Analysis
-
max time kernel
141s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
18-03-2024 07:58
Static task
static1
Behavioral task
behavioral1
Sample
d2fbf37f71c1ad3a863d10c9530a405a.exe
Resource
win7-20240221-en
General
-
Target
d2fbf37f71c1ad3a863d10c9530a405a.exe
-
Size
381KB
-
MD5
d2fbf37f71c1ad3a863d10c9530a405a
-
SHA1
c2e15cebe59a2257d87090d61746578f3d55e0dc
-
SHA256
dc84b22662f9fae553acefc67187214561f02fe22bf6251bec85f6ad936a8103
-
SHA512
aa5a33ccbd91098504ba5a7d916cff99847bcb730491e8aefde9261cd2696c53aff7bf80b09604c82798a3ccb94a1a0005abcd47000cfb7d5a5f37925117de70
-
SSDEEP
6144:pc7bGqgzh4bXcukxIx048XtLEbavvmauYxD7A5UCz44sSIDgRLP:pc7bGB+bPkxh4i4avf379tDgpP
Malware Config
Extracted
cybergate
v1.07.5
remote
happysoap.no-ip.info:81
3UHQQ67I22I60D
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
svhost
-
install_file
svhost.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
cybergate
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Signatures
-
Adds policy Run key to start application 2 TTPs 4 IoCs
Processes:
d2fbf37f71c1ad3a863d10c9530a405a.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run d2fbf37f71c1ad3a863d10c9530a405a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\svhost\\svhost.exe" d2fbf37f71c1ad3a863d10c9530a405a.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run d2fbf37f71c1ad3a863d10c9530a405a.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\svhost\\svhost.exe" d2fbf37f71c1ad3a863d10c9530a405a.exe -
Modifies Installed Components in the registry 2 TTPs 2 IoCs
Processes:
d2fbf37f71c1ad3a863d10c9530a405a.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{4VL3C6J3-T6N7-6P73-XB72-EK56L7NI34GA} d2fbf37f71c1ad3a863d10c9530a405a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4VL3C6J3-T6N7-6P73-XB72-EK56L7NI34GA}\StubPath = "C:\\Windows\\system32\\svhost\\svhost.exe Restart" d2fbf37f71c1ad3a863d10c9530a405a.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
d2fbf37f71c1ad3a863d10c9530a405a.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\system32\\svhost\\svhost.exe" d2fbf37f71c1ad3a863d10c9530a405a.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\system32\\svhost\\svhost.exe" d2fbf37f71c1ad3a863d10c9530a405a.exe -
Drops file in System32 directory 2 IoCs
Processes:
d2fbf37f71c1ad3a863d10c9530a405a.exedescription ioc process File created C:\Windows\SysWOW64\svhost\svhost.exe d2fbf37f71c1ad3a863d10c9530a405a.exe File opened for modification C:\Windows\SysWOW64\svhost\svhost.exe d2fbf37f71c1ad3a863d10c9530a405a.exe -
Drops file in Windows directory 1 IoCs
Processes:
d2fbf37f71c1ad3a863d10c9530a405a.exedescription ioc process File opened for modification C:\Windows\PCGWIN32.LI5 d2fbf37f71c1ad3a863d10c9530a405a.exe -
Modifies registry class 3 IoCs
Processes:
