Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
28/01/2024, 04:39
Static task
static1
Behavioral task
behavioral1
Sample
7c2d4032fe9a740ee4eebd4c9dba4b2c.exe
Resource
win7-20231215-en
General
-
Target
7c2d4032fe9a740ee4eebd4c9dba4b2c.exe
-
Size
258KB
-
MD5
7c2d4032fe9a740ee4eebd4c9dba4b2c
-
SHA1
e5ca92f61d2d4efec0dc29223714f10cd340065b
-
SHA256
ddf51f86fda93814de759eeff8080b0435646a9313151780e4aa4d03c1d2d98a
-
SHA512
848f5079cd7de6b4d07b162388d1196548772847c154c4b6fdbad83071a23db3384b9a9507b9545061b0f3680d60e67a6d1c3a100cf0bb946c59b7bc5779a9da
-
SSDEEP
6144:uXwGGtfQEjcJf263r5JLdvf9cBEeT8pS3ci72MzfGOlnziTRCeq:uX+YEY2675JLF9cBVTGSMG2MzugnzFeq
Malware Config
Extracted
cybergate
2.2.3
Victima
habboflooder.no-ip.org:3460
***MUTEX***
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
asd
-
install_file
flooder.exe#
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
texto da mensagem
-
message_box_title
tÃtulo da mensagem
-
password
hola22
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Signatures
-
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 7c2d4032fe9a740ee4eebd4c9dba4b2c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\asd\\flooder.exe#" 7c2d4032fe9a740ee4eebd4c9dba4b2c.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 7c2d4032fe9a740ee4eebd4c9dba4b2c.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\asd\\flooder.exe#" 7c2d4032fe9a740ee4eebd4c9dba4b2c.exe -
Modifies Installed Components in the registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{08B0E5JF-4FCB-11CF-AAA5-00401C6XX500} 7c2d4032fe9a740ee4eebd4c9dba4b2c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{08B0E5JF-4FCB-11CF-AAA5-00401C6XX500}\StubPath = "C:\\Windows\\asd\\flooder.exe# Restart" 7c2d4032fe9a740ee4eebd4c9dba4b2c.exe -
resource yara_rule behavioral1/memory/2828-253-0x0000000024010000-0x000000002404E000-memory.dmp upx behavioral1/memory/2828-297-0x0000000024010000-0x000000002404E000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\asd\\flooder.exe#" 7c2d4032fe9a740ee4eebd4c9dba4b2c.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\asd\\flooder.exe#" 7c2d4032fe9a740ee4eebd4c9dba4b2c.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2184 set thread context of 2128 2184 7c2d4032fe9a740ee4eebd4c9dba4b2c.exe 28 -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\asd\flooder.exe# 7c2d4032fe9a740ee4eebd4c9dba4b2c.exe File opened for modification C:\Windows\asd\flooder.exe# 7c2d4032fe9a740ee4eebd4c9dba4b2c.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2128 7c2d4032fe9a740ee4eebd4c9dba4b2c.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2828 7c2d4032fe9a740ee4eebd4c9dba4b2c.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2828 7c2d4032fe9a740ee4eebd4c9dba4b2c.exe Token: SeDebugPrivilege 2828 7c2d4032fe9a740ee4eebd4c9dba4b2c.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2184 7c2d4032fe9a740ee4eebd4c9dba4b2c.