Analysis
-
max time kernel
2s -
max time network
47s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
13-03-2024 00:50
Static task
static1
Behavioral task
behavioral1
Sample
c8d63fabb444fefb5199df3be8f67fb421fe96ec4301a3709253ee1a7729022a.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c8d63fabb444fefb5199df3be8f67fb421fe96ec4301a3709253ee1a7729022a.exe
Resource
win10v2004-20240226-en
General
-
Target
c8d63fabb444fefb5199df3be8f67fb421fe96ec4301a3709253ee1a7729022a.exe
-
Size
1008KB
-
MD5
65ba853b862ef14ef7e0f0fc2b899d45
-
SHA1
71427e66914058ea4fbba7e20b8e9f661401c273
-
SHA256
c8d63fabb444fefb5199df3be8f67fb421fe96ec4301a3709253ee1a7729022a
-
SHA512
bdf62ecf5e0e7316534886f80001c44909687649538bc2523820d06897ab821a78fd50891c318dc07a98154fce79a168a3260918e310d919fde0328da1046e93
-
SSDEEP
12288:+pqiC/2OGAtkCP4cejGSOpRKxC1T79AihWFkQ4eqHR1Jx0dWQLkpLHjwtQ:+po/2+ttPJLfpRKxC4IWWW6Hn
Malware Config
Extracted
cybergate
2.6
EL NUEVO FDP
operspicaz.no-ip.biz:1982
infosfenix.no-ip.org :6001
Java(TM) Plarform SE 9 U19
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./novo/
-
ftp_interval
30
-
injected_process
jusched.exe
-
install_dir
Java\jre6\bin
-
install_file
java(TM).exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
texto da mensagem
-
message_box_title
tÃtulo da mensagem
-
password
abcd1234
Signatures
-
Detects binaries and memory artifacts referencing sandbox product IDs 2 IoCs
resource yara_rule behavioral2/memory/2512-4-0x0000000000400000-0x0000000000458000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxProductID behavioral2/memory/2512-5-0x0000000000400000-0x0000000000458000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxProductID -
UPX dump on OEP (original entry point) 6 IoCs
resource yara_rule behavioral2/memory/2512-1-0x0000000000400000-0x0000000000458000-memory.dmp UPX behavioral2/memory/2512-3-0x0000000000400000-0x0000000000458000-memory.dmp UPX behavioral2/memory/2512-4-0x0000000000400000-0x0000000000458000-memory.dmp UPX behavioral2/memory/2512-5-0x0000000000400000-0x0000000000458000-memory.dmp UPX behavioral2/memory/2512-9-0x0000000024010000-0x0000000024072000-memory.dmp UPX behavioral2/memory/2316-74-0x0000000024080000-0x00000000240E2000-memory.dmp UPX -
resource yara_rule behavioral2/memory/2512-1-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral2/memory/2512-3-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral2/memory/2512-4-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral2/memory/2512-5-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral2/memory/2512-9-0x0000000024010000-0x0000000024072000-memory.dmp upx behavioral2/memory/2316-74-0x0000000024080000-0x00000000240E2000-memory.dmp upx -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/216-0-0x0000000000400000-0x00000000004CA000-memory.dmp autoit_exe behavioral2/files/0x000a000000023135-76.dat autoit_exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\Java\jre6\bin\java(TM).exe c8d63fabb444fefb5199df3be8f67fb421fe96ec4301a3709253ee1a7729022a.exe File opened for modification C:\Windows\SysWOW64\Java\jre6\bin\java(TM).exe c8d63fabb444fefb5199df3be8f67fb421fe96ec4301a3709253ee1a7729022a.