d2fbf37f71c1ad3a863d10c9530a405a.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\{76A8E179-B5DD7302-B73DE308-FAAF0DDE} d2fbf37f71c1ad3a863d10c9530a405a.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\{76A8E179-B5DD7302-B73DE308-FAAF0DDE}\ = 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 d2fbf37f71c1ad3a863d10c9530a405a.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\{76A8E179-B5DD7302-B73DE308-FAAF0DDE}\ = bf83676fb0eddd40c6753121262ee3974cfff5d89dfd3925da02bc1b5804ff03a73400dde9c5b6eda1691e6e3977a26065abe293dd7386dcdf47380f9b88bc2a27b34fe3088395f3021bfa7ca259ccfe3666ee1f5647cf60975730b0d1ad76b610a173a69bfe7b18dcbfbbd824454cbd4be54cadb5556d7eead974c6f26d46cd591aba05627e25a61e6087c5bf7e2726d06fb097a20f1228fbd15b097c0e19771550afb7b76f1fc8f87460e3258392330b5ccb3acb9d8b39b3e2d3b23394a43efe279870046f4fa8684eaf17887faf986844493309240aa3d3cbf3b3e32403b31c5bc77c2fd948390c9a89fd1166bec1d8da4043e3849b7d03669c61c6fa7022d7a3bffb67a3d00bca4c8a368ca114510d3eea19757e1ed987c2cf82b774205dd5068e2fa9a82aa91571f1e615904d00368591dd4a4535de1ec6b99e5ab93d26e61f1f7838a1e2f60ae1547233d5ac4e75772e2f17c8b0ed918a3acd236a8ccbb5f45d90c670be6f66c8b110518b72b36b53acbbd6e3ce5c567bcf2377d410f1b19ed9f9c65a0182723c63198bfa8b1aab05eb3274559dce06d7218f42b7932f0c682b6d8c8a978b309452837dc3a64bf054dac33c1325842eb229e432fe2b58ec85d7018f2297553f8e181641f1869de0c59211328e55964e0e69c9b16da956c90f35489e95780163d6048e2fd688cf6b083451ef0a48b551e172b9651ea2f9bb626345b422e005b87d589a793d1e1a39835aa4829271810fb81c4facf95e6370762b5840f78d4a94f725a4a9438fbee4cced184376c0254b40a08ecbe7adfba8e5e947f1706d6b76ec212a269561fdda65c3c283849b5243cd4ce90bfd34edaf75a89ecf39086655d1020d63aaa492d13cc61920be21a65a60bdacd9c8bdb2e56c7169a62e11294a51cd8e4a484b37cc2075cfe228ebd154f2b1aa52b44522111332b49bdebbb8db20fbbd6365d40d8e4ad66d006af84b9a8c83eb4cd455023dd52672e1dbd944f91161ce5a6945725e53b9bbdda3f9fb61db9a437abc655a3e3b271c80bb839b1c4378f4199fc578e1999d42c53b7124ea6cca95ac027463ad04968fcf28085171ce6a578c0076912e062941f2eaec75f462623c75275ec08724b02fd9c83e34676d00f6b72f10884976ce2f36576f70e867376090fb7adb1dbb3a9ba3c3f30393b4349ee138b62551aeb288ad5269f38a94b37ddce607a080d8763a1fdb387c9f1bb8bc21d806bcb16496a1ffcdd8693c8a192c02eb038b04b37153a9443173529cfbc423d27b441cafc637de20787b675c20b901a6628fcdd7ca7f8c98683eb0e7d6bf71e7621f02b8e39c1b447cacdbf6fc90a6709e6506d21134b29392830a7b4d9b15fb8e5c3647af2ff7c89fd7c7400fbc68e6298e8a080aadb5752d6276cdef3517627ff318d48343448cdd2b850c3d49da9244cd43964cf18b12b475ad1eaa8755cfb2d7a53f92187bc15c3d475ae0c3d524bea1a78aefed372adfad8796efffd718ff85e7926fcd683657518036995fc2f83d63667c7f18a7fbafdc977bbf9ba7c3ff742753f033a214828d6af5ad9db579ad5e95f981198186c1905a76bda026ecde49f84aa0f5f2221add43c60ccfb7481facb8d61880792cda95024d7235e51eedf9a91d92fa7be264fc7f66d8913c36a55fd1388d61e99e71c79ac0c4438ed429beea268b819469cc4a34eba10ba29442bedd6679d11ab6836f6ce817b4f0e0272ee0c9a39144b9ff65d8aec556313fdad8457a1223f39c643b2c9c89c75570329ae302533b7cdc19473a20a5e19d3e7927e6df714721104ef7882f54c8fdaaa6b47f1098cb43537c4c6749c0b2c393a4bcc1992682619b4684e19146bac19ba6844fa1a87a7563621b553cbed9a7015f02b8239b24846383e4b4039f84b88d9b0a44745f6107722095a7beafd9f706df91078220f30dec4934ea13ec0c6a17eb309367348fe357b43fa35804b83d64e5fd5166fecf98c8c06f06a8fe0f9808f8a926