Analysis
-
max time kernel
144s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
13-03-2024 04:25
Behavioral task
behavioral1
Sample
c4f764597e9912dca5e7c462d99b965d.exe
Resource
win7-20240215-en
General
-
Target
c4f764597e9912dca5e7c462d99b965d.exe
-
Size
665KB
-
MD5
c4f764597e9912dca5e7c462d99b965d
-
SHA1
4b300b99f61cfec284fca6e1390eb30b7bba5803
-
SHA256
3c058a8e9c46df81f2cbc595282d8e46e25b0b4ecd883f901a30e59a660657ff
-
SHA512
edb16b61f68ae57c816eae37574512e1d556276a5abd9a2c1e4e2c70ab68dc9b22e31ba2012165ba32668d26b585665ee9ae9e11914357c314b926d99fcb68d3
-
SSDEEP
12288:qHLUMuiv9RgfSjAzRtyclz4pR1UMedz6lI1vV4u+0qsx:ItARZlkpR1Uhz+Q
Malware Config
Extracted
cybergate
v1.02.1
Lammer
matrix-hacker.no-ip.biz:81
Pluguin
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
Microsoft
-
install_file
virus.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
VOCÊ FOI HACKEADO ...SEU SISTEMA SERÁ FORMATADO.
-
message_box_title
LAMMER
-
password
123
-
regkey_hkcu
win32
-
regkey_hklm
win32
Signatures
-
Adds policy Run key to start application 2 TTPs 4 IoCs
Processes:
c4f764597e9912dca5e7c462d99b965d.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run c4f764597e9912dca5e7c462d99b965d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\Microsoft\\virus.exe" c4f764597e9912dca5e7c462d99b965d.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run c4f764597e9912dca5e7c462d99b965d.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\Microsoft\\virus.exe" c4f764597e9912dca5e7c462d99b965d.exe -
Modifies Installed Components in the registry 2 TTPs 2 IoCs
Processes:
c4f764597e9912dca5e7c462d99b965d.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{H0V7856I-51L8-A3TD-175P-TP5W65L7VIYQ}\StubPath = "C:\\Windows\\Microsoft\\virus.exe Restart" c4f764597e9912dca5e7c462d99b965d.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{H0V7856I-51L8-A3TD-175P-TP5W65L7VIYQ} c4f764597e9912dca5e7c462d99b965d.exe -
Processes:
resource yara_rule behavioral1/memory/2260-0-0x0000000000400000-0x00000000004E5000-memory.dmp upx behavioral1/memory/2260-17-0x0000000000400000-0x00000000004E5000-memory.dmp upx behavioral1/memory/2668-36-0x0000000000400000-0x00000000004E5000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
c4f764597e9912dca5e7c462d99b965d.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\win32 = "C:\\Windows\\Microsoft\\virus.exe" c4f764597e9912dca5e7c462d99b965d.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\win32 = "C:\\Windows\\Microsoft\\virus.exe" c4f764597e9912dca5e7c462d99b965d.exe -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral1/memory/2260-17-0x0000000000400000-0x00000000004E5000-memory.dmp autoit_exe behavioral1/memory/1632-85-0x0000000002130000-0x0000000002215000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
c4f764597e9912dca5e7c462d99b965d.exedescription pid process target process PID 2260 set thread context of 1632 2260 c4f764597e9912dca5e7c462d99b965d.exe c4f764597e9912dca5e7c462d99b965d.exe -
Drops file in Windows directory 2 IoCs
Processes:
c4f764597e9912dca5e7c462d99b965d.exedescription ioc process File created C:\Windows\Microsoft\virus.exe c4f764597e9912dca5e7c462d99b965d.exe File opened for modification C:\Windows\Microsoft\virus.exe c4f764597e9912dca5e7c462d99b965d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
c4f764597e9912dca5e7c462d99b965d.exepid process 1632 c4f764597e9912dca5e7c462d99b965d.exe -
Suspicious use of WriteProcessMemory 51 IoCs
Processes:
