Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
05/03/2024, 17:17
Static task
static1
Behavioral task
behavioral1
Sample
b53c22fd20cad0c6ceb6cb8a31d92ec4.exe
Resource
win7-20240221-en
General
-
Target
b53c22fd20cad0c6ceb6cb8a31d92ec4.exe
-
Size
724KB
-
MD5
b53c22fd20cad0c6ceb6cb8a31d92ec4
-
SHA1
4b98aa04058a9c6c32305f44fd1c16edee7fd3b7
-
SHA256
79add08db6dfebcd867ba55b5a9ca8b2d216f6c0d8377ad30a3f5ed72106642c
-
SHA512
85aa2aa364174b67227e2b11dd2f0d6c9412fa75b98d849e2e8084e1f0499b8d949ac247e6b474a2ddb705ed1f991f6647f60ab0b597c6e08b30e237657c948b
-
SSDEEP
12288:9O6fCYDzmVu4bDDq0tENwjo3vyH1QYilUj:9O4CiziDne3c1QYiUj
Malware Config
Extracted
cybergate
2.2
vítima
volkancan.no-ip.biz:81
***MUTEX***
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
install
-
install_file
scvhost.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
texto da mensagem
-
message_box_title
título da mensagem
-
password
abcd1234
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Signatures
-
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run b53c22fd20cad0c6ceb6cb8a31d92ec4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "c:\\dir\\install\\install\\scvhost.exe" b53c22fd20cad0c6ceb6cb8a31d92ec4.exe Key created \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run b53c22fd20cad0c6ceb6cb8a31d92ec4.exe Set value (str) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "c:\\dir\\install\\install\\scvhost.exe" b53c22fd20cad0c6ceb6cb8a31d92ec4.exe -
Modifies Installed Components in the registry 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E0J166O5-4H36-5TF0-7P38-HO2S2480L803}\StubPath = "c:\\dir\\install\\install\\scvhost.exe" explorer.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{E0J166O5-4H36-5TF0-7P38-HO2S2480L803} b53c22fd20cad0c6ceb6cb8a31d92ec4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E0J166O5-4H36-5TF0-7P38-HO2S2480L803}\StubPath = "c:\\dir\\install\\install\\scvhost.exe Restart" b53c22fd20cad0c6ceb6cb8a31d92ec4.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{E0J166O5-4H36-5TF0-7P38-HO2S2480L803} explorer.exe -
Deletes itself 1 IoCs
pid Process 1276 explorer.exe -
resource yara_rule behavioral2/memory/3804-9-0x0000000024010000-0x000000002404C000-memory.dmp upx behavioral2/memory/3804-57-0x0000000024050000-0x000000002408C000-memory.dmp upx behavioral2/memory/3996-61-0x0000000024050000-0x000000002408C000-memory.dmp upx behavioral2/memory/3996-62-0x0000000024050000-0x000000002408C000-memory.dmp upx behavioral2/memory/1276-117-0x0000000024090000-0x00000000240CC000-memory.dmp upx behavioral2/memory/3996-153-0x0000000024050000-0x000000002408C000-memory.dmp upx behavioral2/memory/1276-162-0x0000000024090000-0x00000000240CC000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "c:\\dir\\install\\install\\scvhost.exe" b53c22fd20cad0c6ceb6cb8a31d92ec4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "c:\\dir\\install\\install\\scvhost.exe" b53c22fd20cad0c6ceb6cb8a31d92ec4.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1996 set thread context of 3804 1996 b53c22fd20cad0c6ceb6cb8a31d92ec4.exe 90 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3804 b53c22fd20cad0c6ceb6cb8a31d92ec4.exe 3804 b53c22fd20cad0c6ceb6cb8a31d92ec4.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1276 explorer.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1276 explorer.exe Token: SeDebugPrivilege 1276 explorer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3804 b53c22fd20cad0c6ceb6cb8a31d92ec4.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1996 b53c22fd20cad0c6ceb6cb8a31d92ec4.