edafc9c8f171d9e639b1265ee1875a40c37d7c5a59c3c2f4259faeb8b71f10f80f59a801c8a2881231f596ad31f5622d25aaa2f4fc5ee6b9eee5f651604a49ed0e29179670b0e1263e4f9948ba8f25c80ea9a936f15ee539e1e1d5110d4d56d63ff0989afebb985c047bdd2379dc5e04476380c4b523d2accb542b3dcc264beff4e89ea8386a9fb447e070551782001d4cf9cbdd2bb994e54e3d579af084e300dc69c76a10754f6e28d791c0368591923ef499603e81a73d5f1a787b21644eef897711e03682a10cf949da2d3db6266031371ee0393022eb6ceb898b2aac2b1594414d6eca69924e3489ddb579ad1aa944ed936a738d2c6a540b812c1e7647e100d95f41f8da657c325b9dc4c56cfd2be573f164159f3e8727aff0572c401529f2c92229130e04173d30e6d9d006fedf66b8a19f2ac74b3f2c98b5c5dda2c5150d822acdf36a5ccd39f6a66f0fc84890ed0a6aeb1573c22c45b71d607a03a2f41a61434ad4354c2e69970eb0d62130f62b61745a6145fe5259fdc6e6efcf97377fe05875392226dd7006d9e1c1fe49e7ee0096350f12c8cd53ca3bcd9c2a4633ff1ce7f9df26c71f7f3898dd03fa6ce5f5521db4badcda84ba321cad79155e82473a705b9dc4fa029d8bfaf4655fa187f11f663841a7c6bf5f2707d060b2b86226f5219d923a72a3ed6bc94ca9299172f9e32543b2449aff3c27d980855a5d43faece2d7e2800af7156072be6326931f7bf8dc1ebb471c0fb9e8de10477fc0d8f3075cc0c5b9629a2bc2cc3c4be42bbe6ca74b7074696f29a8f6cf108879e9214e8ac94ab2d55dfd86e59f0db8f55d9d86f9a1e17125aa62d463b2b41593fecc67290f8a888b2834d750c071a19ecec6298e96d6813efe59270660bf0be7acbf29676e9f09c7aa9f2b076cb0172a4073edec6a084d93d6c4318f9ac8854d2eb529e16abd4b25ab9e7346e4107f7bd85cb9b922e24cf50b11cb062b11734614a0ce7036e121722aed6caacb2d1355843ea0e6d63e0066b32193b6032f2cd76bffaca7089f31c7620fa5882df6ea90f3f2ac5cebb90c26695f12f88b61eb02b3f32c54890e0a976d0f16a8bfd0e7b49f2247a3a0e3bf63988cfa095a2a85f4516e02090bf25454800f44a8d36bbcf4679c80c6952ebec9677240eb794c9e0987b65f11f876a6ef1e178770cfef57c8b08e15a84e50f78d50954b4d2bb5ec9de9f952e54d7d4adab47cac59d402f2da643a9364433d249a33435cc4b8be5e18c7fda0a53b61a4f6039eb407dde0ba8be3746cd1888128312f9ae83c289b757b215c963b4024df6087f700dffb479ca0850ed117758052aac30c1b55bc3da6e6ced1164e7fa818d47dbca65a3045e52ede3747909f430734301da97969a6ca018c1209b58aae356852d1f5896e0917b6f0ee2d5616813ff5186d3d96e60e1f37386025532e8c766ad1ed35b5ae11a8862e1037b390dbca7b94dc3cc6d9a0b99d5d3aba255a9203fae4a2527a739b148473c39cecfa349a2f3c28a7290fd6e83ed1e77acfa4d7d04f4b484c31f72610afb597ae3fd7d830846b5234cd5f95b8cd1b153c8267dd6086aad174461e9047f29f630754303ea52741d00afcf3e6231e1c470520c28b d2fbf37f71c1ad3a863d10c9530a405a.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
d2fbf37f71c1ad3a863d10c9530a405a.exepid process 1772 d2fbf37f71c1ad3a863d10c9530a405a.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
d2fbf37f71c1ad3a863d10c9530a405a.exepid process 1772 d2fbf37f71c1ad3a863d10c9530a405a.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