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2184 wrote to memory of 2128 2184 7c2d4032fe9a740ee4eebd4c9dba4b2c.exe 28 PID 2184 wrote to memory of 2128 2184 7c2d4032fe9a740ee4eebd4c9dba4b2c.exe 28 PID 2184 wrote to memory of 2128 2184 7c2d4032fe9a740ee4eebd4c9dba4b2c.exe 28 PID 2184 wrote to memory of 2128 2184 7c2d4032fe9a740ee4eebd4c9dba4b2c.exe 28 PID 2184 wrote to memory of 2128 2184 7c2d4032fe9a740ee4eebd4c9dba4b2c.exe 28 PID 2184 wrote to memory of 2128 2184 7c2d4032fe9a740ee4eebd4c9dba4b2c.exe 28 PID 2184 wrote to memory of 2128 2184 7c2d4032fe9a740ee4eebd4c9dba4b2c.exe 28 PID 2184 wrote to memory of 2128 2184 7c2d4032fe9a740ee4eebd4c9dba4b2c.exe 28 PID 2184 wrote to memory of 2128 2184 7c2d4032fe9a740ee4eebd4c9dba4b2c.exe 28 PID 2184 wrote to memory of 2128 2184 7c2d4032fe9a740ee4eebd4c9dba4b2c.exe 28 PID 2184 wrote to memory of 2128 2184 7c2d4032fe9a740ee4eebd4c9dba4b2c.exe 28 PID 2184 wrote to memory of 2128 2184 7c2d4032fe9a740ee4eebd4c9dba4b2c.exe 28 PID 2128 wrote to memory of 2828 2128 7c2d4032fe9a740ee4eebd4c9dba4b2c.exe 29 PID 2128 wrote to memory of 2828 2128 7c2d4032fe9a740ee4eebd4c9dba4b2c.exe 29 PID 2128 wrote to memory of 2828 2128 7c2d4032fe9a740ee4eebd4c9dba4b2c.exe 29 PID 2128 wrote to memory of 2828 2128 7c2d4032fe9a740ee4eebd4c9dba4b2c.exe 29 PID 2128 wrote to memory of 2828 2128 7c2d4032fe9a740ee4eebd4c9dba4b2c.exe 29 PID 2128 wrote to memory of 2828 2128 7c2d4032fe9a740ee4eebd4c9dba4b2c.exe 29 PID 2128 wrote to memory of 2828 2128 7c2d4032fe9a740ee4eebd4c9dba4b2c.exe 29 PID 2128 wrote to memory of 2828 2128 7c2d4032fe9a740ee4eebd4c9dba4b2c.exe 29 PID 2128 wrote to memory of 2828 2128 7c2d4032fe9a740ee4eebd4c9dba4b2c.exe 29 PID 2128 wrote to memory of 2828 2128 7c2d4032fe9a740ee4eebd4c9dba4b2c.exe 29 PID 2128 wrote to memory of 2828 2128 7c2d4032fe9a740ee4eebd4c9dba4b2c.exe 29 PID 2128 wrote to memory of 2828 2128 7c2d4032fe9a740ee4eebd4c9dba4b2c.exe 29 PID 2128 wrote to memory of 2828 2128 7c2d4032fe9a740ee4eebd4c9dba4b2c.exe 29 PID 2128 wrote to memory of 2828 2128 7c2d4032fe9a740ee4eebd4c9dba4b2c.exe 29 PID 2128 wrote to memory of 2828 2128 7c2d4032fe9a740ee4eebd4c9dba4b2c.exe 29 PID 2128 wrote to memory of 2828 2128 7c2d4032fe9a740ee4eebd4c9dba4b2c.exe 29 PID 2128 wrote to memory of 2828 2128 7c2d4032fe9a740ee4eebd4c9dba4b2c.exe 29 PID 2128 wrote to memory of 2828 2128 7c2d4032fe9a740ee4eebd4c9dba4b2c.exe 29 PID 2128 wrote to memory of 2828 2128 7c2d4032fe9a740ee4eebd4c9dba4b2c.exe 29 PID 2128 wrote to memory of 2828 2128 7c2d4032fe9a740ee4eebd4c9dba4b2c.exe 29 PID 2128 wrote to memory of 2828 2128 7c2d4032fe9a740ee4eebd4c9dba4b2c.exe 29 PID 2128 wrote to memory of 2828 2128 7c2d4032fe9a740ee4eebd4c9dba4b2c.exe 29 PID 2128 wrote to memory of 2828 2128 7c2d4032fe9a740ee4eebd4c9dba4b2c.exe 29 PID 2128 wrote to memory of 2828 2128 7c2d4032fe9a740ee4eebd4c9dba4b2c.exe 29 PID 2128 wrote to memory of 2828 2128 7c2d4032fe9a740ee4eebd4c9dba4b2c.exe 29 PID 2128 wrote to memory of 2828 2128 7c2d4032fe9a740ee4eebd4c9dba4b2c.exe 29 PID 2128 wrote to memory of 2828 2128 7c2d4032fe9a740ee4eebd4c9dba4b2c.exe 29 PID 2128 wrote to memory of 2828 2128 7c2d4032fe9a740ee4eebd4c9dba4b2c.exe 29 PID 2128 wrote to memory of 2828 2128 7c2d4032fe9a740ee4eebd4c9dba4b2c.exe 29 PID 2128 wrote to memory of 2828 