Analysis

  • max time kernel
    147s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-10-2024 02:40

General

  • Target

    c79362fef5007237e0009e594b90cec12269ddc634157217209f7003cf5e4608.exe

  • Size

    370KB

  • MD5

    2e99272fa450b91bc5d126150a39ba29

  • SHA1

    c40206dbaa5a0f37814b7aa212508034a805fd08

  • SHA256

    c79362fef5007237e0009e594b90cec12269ddc634157217209f7003cf5e4608

  • SHA512

    ff8dce6e3f1ca99349dc9128aad7048955592feabdf724a63df6be9761a991ec3025132f53402461f5c68aaee4768a6f60f169024772a13e0c6de059f871e821

  • SSDEEP

    6144:tLJI/R1pyG4RgqMF85L623ZfsVgU+Ihsbi7GYssFxvujoKPxChJn7qyv0NE3K:tLJI//pyG4RgqU85n0VZhKMlLKooxCho

Malware Config

Extracted

Family

cybergate

Version

v1.07.5

Botnet

remote

C2

kyzersoze.no-ip.org:1604

Mutex

P12YG2T751J65G

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    install

  • install_file

    svchost.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    00000

  • regkey_hklm

    HKLM

Signatures

  • CyberGate, Rebhip

    CyberGate is a lightweight remote administration tool with a wide array of functionalities.

  • Adds policy Run key to start application 2 TTPs 4 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c79362fef5007237e0009e594b90cec12269ddc634157217209f7003cf5e4608.exe
    "C:\Users\Admin\AppData\Local\Temp\c79362fef5007237e0009e594b90cec12269ddc634157217209f7003cf5e4608.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:180
    • C:\Users\Admin\AppData\Local\Temp\c79362fef5007237e0009e594b90cec12269ddc634157217209f7003cf5e4608.exe
      "C:\Users\Admin\AppData\Local\Temp\c79362fef5007237e0009e594b90cec12269ddc634157217209f7003cf5e4608.exe"
      2⤵
      • Adds policy Run key to start application
      • Boot or Logon Autostart Execution: Active Setup
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2764
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe"
        3⤵
          PID:3736
        • C:\Users\Admin\AppData\Local\Temp\c79362fef5007237e0009e594b90cec12269ddc634157217209f7003cf5e4608.exe
          "C:\Users\Admin\AppData\Local\Temp\c79362fef5007237e0009e594b90cec12269ddc634157217209f7003cf5e4608.exe"
          3⤵
          • Checks computer location settings
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of AdjustPrivilegeToken
          PID:4620
          • C:\install\svchost.exe
            "C:\install\svchost.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            PID:4192
            • C:\install\svchost.exe
              "C:\install\svchost.exe"
              5⤵
              • Executes dropped EXE
              PID:3296

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\Admin2.txt

      Filesize

      224KB

      MD5

      b45d44eb7bfbf8bfce93a149cb5826ad

      SHA1

      8971f4b32faa2fb28b05566f8fd8f7b687d3464c

      SHA256

      ff3749614b7c6428c4065d679ab53a7d6027a3b63307669811ff4716e4393784

      SHA512

      c5569b83a4711a067378980163407e4bc7fd4e645a2084fd55d5486370ec5adc20f23db504863e575d60ba6002fa1f0b7f5655a0dfb22d53e0daacc3e506b4ce

    • C:\Users\Admin\AppData\Local\Temp\Admin7

      Filesize

      8B

      MD5

      fa3dbbf77983177b2bc96e0975feebd2

      SHA1

      cdca49d7fd4864521ccca2440283e9277721e271

      SHA256

      f8497af8ffe6b4720517c2cf7f8ed0e1b16626edfb8e5d7b671f2221872092fa

      SHA512

      c26d9ce8d382ac38da98a8516ff4e2b4afc94e02c6f2454f4ae01913bf343cfe04f795524e774b1609e3e43ab5e96a7ee717dfb9c10459ea64e123bf0a7a9d0c

    • C:\Users\Admin\AppData\Local\Temp\Admin7

      Filesize

      8B

      MD5

      9679e6d4eaec1a41b14f13891c05a70e

      SHA1

      f96f8841f26e2e2b4d5999cd6f76eab85620dfa8

      SHA256

      4814d587d366b483c1722266b5124e3b947ab667a5c8e100cbf14b6a78ef3392

      SHA512

      dfcdafcb1c77c8a96790c5d281ff922d68130ab98162770727117be7c1efc1788af64cb60135264640c8a2e9634a30c8889fd9b82e38b6cb305d305e63dac93f

