Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19/11/2024, 19:29
Behavioral task
behavioral1
Sample
0e89f82a348e2887a81cce90267f890e4424acd0e778693670261105182c65a6.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0e89f82a348e2887a81cce90267f890e4424acd0e778693670261105182c65a6.exe
Resource
win10v2004-20241007-en
General
-
Target
0e89f82a348e2887a81cce90267f890e4424acd0e778693670261105182c65a6.exe
-
Size
1.5MB
-
MD5
2ed099e56a228a99fad0f00b375d7eb3
-
SHA1
e615689ee2892977db1b4ad7ac0f338b4262f97d
-
SHA256
0e89f82a348e2887a81cce90267f890e4424acd0e778693670261105182c65a6
-
SHA512
1d534ad7f792214d0d028371d2cc7fb6520fee049579e9990fbde85cf9dd612caaf4b80a967ab6375da26f0a2381d78b962e546fc6066250fa72bfe1f58550b0
-
SSDEEP
12288:yEKhMY2KQwCyFe4Xf5koCNl6hSNt0LOhJYzmx7nvZZfZS3Bh/ZFMw6NxNj+GiADn:Pa8oHUbrxLz9pScNhXAsaftAddF
Malware Config
Extracted
cybergate
v1.07.5
lstreeet.no-ip.biz:15963
OAKTI06NWO4PTL
-
enable_keylogger
false
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
install
-
install_file
winlogone.exe
-
install_flag
false
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
whore1
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Signatures
-
Cybergate family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 0e89f82a348e2887a81cce90267f890e4424acd0e778693670261105182c65a6.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation real.exe -
Executes dropped EXE 4 IoCs
pid Process 2000 real.exe 1900 real.exe 1452 real.exe 1912 real.exe -
Loads dropped DLL 1 IoCs
pid Process 2668 real.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Key Name real = "C:\\Users\\Admin\\AppData\\Roaming\\FolderName@OFF@\\real.exe" reg.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4728 set thread context of 3432 4728 0e89f82a348e2887a81cce90267f890e4424acd0e778693670261105182c65a6.exe 95 PID 2000 set thread context of 1900 2000 real.exe 101 PID 2000 set thread context of 1452 2000 real.exe 102 -
resource yara_rule behavioral2/memory/4728-0-0x0000000000400000-0x0000000000581000-memory.dmp upx behavioral2/memory/4728-5-0x0000000000400000-0x0000000000581000-memory.dmp upx behavioral2/memory/3432-9-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/3432-13-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/3432-11-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/4728-15-0x0000000000400000-0x0000000000581000-memory.dmp upx behavioral2/files/0x0002000000021f9c-30.dat upx behavioral2/memory/2000-38-0x0000000000400000-0x0000000000581000-memory.dmp upx behavioral2/memory/2000-41-0x0000000000400000-0x0000000000581000-memory.dmp upx behavioral2/memory/2000-42-0x0000000000400000-0x0000000000581000-memory.dmp upx behavioral2/memory/3432-43-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/2000-52-0x0000000000400000-0x0000000000581000-memory.dmp upx behavioral2/memory/2000-64-0x0000000000400000-0x0000000000581000-memory.dmp upx behavioral2/memory/3432-66-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/1452-73-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral2/memory/1452-69-0x0000000010410000-0x0000000010475000-memory.dmp upx behavioral2/memory/1900-156-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/2668-161-0x0000000000400000-0x0000000000581000-memory.dmp upx behavioral2/memory/1912-174-0x0000000000400000-0x0000000000581000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language real.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0e89f82a348e2887a81cce90267f890e4424acd0e778693670261105182c65a6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0e89f82a348e2887a81cce90267f890e4424acd0e778693670261105182c65a6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language real.