Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/11/2024, 19:29

General

  • Target

    0e89f82a348e2887a81cce90267f890e4424acd0e778693670261105182c65a6.exe

  • Size

    1.5MB

  • MD5

    2ed099e56a228a99fad0f00b375d7eb3

  • SHA1

    e615689ee2892977db1b4ad7ac0f338b4262f97d

  • SHA256

    0e89f82a348e2887a81cce90267f890e4424acd0e778693670261105182c65a6

  • SHA512

    1d534ad7f792214d0d028371d2cc7fb6520fee049579e9990fbde85cf9dd612caaf4b80a967ab6375da26f0a2381d78b962e546fc6066250fa72bfe1f58550b0

  • SSDEEP

    12288:yEKhMY2KQwCyFe4Xf5koCNl6hSNt0LOhJYzmx7nvZZfZS3Bh/ZFMw6NxNj+GiADn:Pa8oHUbrxLz9pScNhXAsaftAddF

Malware Config

Extracted

Family

cybergate

Version

v1.07.5

C2

lstreeet.no-ip.biz:15963

Mutex

OAKTI06NWO4PTL

Attributes
  • enable_keylogger

    false

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    install

  • install_file

    winlogone.exe

  • install_flag

    false

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    whore1

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Signatures

  • CyberGate, Rebhip

    CyberGate is a lightweight remote administration tool with a wide array of functionalities.

  • Cybergate family
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • UPX packed file 19 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 15 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0e89f82a348e2887a81cce90267f890e4424acd0e778693670261105182c65a6.exe
    "C:\Users\Admin\AppData\Local\Temp\0e89f82a348e2887a81cce90267f890e4424acd0e778693670261105182c65a6.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4728
    • C:\Users\Admin\AppData\Local\Temp\0e89f82a348e2887a81cce90267f890e4424acd0e778693670261105182c65a6.exe
      "C:\Users\Admin\AppData\Local\Temp\0e89f82a348e2887a81cce90267f890e4424acd0e778693670261105182c65a6.exe"
      2⤵
      • Checks computer location settings
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3432
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\IMHPE.bat" "
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4848
        • C:\Windows\SysWOW64\reg.exe
          REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Key Name real" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\FolderName@OFF@\real.exe" /f
          4⤵
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          PID:5032
      • C:\Users\Admin\AppData\Roaming\FolderName@OFF@\real.exe
        "C:\Users\Admin\AppData\Roaming\FolderName@OFF@\real.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2000
        • C:\Users\Admin\AppData\Roaming\FolderName@OFF@\real.exe
          "C:\Users\Admin\AppData\Roaming\FolderName@OFF@\real.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:1900
        • C:\Users\Admin\AppData\Roaming\FolderName@OFF@\real.exe
          "C:\Users\Admin\AppData\Roaming\FolderName@OFF@\real.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1452
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:712
            • C:\Users\Admin\AppData\Roaming\FolderName@OFF@\real.exe
              "C:\Users\Admin\AppData\Roaming\FolderName@OFF@\real.exe"
              5⤵
              • Checks computer location settings
              • Loads dropped DLL
              • System Location Discovery: System Language Discovery
              • Suspicious use of AdjustPrivilegeToken
              PID:2668
              • C:\Users\Admin\AppData\Roaming\FolderName@OFF@\real.exe
                "C:\Users\Admin\AppData\Roaming\FolderName@OFF@\real.exe"
                6⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                PID:1912

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\Admin2.txt

      Filesize

      224KB

      MD5

      7f198c345ee51464a78fdce6345155bf

      SHA1

      790df04136ae8251c5f719f93fd0f0411daeba01

      SHA256

      b47ee1e4198cb7864f59b8e56a0c3586ab1fc407ebd870d24e1bf7b6d9f3061f

      SHA512

      854356180d58715b3327b953242bac94d0b5be0aabc29f9aa321ff204c822bd84f8a87999b3e932f9f45899fa6378e2b5633e80715e329f73f1d9362c9978547

    • C:\Users\Admin\AppData\Local\Temp\Admin7

      Filesize

      8B

      MD5

      f3563adeccae6e0f7719b5e1c80b520c

      SHA1

      9b6bd492088cac7baf9e5c3d2277462af6a91811

      SHA256

      a8fd2db954e8378978bca4a8d6695848b2ba77061b549938954614bdd12340f3

      SHA512

      c69e19502ebe0c374d9a54ef76a425355cf1bded10204622c40a36bdf88f5c4300bdcee1d66806741ea4d86d940ecedc670c19799ada92d359cbb09971d076a3