    • C:\Users\Admin\AppData\Local\Temp\Admin7

      Filesize

      8B

      MD5

      ceb85c0f2bea3679d4bea255a358816c

      SHA1

      0dc2ef8df3768b0ff1e32a48cb2c9b69cb85bc69

      SHA256

      ff6f6dbe00e6da6f4a5991b0e808f7c9cc01b82ad70fcf173a44bdbfbb16eb00

      SHA512

      263f81a20e2334659b91b72e223ed30fcbc925e301b2ee9232744a4b3b05cb1a28efd6d8a4f7011659f52111e6217fe355195e0890afece8f16d049cfadbd766

    • C:\Users\Admin\AppData\Local\Temp\Admin7

      Filesize

      8B

      MD5

      a2391235f6e4f7f72941eb9a1ab91eab

      SHA1

      b0c4ac13d85139e9fb994dd2c472f3c2b69b444f

      SHA256

      4da92272ec5b30cfb992403c00db4fa18a827994f6e7b5f143c37ac4364140a6

      SHA512

      037a6e99433500808f637b0afa63a147c1f0f5c32711a1a99b15c08324dc893c097413da5463827377f2a3d72f03ab375e30470c6f351ca3f041b4eb8b66cfdc

    • C:\Users\Admin\AppData\Local\Temp\Admin7

      Filesize

      8B

      MD5

      567aecaca94ade208ee471e23602e7b7

      SHA1

      1c6827c5c08494c21cb3816b5329ffab293110c1

      SHA256

      0f9114278596bb9b7f0ab4bf315b5a3324193148ebe5e15ede5361ed3eedc7c6

      SHA512

      919892f07b5031874135a25712f9fe1f4c3080140bfc1e66962183d597998c0cc457cb35728bacbf2f16abe0b9336be9f966d8e0f1897d987ff966658050224d

    • C:\Users\Admin\AppData\Local\Temp\Admin7

      Filesize

      8B

      MD5

      e02d622e644f342d216715de7bcedc49

      SHA1

      1a1ba739557463e50fd5abb5a6318feccfaa4e86

      SHA256

      896bbfdd14d9b95ed75c648a8542d4eb0d95bdc5204a45e93290a149694fe56e

      SHA512

      6475b43b4ee2283bac240bc6d58a27a68cf5444e0db8f04904f5e71543b269601fb9ba2e4615ade84069d0f1d68f5d7586b0ef0bd9f6ebed1b968fe0f1fb5cfd

    • C:\Users\Admin\AppData\Local\Temp\Admin7

      Filesize

      8B

      MD5

      0b45522009bc5466ffe3fe8a46e9fc5e

      SHA1

      e2f82d32a95b15533df86c6a088c7cf46b668df8

      SHA256

      586495fdb332bd8ea74c116bf29b102171734ca2f74d5e1a9ab9e9edb7031c21

      SHA512

      cdc24de27f25fd9f661ed8fac726344c09f2cd536b69907a5e7311383c1154762c605d832e6f1fbc6ddca5c370fe12ffa8646672eb4dfe1bb25f06320f1064d3

    • C:\Users\Admin\AppData\Local\Temp\Admin7

      Filesize

      8B

      MD5

      507b55ebd4934e0b8f59a289f50e42b6

      SHA1

      0b5befa781a06980227ea80fb71a3bf0cda2ccc8

      SHA256

      228903eaaffa85ece0d763edb6d8b116ed86547d8d5ecca77fc03d3ef5903dbc

      SHA512

      9e8e902649ff8e3150e11e9fd169d6d67e04574bd98d87c705aa92aab628ddd98573c4bd6c9a217df24624b4cd2f519dde89304f4d39a05913c50a0eda283cdf

