Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    02/12/2024, 09:28

General

  • Target

    guitarportfolio.exe

  • Size

    324KB

  • MD5

    56817271884bffe78eedb21b9ef2957c

  • SHA1

    1ed0d1bb06e4b7b878f7d6e2a1b061391f308e2f

  • SHA256

    b88f359ef837d4a39e47375cc5d81ded93e9ff633aafbafd3391ecf2b4b4ba0d

  • SHA512

    e4e2a2a6b0f8a58ba202de6c4060f4843e77ba95aec0b97f9419df4da2fe06eb58c9fa70a94202400eb4b1183ec88a8c24d00830fc10335a0f4631b3cec8bdb8

  • SSDEEP

    6144:g0J4yY9zWIjr+Z+Nj6kMjJlzli+GB5u7qGmUIlk0wLjlpEBKlKpS/:r4yYVWIjrr1M9RlpC5uuGmVEflp9US

Malware Config

Extracted

Family

cybergate

Version

v1.07.5

Botnet

gringo

C2

fogueteiro.webhop.biz:800

Mutex

6GAVTIIW66I2NP

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    install

  • install_file

    winserver.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    online50

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Signatures

  • CyberGate, Rebhip

    CyberGate is a lightweight remote administration tool with a wide array of functionalities.

  • Cybergate family
  • Adds policy Run key to start application 2 TTPs 4 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1188
      • C:\Users\Admin\AppData\Local\Temp\guitarportfolio.exe
        "C:\Users\Admin\AppData\Local\Temp\guitarportfolio.exe"
        2⤵
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2396
        • C:\Users\Admin\AppData\Local\Temp\guitarportfolio.exe
          "C:\Users\Admin\AppData\Local\Temp\guitarportfolio.exe"
          3⤵
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1368
          • C:\Users\Admin\AppData\Local\Temp\guitarportfolio.exe
            "C:\Users\Admin\AppData\Local\Temp\guitarportfolio.exe"
            4⤵
            • Adds policy Run key to start application
            • Boot or Logon Autostart Execution: Active Setup
            • Adds Run key to start application
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of WriteProcessMemory
            PID:2232
            • C:\Windows\SysWOW64\explorer.exe
              explorer.exe
              5⤵
              • Boot or Logon Autostart Execution: Active Setup
              • System Location Discovery: System Language Discovery
              • Suspicious use of AdjustPrivilegeToken
              PID:1488
            • C:\Program Files\Internet Explorer\iexplore.exe
              "C:\Program Files\Internet Explorer\iexplore.exe"
              5⤵
                PID:352
              • C:\Users\Admin\AppData\Local\Temp\guitarportfolio.exe
                "C:\Users\Admin\AppData\Local\Temp\guitarportfolio.exe"
                5⤵
                • Loads dropped DLL
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: GetForegroundWindowSpam
                • Suspicious use of AdjustPrivilegeToken
                PID:2316
                • C:\Windows\install\winserver.exe
                  "C:\Windows\install\winserver.exe"
                  6⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Suspicious use of SetThreadContext
                  • Drops file in Windows directory
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of SetWindowsHookEx
                  PID:1072
                  • C:\Windows\install\winserver.exe
                    "C:\Windows\install\winserver.exe"
                    7⤵
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    • System Location Discovery: System Language Discovery
                    PID:1644
                    • C:\Windows\install\winserver.exe
                      "C:\Windows\install\winserver.exe"
                      8⤵
                      • Executes dropped EXE
                      PID:2032

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\Admin2.txt

        Filesize

        224KB

        MD5

        dce68f643327f72fb307f924fb1c388a

        SHA1

        4c90beb7aa1bc22cb318117ef992ec547af40212

        SHA256

        358db295be5bad587243ae7c7dd1e45bf26078b96c04288de391dcc99570d917

        SHA512

        b7ab4717eca79dc3d935350c8d304e8c405b6cb8c113bf456f3f6a5e6303b1361f12c5063dd85b1bb5fcb1aa443dbbe3f527c6fb035fd9d03ef418769c82206c