c4f764597e9912dca5e7c462d99b965d.exec4f764597e9912dca5e7c462d99b965d.exedescription pid process target process PID 2260 wrote to memory of 1632 2260 c4f764597e9912dca5e7c462d99b965d.exe c4f764597e9912dca5e7c462d99b965d.exe PID 2260 wrote to memory of 1632 2260 c4f764597e9912dca5e7c462d99b965d.exe c4f764597e9912dca5e7c462d99b965d.exe PID 2260 wrote to memory of 1632 2260 c4f764597e9912dca5e7c462d99b965d.exe c4f764597e9912dca5e7c462d99b965d.exe PID 2260 wrote to memory of 1632 2260 c4f764597e9912dca5e7c462d99b965d.exe c4f764597e9912dca5e7c462d99b965d.exe PID 2260 wrote to memory of 1632 2260 c4f764597e9912dca5e7c462d99b965d.exe c4f764597e9912dca5e7c462d99b965d.exe PID 2260 wrote to memory of 1632 2260 c4f764597e9912dca5e7c462d99b965d.exe c4f764597e9912dca5e7c462d99b965d.exe PID 2260 wrote to memory of 1632 2260 c4f764597e9912dca5e7c462d99b965d.exe c4f764597e9912dca5e7c462d99b965d.exe PID 2260 wrote to memory of 1632 2260 c4f764597e9912dca5e7c462d99b965d.exe c4f764597e9912dca5e7c462d99b965d.exe PID 2260 wrote to memory of 1632 2260 c4f764597e9912dca5e7c462d99b965d.exe c4f764597e9912dca5e7c462d99b965d.exe PID 2260 wrote to memory of 1632 2260 c4f764597e9912dca5e7c462d99b965d.exe c4f764597e9912dca5e7c462d99b965d.exe PID 2260 wrote to memory of 1632 2260 c4f764597e9912dca5e7c462d99b965d.exe c4f764597e9912dca5e7c462d99b965d.exe PID 1632 wrote to memory of 2668 1632 c4f764597e9912dca5e7c462d99b965d.exe c4f764597e9912dca5e7c462d99b965d.exe PID 1632 wrote to memory of 2668 1632 c4f764597e9912dca5e7c462d99b965d.exe c4f764597e9912dca5e7c462d99b965d.exe PID 1632 wrote to memory of 2668 1632 c4f764597e9912dca5e7c462d99b965d.exe c4f764597e9912dca5e7c462d99b965d.exe PID 1632 wrote to memory of 2668 1632 c4f764597e9912dca5e7c462d99b965d.exe c4f764597e9912dca5e7c462d99b965d.exe PID 1632 wrote to memory of 2668 1632 c4f764597e9912dca5e7c462d99b965d.exe c4f764597e9912dca5e7c462d99b965d.exe PID 1632 wrote to memory of 2668 1632 c4f764597e9912dca5e7c462d99b965d.exe c4f764597e9912dca5e7c462d99b965d.exe PID 1632 wrote to memory of 2668 1632 c4f764597e9912dca5e7c462d99b965d.exe c4f764597e9912dca5e7c462d99b965d.exe PID 1632 wrote to memory of 2668 1632 c4f764597e9912dca5e7c462d99b965d.exe c4f764597e9912dca5e7c462d99b965d.exe PID 1632 wrote to memory of 2668 1632 c4f764597e9912dca5e7c462d99b965d.exe c4f764597e9912dca5e7c462d99b965d.exe PID 1632 wrote to memory of 2668 1632 c4f764597e9912dca5e7c462d99b965d.exe c4f764597e9912dca5e7c462d99b965d.exe PID 1632 wrote to memory of 2668 1632 c4f764597e9912dca5e7c462d99b965d.exe c4f764597e9912dca5e7c462d99b965d.exe PID 1632 wrote to memory of 2668 1632 c4f764597e9912dca5e7c462d99b965d.exe c4f764597e9912dca5e7c462d99b965d.exe PID 1632 wrote to memory of 2668 1632 c4f764597e9912dca5e7c462d99b965d.exe c4f764597e9912dca5e7c462d99b965d.exe PID 1632 wrote to memory of 2668 1632 c4f764597e9912dca5e7c462d99b965d.exe c4f764597e9912dca5e7c462d99b965d.exe PID 1632 wrote to memory of 2668 1632 c4f764597e9912dca5e7c462d99b965d.exe c4f764597e9912dca5e7c462d99b965d.exe PID 1632 wrote to memory of 2668 1632 c4f764597e9912dca5e7c462d99b965d.exe c4f764597e9912dca5e7c462d99b965d.exe PID 1632 wrote to memory of 2668 1632 c4f764597e9912dca5e7c462d99b965d.exe c4f764597e9912dca5e7c462d99b965d.exe PID 1632 wrote to memory of 2668 1632 c4f764597e9912dca5e7c462d99b965d.exe c4f764597e9912dca5e7c462d99b965d.exe PID 1632 wrote to memory of 2668 1632 c4f764597e9912dca5e7c462d99b965d.exe c4f764597e9912dca5e7c462d99b965d.exe PID 1632 wrote to memory of 2668 1632 c4f764597e9912dca5e7c462d99b965d.exe c4f764597e9912dca5e7c462d99b965d.exe PID 1632 wrote to memory of 2668 1632 c4f764597e9912dca5e7c462d99b965d.exe c4f764597e9912dca5e7c462d99b965d.exe PID 1632 wrote to memory of 2668 1632 c4f764597e9912dca5e7c462d99b965d.exe c4f764597e9912dca5e7c462d99b965d.exe PID 1632 wrote to memory of 2668 1632 c4f764597e9912dca5e7c462d99b965d.exe c4f764597e9912dca5e7c462d99b965d.exe PID 1632 wrote to memory of 2668 1632 c4f764597e9912dca5e7c462d99b965d.exe c4f764597e9912dca5e7c462d99b965d.exe PID 1632 wrote to memory of 2668 1632 c4f764597e9912dca5e7c462d99b965d.exe c4f764597e9912dca5e7c462d99b965d.exe PID 1632 wrote to memory of 2668 1632 