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 216 set thread context of 2512 216 c8d63fabb444fefb5199df3be8f67fb421fe96ec4301a3709253ee1a7729022a.exe 90 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2512 c8d63fabb444fefb5199df3be8f67fb421fe96ec4301a3709253ee1a7729022a.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 216 wrote to memory of 2512 216 c8d63fabb444fefb5199df3be8f67fb421fe96ec4301a3709253ee1a7729022a.exe 90 PID 216 wrote to memory of 2512 216 c8d63fabb444fefb5199df3be8f67fb421fe96ec4301a3709253ee1a7729022a.exe 90 PID 216 wrote to memory of 2512 216 c8d63fabb444fefb5199df3be8f67fb421fe96ec4301a3709253ee1a7729022a.exe 90 PID 216 wrote to memory of 2512 216 c8d63fabb444fefb5199df3be8f67fb421fe96ec4301a3709253ee1a7729022a.exe 90 PID 216 wrote to memory of 2512 216 c8d63fabb444fefb5199df3be8f67fb421fe96ec4301a3709253ee1a7729022a.exe 90 PID 216 wrote to memory of 2512 216 c8d63fabb444fefb5199df3be8f67fb421fe96ec4301a3709253ee1a7729022a.exe 90 PID 2512 wrote to memory of 3556 2512 c8d63fabb444fefb5199df3be8f67fb421fe96ec4301a3709253ee1a7729022a.exe 57 PID 2512 wrote to memory of 3556 2512 c8d63fabb444fefb5199df3be8f67fb421fe96ec4301a3709253ee1a7729022a.exe 57 PID 2512 wrote to memory of 3556 2512 c8d63fabb444fefb5199df3be8f67fb421fe96ec4301a3709253ee1a7729022a.exe 57 PID 2512 wrote to memory of 3556 2512 c8d63fabb444fefb5199df3be8f67fb421fe96ec4301a3709253ee1a7729022a.exe 57 PID 2512 wrote to memory of 3556 2512 c8d63fabb444fefb5199df3be8f67fb421fe96ec4301a3709253ee1a7729022a.exe 57 PID 2512 wrote to memory of 3556 2512 c8d63fabb444fefb5199df3be8f67fb421fe96ec4301a3709253ee1a7729022a.exe 57 PID 2512 wrote to memory of 3556 2512 c8d63fabb444fefb5199df3be8f67fb421fe96ec4301a3709253ee1a7729022a.exe 57 PID 2512 wrote to memory of 3556 2512 c8d63fabb444fefb5199df3be8f67fb421fe96ec4301a3709253ee1a7729022a.exe 57 PID 2512 wrote to memory of 3556 2512 c8d63fabb444fefb5199df3be8f67fb421fe96ec4301a3709253ee1a7729022a.exe 57 PID 2512 wrote to memory of 3556 2512 c8d63fabb444fefb5199df3be8f67fb421fe96ec4301a3709253ee1a7729022a.exe 57 PID 2512 wrote to memory of 3556 2512 c8d63fabb444fefb5199df3be8f67fb421fe96ec4301a3709253ee1a7729022a.exe 57 PID 2512 wrote to memory of 3556 2512 c8d63fabb444fefb5199df3be8f67fb421fe96ec4301a3709253ee1a7729022a.exe 57 PID 2512 wrote to memory of 3556 2512 c8d63fabb444fefb5199df3be8f67fb421fe96ec4301a3709253ee1a7729022a.exe 57 PID 2512 wrote to memory of 3556 2512 c8d63fabb444fefb5199df3be8f67fb421fe96ec4301a3709253ee1a7729022a.exe 57 PID 2512 wrote to memory of 3556 2512 c8d63fabb444fefb5199df3be8f67fb421fe96ec4301a3709253ee1a7729022a.exe 57 PID 2512 wrote to memory of 3556 2512 c8d63fabb444fefb5199df3be8f67fb421fe96ec4301a3709253ee1a7729022a.exe 57 PID 2512 wrote to memory of 3556 2512 c8d63fabb444fefb5199df3be8f67fb421fe96ec4301a3709253ee1a7729022a.exe 57 PID 2512 wrote to