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        506d1c7e342985def9d8fce51ab9afe2

        SHA1

        a35ccf562dd53ea7135aa0ea4da95a3ef796c1f6

        SHA256

        8cae4c3034144ac9065fa703872f5a1c84ed00f6628acaa5b59557d3287ef165

        SHA512

        b21395562a4c93f7267fbbb39072e6b761df883bf734d3c978df2a5090750d3fb13e7a8e4ef15d85107843832dc2f0471d840388984d6ba11bbd9d62642bcbf9

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        2d85a9dda8a6684143b24a3fb045f21f

        SHA1

        4843dd12d90da26bc7ab38af8be05ddd4e913f2c

        SHA256

        1eaea9fb5061151e45fc3bbe65f63bd3b2080570e627c76193f4bf5727a01afb

        SHA512

        e7ba03497f1cd7e4b36affcdf2220a5cfdd461e7ff66f29feaaf49d6a45f0a177e150c35ed7d17aa2d7d81087f03bbd3ffc137d6d3fb6f57cb3b8b96073ac536

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        b8f2e75810d187f5e4f8ce30f4d26566

        SHA1

        02263faad3a1c25ebf6e781ea624d28e1424c1c4

        SHA256

        3aa086c69ef0b88fe812944c80b0a7eb9a9f890e86bf3cf8d56ca27045a60ca5

        SHA512

        34eaee0d79bfabbd28aa6cf31a95a93d88b83251826ea5d9d3ddb58d75f8e9642f49a2d1dabf2c05f0b77a718e2eee4f5d7de1f9d22f7477af5337c39c56757f

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        d62ef45d933f4a8f65a680b5c402d409

        SHA1

        66d6629b90a5d0fec78b3fb33e5bde3ec0b88398

        SHA256

        e4b251e1dde798d2646849bd2482d52b14492c18f3fcc079c6903de26fe050a5

        SHA512

        d6c73d0f24efbf659b5c42228b3a46e05c46d38b48c8111b5d95285e5f1a894d9d1bde5a4feb16df4295581e34877c3c64e7a5efa8e3c85da728f8f1d743266c

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        f40a1d5e2f78bad9fa1ab42ec1790b8f

        SHA1

        d010338ccac6e14e26d756304518c0082f317088

        SHA256

        7f34c365fd9c69bef8dee9f83f62cddf9c70330b6aee338ab668f7200489f37a

        SHA512

        f1d63201e8b1f67dabfa8862a30e84bd552068e9bdcc66785623f4453af1a53e4147e2a861d896b7f91e09dfdd256a1c9cff1213212d080f6eecf3a3bb05e957

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        4f7698e5f99a1011359ad6ed404ca251

        SHA1

        2f9d106fc29643e361880d5da3db0e0203da6c62

        SHA256

        311d6c3be765d711a53ee767e278595c2fce2452c67ccde4410d69c2df545c50

        SHA512

        5bfabf53b35389eac3ed2812aa100b30d553a94eedbc72551cb96983c539e68069defca5e58abb5e743fd5cc081a6345a9d3e73dbe15f65a201739337f6e005c

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        b49f820de05b29e60a3368ef986726ef

        SHA1

        71533dda33cac1f3de23a2d3fd242494e3501e56

        SHA256

        762edc00121944d2068d212823f1ae9176fd8170225131589cd62341bc5f029d

        SHA512

        c8b2a583befcf5899bfab980d7a0e1b75b89ad2bd1a3c550cf778a3244dd2d90b9ce427290b299ffc46ecab9939cdc2f6134c214d2a4def6fe0ff0d0aa225319

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        fa8348a7dea507b9541d1a08e42db15a