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1996 wrote to memory of 3804 1996 b53c22fd20cad0c6ceb6cb8a31d92ec4.exe 90 PID 1996 wrote to memory of 3804 1996 b53c22fd20cad0c6ceb6cb8a31d92ec4.exe 90 PID 1996 wrote to memory of 3804 1996 b53c22fd20cad0c6ceb6cb8a31d92ec4.exe 90 PID 1996 wrote to memory of 3804 1996 b53c22fd20cad0c6ceb6cb8a31d92ec4.exe 90 PID 1996 wrote to memory of 3804 1996 b53c22fd20cad0c6ceb6cb8a31d92ec4.exe 90 PID 1996 wrote to memory of 3804 1996 b53c22fd20cad0c6ceb6cb8a31d92ec4.exe 90 PID 1996 wrote to memory of 3804 1996 b53c22fd20cad0c6ceb6cb8a31d92ec4.exe 90 PID 1996 wrote to memory of 3804 1996 b53c22fd20cad0c6ceb6cb8a31d92ec4.exe 90 PID 1996 wrote to memory of 3804 1996 b53c22fd20cad0c6ceb6cb8a31d92ec4.exe 90 PID 1996 wrote to memory of 3804 1996 b53c22fd20cad0c6ceb6cb8a31d92ec4.exe 90 PID 1996 wrote to memory of 3804 1996 b53c22fd20cad0c6ceb6cb8a31d92ec4.exe 90 PID 1996 wrote to memory of 3804 1996 b53c22fd20cad0c6ceb6cb8a31d92ec4.exe 90 PID 1996 wrote to memory of 3804 1996 b53c22fd20cad0c6ceb6cb8a31d92ec4.exe 90 PID 3804 wrote to memory of 3504 3804 b53c22fd20cad0c6ceb6cb8a31d92ec4.exe 57 PID 3804 wrote to memory of 3504 3804 b53c22fd20cad0c6ceb6cb8a31d92ec4.exe 57 PID 3804 wrote to memory of 3504 3804 b53c22fd20cad0c6ceb6cb8a31d92ec4.exe 57 PID 3804 wrote to memory of 3504 3804 b53c22fd20cad0c6ceb6cb8a31d92ec4.exe 57 PID 3804 wrote to memory of 3504 3804 b53c22fd20cad0c6ceb6cb8a31d92ec4.exe 57 PID 3804 wrote to memory of 3504 3804 b53c22fd20cad0c6ceb6cb8a31d92ec4.exe 57 PID 3804 wrote to memory of 3504 3804 b53c22fd20cad0c6ceb6cb8a31d92ec4.exe 57 PID 3804 wrote to memory of 3504 3804 b53c22fd20cad0c6ceb6cb8a31d92ec4.exe 57 PID 3804 wrote to memory of 3504 3804 b53c22fd20cad0c6ceb6cb8a31d92ec4.exe 57 PID 3804 wrote to memory of 3504 3804 b53c22fd20cad0c6ceb6cb8a31d92ec4.exe 57 PID 3804 wrote to memory of 3504 3804 b53c22fd20cad0c6ceb6cb8a31d92ec4.exe 57 PID 3804 wrote to memory of 3504 3804 b53c22fd20cad0c6ceb6cb8a31d92ec4.exe 57 PID 3804 wrote to memory of 3504 3804 b53c22fd20cad0c6ceb6cb8a31d92ec4.exe 57 PID 3804 wrote to memory of 3504 3804 b53c22fd20cad0c6ceb6cb8a31d92ec4.exe 57 PID 3804 wrote to memory of 3504 3804 b53c22fd20cad0c6ceb6cb8a31d92ec4.exe 57 PID 3804 wrote to memory of 3504 3804 b53c22fd20cad0c6ceb6cb8a31d92ec4.exe 57 PID 3804 wrote to memory of 3504 3804 b53c22fd20cad0c6ceb6cb8a31d92ec4.exe 57 PID 3804 wrote to memory of 3504 3804 b53c22fd20cad0c6ceb6cb8a31d92ec4.exe 57 PID 3804 wrote to memory of 3504 3804 b53c22fd20cad0c6ceb6cb8a31d92ec4.exe 57 PID 3804 wrote to memory of 3504 3804 b53c22fd20cad0c6ceb6cb8a31d92ec4.exe 57 PID 3804 wrote to memory of 3504 3804 b53c22fd20cad0c6ceb6cb8a31d92ec4.exe 57 PID 3804 wrote to memory of 3504 3804 b53c22fd20cad0c6ceb6cb8a31d92ec4.exe 57 PID 3804 wrote to memory of 3504 3804 b53c22fd20cad0c6ceb6cb8a31d92ec4.exe 57 PID 3804 wrote to memory of 3504 3804 b53c22fd20cad0c6ceb6cb8a31d92ec4.exe 57 PID 3804 wrote to memory of 3504 3804 b53c22fd20cad0c6ceb6cb8a31d92ec4.exe 57 PID 3804 wrote to memory of 3504 3804 b53c22fd20cad0c6ceb6cb8a31d92ec4.exe 57 PID 3804 wrote to memory of 3504 3804 b53c22fd20cad0c6ceb6cb8a31d92ec4.exe 57 PID 3804 wrote to memory of 3504 3804 b53c22fd20cad0c6ceb6cb8a31d92ec4.exe 57 PID 3804 wrote to memory of 3504 3804 b53c22fd20cad0c6ceb6cb8a31d92ec4.exe 57 PID 3804 wrote to memory of 3504 3804 b53c22fd20cad0c6ceb6cb8a31d92ec4.exe 57 PID 3804 wrote to memory of 3504 3804 b53c22fd20cad0c6ceb6cb8a31d92ec4.exe 57 PID 3804 wrote to memory of 3504 3804 