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language real.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language real.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language real.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeBackupPrivilege 2668 real.exe Token: SeRestorePrivilege 2668 real.exe Token: SeDebugPrivilege 2668 real.exe Token: SeDebugPrivilege 2668 real.exe Token: SeDebugPrivilege 1900 real.exe Token: SeDebugPrivilege 1900 real.exe Token: SeDebugPrivilege 1900 real.exe Token: SeDebugPrivilege 1900 real.exe Token: SeDebugPrivilege 1900 real.exe Token: SeDebugPrivilege 1900 real.exe Token: SeDebugPrivilege 1900 real.exe Token: SeDebugPrivilege 1900 real.exe Token: SeDebugPrivilege 1900 real.exe Token: SeDebugPrivilege 1900 real.exe Token: SeDebugPrivilege 1900 real.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 4728 0e89f82a348e2887a81cce90267f890e4424acd0e778693670261105182c65a6.exe 3432 0e89f82a348e2887a81cce90267f890e4424acd0e778693670261105182c65a6.exe 2000 real.exe 1900 real.exe 1912 real.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4728 wrote to memory of 3432 4728 0e89f82a348e2887a81cce90267f890e4424acd0e778693670261105182c65a6.exe 95 PID 4728 wrote to memory of 3432 4728 0e89f82a348e2887a81cce90267f890e4424acd0e778693670261105182c65a6.exe 95 PID 4728 wrote to memory of 3432 4728 0e89f82a348e2887a81cce90267f890e4424acd0e778693670261105182c65a6.exe 95 PID 4728 wrote to memory of 3432 4728 0e89f82a348e2887a81cce90267f890e4424acd0e778693670261105182c65a6.exe 95 PID 4728 wrote to memory of 3432 4728 0e89f82a348e2887a81cce90267f890e4424acd0e778693670261105182c65a6.exe 95 PID 4728 wrote to memory of 3432 4728 0e89f82a348e2887a81cce90267f890e4424acd0e778693670261105182c65a6.exe 95 PID 4728 wrote to memory of 3432 4728 0e89f82a348e2887a81cce90267f890e4424acd0e778693670261105182c65a6.exe 95 PID 4728 wrote to memory of 3432 4728 0e89f82a348e2887a81cce90267f890e4424acd0e778693670261105182c65a6.exe 95 PID 3432 wrote to memory of 4848 3432 0e89f82a348e2887a81cce90267f890e4424acd0e778693670261105182c65a6.exe 96 PID 3432 wrote to memory of 4848 3432 0e89f82a348e2887a81cce90267f890e4424acd0e778693670261105182c65a6.exe 96 PID 3432 wrote to memory of 4848 3432 0e89f82a348e2887a81cce90267f890e4424acd0e778693670261105182c65a6.exe 96 PID 4848 wrote to memory of 5032 4848 cmd.exe 99 PID 4848 wrote to memory of 5032 4848 cmd.exe 99 PID 4848 wrote to memory of 5032 4848 cmd.exe 99 PID 3432 wrote to memory of 2000 3432 0e89f82a348e2887a81cce90267f890e4424acd0e778693670261105182c65a6.exe 100 PID 3432 wrote to memory of 2000 3432 0e89f82a348e2887a81cce90267f890e4424acd0e778693670261105182c65a6.exe 100 PID 3432 wrote to memory of 2000 3432 0e89f82a348e2887a81cce90267f890e4424acd0e778693670261105182c65a6.exe 100 PID 2000 wrote to memory of 1900 2000 real.exe 101 PID 2000 wrote to memory of 1900 2000 real.exe 101 PID 2000 wrote to memory of 1900 2000 real.exe 101 PID 2000 wrote to memory of 1900 2000 real.exe 101 PID 2000 wrote to memory of 1900 2000 real.exe 101 PID 2000 wrote to memory of 1900 2000 real.exe 101 PID 2000 wrote to memory of 1900 2000 real.exe 101 PID 2000 wrote to memory of 1900 2000 real.exe 101 PID 2000 wrote to memory of 1452 2000 real.exe 102 PID 2000 wrote to memory of 1452 2000 real.exe 102 PID 2000 wrote to memory of 1452 2000 real.exe 102 PID 2000 wrote to memory of 1452 2000 real.exe 102 PID 