        SHA1

        d4f92ca5543a3f5e7edb75c26c10106a14da56bd

        SHA256

        076c5c9ae4c511163da0cb33befcdd5b703f4bb4f9b8c166d4bf3391b3ae5c08

        SHA512

        114010b152b1e9735dc7b95eb58930d8fe07472f8c1dc19d21df38e0fa14e646bb4cdfd1978f6ab2161e5a161924940b545501628c83245ee4f9e0a36560c3a0

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        b84c6a1af796642b4113909b0dd32fe1

        SHA1

        d5e2267edab7a0f269a0519e4949ce1d609c068d

        SHA256

        44f5a381bfed8e9aeecc32a20178d81ffb73ca0cc1d01a51807d10c663e5e689

        SHA512

        84a4afa5b7b2911abde4572a8e86a5defabd2a443320ad9d234bb9cd979940f54a76c84ad382fd1f5c082e115b9d3a28738bd7be3e628b626b7bf81058c8f1dc

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        197b0348ce1e91bcbbf6bdc7d1cf1c93

        SHA1

        8c14e27ca375a90b9f8fbb86ccc5d25031f6eda3

        SHA256

        97adb3ce9480780264f6795342daafd73b2dd50ea10fd6e790ce83b9582ed288

        SHA512

        e5d1838685977499d453134bae42ee0bcf9fa4ea29a4aabecca2427b57201181fb0fdb0a3c686016806427478d2140e201f33a622e6d6b7973b2f07bc0b662f1

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        0b9ab6da7fd5835b1a95434c167de810

        SHA1

        e3ca778e4524125eb262c78d3dca413e30f6b330

        SHA256

        345ae70ed97fc730c06af55e582d199e6589609bfa436a81e359d62db6cc0bd9

        SHA512

        48138f21dcb9422e87dc5acd04ee083bf5df825c53847afd5d0b64a7ab8ad181bf20901db6f8822b8553a9cf866b3f056704afcd7bfeea49743e3e7fabba6bc6

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        be3f149b2ce8e55ff575b93efeb23b2c

        SHA1

        30ca00901fb64b4a4434eec4b8c3ed0f1bb74725

        SHA256

        0c6dfc9e74009118f42ef34fd27028c3e39965a97de7e4a1672da5b8b41c6ce0

        SHA512

        2095115a2e180f1f1e8c70e38cb3609a4172ed63d7df2c2578f65d0afdad267ec3cd41ce47db6ab132f74e4346f61efce492d7066463d1462f2997dcdfc9a6e2

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        348d6a3dc2cc9c0283023f44af606b8c

        SHA1

        558416688e75e9461c5d9aed91485819e3909b0a

        SHA256

        0a51621a526285abf2cee377ce1815183e917a9f30135461e9978d59c74a0822

        SHA512

        f7caeaa6381430ec3269ee783d91db6255b50268b31bc6f4c73e7eab99ae41b88c98c4f1662eb395ab42dc1e4d879b22aac75e01922abd1da81521730ddca2af

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        85680e6933ba249905348ed5bd20b595

        SHA1

        e2353e56f4e6ed268f394c18b68f4a1e3b549c06

        SHA256

        471e7d4f7c398425870bc119e7a7a61235594490e5df9d962cd5eb8dd066e329

        SHA512

        cec99dbc0c66024847a043098eeb7cfcf70a99ae91abdcf33e9651cd526403b9dd6258dde2493b5cc4d2f7dc3c055eb357fc744f264ab5da5dd7cf7f6e3e9a74

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        5fc765f900f053aa3ab6b86fea671d48

        SHA1

        20f4308893f1a4ee5f3a57c93a9e6d1a902fad0f

        SHA256

        54ba677ba5faefd84ceb6486c54d29bd4b54efacbb93b27973476eb79846bc07

        SHA512

        8e19f09a100ed9eea9f19dab96ae8f4faa5afcceafb7c0bbad908becc9701f2348d49b3d25b91ad63bedc0011591e15d2f5bd58236adccd66fed8b958e7f5099