    • C:\Users\Admin\AppData\Local\Temp\Admin7

      Filesize

      8B

      MD5

      6f84ad1bdeb52c38e50929c79ec1e49c

      SHA1

      a86d8fc0dc07bee6023aa4e6b486b59912b0ae3e

      SHA256

      84bd557e62444f2f9e060f758042e00f668c66b8001a6c05229b0f6f1f807711

      SHA512

      d15c82b93f18ac61fd55056b762c42f4f5833383e1a9940bcd794ece4cbb6f894727385bc567304267eb4f2ffc07b5ba6c90ddcbb596933c4cbba03df0da46a5

    • C:\Users\Admin\AppData\Local\Temp\Admin7

      Filesize

      8B

      MD5

      3791a291e80a8d1a7c9540fa0d962113

      SHA1

      4797ddc2baf3caadb518087a0aab082340b51e07

      SHA256

      ed0d8cf72ac3a706be75b944b0251e072aa31160368ca27f49fba759de5dcf17

      SHA512

      800b88263306024fa0cec3c76c618d1f2b50b469192bbd0b5f39b188f467cedd89e76008e95c72f04c1186277a090ad8c3eb2c98122902f3d6f24d0c784e22ca

    • C:\Users\Admin\AppData\Local\Temp\Admin7

      Filesize

      8B

      MD5

      3630c9cef739ac2521244935a3a94ead

      SHA1

      21460987ecc7d27440ad8fdd63ca31cd92907aa5

      SHA256

      2a4c2535e09130ed2f92f3eadfb8be3fefa515622b8fa209f919262848b950e3

      SHA512

      f5d6dc057197fd58fbe3c7669746a443eef6dff5e9286e1f16cea476263be13c9566d2c743595e8dd6f29b5eda0912012f6d329e403ed568bdd08ab0f7ee49ff

    • C:\Users\Admin\AppData\Local\Temp\Admin7

      Filesize

      8B

      MD5

      17c7430c503a28682cfdb85481a78cc5

      SHA1

      433d2f22b5983524e845c56d1414968d4f70f504

      SHA256

      c99d5fa792766435c6419b4fa7102685533781cbb17972bdd4ec674f92d2c9f8

      SHA512

      a7915dd80b120ea0091553f3cb71581c7f1db61bed0a3b1b98cb234d85f548340b4be7a7833f94a0c24bab365d491958538e1316848d1af4f8283ddc774258f3

    • C:\Users\Admin\AppData\Local\Temp\Admin7

      Filesize

      8B

      MD5

      181a9e2aeadd917d8c58c46042926e4c

      SHA1

      2c22a6bda9f0fe97361e6b4248448d65e3fc4f86

      SHA256

      624c4b163e368aac87ccbca64ab3a91d85337d919cc9634cd68fd8b36da21035

      SHA512

      af7526923d95949bbc63ffa0ae6101a7a94cc070867b29d6565e8573c2faefff7150fa8c22f3fc39c0ef5de3d7c2efd9de0106aa0c2422e95e18770fe7cdcfcf

    • C:\Users\Admin\AppData\Local\Temp\Admin7

      Filesize

      8B

      MD5

      37091ebb83282cb265b868986382439c

      SHA1

      c94d0b26d69ed07c9ea8d8f9cee81b90dd078b47

      SHA256

      52e60ebfaed2aae03adce8b12f0dd70ffd4358fc15f619844294026c903fa6ae

      SHA512

      e421e40f3de880da8f327fcf35b2bef67ef19288da57b1c523eba220c7285d1a7e82ffbd36f43d3991d3ee126f168821b2f5d04ac57def1edd6e34addfb4bb0a

    • C:\Users\Admin\AppData\Local\Temp\Admin7

      Filesize

      8B

      MD5

      a7cf21a298a5b171494cc4a7ec94dde5

      SHA1

      93cf04fd22200e4337298977fe47d4672ae65123

      SHA256

      dc7fe45865dc2fe0464dfa639f6eb947a2e336aab5c10cd9c7266a5719c3219e

      SHA512

      ef2ee8dbaa44072194babdb9f29398497895a8e940db24979dcb86cd1cc9e2036221cf30b00c91ae18c47d4d97a8bd3b5537fa1949a8a777f66bd7b7a2a9146a

    • C:\Users\Admin\AppData\Local\Temp\Admin8

      Filesize

      8B

      MD5

      c55be0111e5822ac41f8aec51889d607

      SHA1

      619efc4d41328365752bebc0dca81397a5c8458e

      SHA256

      5f3057c65d946510bf5d775c15ebabf43257e458320abeba3abd6bd5e2a73190

      SHA512

      a32ac0901346f06a197c383eed8639cf6adb2dee195115bf8cd7bd5bb8859558ba8eaf5a068ae517ada5021b4811476ea3fb4198f806a4486f5fcadb9e6c6a63