c4f764597e9912dca5e7c462d99b965d.exe c4f764597e9912dca5e7c462d99b965d.exe PID 1632 wrote to memory of 2668 1632 c4f764597e9912dca5e7c462d99b965d.exe c4f764597e9912dca5e7c462d99b965d.exe PID 1632 wrote to memory of 2668 1632 c4f764597e9912dca5e7c462d99b965d.exe c4f764597e9912dca5e7c462d99b965d.exe PID 1632 wrote to memory of 2668 1632 c4f764597e9912dca5e7c462d99b965d.exe c4f764597e9912dca5e7c462d99b965d.exe PID 1632 wrote to memory of 2668 1632 c4f764597e9912dca5e7c462d99b965d.exe c4f764597e9912dca5e7c462d99b965d.exe PID 1632 wrote to memory of 2668 1632 c4f764597e9912dca5e7c462d99b965d.exe c4f764597e9912dca5e7c462d99b965d.exe PID 1632 wrote to memory of 2668 1632 c4f764597e9912dca5e7c462d99b965d.exe c4f764597e9912dca5e7c462d99b965d.exe PID 1632 wrote to memory of 2668 1632 c4f764597e9912dca5e7c462d99b965d.exe c4f764597e9912dca5e7c462d99b965d.exe PID 1632 wrote to memory of 2668 1632 c4f764597e9912dca5e7c462d99b965d.exe c4f764597e9912dca5e7c462d99b965d.exe PID 1632 wrote to memory of 2668 1632 c4f764597e9912dca5e7c462d99b965d.exe c4f764597e9912dca5e7c462d99b965d.exe PID 1632 wrote to memory of 2668 1632 c4f764597e9912dca5e7c462d99b965d.exe c4f764597e9912dca5e7c462d99b965d.exe PID 1632 wrote to memory of 2668 1632 c4f764597e9912dca5e7c462d99b965d.exe c4f764597e9912dca5e7c462d99b965d.exe PID 1632 wrote to memory of 2668 1632 c4f764597e9912dca5e7c462d99b965d.exe c4f764597e9912dca5e7c462d99b965d.exe PID 1632 wrote to memory of 2668 1632 c4f764597e9912dca5e7c462d99b965d.exe c4f764597e9912dca5e7c462d99b965d.exe PID 1632 wrote to memory of 2668 1632 c4f764597e9912dca5e7c462d99b965d.exe c4f764597e9912dca5e7c462d99b965d.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c4f764597e9912dca5e7c462d99b965d.exe"C:\Users\Admin\AppData\Local\Temp\c4f764597e9912dca5e7c462d99b965d.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\c4f764597e9912dca5e7c462d99b965d.exe"C:\Users\Admin\AppData\Local\Temp\c4f764597e9912dca5e7c462d99b965d.exe"2⤵
- Adds policy Run key to start application
- Modifies Installed Components in the registry
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\c4f764597e9912dca5e7c462d99b965d.exe"C:\Users\Admin\AppData\Local\Temp\c4f764597e9912dca5e7c462d99b965d.exe"3⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1632-16-0x0000000000400000-0x000000000044E000-memory.dmpFilesize
312KB
-
memory/1632-35-0x0000000002130000-0x0000000002215000-memory.dmpFilesize
916KB
-
memory/1632-3-0x0000000000400000-0x000000000044E000-memory.dmpFilesize
312KB
-
memory/1632-5-0x0000000000400000-0x000000000044E000-memory.dmpFilesize
312KB
-
memory/1632-7-0x0000000000400000-0x000000000044E000-memory.dmpFilesize
312KB
-
memory/1632-9-0x0000000000400000-0x000000000044E000-memory.dmpFilesize
312KB
-
memory/1632-11-0x0000000000400000-0x000000000044E000-memory.dmpFilesize
312KB
-
memory/1632-15-0x0000000000400000-0x000000000044E000-memory.dmpFilesize
312KB
-
memory/1632-85-0x0000000002130000-0x0000000002215000-memory.dmpFilesize
916KB
-
memory/1632-1-0x0000000000400000-0x000000000044E000-memory.dmpFilesize
312KB
-
memory/1632-13-0x0000000000400000-0x000000000044E000-memory.dmpFilesize
312KB
-
memory/1632-18-0x0000000000400000-0x000000000044E000-memory.dmpFilesize
312KB
-
memory/1632-19-0x0000000000400000-0x000000000044E000-memory.dmpFilesize
312KB
-
memory/1632-84-0x0000000000400000-0x000000000044E000-memory.dmpFilesize
312KB
-
memory/2260-17-0x0000000000400000-0x00000000004E5000-memory.dmpFilesize
916KB
-
memory/2260-0-0x0000000000400000-0x00000000004E5000-memory.dmpFilesize
916KB
-
memory/2668-34-0x0000000000150000-0x0000000000151000-memory.dmpFilesize
4KB
-
memory/2668-23-0x00000000000B0000-0x00000000000B1000-memory.dmpFilesize
4KB
-
memory/2668-36-0x0000000000400000-0x00000000004E5000-memory.dmpFilesize
916KB
-
memory/2668-29-0x00000000000D0000-0x00000000000D1000-memory.dmpFilesize
4KB