d2fbf37f71c1ad3a863d10c9530a405a.exedescription pid process target process PID 1772 wrote to memory of 1356 1772 d2fbf37f71c1ad3a863d10c9530a405a.exe Explorer.EXE PID 1772 wrote to memory of 1356 1772 d2fbf37f71c1ad3a863d10c9530a405a.exe Explorer.EXE PID 1772 wrote to memory of 1356 1772 d2fbf37f71c1ad3a863d10c9530a405a.exe Explorer.EXE PID 1772 wrote to memory of 1356 1772 d2fbf37f71c1ad3a863d10c9530a405a.exe Explorer.EXE PID 1772 wrote to memory of 1356 1772 d2fbf37f71c1ad3a863d10c9530a405a.exe Explorer.EXE PID 1772 wrote to memory of 1356 1772 d2fbf37f71c1ad3a863d10c9530a405a.exe Explorer.EXE PID 1772 wrote to memory of 1356 1772 d2fbf37f71c1ad3a863d10c9530a405a.exe Explorer.EXE PID 1772 wrote to memory of 1356 1772 d2fbf37f71c1ad3a863d10c9530a405a.exe Explorer.EXE PID 1772 wrote to memory of 1356 1772 d2fbf37f71c1ad3a863d10c9530a405a.exe Explorer.EXE PID 1772 wrote to memory of 1356 1772 d2fbf37f71c1ad3a863d10c9530a405a.exe Explorer.EXE PID 1772 wrote to memory of 1356 1772 d2fbf37f71c1ad3a863d10c9530a405a.exe Explorer.EXE PID 1772 wrote to memory of 1356 1772 d2fbf37f71c1ad3a863d10c9530a405a.exe Explorer.EXE PID 1772 wrote to memory of 1356 1772 d2fbf37f71c1ad3a863d10c9530a405a.exe Explorer.EXE PID 1772 wrote to memory of 1356 1772 d2fbf37f71c1ad3a863d10c9530a405a.exe Explorer.EXE PID 1772 wrote to memory of 1356 1772 d2fbf37f71c1ad3a863d10c9530a405a.exe Explorer.EXE PID 1772 wrote to memory of 1356 1772 d2fbf37f71c1ad3a863d10c9530a405a.exe Explorer.EXE PID 1772 wrote to memory of 1356 1772 d2fbf37f71c1ad3a863d10c9530a405a.exe Explorer.EXE PID 1772 wrote to memory of 1356 1772 d2fbf37f71c1ad3a863d10c9530a405a.exe Explorer.EXE PID 1772 wrote to memory of 1356 1772 d2fbf37f71c1ad3a863d10c9530a405a.exe Explorer.EXE PID 1772 wrote to memory of 1356 1772 d2fbf37f71c1ad3a863d10c9530a405a.exe Explorer.EXE PID 1772 wrote to memory of 1356 1772 d2fbf37f71c1ad3a863d10c9530a405a.exe Explorer.EXE PID 1772 wrote to memory of 1356 1772 d2fbf37f71c1ad3a863d10c9530a405a.exe Explorer.EXE PID 1772 wrote to memory of 1356 1772 d2fbf37f71c1ad3a863d10c9530a405a.exe Explorer.EXE PID 1772 wrote to memory of 1356 1772 d2fbf37f71c1ad3a863d10c9530a405a.exe Explorer.EXE PID 1772 wrote to memory of 1356 1772 d2fbf37f71c1ad3a863d10c9530a405a.exe Explorer.EXE PID 1772 wrote to memory of 1356 1772 d2fbf37f71c1ad3a863d10c9530a405a.exe Explorer.EXE PID 1772 wrote to memory of 1356 1772 d2fbf37f71c1ad3a863d10c9530a405a.exe Explorer.EXE PID 1772 wrote to memory of 1356 1772 d2fbf37f71c1ad3a863d10c9530a405a.exe Explorer.EXE PID 1772 wrote to memory of 1356 1772 d2fbf37f71c1ad3a863d10c9530a405a.exe Explorer.EXE PID 1772 wrote to memory of 1356 1772 d2fbf37f71c1ad3a863d10c9530a405a.exe Explorer.EXE PID 1772 wrote to memory of 1356 1772 d2fbf37f71c1ad3a863d10c9530a405a.exe Explorer.EXE PID 1772 wrote to memory of 1356 1772 d2fbf37f71c1ad3a863d10c9530a405a.exe Explorer.EXE PID 1772 wrote to memory of 1356 1772 d2fbf37f71c1ad3a863d10c9530a405a.exe Explorer.EXE PID 1772 wrote to memory of 1356 1772 d2fbf37f71c1ad3a863d10c9530a405a.exe Explorer.EXE PID 1772 wrote to memory of 1356 1772 d2fbf37f71c1ad3a863d10c9530a405a.exe Explorer.EXE PID 1772 wrote to memory of 1356 1772 d2fbf37f71c1ad3a863d10c9530a405a.exe Explorer.EXE PID 1772 wrote to memory of 1356 1772 d2fbf37f71c1ad3a863d10c9530a405a.exe Explorer.EXE PID 1772 wrote to memory of 1356 1772 