Malware Analysis Report

2025-06-16 02:17

Sample ID 240205-1nfbkabaen
Target 9314e39dbce88ec9d402499a770aae1f
SHA256 05b49a912ad9e25524601da4c363de4eba6cc862d627d51f43cf7f1f1cb39753
Tags
cybergate january persistence stealer trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

05b49a912ad9e25524601da4c363de4eba6cc862d627d51f43cf7f1f1cb39753

Threat Level: Known bad

The file 9314e39dbce88ec9d402499a770aae1f was found to be: Known bad.

Malicious Activity Summary

cybergate january persistence stealer trojan

CyberGate, Rebhip

Modifies Installed Components in the registry

Adds policy Run key to start application

AutoIT Executable

Drops file in System32 directory

Suspicious use of SetThreadContext

Unsigned PE

Enumerates physical storage devices

Program crash

Suspicious use of FindShellTrayWindow

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-02-05 21:47

Signatures

AutoIT Executable

Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-02-05 21:47

Reported

2024-02-05 21:50

Platform

win10v2004-20231222-en

Max time kernel

91s

Max time network

150s

Command Line

"C:\Users\Admin\AppData\Local\Temp\9314e39dbce88ec9d402499a770aae1f.exe"

Signatures

CyberGate, Rebhip

trojan stealer cybergate

Adds policy Run key to start application

persistence
Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run C:\Windows\SysWOW64\svchost.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\SYSTEM = "C:\\Windows\\system32\\Install\\svchost.exe" C:\Windows\SysWOW64\svchost.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run C:\Windows\SysWOW64\svchost.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\SYSTEM = "C:\\Windows\\system32\\Install\\svchost.exe" C:\Windows\SysWOW64\svchost.exe N/A

Modifies Installed Components in the registry

persistence
Description Indicator Process Target
Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Q0SCYFX6-EN3T-7VAX-PMQH-4IQQH3V225N7} C:\Windows\SysWOW64\svchost.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Q0SCYFX6-EN3T-7VAX-PMQH-4IQQH3V225N7}\StubPath = "C:\\Windows\\system32\\Install\\svchost.exe Restart" C:\Windows\SysWOW64\svchost.exe N/A

AutoIT Executable

Description Indicator Process Target
N/A N/A N/A N/A

Drops file in System32 directory

Description Indicator Process Target
File created C:\Windows\SysWOW64\Install\svchost.exe C:\Windows\SysWOW64\svchost.exe N/A
File opened for modification C:\Windows\SysWOW64\Install\svchost.exe C:\Windows\SysWOW64\svchost.exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 3832 set thread context of 956 N/A C:\Users\Admin\AppData\Local\Temp\9314e39dbce88ec9d402499a770aae1f.exe C:\Windows\SysWOW64\svchost.exe

Enumerates physical storage devices

Program crash

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\svchost.exe

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\svchost.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3832 wrote to memory of 956 N/A C:\Users\Admin\AppData\Local\Temp\9314e39dbce88ec9d402499a770aae1f.exe C:\Windows\SysWOW64\svchost.exe
PID 3832 wrote to memory of 956 N/A C:\Users\Admin\AppData\Local\Temp\9314e39dbce88ec9d402499a770aae1f.exe C:\Windows\SysWOW64\svchost.exe
PID 3832 wrote to memory of 956 N/A C:\Users\Admin\AppData\Local\Temp\9314e39dbce88ec9d402499a770aae1f.exe C:\Windows\SysWOW64\svchost.exe
PID 3832 wrote to memory of 956 N/A C:\Users\Admin\AppData\Local\Temp\9314e39dbce88ec9d402499a770aae1f.exe C:\Windows\SysWOW64\svchost.exe
PID 3832 wrote to memory of 956 N/A C:\Users\Admin\AppData\Local\Temp\9314e39dbce88ec9d402499a770aae1f.exe C:\Windows\SysWOW64\svchost.exe
PID 3832 wrote to memory of 956 N/A C:\Users\Admin\AppData\Local\Temp\9314e39dbce88ec9d402499a770aae1f.exe C:\Windows\SysWOW64\svchost.exe
PID 3832 wrote to memory of 956 N/A C:\Users\Admin\AppData\Local\Temp\9314e39dbce88ec9d402499a770aae1f.exe C:\Windows\SysWOW64\svchost.exe
PID 3832 wrote to memory of 956 N/A C:\Users\Admin\AppData\Local\Temp\9314e39dbce88ec9d402499a770aae1f.exe C:\Windows\SysWOW64\svchost.exe
PID 3832 wrote to memory of 956 N/A C:\Users\Admin\AppData\Local\Temp\9314e39dbce88ec9d402499a770aae1f.exe C:\Windows\SysWOW64\svchost.exe
PID 3832 wrote to memory of 956 N/A C:\Users\Admin\AppData\Local\Temp\9314e39dbce88ec9d402499a770aae1f.exe C:\Windows\SysWOW64\svchost.exe
PID 3832 wrote to memory of 956 N/A C:\Users\Admin\AppData\Local\Temp\9314e39dbce88ec9d402499a770aae1f.exe C:\Windows\SysWOW64\svchost.exe

