e6e2cd86d5e786bb1950a69a1e74d5a162957e27d24a3f56afc167c

    • C:\Users\Admin\AppData\Local\Temp\Admin7

      Filesize

      8B

      MD5

      4a8cbd9063ca9e43bfed0c14d960fb1e

      SHA1

      b33d8af0679effc251eaa723ff020463c9cd960c

      SHA256

      ea68342725567d2f5b2be55089941262b6e005fadf703aef2d6745f522e687df

      SHA512

      1ca39acba8faef52b7de1e5f203c7f643cad3b5b4ebb9a1c7b18f165b4f067dc9b3817f63dd5d0cb50f423ae8c45a3d743cf8504a79fa2d6008b3de46124c1a2

    • C:\Users\Admin\AppData\Local\Temp\Admin8

      Filesize

      8B

      MD5

      a96516cdd9db38ffe97220a46f60387b

      SHA1

      da14f45ff1bc7845eb774c35b3c3ec6d02774739

      SHA256

      2314e6b012cc39d00e8f8bb7c12b63c11b03393d7bb353992cd1b60430078c24

      SHA512

      676f2f83b206532b9276f55c05ba12961cacca6dc4b19bd89d6aa7caddff7c77a5d9034246e6233ae14c3a0337d443279c49f8e55c569cf2a72e5f9e406600f5

    • C:\Users\Admin\AppData\Local\Temp\CRSPY.txt

      Filesize

      155B

      MD5

      f8c91c062813c5d40d7dad776438c3cc

      SHA1

      9db3fbda51c2f872ba693f6be0318b8d842b251c

      SHA256

      13b5540373c481fc4050c54b397e8569589e4a75737889bdb173c3d98343f7ef

      SHA512

      2e137f8920143b6a40a3ac9674e371b8e41f575a02b10765d9146ccc69091d6bc525f600304f1239c895e3a784a2c5caaa86270ebf8fe5c0b616d71eda968baf

    • C:\Users\Admin\AppData\Roaming\FolderName@OFF@\real.exe

      Filesize

      500KB

      MD5

      95020041ae43de325f8ab6f1fde65157

      SHA1

      8699ed95e9ccc84c8f8bdee3b53768d2474db50d

      SHA256

      fee0910da8667497de7d77c25ba68b6c3c967c31a4579eeccd1a1b96025c839b

      SHA512

      e12a73665364e2ac87ca871b0e9b9736ca457792b25efbb596880edc843e5e9a698123db3624a378e312ae94c7e0cdd9cf64538727fba0b0433b6deed4b685b0

    • memory/868-12-0x00000000001C0000-0x00000000001C1000-memory.dmp

      Filesize

      4KB

    • memory/868-3-0x00000000022E0000-0x00000000022E1000-memory.dmp

      Filesize

      4KB

    • memory/868-17-0x0000000000400000-0x0000000000580000-memory.dmp

      Filesize

      1.5MB

    • memory/868-0-0x0000000000400000-0x0000000000580000-memory.dmp

      Filesize

      1.5MB

    • memory/868-7-0x00000000022E0000-0x00000000022E1000-memory.dmp

      Filesize

      4KB

    • memory/868-5-0x0000000000400000-0x0000000000580000-memory.dmp

      Filesize

      1.5MB

    • memory/868-4-0x00000000022F0000-0x00000000022F1000-memory.dmp

      Filesize

      4KB

    • memory/868-14-0x00000000001D0000-0x00000000001D1000-memory.dmp

      Filesize

      4KB

    • memory/964-43-0x0000000000400000-0x0000000000580000-memory.dmp

      Filesize

      1.5MB

    • memory/964-47-0x0000000000400000-0x0000000000580000-memory.dmp

      Filesize

      1.5MB

    • memory/964-58-0x00000000001C0000-0x00000000001C1000-memory.dmp

      Filesize

      4KB

    • memory/964-61-0x00000000001D0000-0x00000000001D1000-memory.dmp

      Filesize

      4KB

    • memory/964-63-0x0000000000940000-0x0000000000941000-memory.dmp

      Filesize

      4KB

    • memory/964-69-0x0000000000400000-0x0000000000580000-memory.dmp

      Filesize

      1.5MB

    • memory/1340-81-0x0000000010410000-0x0000000010475000-memory.dmp

      Filesize

      404KB

    • memory/1340-71-0x0000000000400000-0x0000000000451000-memory.dmp

      Filesize

      324KB

    • memory/1340-78-0x0000000000400000-0x0000000000451000-memory.dmp

      Filesize

      324KB

    • memory/1340-67-0x0000000000400000-0x0000000000451000-memory.dmp

      Filesize

      324KB

    • memory/1340-74-0x0000000000400000-0x0000000000451000-memory.dmp

      Filesize

      324KB

    • memory/1340-64-0x0000000000400000-0x0000000000451000-memory.dmp

      Filesize

      324KB

    • memory/1920-161-0x0000000000400000-0x000000000040B000-memory.dmp

      Filesize

      44KB

    • memory/1920-149-0x0000000000400000-0x000000000040B000-memory.dmp

      Filesize

      44KB

    • memory/2016-170-0x00000000022F0000-0x00000000022F1000-memory.dmp

      Filesize

      4KB

    • memory/2968-85-0x00000000001E0000-0x00000000001E1000-memory.dmp

      Filesize

      4KB

    • memory/2968-86-0x00000000006E0000-0x00000000006E1000-memory.dmp

      Filesize

      4KB

    • memory/2968-89-0x0000000000400000-0x0000000000580000-memory.dmp

      Filesize

      1.5MB

    • memory/2968-151-0x0000000010480000-0x00000000104E5000-memory.dmp

      Filesize

      404KB

    • memory/4808-77-0x0000000000400000-0x000000000040B000-memory.dmp

      Filesize

      44KB

    • memory/4808-46-0x0000000000400000-0x000000000040B000-memory.dmp

      Filesize

      44KB

    • memory/4808-75-0x0000000000570000-0x0000000000639000-memory.dmp

      Filesize

      804KB

    • memory/4808-19-0x0000000000400000-0x000000000040B000-memory.dmp

      Filesize

      44KB

    • memory/4808-16-0x0000000000400000-0x000000000040B000-memory.dmp

      Filesize

      44KB

    • memory/4808-13-0x0000000000400000-0x000000000040B000-memory.dmp

      Filesize

      44KB