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        7b0b5b32cca7ca9014fcdfeb3f3b4c16

        SHA1

        2e1d322d0eee360c87e4898da756a40ce2850a3e

        SHA256

        bd3d55f5e761babbbcdc81f7dc53de62e6ae1620d7b9aae8a64d29da7de3ba77

        SHA512

        6153395370f4cf1004495440a467c0725050fb6653b7af3d7f94e43a16a2413376c13f619289714f545fa097f8639ed6982126f9c9e483164b4a5c6820eea5f4

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        e13db123780a230d64b68ddb5b860315

        SHA1

        3e9d43f261fd85e29682faad103d097c662fb825

        SHA256

        1bcbb7c45b8706bd1d0760d562d1f7ee39112d68dd0f1148581a98ea1a94c09c

        SHA512

        b6e4cb6e35e601cb06e9349cd06c960ad056500e5ec2e8a52a0a07ce5c483bdfc05bf1ae92b4e3c9254b6abc422305fc863e760c28869a87176a64d1555434e5

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        09b9eddc18291719782655b844e51d57

        SHA1

        475b0905fd58ddab5bdab1a6be4dd3b6245f2c03

        SHA256

        a95a2f7006ba540bea53a66366a3dbf3d0d2e11d537f96d97ad60fa9a6a940c2

        SHA512

        243026a2e213987b005de7ee070a2e1a5705a6e03191d00969206c6ea01e6ea95336437cb45a9ace17ab1e278701561b7cd42404d85a0c87141ec57d56e7b5c6

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        c3fbf732291b7715579f941794446a12

        SHA1

        82e29c0cf69cae53ea5bb7c892c71fb316f114c1

        SHA256

        9e253ea0a937989decbf259da4f89a375497e5e9f3be12c4e375ef781d8cddb8

        SHA512

        b217334929faeebd58d4b725afdb10c2996b86fc68b9c46219caf422077cd2459d94ab0167fd0dddbc20588bfaa7a630f1463fe439c43b99ebfdf9185a8d0ab2

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        189fae9fff68939a1976de3ab2b6b2cf

        SHA1

        cea025540047934fab0c86a26a82facbb81f6f9a

        SHA256

        8d61a812ee0123d94b8877dd6495f33ed86053bc3aaafa8fae75255de83249fa

        SHA512

        74d1c98155df578690d29ee6b9328125392d50c478f655f7def9b645e18197c61b86c285905d088a99835992c5e23e61ee19793ebcfa2543231e3be4dba3ae23

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        b29f5514321570be3217a83f9d6e3107

        SHA1

        28582c1ed4f62e0834fc513c13c3f3dad5ccb10d

        SHA256

        3876c2ae911b1da88f0a4ec8a2a704227426c799ecbdc28108f7fdfd78d6773d

        SHA512

        bb75f238df9bf3bf8a745d921f630a9b0de6ac3dc99eada1723e45677222859ec85cacb3467f604c181c6733118d3a926293bd677ce81fa4e7fe7809df2acb18

      • C:\Users\Admin\AppData\Roaming\Adminlog.dat

        Filesize

        15B

        MD5

        bf3dba41023802cf6d3f8c5fd683a0c7

        SHA1

        466530987a347b68ef28faad238d7b50db8656a5

        SHA256

        4a8e75390856bf822f492f7f605ca0c21f1905172f6d3ef610162533c140507d

        SHA512

        fec60f447dcc90753d693014135e24814f6e8294f6c0f436bc59d892b24e91552108dba6cf5a6fa7c0421f6d290d1bafee9f9f2d95ea8c4c05c2ad0f7c1bb314