Processes

C:\Users\Admin\AppData\Local\Temp\9314e39dbce88ec9d402499a770aae1f.exe

"C:\Users\Admin\AppData\Local\Temp\9314e39dbce88ec9d402499a770aae1f.exe"

C:\Windows\SysWOW64\svchost.exe

"C:\Windows\SysWOW64\svchost.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 956 -ip 956

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 956 -s 532

Network

Country Destination Domain Proto
US 8.8.8.8:53 133.211.185.52.in-addr.arpa udp
US 8.8.8.8:53 173.178.17.96.in-addr.arpa udp
US 8.8.8.8:53 140.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 58.55.71.13.in-addr.arpa udp
US 8.8.8.8:53 50.23.12.20.in-addr.arpa udp
US 8.8.8.8:53 56.126.166.20.in-addr.arpa udp
US 8.8.8.8:53 140.71.91.104.in-addr.arpa udp
US 8.8.8.8:53 175.178.17.96.in-addr.arpa udp
US 8.8.8.8:53 43.229.111.52.in-addr.arpa udp

Files

memory/3832-0-0x0000000000400000-0x0000000000505000-memory.dmp

memory/956-1-0x0000000000400000-0x000000000044F000-memory.dmp

memory/956-3-0x0000000000400000-0x000000000044F000-memory.dmp

memory/956-2-0x0000000000400000-0x000000000044F000-memory.dmp

memory/956-4-0x0000000000400000-0x000000000044F000-memory.dmp

memory/956-8-0x0000000000400000-0x000000000044F000-memory.dmp

Analysis: behavioral1

Detonation Overview

Submitted

2024-02-05 21:47

Reported

2024-02-05 21:50

Platform

win7-20231215-en

Max time kernel

118s

Max time network

133s

Command Line

"C:\Users\Admin\AppData\Local\Temp\9314e39dbce88ec9d402499a770aae1f.exe"

Signatures

CyberGate, Rebhip

trojan stealer cybergate

Adds policy Run key to start application

persistence
Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run C:\Windows\SysWOW64\svchost.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\SYSTEM = "C:\\Windows\\system32\\Install\\svchost.exe" C:\Windows\SysWOW64\svchost.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run C:\Windows\SysWOW64\svchost.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\SYSTEM = "C:\\Windows\\system32\\Install\\svchost.exe" C:\Windows\SysWOW64\svchost.exe N/A

Modifies Installed Components in the registry

persistence
Description Indicator Process Target
Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Q0SCYFX6-EN3T-7VAX-PMQH-4IQQH3V225N7} C:\Windows\SysWOW64\svchost.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Q0SCYFX6-EN3T-7VAX-PMQH-4IQQH3V225N7}\StubPath = "C:\\Windows\\system32\\Install\\svchost.exe Restart" C:\Windows\SysWOW64\svchost.exe N/A

AutoIT Executable

Description Indicator Process Target
N/A N/A N/A N/A

Drops file in System32 directory

Description Indicator Process Target
File created C:\Windows\SysWOW64\Install\svchost.exe C:\Windows\SysWOW64\svchost.exe N/A
File opened for modification C:\Windows\SysWOW64\Install\svchost.exe C:\Windows\SysWOW64\svchost.exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 1344 set thread context of 2544 N/A C:\Users\Admin\AppData\Local\Temp\9314e39dbce88ec9d402499a770aae1f.exe C:\Windows\SysWOW64\svchost.exe