2000 wrote to memory of 1452 2000 real.exe 102 PID 2000 wrote to memory of 1452 2000 real.exe 102 PID 2000 wrote to memory of 1452 2000 real.exe 102 PID 2000 wrote to memory of 1452 2000 real.exe 102 PID 2000 wrote to memory of 1452 2000 real.exe 102 PID 2000 wrote to memory of 1452 2000 real.exe 102 PID 2000 wrote to memory of 1452 2000 real.exe 102 PID 2000 wrote to memory of 1452 2000 real.exe 102 PID 2000 wrote to memory of 1452 2000 real.exe 102 PID 1452 wrote to memory of 712 1452 real.exe 103 PID 1452 wrote to memory of 712 1452 real.exe 103 PID 1452 wrote to memory of 712 1452 real.exe 103 PID 1452 wrote to memory of 712 1452 real.exe 103 PID 1452 wrote to memory of 712 1452 real.exe 103 PID 1452 wrote to memory of 712 1452 real.exe 103 PID 1452 wrote to memory of 712 1452 real.exe 103 PID 1452 wrote to memory of 712 1452 real.exe 103 PID 1452 wrote to memory of 712 1452 real.exe 103 PID 1452 wrote to memory of 712 1452 real.exe 103 PID 1452 wrote to memory of 712 1452 real.exe 103 PID 1452 wrote to memory of 712 1452 real.exe 103 PID 1452 wrote to memory of 712 1452 real.exe 103 PID 1452 wrote to memory of 712 1452 real.exe 103 PID 1452 wrote to memory of 712 1452 real.exe 103 PID 1452 wrote to memory of 712 1452 real.exe 103 PID 1452 wrote to memory of 712 1452 real.exe 103 PID 1452 wrote to memory of 712 1452 real.exe 103 PID 1452 wrote to memory of 712 1452 real.exe 103 PID 1452 wrote to memory of 712 1452 real.exe 103 PID 1452 wrote to memory of 712 1452 real.exe 103 PID 1452 wrote to memory of 712 1452 real.exe 103 PID 1452 wrote to memory of 712 1452 real.exe 103 PID 1452 wrote to memory of 712 1452 real.exe 103 PID 1452 wrote to memory of 712 1452 real.exe 103 PID 1452 wrote to memory of 712 1452 real.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e89f82a348e2887a81cce90267f890e4424acd0e778693670261105182c65a6.exe"C:\Users\Admin\AppData\Local\Temp\0e89f82a348e2887a81cce90267f890e4424acd0e778693670261105182c65a6.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4728 -
C:\Users\Admin\AppData\Local\Temp\0e89f82a348e2887a81cce90267f890e4424acd0e778693670261105182c65a6.exe"C:\Users\Admin\AppData\Local\Temp\0e89f82a348e2887a81cce90267f890e4424acd0e778693670261105182c65a6.exe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3432 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\IMHPE.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Key Name real" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\FolderName@OFF@\real.exe" /f4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:5032
-
-
-
C:\Users\Admin\AppData\Roaming\FolderName@OFF@\real.exe"C:\Users\Admin\AppData\Roaming\FolderName@OFF@\real.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Users\Admin\AppData\Roaming\FolderName@OFF@\real.exe"C:\Users\Admin\AppData\Roaming\FolderName@OFF@\real.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1900
-
-
C:\Users\Admin\AppData\Roaming\FolderName@OFF@\real.exe"C:\Users\Admin\AppData\Roaming\FolderName@OFF@\real.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:712
-
-
C:\Users\Admin\AppData\Roaming\FolderName@OFF@\real.exe"C:\Users\Admin\AppData\Roaming\FolderName@OFF@\real.exe"5⤵
- Checks computer location settings
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2668 -
C:\Users\Admin\AppData\Roaming\FolderName@OFF@\real.exe"C:\Users\Admin\AppData\Roaming\FolderName@OFF@\real.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1912
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD57f198c345ee51464a78fdce6345155bf
