Analysis
-
max time kernel
2s -
max time network
3s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06-03-2024 11:55
Behavioral task
behavioral1
Sample
b756cabdc438f199a443e6393ea04f0d.exe
Resource
win7-20240221-en
General
-
Target
b756cabdc438f199a443e6393ea04f0d.exe
-
Size
302KB
-
MD5
b756cabdc438f199a443e6393ea04f0d
-
SHA1
0167dd17939e796d2dcfea1c82f0b1b6fb788ba9
-
SHA256
20ea4faa2783de82e7786ce2c89d5c1f87c9287eb10907226964d1a64c122396
-
SHA512
311df7a8a82b66e1be1b921e737e0c0e3e278e2291365d4984fea83dbd451f21e0de9c06802f5d06e766204db74ae3602012ac598795e18d7c9dcae8be535dfb
-
SSDEEP
6144:2OpslFlqUhdBCkWYxuukP1pjSKSNVkq/MVJb6:2wsl3TBd47GLRMTb6
Malware Config
Extracted
cybergate
v1.07.5
cyber
79.132.181.169:100
8LUG2YFKPUT0DL
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
install
-
install_file
server.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
123456
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Signatures
-
Adds policy Run key to start application 2 TTPs 4 IoCs
Processes:
b756cabdc438f199a443e6393ea04f0d.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run b756cabdc438f199a443e6393ea04f0d.exe Set value (str) \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\install\\server.exe" b756cabdc438f199a443e6393ea04f0d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run b756cabdc438f199a443e6393ea04f0d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\install\\server.exe" b756cabdc438f199a443e6393ea04f0d.exe -
Modifies Installed Components in the registry 2 TTPs 2 IoCs
Processes:
b756cabdc438f199a443e6393ea04f0d.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{N0A1VPKU-2P00-H4RT-BX1A-R01Q0877408J} b756cabdc438f199a443e6393ea04f0d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{N0A1VPKU-2P00-H4RT-BX1A-R01Q0877408J}\StubPath = "C:\\Windows\\system32\\install\\server.exe Restart" b756cabdc438f199a443e6393ea04f0d.exe -
Processes:
resource yara_rule behavioral2/memory/3916-3-0x0000000010410000-0x0000000010475000-memory.dmp upx behavioral2/memory/3916-63-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral2/memory/1996-67-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral2/memory/1996-68-0x0000000010480000-0x00000000104E5000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
b756cabdc438f199a443e6393ea04f0d.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\system32\\install\\server.exe" b756cabdc438f199a443e6393ea04f0d.exe Set value (str) \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\system32\\install\\server.exe" b756cabdc438f199a443e6393ea04f0d.exe -
Drops file in System32 directory 2 IoCs
Processes:
b756cabdc438f199a443e6393ea04f0d.exedescription ioc process File created C:\Windows\SysWOW64\install\server.exe b756cabdc438f199a443e6393ea04f0d.exe File opened for modification C:\Windows\SysWOW64\install\server.exe b756cabdc438f199a443e6393ea04f0d.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
b756cabdc438f199a443e6393ea04f0d.exepid process 3916 b756cabdc438f199a443e6393ea04f0d.exe 3916 b756cabdc438f199a443e6393ea04f0d.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
explorer.exedescription pid process Token: SeBackupPrivilege 1996 explorer.exe Token: SeRestorePrivilege 1996 explorer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
b756cabdc438f199a443e6393ea04f0d.exepid process 3916 b756cabdc438f199a443e6393ea04f0d.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