Enumerates physical storage devices

Program crash

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\svchost.exe

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\svchost.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1344 wrote to memory of 2544 N/A C:\Users\Admin\AppData\Local\Temp\9314e39dbce88ec9d402499a770aae1f.exe C:\Windows\SysWOW64\svchost.exe
PID 1344 wrote to memory of 2544 N/A C:\Users\Admin\AppData\Local\Temp\9314e39dbce88ec9d402499a770aae1f.exe C:\Windows\SysWOW64\svchost.exe
PID 1344 wrote to memory of 2544 N/A C:\Users\Admin\AppData\Local\Temp\9314e39dbce88ec9d402499a770aae1f.exe C:\Windows\SysWOW64\svchost.exe
PID 1344 wrote to memory of 2544 N/A C:\Users\Admin\AppData\Local\Temp\9314e39dbce88ec9d402499a770aae1f.exe C:\Windows\SysWOW64\svchost.exe
PID 1344 wrote to memory of 2544 N/A C:\Users\Admin\AppData\Local\Temp\9314e39dbce88ec9d402499a770aae1f.exe C:\Windows\SysWOW64\svchost.exe
PID 1344 wrote to memory of 2544 N/A C:\Users\Admin\AppData\Local\Temp\9314e39dbce88ec9d402499a770aae1f.exe C:\Windows\SysWOW64\svchost.exe
PID 1344 wrote to memory of 2544 N/A C:\Users\Admin\AppData\Local\Temp\9314e39dbce88ec9d402499a770aae1f.exe C:\Windows\SysWOW64\svchost.exe
PID 1344 wrote to memory of 2544 N/A C:\Users\Admin\AppData\Local\Temp\9314e39dbce88ec9d402499a770aae1f.exe C:\Windows\SysWOW64\svchost.exe
PID 1344 wrote to memory of 2544 N/A C:\Users\Admin\AppData\Local\Temp\9314e39dbce88ec9d402499a770aae1f.exe C:\Windows\SysWOW64\svchost.exe
PID 1344 wrote to memory of 2544 N/A C:\Users\Admin\AppData\Local\Temp\9314e39dbce88ec9d402499a770aae1f.exe C:\Windows\SysWOW64\svchost.exe
PID 1344 wrote to memory of 2544 N/A C:\Users\Admin\AppData\Local\Temp\9314e39dbce88ec9d402499a770aae1f.exe C:\Windows\SysWOW64\svchost.exe
PID 1344 wrote to memory of 2544 N/A C:\Users\Admin\AppData\Local\Temp\9314e39dbce88ec9d402499a770aae1f.exe C:\Windows\SysWOW64\svchost.exe
PID 2544 wrote to memory of 2732 N/A C:\Windows\SysWOW64\svchost.exe C:\Windows\SysWOW64\WerFault.exe
PID 2544 wrote to memory of 2732 N/A C:\Windows\SysWOW64\svchost.exe C:\Windows\SysWOW64\WerFault.exe
PID 2544 wrote to memory of 2732 N/A C:\Windows\SysWOW64\svchost.exe C:\Windows\SysWOW64\WerFault.exe
PID 2544 wrote to memory of 2732 N/A C:\Windows\SysWOW64\svchost.exe C:\Windows\SysWOW64\WerFault.exe

Processes

C:\Users\Admin\AppData\Local\Temp\9314e39dbce88ec9d402499a770aae1f.exe

"C:\Users\Admin\AppData\Local\Temp\9314e39dbce88ec9d402499a770aae1f.exe"

C:\Windows\SysWOW64\svchost.exe

"C:\Windows\SysWOW64\svchost.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2544 -s 200

Network

N/A

Files

memory/1344-0-0x0000000000400000-0x0000000000505000-memory.dmp

memory/2544-7-0x0000000000400000-0x000000000044F000-memory.dmp

memory/2544-16-0x0000000000400000-0x000000000044F000-memory.dmp

memory/2544-15-0x0000000000400000-0x000000000044F000-memory.dmp

memory/2544-13-0x0000000000400000-0x000000000044F000-memory.dmp

memory/2544-17-0x0000000000400000-0x000000000044F000-memory.dmp

memory/2544-18-0x0000000000400000-0x000000000044F000-memory.dmp

memory/2544-11-0x0000000000400000-0x000000000044F000-memory.dmp

memory/2544-9-0x0000000000400000-0x000000000044F000-memory.dmp

memory/2544-5-0x0000000000400000-0x000000000044F000-memory.dmp

memory/2544-3-0x0000000000400000-0x000000000044F000-memory.dmp

memory/2544-1-0x0000000000400000-0x000000000044F000-memory.dmp

memory/2544-22-0x0000000000400000-0x000000000044F000-memory.dmp