      • C:\Windows\install\winserver.exe

        Filesize

        324KB

        MD5

        56817271884bffe78eedb21b9ef2957c

        SHA1

        1ed0d1bb06e4b7b878f7d6e2a1b061391f308e2f

        SHA256

        b88f359ef837d4a39e47375cc5d81ded93e9ff633aafbafd3391ecf2b4b4ba0d

        SHA512

        e4e2a2a6b0f8a58ba202de6c4060f4843e77ba95aec0b97f9419df4da2fe06eb58c9fa70a94202400eb4b1183ec88a8c24d00830fc10335a0f4631b3cec8bdb8

      • \Users\Admin\AppData\Local\Temp\dhD68E8N7Dch1gh.txt

        Filesize

        2KB

        MD5

        835ca66c674a8801c1a15d0780ad9337

        SHA1

        e6b66384d62cd2e8453e5da4c653ef23f63acbc8

        SHA256

        fe2fb191d88254bae10cef24d1a5d89d9f488f9eca6a1bfe381de9032cd92a73

        SHA512

        4a57f1381fa88071f93181578b7eb28fb42aa956d0506a73a09c78569753744cd107c95e0cd29b2c128e328bcd5dd32a43e4b9ce61a9f1bbbab2a4af6e74451b

      • memory/1188-62-0x0000000002DA0000-0x0000000002DA1000-memory.dmp

        Filesize

        4KB

      • memory/1368-13-0x0000000000400000-0x000000000044D000-memory.dmp

        Filesize

        308KB

      • memory/1368-11-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

        Filesize

        4KB

      • memory/1368-9-0x0000000000400000-0x000000000044D000-memory.dmp

        Filesize

        308KB

      • memory/1368-5-0x0000000000400000-0x000000000044D000-memory.dmp

        Filesize

        308KB

      • memory/1368-54-0x0000000000400000-0x000000000044D000-memory.dmp

        Filesize

        308KB

      • memory/1368-15-0x0000000000400000-0x000000000044D000-memory.dmp

        Filesize

        308KB

      • memory/1368-7-0x0000000000400000-0x000000000044D000-memory.dmp

        Filesize

        308KB

      • memory/1488-323-0x00000000000E0000-0x00000000000E1000-memory.dmp

        Filesize

        4KB

      • memory/1488-1018-0x0000000010480000-0x00000000104E5000-memory.dmp

        Filesize

        404KB

      • memory/1488-305-0x00000000000A0000-0x00000000000A1000-memory.dmp

        Filesize

        4KB

      • memory/1488-605-0x0000000010480000-0x00000000104E5000-memory.dmp

        Filesize

        404KB

      • memory/2232-61-0x0000000010410000-0x0000000010475000-memory.dmp

        Filesize

        404KB

      • memory/2232-53-0x0000000000400000-0x000000000044F000-memory.dmp

        Filesize

        316KB

      • memory/2232-56-0x0000000000400000-0x000000000044F000-memory.dmp

        Filesize

        316KB

      • memory/2232-49-0x0000000000400000-0x000000000044F000-memory.dmp

        Filesize

        316KB

      • memory/2232-58-0x0000000000400000-0x000000000044F000-memory.dmp

        Filesize

        316KB

      • memory/2232-45-0x0000000000400000-0x000000000044F000-memory.dmp

        Filesize

        316KB

      • memory/2232-57-0x0000000000400000-0x000000000044F000-memory.dmp

        Filesize

        316KB

      • memory/2232-47-0x0000000000400000-0x000000000044F000-memory.dmp

        Filesize

        316KB

      • memory/2232-39-0x0000000000400000-0x000000000044F000-memory.dmp

        Filesize

        316KB

      • memory/2232-43-0x0000000000400000-0x000000000044F000-memory.dmp

        Filesize

        316KB

      • memory/2232-41-0x0000000000400000-0x000000000044F000-memory.dmp

        Filesize

        316KB

      • memory/2232-937-0x0000000000400000-0x000000000044F000-memory.dmp

        Filesize

        316KB

      • memory/2232-37-0x0000000000400000-0x000000000044F000-memory.dmp

        Filesize

        316KB