    • C:\Users\Admin\AppData\Local\Temp\Admin7

      Filesize

      8B

      MD5

      221338bb2f8c8c00925d382c84479d0a

      SHA1

      736be5676eaf47332b12b41e4cfcdf8ec25ee64e

      SHA256

      af6a7b09cc523d10f745533b6c5893cc9b0706dc58f086678a3952e32494b76d

      SHA512

      429e8c6eb239d41327416b36991b2dc49dc172f418389fea83e33a6c751a89bb1b9f36f9fbe7af421b5bc9a40ee0d4f35015c1b8fb381d1de704cce3f5a599e9

    • C:\Users\Admin\AppData\Local\Temp\Admin7

      Filesize

      8B

      MD5

      357c715ad33afe1c3c57d9ad2de1e83f

      SHA1

      7b95ab8fc3cb8bfab1bd6b81bc7cbf86148e7848

      SHA256

      4a9d3496f9c463128adc274be19ae149a4de412ef3201a3ce474d29367a06b61

      SHA512

      a03803d9853a0cb94d0b093aa7a2e053511c62eabb6c73172ba1b5f7ecc038a0e4c0c89bf2162e6af69a7430470f892d795169591ac4d7eea1c1fc74ec71fff1

    • C:\Users\Admin\AppData\Local\Temp\Admin7

      Filesize

      8B

      MD5

      e251ca8406cf152f792e8e8f13d8623a

      SHA1

      8438b410cb95a1c30a3306d4b14832776b74e383

      SHA256

      f402ad4a3938d4cbcbd83f08b68fe689cfcf86bbe5687b2728465f20cadf4c9e

      SHA512

      fae25c2f4ec0972e0af7d6591c0662c7b8c756ec7f2c4e15c20032a2fcc7a81de08b0cf6d0c1d48805c9881ee926173df61b882a82c536aa940cec3638b753c0

    • C:\Users\Admin\AppData\Local\Temp\Admin7

      Filesize

      8B

      MD5

      8db4b8a5b137eb5283200c5169fe63d4

      SHA1

      a606495c9af22a28407e478ab3e11e3d0342ab0a

      SHA256

      64970d9530ef293c9ee2d2d22b11a95a66d6403df4153173424c29841f839c7d

      SHA512

      e2f0c114b506bebfabd32415a5e9b870df9ae6c0f72bca3d91649ecade46a7fa795e5ab0b35634840053d656d5767f2152ddf0d55830bc5654ea901e05d61339

    • C:\Users\Admin\AppData\Local\Temp\Admin7

      Filesize

      8B

      MD5

      332b3543294640e5d30396637658accf

      SHA1

      19491d1566b7d79806deed34794216b1c73c5c03

      SHA256

      70ab513ff5848ef88e5a760cff77406484e5487eeaac8821a5a8b7deca2fb4b3

      SHA512

      7485251e3ec4d5e5b68ede735577661bc609ab5e08796223ce19423e0f5c7d587c8f7dbcac51c5ee5228b7f00d1e4c94a6de2c2dd457ffd6f7efa6f0c7e9e741

    • C:\Users\Admin\AppData\Local\Temp\Admin7

      Filesize

      8B

      MD5

      7b941bf8bc94c3d0937f5f8cd66ea5b4

      SHA1

      b27cc38fa1a6e741be8147007eab4e95d324005a

      SHA256

      3dd54cde1679acbcaba926f5d711c7227e82ad5d659371861c12d3601f57bf1b

      SHA512

      0c6aae54eff2bd7eec3ed955ce33051a89f423b3000e4a458fbd6a0c0336f7e468eacc93074469d9d7a07f2db96e2ebaa781784c9fd380d5dea66d4c3bc220aa

    • C:\Users\Admin\AppData\Local\Temp\Admin7

      Filesize

      8B

      MD5

      ae7d22339635a5615ed35d9968eb1ace

      SHA1

      29c06f21218204fbadeda6aefa24564f7854528c

      SHA256

      98145d015b9a5abc2eb66383a9544f2812d05cb7e81bc3641fdf37da581f1d9c

      SHA512

      d707d4a8d9f0dddb58ffffdf5a5bc3540eb67fe160575509b5d3179a29e48984084529ee8fa50a122f2384cc8588992caba65221c2ef5b402d200fcab8e764b2