d2fbf37f71c1ad3a863d10c9530a405a.exe Explorer.EXE PID 1772 wrote to memory of 1356 1772 d2fbf37f71c1ad3a863d10c9530a405a.exe Explorer.EXE PID 1772 wrote to memory of 1356 1772 d2fbf37f71c1ad3a863d10c9530a405a.exe Explorer.EXE PID 1772 wrote to memory of 1356 1772 d2fbf37f71c1ad3a863d10c9530a405a.exe Explorer.EXE PID 1772 wrote to memory of 1356 1772 d2fbf37f71c1ad3a863d10c9530a405a.exe Explorer.EXE PID 1772 wrote to memory of 1356 1772 d2fbf37f71c1ad3a863d10c9530a405a.exe Explorer.EXE PID 1772 wrote to memory of 1356 1772 d2fbf37f71c1ad3a863d10c9530a405a.exe Explorer.EXE PID 1772 wrote to memory of 1356 1772 d2fbf37f71c1ad3a863d10c9530a405a.exe Explorer.EXE PID 1772 wrote to memory of 1356 1772 d2fbf37f71c1ad3a863d10c9530a405a.exe Explorer.EXE PID 1772 wrote to memory of 1356 1772 d2fbf37f71c1ad3a863d10c9530a405a.exe Explorer.EXE PID 1772 wrote to memory of 1356 1772 d2fbf37f71c1ad3a863d10c9530a405a.exe Explorer.EXE PID 1772 wrote to memory of 1356 1772 d2fbf37f71c1ad3a863d10c9530a405a.exe Explorer.EXE PID 1772 wrote to memory of 1356 1772 d2fbf37f71c1ad3a863d10c9530a405a.exe Explorer.EXE PID 1772 wrote to memory of 1356 1772 d2fbf37f71c1ad3a863d10c9530a405a.exe Explorer.EXE PID 1772 wrote to memory of 1356 1772 d2fbf37f71c1ad3a863d10c9530a405a.exe Explorer.EXE PID 1772 wrote to memory of 1356 1772 d2fbf37f71c1ad3a863d10c9530a405a.exe Explorer.EXE PID 1772 wrote to memory of 1356 1772 d2fbf37f71c1ad3a863d10c9530a405a.exe Explorer.EXE PID 1772 wrote to memory of 1356 1772 d2fbf37f71c1ad3a863d10c9530a405a.exe Explorer.EXE PID 1772 wrote to memory of 1356 1772 d2fbf37f71c1ad3a863d10c9530a405a.exe Explorer.EXE PID 1772 wrote to memory of 1356 1772 d2fbf37f71c1ad3a863d10c9530a405a.exe Explorer.EXE PID 1772 wrote to memory of 1356 1772 d2fbf37f71c1ad3a863d10c9530a405a.exe Explorer.EXE PID 1772 wrote to memory of 1356 1772 d2fbf37f71c1ad3a863d10c9530a405a.exe Explorer.EXE PID 1772 wrote to memory of 1356 1772 d2fbf37f71c1ad3a863d10c9530a405a.exe Explorer.EXE PID 1772 wrote to memory of 1356 1772 d2fbf37f71c1ad3a863d10c9530a405a.exe Explorer.EXE PID 1772 wrote to memory of 1356 1772 d2fbf37f71c1ad3a863d10c9530a405a.exe Explorer.EXE PID 1772 wrote to memory of 1356 1772 d2fbf37f71c1ad3a863d10c9530a405a.exe Explorer.EXE PID 1772 wrote to memory of 1356 1772 d2fbf37f71c1ad3a863d10c9530a405a.exe Explorer.EXE
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1356
-
C:\Users\Admin\AppData\Local\Temp\d2fbf37f71c1ad3a863d10c9530a405a.exe"C:\Users\Admin\AppData\Local\Temp\d2fbf37f71c1ad3a863d10c9530a405a.exe"2⤵
- Adds policy Run key to start application
- Modifies Installed Components in the registry
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:2792
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD594d22bef9b71747901a890b0234e6e38
SHA15e693c78788d80fb619948f80f10783fafd085ed
SHA2564db30cf1e8259b7bf5e393601daa8b5d3384ff8e15577aa0215c0f5e63e7de83
SHA5129442412a831649f806f6d72c10dee4234a50a73fa61c30d4f2b0825f2d2be23d04acb68932c773b84003bb396225fa951f5c50643fcea3415010f588bc3217f6