memory of 3556 2512 c8d63fabb444fefb5199df3be8f67fb421fe96ec4301a3709253ee1a7729022a.exe 57 PID 2512 wrote to memory of 3556 2512 c8d63fabb444fefb5199df3be8f67fb421fe96ec4301a3709253ee1a7729022a.exe 57 PID 2512 wrote to memory of 3556 2512 c8d63fabb444fefb5199df3be8f67fb421fe96ec4301a3709253ee1a7729022a.exe 57 PID 2512 wrote to memory of 3556 2512 c8d63fabb444fefb5199df3be8f67fb421fe96ec4301a3709253ee1a7729022a.exe 57 PID 2512 wrote to memory of 3556 2512 c8d63fabb444fefb5199df3be8f67fb421fe96ec4301a3709253ee1a7729022a.exe 57 PID 2512 wrote to memory of 3556 2512 c8d63fabb444fefb5199df3be8f67fb421fe96ec4301a3709253ee1a7729022a.exe 57 PID 2512 wrote to memory of 3556 2512 c8d63fabb444fefb5199df3be8f67fb421fe96ec4301a3709253ee1a7729022a.exe 57 PID 2512 wrote to memory of 3556 2512 c8d63fabb444fefb5199df3be8f67fb421fe96ec4301a3709253ee1a7729022a.exe 57 PID 2512 wrote to memory of 3556 2512 c8d63fabb444fefb5199df3be8f67fb421fe96ec4301a3709253ee1a7729022a.exe 57 PID 2512 wrote to memory of 3556 2512 c8d63fabb444fefb5199df3be8f67fb421fe96ec4301a3709253ee1a7729022a.exe 57 PID 2512 wrote to memory of 3556 2512 c8d63fabb444fefb5199df3be8f67fb421fe96ec4301a3709253ee1a7729022a.exe 57 PID 2512 wrote to memory of 3556 2512 c8d63fabb444fefb5199df3be8f67fb421fe96ec4301a3709253ee1a7729022a.exe 57 PID 2512 wrote to memory of 3556 2512 c8d63fabb444fefb5199df3be8f67fb421fe96ec4301a3709253ee1a7729022a.exe 57 PID 2512 wrote to memory of 3556 2512 c8d63fabb444fefb5199df3be8f67fb421fe96ec4301a3709253ee1a7729022a.exe 57 PID 2512 wrote to memory of 3556 2512 c8d63fabb444fefb5199df3be8f67fb421fe96ec4301a3709253ee1a7729022a.exe 57 PID 2512 wrote to memory of 3556 2512 c8d63fabb444fefb5199df3be8f67fb421fe96ec4301a3709253ee1a7729022a.exe 57 PID 2512 wrote to memory of 3556 2512 c8d63fabb444fefb5199df3be8f67fb421fe96ec4301a3709253ee1a7729022a.exe 57 PID 2512 wrote to memory of 3556 2512 c8d63fabb444fefb5199df3be8f67fb421fe96ec4301a3709253ee1a7729022a.exe 57 PID 2512 wrote to memory of 3556 2512 c8d63fabb444fefb5199df3be8f67fb421fe96ec4301a3709253ee1a7729022a.exe 57 PID 2512 wrote to memory of 3556 2512 c8d63fabb444fefb5199df3be8f67fb421fe96ec4301a3709253ee1a7729022a.exe 57 PID 2512 wrote to memory of 3556 2512 c8d63fabb444fefb5199df3be8f67fb421fe96ec4301a3709253ee1a7729022a.exe 57 PID 2512 wrote to memory of 3556 2512 c8d63fabb444fefb5199df3be8f67fb421fe96ec4301a3709253ee1a7729022a.exe 57 PID 2512 wrote to memory of 3556 2512 c8d63fabb444fefb5199df3be8f67fb421fe96ec4301a3709253ee1a7729022a.exe 57 PID 2512 wrote to memory of 3556 2512 c8d63fabb444fefb5199df3be8f67fb421fe96ec4301a3709253ee1a7729022a.exe 57 PID 2512 wrote to memory of 3556 2512 c8d63fabb444fefb5199df3be8f67fb421fe96ec4301a3709253ee1a7729022a.exe 57 PID 2512 wrote to memory of 3556 2512 c8d63fabb444fefb5199df3be8f67fb421fe96ec4301a3709253ee1a7729022a.exe 57 PID 2512 wrote to memory of 3556 2512 c8d63fabb444fefb5199df3be8f67fb421fe96ec4301a3709253ee1a7729022a.exe 57 PID 2512 wrote to memory of 3556 2512 