b756cabdc438f199a443e6393ea04f0d.exedescription pid process target process PID 3916 wrote to memory of 3484 3916 b756cabdc438f199a443e6393ea04f0d.exe Explorer.EXE PID 3916 wrote to memory of 3484 3916 b756cabdc438f199a443e6393ea04f0d.exe Explorer.EXE PID 3916 wrote to memory of 3484 3916 b756cabdc438f199a443e6393ea04f0d.exe Explorer.EXE PID 3916 wrote to memory of 3484 3916 b756cabdc438f199a443e6393ea04f0d.exe Explorer.EXE PID 3916 wrote to memory of 3484 3916 b756cabdc438f199a443e6393ea04f0d.exe Explorer.EXE PID 3916 wrote to memory of 3484 3916 b756cabdc438f199a443e6393ea04f0d.exe Explorer.EXE PID 3916 wrote to memory of 3484 3916 b756cabdc438f199a443e6393ea04f0d.exe Explorer.EXE PID 3916 wrote to memory of 3484 3916 b756cabdc438f199a443e6393ea04f0d.exe Explorer.EXE PID 3916 wrote to memory of 3484 3916 b756cabdc438f199a443e6393ea04f0d.exe Explorer.EXE PID 3916 wrote to memory of 3484 3916 b756cabdc438f199a443e6393ea04f0d.exe Explorer.EXE PID 3916 wrote to memory of 3484 3916 b756cabdc438f199a443e6393ea04f0d.exe Explorer.EXE PID 3916 wrote to memory of 3484 3916 b756cabdc438f199a443e6393ea04f0d.exe Explorer.EXE PID 3916 wrote to memory of 3484 3916 b756cabdc438f199a443e6393ea04f0d.exe Explorer.EXE PID 3916 wrote to memory of 3484 3916 b756cabdc438f199a443e6393ea04f0d.exe Explorer.EXE PID 3916 wrote to memory of 3484 3916 b756cabdc438f199a443e6393ea04f0d.exe Explorer.EXE PID 3916 wrote to memory of 3484 3916 b756cabdc438f199a443e6393ea04f0d.exe Explorer.EXE PID 3916 wrote to memory of 3484 3916 b756cabdc438f199a443e6393ea04f0d.exe Explorer.EXE PID 3916 wrote to memory of 3484 3916 b756cabdc438f199a443e6393ea04f0d.exe Explorer.EXE PID 3916 wrote to memory of 3484 3916 b756cabdc438f199a443e6393ea04f0d.exe Explorer.EXE PID 3916 wrote to memory of 3484 3916 b756cabdc438f199a443e6393ea04f0d.exe Explorer.EXE PID 3916 wrote to memory of 3484 3916 b756cabdc438f199a443e6393ea04f0d.exe Explorer.EXE PID 3916 wrote to memory of 3484 3916 b756cabdc438f199a443e6393ea04f0d.exe Explorer.EXE PID 3916 wrote to memory of 3484 3916 b756cabdc438f199a443e6393ea04f0d.exe Explorer.EXE PID 3916 wrote to memory of 3484 3916 b756cabdc438f199a443e6393ea04f0d.exe Explorer.EXE PID 3916 wrote to memory of 3484 3916 b756cabdc438f199a443e6393ea04f0d.exe Explorer.EXE PID 3916 wrote to memory of 3484 3916 b756cabdc438f199a443e6393ea04f0d.exe Explorer.EXE PID 3916 wrote to memory of 3484 3916 b756cabdc438f199a443e6393ea04f0d.exe Explorer.EXE PID 3916 wrote to memory of 3484 3916 b756cabdc438f199a443e6393ea04f0d.exe Explorer.EXE PID 3916 wrote to memory of 3484 3916 b756cabdc438f199a443e6393ea04f0d.exe Explorer.EXE PID 3916 wrote to memory of 3484 3916 b756cabdc438f199a443e6393ea04f0d.exe Explorer.EXE PID 3916 wrote to memory of 3484 3916 b756cabdc438f199a443e6393ea04f0d.exe Explorer.EXE PID 3916 wrote to memory of 3484 3916 b756cabdc438f199a443e6393ea04f0d.exe Explorer.EXE PID 3916 wrote to memory of 3484 3916 b756cabdc438f199a443e6393ea04f0d.exe Explorer.EXE PID 3916 wrote to memory of 3484 3916 b756cabdc438f199a443e6393ea04f0d.exe Explorer.EXE PID 3916 wrote to memory of 3484 3916 b756cabdc438f199a443e6393ea04f0d.exe Explorer.EXE PID 3916 wrote to memory of 3484 3916 b756cabdc438f199a443e6393ea04f0d.exe Explorer.EXE PID 3916 wrote to memory of 3484 3916 b756cabdc438f199a443e6393ea04f0d.exe Explorer.EXE PID 3916 wrote to memory of 3484 3916 b756cabdc438f199a443e6393ea04f0d.exe Explorer.EXE PID 3916 wrote to memory of 3484 3916 b756cabdc438f199a443e6393ea04f0d.exe Explorer.EXE PID 3916 wrote to memory of 3484 3916 b756cabdc438f199a443e6393ea04f0d.exe Explorer.EXE PID 3916 wrote to memory of 3484 3916 b756cabdc438f199a443e6393ea04f0d.exe Explorer.EXE PID 3916 wrote to memory of 3484 3916 b756cabdc438f199a443e6393ea04f0d.exe Explorer.EXE PID 3916 wrote to memory of 3484 3916 b756cabdc438f199a443e6393ea04f0d.exe