b53c22fd20cad0c6ceb6cb8a31d92ec4.exe 57 PID 3804 wrote to memory of 3504 3804 b53c22fd20cad0c6ceb6cb8a31d92ec4.exe 57 PID 3804 wrote to memory of 3504 3804 b53c22fd20cad0c6ceb6cb8a31d92ec4.exe 57 PID 3804 wrote to memory of 3504 3804 b53c22fd20cad0c6ceb6cb8a31d92ec4.exe 57 PID 3804 wrote to memory of 3504 3804 b53c22fd20cad0c6ceb6cb8a31d92ec4.exe 57 PID 3804 wrote to memory of 3504 3804 b53c22fd20cad0c6ceb6cb8a31d92ec4.exe 57 PID 3804 wrote to memory of 3504 3804 b53c22fd20cad0c6ceb6cb8a31d92ec4.exe 57 PID 3804 wrote to memory of 3504 3804 b53c22fd20cad0c6ceb6cb8a31d92ec4.exe 57 PID 3804 wrote to memory of 3504 3804 b53c22fd20cad0c6ceb6cb8a31d92ec4.exe 57 PID 3804 wrote to memory of 3504 3804 b53c22fd20cad0c6ceb6cb8a31d92ec4.exe 57 PID 3804 wrote to memory of 3504 3804 b53c22fd20cad0c6ceb6cb8a31d92ec4.exe 57 PID 3804 wrote to memory of 3504 3804 b53c22fd20cad0c6ceb6cb8a31d92ec4.exe 57 PID 3804 wrote to memory of 3504 3804 b53c22fd20cad0c6ceb6cb8a31d92ec4.exe 57 PID 3804 wrote to memory of 3504 3804 b53c22fd20cad0c6ceb6cb8a31d92ec4.exe 57 PID 3804 wrote to memory of 3504 3804 b53c22fd20cad0c6ceb6cb8a31d92ec4.exe 57 PID 3804 wrote to memory of 3504 3804 b53c22fd20cad0c6ceb6cb8a31d92ec4.exe 57 PID 3804 wrote to memory of 3504 3804 b53c22fd20cad0c6ceb6cb8a31d92ec4.exe 57 PID 3804 wrote to memory of 3504 3804 b53c22fd20cad0c6ceb6cb8a31d92ec4.exe 57 PID 3804 wrote to memory of 3504 3804 b53c22fd20cad0c6ceb6cb8a31d92ec4.exe 57 PID 3804 wrote to memory of 3504 3804 b53c22fd20cad0c6ceb6cb8a31d92ec4.exe 57
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3504
-
C:\Users\Admin\AppData\Local\Temp\b53c22fd20cad0c6ceb6cb8a31d92ec4.exe"C:\Users\Admin\AppData\Local\Temp\b53c22fd20cad0c6ceb6cb8a31d92ec4.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Users\Admin\AppData\Local\Temp\b53c22fd20cad0c6ceb6cb8a31d92ec4.exeC:\Users\Admin\AppData\Local\Temp\b53c22fd20cad0c6ceb6cb8a31d92ec4.exe3⤵
- Adds policy Run key to start application
- Modifies Installed Components in the registry
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3804 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
- Modifies Installed Components in the registry
PID:3996
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
- Deletes itself
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:1276
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8B
MD5794fba68d915a92c7bdc37cf9e992d73
SHA1996924c352d1e26c4e3a7959be45835043570a42
SHA256664752e8dffc735b16f20ba4dc61429ea19e18131326f01fec41004a7ae29b48
SHA512e18900a9dcc13ecc087c04d20864b7233cef6f34046fdc83c19a8a063fbca9db6792227a81699aebe846c443aba383572ab3d0a58145e8bb7e6c14c6aa7cce50
-
Filesize
137KB
MD5111129a812b02d57773626cc6b2e6693
SHA10de3a1128540cd79d8c6bb888fd3608684fa6d66
SHA2564386207e6cd00164c2cce9edfe22c0ab35bb75f3582ceffbc2e71d8191ca4728
SHA5125ae3bf5d70c7795851e49f84d52885241fc11b0b330f1b0131012c0b00bf73f0ef47ee8f426928d1852651d18392e7483fd63992ff7366602b2409231114b57d
-
Filesize
15B
MD586f3c87caff4d7973404ff22c664505b
SHA1245bc19c345bc8e73645cd35f5af640bc489da19
SHA256e8ab966478c22925527b58b0a7c3d89e430690cbdabb44d501744e0ad0ac9ddb
SHA5120940c4b339640f60f1a21fc9e4e958bf84f0e668f33a9b24d483d1e6bfcf35eca45335afee1d3b7ff6fd091b2e395c151af8af3300e154d3ea3fdb2b73872024
-
Filesize
724KB
MD5b53c22fd20cad0c6ceb6cb8a31d92ec4
SHA14b98aa04058a9c6c32305f44fd1c16edee7fd3b7
SHA25679add08db6dfebcd867ba55b5a9ca8b2d216f6c0d8377ad30a3f5ed72106642c
SHA51285aa2aa364174b67227e2b11dd2f0d6c9412fa75b98d849e2e8084e1f0499b8d949ac247e6b474a2ddb705ed1f991f6647f60ab0b597c6e08b30e237657c948b