    • C:\Users\Admin\AppData\Local\Temp\Admin7

      Filesize

      8B

      MD5

      a047d56b78895d17c5eaf05cae9023ed

      SHA1

      934baf33e05ae86ae3bb11c80f52f809543b058b

      SHA256

      370a9886f7fa0f9bdbedfd933cdd4a1f01f9534e2410b192f0f383aafb1ea8df

      SHA512

      eb235062a4d2209026e8e3a2420d6a9c41efb2e79c117dc0d856e34d32ddc5e898bf1cf192f0155b156e2ab921c318943293f033ac5be28d0b11b401be2878da

    • C:\Users\Admin\AppData\Local\Temp\Admin7

      Filesize

      8B

      MD5

      97c87de3d531c5f52df25ba6fc195f5f

      SHA1

      8822a703f6498781b3ce839aaa5eb052e95c7058

      SHA256

      002f981b43def3258edce749ae7db0f2b62ecdd1ca5493354e9cf6d1b0136f50

      SHA512

      14df188d9f50d98e6d1b2f400bd5d9b9e515bda50226566fb3d995d41702f083a3e9ec6d2fc1d10060c4154bd70bd58285974419aa749bebefa59bdc1439d69a

    • C:\Users\Admin\AppData\Local\Temp\Admin7

      Filesize

      8B

      MD5

      db95961ad94c33873b59c1019eb970b3

      SHA1

      6b7627e18a1e55914b026d1ddff5120e85ddfd4d

      SHA256

      4f400becf1ca8b17662c7c35cd6c97581ef96c82cdd8b8d12db63fb409a9f0e2

      SHA512

      4e8e99a0d08df679c84503e47ffc713402978fc29dce37ee5c468955b741d6b1991e6c2c31a135fdf15f7184051fe1e85cb9b0b497d681dfbb731659cc78eda1

    • C:\Users\Admin\AppData\Roaming\Adminlog.dat

      Filesize

      15B

      MD5

      bf3dba41023802cf6d3f8c5fd683a0c7

      SHA1

      466530987a347b68ef28faad238d7b50db8656a5

      SHA256

      4a8e75390856bf822f492f7f605ca0c21f1905172f6d3ef610162533c140507d

      SHA512

      fec60f447dcc90753d693014135e24814f6e8294f6c0f436bc59d892b24e91552108dba6cf5a6fa7c0421f6d290d1bafee9f9f2d95ea8c4c05c2ad0f7c1bb314

    • C:\install\svchost.exe

      Filesize

      370KB

      MD5

      2e99272fa450b91bc5d126150a39ba29

      SHA1

      c40206dbaa5a0f37814b7aa212508034a805fd08

      SHA256

      c79362fef5007237e0009e594b90cec12269ddc634157217209f7003cf5e4608

      SHA512

      ff8dce6e3f1ca99349dc9128aad7048955592feabdf724a63df6be9761a991ec3025132f53402461f5c68aaee4768a6f60f169024772a13e0c6de059f871e821

    • memory/2764-2-0x0000000000400000-0x000000000044F000-memory.dmp

      Filesize

      316KB

    • memory/2764-30-0x0000000000400000-0x000000000044F000-memory.dmp

      Filesize

      316KB

    • memory/2764-78-0x0000000000400000-0x000000000044F000-memory.dmp

      Filesize

      316KB

    • memory/2764-12-0x0000000010480000-0x00000000104E5000-memory.dmp

      Filesize

      404KB

    • memory/2764-8-0x0000000010410000-0x0000000010475000-memory.dmp

      Filesize

      404KB

    • memory/2764-5-0x0000000000400000-0x000000000044F000-memory.dmp

      Filesize

      316KB

    • memory/2764-4-0x0000000000400000-0x000000000044F000-memory.dmp

      Filesize

      316KB

    • memory/2764-3-0x0000000000400000-0x000000000044F000-memory.dmp

      Filesize

      316KB

    • memory/3296-108-0x0000000000400000-0x000000000044F000-memory.dmp

      Filesize

      316KB

    • memory/3296-105-0x0000000000400000-0x000000000044F000-memory.dmp

      Filesize

      316KB

    • memory/4620-17-0x0000000000400000-0x0000000000415000-memory.dmp

      Filesize

      84KB

    • memory/4620-13-0x00000000001E0000-0x00000000001E1000-memory.dmp

      Filesize

      4KB

    • memory/4620-14-0x0000000000580000-0x0000000000581000-memory.dmp

      Filesize

      4KB