SHA1790df04136ae8251c5f719f93fd0f0411daeba01
SHA256b47ee1e4198cb7864f59b8e56a0c3586ab1fc407ebd870d24e1bf7b6d9f3061f
SHA512854356180d58715b3327b953242bac94d0b5be0aabc29f9aa321ff204c822bd84f8a87999b3e932f9f45899fa6378e2b5633e80715e329f73f1d9362c9978547
-
Filesize
8B
MD5f3563adeccae6e0f7719b5e1c80b520c
SHA19b6bd492088cac7baf9e5c3d2277462af6a91811
SHA256a8fd2db954e8378978bca4a8d6695848b2ba77061b549938954614bdd12340f3
SHA512c69e19502ebe0c374d9a54ef76a425355cf1bded10204622c40a36bdf88f5c4300bdcee1d66806741ea4d86d940ecedc670c19799ada92d359cbb09971d076a3
-
Filesize
8B
MD56f84ad1bdeb52c38e50929c79ec1e49c
SHA1a86d8fc0dc07bee6023aa4e6b486b59912b0ae3e
SHA25684bd557e62444f2f9e060f758042e00f668c66b8001a6c05229b0f6f1f807711
SHA512d15c82b93f18ac61fd55056b762c42f4f5833383e1a9940bcd794ece4cbb6f894727385bc567304267eb4f2ffc07b5ba6c90ddcbb596933c4cbba03df0da46a5
-
Filesize
8B
MD53791a291e80a8d1a7c9540fa0d962113
SHA14797ddc2baf3caadb518087a0aab082340b51e07
SHA256ed0d8cf72ac3a706be75b944b0251e072aa31160368ca27f49fba759de5dcf17
SHA512800b88263306024fa0cec3c76c618d1f2b50b469192bbd0b5f39b188f467cedd89e76008e95c72f04c1186277a090ad8c3eb2c98122902f3d6f24d0c784e22ca
-
Filesize
8B
MD53630c9cef739ac2521244935a3a94ead
SHA121460987ecc7d27440ad8fdd63ca31cd92907aa5
SHA2562a4c2535e09130ed2f92f3eadfb8be3fefa515622b8fa209f919262848b950e3
SHA512f5d6dc057197fd58fbe3c7669746a443eef6dff5e9286e1f16cea476263be13c9566d2c743595e8dd6f29b5eda0912012f6d329e403ed568bdd08ab0f7ee49ff
-
Filesize
8B
MD517c7430c503a28682cfdb85481a78cc5
SHA1433d2f22b5983524e845c56d1414968d4f70f504
SHA256c99d5fa792766435c6419b4fa7102685533781cbb17972bdd4ec674f92d2c9f8
SHA512a7915dd80b120ea0091553f3cb71581c7f1db61bed0a3b1b98cb234d85f548340b4be7a7833f94a0c24bab365d491958538e1316848d1af4f8283ddc774258f3
-
Filesize
8B
MD5181a9e2aeadd917d8c58c46042926e4c
SHA12c22a6bda9f0fe97361e6b4248448d65e3fc4f86
SHA256624c4b163e368aac87ccbca64ab3a91d85337d919cc9634cd68fd8b36da21035
SHA512af7526923d95949bbc63ffa0ae6101a7a94cc070867b29d6565e8573c2faefff7150fa8c22f3fc39c0ef5de3d7c2efd9de0106aa0c2422e95e18770fe7cdcfcf
-
Filesize
8B
MD537091ebb83282cb265b868986382439c
SHA1c94d0b26d69ed07c9ea8d8f9cee81b90dd078b47
SHA25652e60ebfaed2aae03adce8b12f0dd70ffd4358fc15f619844294026c903fa6ae
SHA512e421e40f3de880da8f327fcf35b2bef67ef19288da57b1c523eba220c7285d1a7e82ffbd36f43d3991d3ee126f168821b2f5d04ac57def1edd6e34addfb4bb0a
-
Filesize
8B
MD5a7cf21a298a5b171494cc4a7ec94dde5
SHA193cf04fd22200e4337298977fe47d4672ae65123
SHA256dc7fe45865dc2fe0464dfa639f6eb947a2e336aab5c10cd9c7266a5719c3219e
SHA512ef2ee8dbaa44072194babdb9f29398497895a8e940db24979dcb86cd1cc9e2036221cf30b00c91ae18c47d4d97a8bd3b5537fa1949a8a777f66bd7b7a2a9146a
-
Filesize
8B
MD5c55be0111e5822ac41f8aec51889d607
SHA1619efc4d41328365752bebc0dca81397a5c8458e
SHA2565f3057c65d946510bf5d775c15ebabf43257e458320abeba3abd6bd5e2a73190
SHA512a32ac0901346f06a197c383eed8639cf6adb2dee195115bf8cd7bd5bb8859558ba8eaf5a068ae517ada5021b4811476ea3fb4198f806a4486f5fcadb9e6c6a63
-
Filesize
155B
MD5f8c91c062813c5d40d7dad776438c3cc
SHA19db3fbda51c2f872ba693f6be0318b8d842b251c
SHA25613b5540373c481fc4050c54b397e8569589e4a75737889bdb173c3d98343f7ef
SHA5122e137f8920143b6a40a3ac9674e371b8e41f575a02b10765d9146ccc69091d6bc525f600304f1239c895e3a784a2c5caaa86270ebf8fe5c0b616d71eda968baf
-
Filesize
1.5MB
MD52cdba3746218fe9495f5d1b886e78f7f
SHA1d3b2b29f849105b7dee101e29e71784a3e576e0e
SHA25664ac090b7baba3c778787269f58d6c1db920c784e5fd5f547573a2579d5ede0d
SHA512b75c5b69908af41ef7884483fc9ae840bc914f2a18e8e825f1862f93d06ca97c8003583d269dcee0e781b5a5baeb0b5dc7dfd01db5323c31422725669cb916da