2128 7c2d4032fe9a740ee4eebd4c9dba4b2c.exe 29 PID 2128 wrote to memory of 2828 2128 7c2d4032fe9a740ee4eebd4c9dba4b2c.exe 29 PID 2128 wrote to memory of 2828 2128 7c2d4032fe9a740ee4eebd4c9dba4b2c.exe 29 PID 2128 wrote to memory of 2828 2128 7c2d4032fe9a740ee4eebd4c9dba4b2c.exe 29 PID 2128 wrote to memory of 2828 2128 7c2d4032fe9a740ee4eebd4c9dba4b2c.exe 29 PID 2128 wrote to memory of 2828 2128 7c2d4032fe9a740ee4eebd4c9dba4b2c.exe 29 PID 2128 wrote to memory of 2828 2128 7c2d4032fe9a740ee4eebd4c9dba4b2c.exe 29 PID 2128 wrote to memory of 2828 2128 7c2d4032fe9a740ee4eebd4c9dba4b2c.exe 29 PID 2128 wrote to memory of 2828 2128 7c2d4032fe9a740ee4eebd4c9dba4b2c.exe 29 PID 2128 wrote to memory of 2828 2128 7c2d4032fe9a740ee4eebd4c9dba4b2c.exe 29 PID 2128 wrote to memory of 2828 2128 7c2d4032fe9a740ee4eebd4c9dba4b2c.exe 29 PID 2128 wrote to memory of 2828 2128 7c2d4032fe9a740ee4eebd4c9dba4b2c.exe 29 PID 2128 wrote to memory of 2828 2128 7c2d4032fe9a740ee4eebd4c9dba4b2c.exe 29 PID 2128 wrote to memory of 2828 2128 7c2d4032fe9a740ee4eebd4c9dba4b2c.exe 29 PID 2128 wrote to memory of 2828 2128 7c2d4032fe9a740ee4eebd4c9dba4b2c.exe 29 PID 2128 wrote to memory of 2828 2128 7c2d4032fe9a740ee4eebd4c9dba4b2c.exe 29 PID 2128 wrote to memory of 2828 2128 7c2d4032fe9a740ee4eebd4c9dba4b2c.exe 29 PID 2128 wrote to memory of 2828 2128 7c2d4032fe9a740ee4eebd4c9dba4b2c.exe 29 PID 2128 wrote to memory of 2828 2128 7c2d4032fe9a740ee4eebd4c9dba4b2c.exe 29 PID 2128 wrote to memory of 2828 2128 7c2d4032fe9a740ee4eebd4c9dba4b2c.exe 29 PID 2128 wrote to memory of 2828 2128 7c2d4032fe9a740ee4eebd4c9dba4b2c.exe 29 PID 2128 wrote to memory of 2828 2128 7c2d4032fe9a740ee4eebd4c9dba4b2c.exe 29 PID 2128 wrote to memory of 2828 2128 7c2d4032fe9a740ee4eebd4c9dba4b2c.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\7c2d4032fe9a740ee4eebd4c9dba4b2c.exe"C:\Users\Admin\AppData\Local\Temp\7c2d4032fe9a740ee4eebd4c9dba4b2c.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Users\Admin\AppData\Local\Temp\7c2d4032fe9a740ee4eebd4c9dba4b2c.exeC:\Users\Admin\AppData\Local\Temp\7c2d4032fe9a740ee4eebd4c9dba4b2c.exe2⤵
- Adds policy Run key to start application
- Modifies Installed Components in the registry
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Users\Admin\AppData\Local\Temp\7c2d4032fe9a740ee4eebd4c9dba4b2c.exe"C:\Users\Admin\AppData\Local\Temp\7c2d4032fe9a740ee4eebd4c9dba4b2c.exe"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2828
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
141KB
MD5154bdcfc02bd3497f014a629cc1c8877
SHA12acfbbd6fe91c5c21b24f6689f096f63efd308a2
SHA2561d772499cb349fa710332880a70cf4d7b70a43e5172311ceb9ca76177dc611f0
SHA512cad6c417609cfb773207730783af5e9c6a7db24c01dcc6d59daedcb6ca258dc9ba967c2c99648f908cd28f56cdad7f66da59700eeb0a7d8d796c378f485b2107
-
Filesize
15B
MD586f3c87caff4d7973404ff22c664505b
SHA1245bc19c345bc8e73645cd35f5af640bc489da19
SHA256e8ab966478c22925527b58b0a7c3d89e430690cbdabb44d501744e0ad0ac9ddb
SHA5120940c4b339640f60f1a21fc9e4e958bf84f0e668f33a9b24d483d1e6bfcf35eca45335afee1d3b7ff6fd091b2e395c151af8af3300e154d3ea3fdb2b73872024