    • C:\Users\Admin\AppData\Local\Temp\IMHPE.txt

      Filesize

      155B

      MD5

      f8c91c062813c5d40d7dad776438c3cc

      SHA1

      9db3fbda51c2f872ba693f6be0318b8d842b251c

      SHA256

      13b5540373c481fc4050c54b397e8569589e4a75737889bdb173c3d98343f7ef

      SHA512

      2e137f8920143b6a40a3ac9674e371b8e41f575a02b10765d9146ccc69091d6bc525f600304f1239c895e3a784a2c5caaa86270ebf8fe5c0b616d71eda968baf

    • C:\Users\Admin\AppData\Roaming\FolderName@OFF@\real.exe

      Filesize

      1.5MB

      MD5

      2cdba3746218fe9495f5d1b886e78f7f

      SHA1

      d3b2b29f849105b7dee101e29e71784a3e576e0e

      SHA256

      64ac090b7baba3c778787269f58d6c1db920c784e5fd5f547573a2579d5ede0d

      SHA512

      b75c5b69908af41ef7884483fc9ae840bc914f2a18e8e825f1862f93d06ca97c8003583d269dcee0e781b5a5baeb0b5dc7dfd01db5323c31422725669cb916da

    • memory/1452-60-0x0000000000400000-0x0000000000451000-memory.dmp

      Filesize

      324KB

    • memory/1452-65-0x0000000000400000-0x0000000000451000-memory.dmp

      Filesize

      324KB

    • memory/1452-138-0x0000000000400000-0x0000000000451000-memory.dmp

      Filesize

      324KB

    • memory/1452-69-0x0000000010410000-0x0000000010475000-memory.dmp

      Filesize

      404KB

    • memory/1452-73-0x0000000010480000-0x00000000104E5000-memory.dmp

      Filesize

      404KB

    • memory/1452-59-0x0000000000400000-0x0000000000451000-memory.dmp

      Filesize

      324KB

    • memory/1452-56-0x0000000000400000-0x0000000000451000-memory.dmp

      Filesize

      324KB

    • memory/1452-63-0x0000000000400000-0x0000000000451000-memory.dmp

      Filesize

      324KB

    • memory/1900-156-0x0000000000400000-0x000000000040B000-memory.dmp

      Filesize

      44KB

    • memory/1912-174-0x0000000000400000-0x0000000000581000-memory.dmp

      Filesize

      1.5MB

    • memory/2000-64-0x0000000000400000-0x0000000000581000-memory.dmp

      Filesize

      1.5MB

    • memory/2000-38-0x0000000000400000-0x0000000000581000-memory.dmp

      Filesize

      1.5MB

    • memory/2000-52-0x0000000000400000-0x0000000000581000-memory.dmp

      Filesize

      1.5MB

    • memory/2000-42-0x0000000000400000-0x0000000000581000-memory.dmp

      Filesize

      1.5MB

    • memory/2000-41-0x0000000000400000-0x0000000000581000-memory.dmp

      Filesize

      1.5MB

    • memory/2668-161-0x0000000000400000-0x0000000000581000-memory.dmp

      Filesize

      1.5MB

    • memory/2668-75-0x00000000006F0000-0x00000000006F1000-memory.dmp

      Filesize

      4KB

    • memory/2668-74-0x00000000001E0000-0x00000000001E1000-memory.dmp

      Filesize

      4KB

    • memory/3432-13-0x0000000000400000-0x000000000040B000-memory.dmp

      Filesize

      44KB

    • memory/3432-11-0x0000000000400000-0x000000000040B000-memory.dmp

      Filesize

      44KB

    • memory/3432-66-0x0000000000400000-0x000000000040B000-memory.dmp

      Filesize

      44KB

    • memory/3432-43-0x0000000000400000-0x000000000040B000-memory.dmp

      Filesize

      44KB

    • memory/3432-9-0x0000000000400000-0x000000000040B000-memory.dmp

      Filesize

      44KB

    • memory/4728-15-0x0000000000400000-0x0000000000581000-memory.dmp

      Filesize

      1.5MB

    • memory/4728-0-0x0000000000400000-0x0000000000581000-memory.dmp

      Filesize

      1.5MB

    • memory/4728-8-0x00000000001D0000-0x00000000001D1000-memory.dmp

      Filesize

      4KB

    • memory/4728-7-0x00000000001C0000-0x00000000001C1000-memory.dmp

      Filesize

      4KB

    • memory/4728-6-0x0000000002B80000-0x0000000002B81000-memory.dmp

      Filesize

      4KB

    • memory/4728-5-0x0000000000400000-0x0000000000581000-memory.dmp

      Filesize

      1.5MB

    • memory/4728-4-0x0000000002B90000-0x0000000002B91000-memory.dmp

      Filesize

      4KB

    • memory/4728-3-0x0000000002B80000-0x0000000002B81000-memory.dmp

      Filesize

      4KB