Explorer.EXE PID 3916 wrote to memory of 3484 3916 b756cabdc438f199a443e6393ea04f0d.exe Explorer.EXE PID 3916 wrote to memory of 3484 3916 b756cabdc438f199a443e6393ea04f0d.exe Explorer.EXE PID 3916 wrote to memory of 3484 3916 b756cabdc438f199a443e6393ea04f0d.exe Explorer.EXE PID 3916 wrote to memory of 3484 3916 b756cabdc438f199a443e6393ea04f0d.exe Explorer.EXE PID 3916 wrote to memory of 3484 3916 b756cabdc438f199a443e6393ea04f0d.exe Explorer.EXE PID 3916 wrote to memory of 3484 3916 b756cabdc438f199a443e6393ea04f0d.exe Explorer.EXE PID 3916 wrote to memory of 3484 3916 b756cabdc438f199a443e6393ea04f0d.exe Explorer.EXE PID 3916 wrote to memory of 3484 3916 b756cabdc438f199a443e6393ea04f0d.exe Explorer.EXE PID 3916 wrote to memory of 3484 3916 b756cabdc438f199a443e6393ea04f0d.exe Explorer.EXE PID 3916 wrote to memory of 3484 3916 b756cabdc438f199a443e6393ea04f0d.exe Explorer.EXE PID 3916 wrote to memory of 3484 3916 b756cabdc438f199a443e6393ea04f0d.exe Explorer.EXE PID 3916 wrote to memory of 3484 3916 b756cabdc438f199a443e6393ea04f0d.exe Explorer.EXE PID 3916 wrote to memory of 3484 3916 b756cabdc438f199a443e6393ea04f0d.exe Explorer.EXE PID 3916 wrote to memory of 3484 3916 b756cabdc438f199a443e6393ea04f0d.exe Explorer.EXE PID 3916 wrote to memory of 3484 3916 b756cabdc438f199a443e6393ea04f0d.exe Explorer.EXE PID 3916 wrote to memory of 3484 3916 b756cabdc438f199a443e6393ea04f0d.exe Explorer.EXE PID 3916 wrote to memory of 3484 3916 b756cabdc438f199a443e6393ea04f0d.exe Explorer.EXE PID 3916 wrote to memory of 3484 3916 b756cabdc438f199a443e6393ea04f0d.exe Explorer.EXE PID 3916 wrote to memory of 3484 3916 b756cabdc438f199a443e6393ea04f0d.exe Explorer.EXE PID 3916 wrote to memory of 3484 3916 b756cabdc438f199a443e6393ea04f0d.exe Explorer.EXE PID 3916 wrote to memory of 3484 3916 b756cabdc438f199a443e6393ea04f0d.exe Explorer.EXE
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Users\Admin\AppData\Local\Temp\b756cabdc438f199a443e6393ea04f0d.exe"C:\Users\Admin\AppData\Local\Temp\b756cabdc438f199a443e6393ea04f0d.exe"2⤵
- Adds policy Run key to start application
- Modifies Installed Components in the registry
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵
-
C:\Users\Admin\AppData\Local\Temp\b756cabdc438f199a443e6393ea04f0d.exe"C:\Users\Admin\AppData\Local\Temp\b756cabdc438f199a443e6393ea04f0d.exe"3⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\Admin2.txtFilesize
224KB
MD5f9dc6fa8e34af760e4d6e0b12279a41d
SHA1b08570ae7c001b8a0244b0188106883e8f5a3f1a
SHA256896811d42001553d0cea05166acad7f2f3f726af92c1d961a4428e567cb5c475
SHA512bb0fe687e82a6b2e33ecbac96cce28405e0078f0841b30422f439ef3eef5ba082883dc87d65c076aeabef5bd3a221d2e2d758eb56f393c5fc19685330221078e
-
C:\Windows\SysWOW64\install\server.exeFilesize
302KB
MD5b756cabdc438f199a443e6393ea04f0d
SHA10167dd17939e796d2dcfea1c82f0b1b6fb788ba9
SHA25620ea4faa2783de82e7786ce2c89d5c1f87c9287eb10907226964d1a64c122396
SHA512311df7a8a82b66e1be1b921e737e0c0e3e278e2291365d4984fea83dbd451f21e0de9c06802f5d06e766204db74ae3602012ac598795e18d7c9dcae8be535dfb
-
memory/1996-7-0x0000000001140000-0x0000000001141000-memory.dmpFilesize
4KB
-
memory/1996-8-0x0000000001400000-0x0000000001401000-memory.dmpFilesize
4KB
-
memory/1996-66-0x0000000003EF0000-0x0000000003EF1000-memory.dmpFilesize
4KB
-
memory/1996-67-0x0000000010480000-0x00000000104E5000-memory.dmpFilesize
404KB
-
memory/1996-68-0x0000000010480000-0x00000000104E5000-memory.dmpFilesize
404KB
-
memory/3916-3-0x0000000010410000-0x0000000010475000-memory.dmpFilesize
404KB
-
memory/3916-63-0x0000000010480000-0x00000000104E5000-memory.dmpFilesize
404KB