c8d63fabb444fefb5199df3be8f67fb421fe96ec4301a3709253ee1a7729022a.exe 57 PID 2512 wrote to memory of 3556 2512 c8d63fabb444fefb5199df3be8f67fb421fe96ec4301a3709253ee1a7729022a.exe 57 PID 2512 wrote to memory of 3556 2512 c8d63fabb444fefb5199df3be8f67fb421fe96ec4301a3709253ee1a7729022a.exe 57 PID 2512 wrote to memory of 3556 2512 c8d63fabb444fefb5199df3be8f67fb421fe96ec4301a3709253ee1a7729022a.exe 57 PID 2512 wrote to memory of 3556 2512 c8d63fabb444fefb5199df3be8f67fb421fe96ec4301a3709253ee1a7729022a.exe 57 PID 2512 wrote to memory of 3556 2512 c8d63fabb444fefb5199df3be8f67fb421fe96ec4301a3709253ee1a7729022a.exe 57 PID 2512 wrote to memory of 3556 2512 c8d63fabb444fefb5199df3be8f67fb421fe96ec4301a3709253ee1a7729022a.exe 57 PID 2512 wrote to memory of 3556 2512 c8d63fabb444fefb5199df3be8f67fb421fe96ec4301a3709253ee1a7729022a.exe 57 PID 2512 wrote to memory of 3556 2512 c8d63fabb444fefb5199df3be8f67fb421fe96ec4301a3709253ee1a7729022a.exe 57 PID 2512 wrote to memory of 3556 2512 c8d63fabb444fefb5199df3be8f67fb421fe96ec4301a3709253ee1a7729022a.exe 57 PID 2512 wrote to memory of 3556 2512 c8d63fabb444fefb5199df3be8f67fb421fe96ec4301a3709253ee1a7729022a.exe 57 PID 2512 wrote to memory of 3556 2512 c8d63fabb444fefb5199df3be8f67fb421fe96ec4301a3709253ee1a7729022a.exe 57 PID 2512 wrote to memory of 3556 2512 c8d63fabb444fefb5199df3be8f67fb421fe96ec4301a3709253ee1a7729022a.exe 57 PID 2512 wrote to memory of 3556 2512 c8d63fabb444fefb5199df3be8f67fb421fe96ec4301a3709253ee1a7729022a.exe 57
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3556
-
C:\Users\Admin\AppData\Local\Temp\c8d63fabb444fefb5199df3be8f67fb421fe96ec4301a3709253ee1a7729022a.exe"C:\Users\Admin\AppData\Local\Temp\c8d63fabb444fefb5199df3be8f67fb421fe96ec4301a3709253ee1a7729022a.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Users\Admin\AppData\Local\Temp\c8d63fabb444fefb5199df3be8f67fb421fe96ec4301a3709253ee1a7729022a.exe"C:\Users\Admin\AppData\Local\Temp\c8d63fabb444fefb5199df3be8f67fb421fe96ec4301a3709253ee1a7729022a.exe"3⤵
- Drops file in System32 directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵PID:2316
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:3904
-
-
C:\Users\Admin\AppData\Local\Temp\c8d63fabb444fefb5199df3be8f67fb421fe96ec4301a3709253ee1a7729022a.exe"C:\Users\Admin\AppData\Local\Temp\c8d63fabb444fefb5199df3be8f67fb421fe96ec4301a3709253ee1a7729022a.exe"4⤵PID:4560
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
240KB
MD511076fae895d26321ec2e16c5ff8229d
SHA1037dbc3ab440f207791e99d5567a5a786538e3fa
SHA2560be03cc04dee5bf638998b84f4e5ec36951e16aa65eaa8d34587e1adb853df16
SHA512fd9df4d6c60e39f14e07c712b37442fd8c1530401b77bed6a749a49242a46664b4517171c82fda2d899b903a9bf1e7d0ca9a51d0d7c1d4b3c368134e799c2de6
-
Filesize
1008KB
MD565ba853b862ef14ef7e0f0fc2b899d45
SHA171427e66914058ea4fbba7e20b8e9f661401c273
SHA256c8d63fabb444fefb5199df3be8f67fb421fe96ec4301a3709253ee1a7729022a
SHA512bdf62ecf5e0e7316534886f80001c44909687649538bc2523820d06897ab821a78fd50891c318dc07a98154fce79a168a3260918e310d919fde0328da1046e93