Analysis

  • max time kernel
    120s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-12-2024 22:37

General

  • Target

    275778d4ed6e4798c4e523c35c6bf2bcf403a872a7dfc3e748191faf8e67ea79N.exe

  • Size

    746KB

  • MD5

    d1ec6694c9806c6a41898c60dd084030

  • SHA1

    b620252f74a58803431f0430f9942d32ed96e7ee

  • SHA256

    275778d4ed6e4798c4e523c35c6bf2bcf403a872a7dfc3e748191faf8e67ea79

  • SHA512

    95de98f1260712136386399e3274e8e01f647d7611b7350e69c38ec5a717a9f98f27e2f4f16c83549f85b1a28e76c9665a9ecff1f36276fd85a6ac9cfcb9a032

  • SSDEEP

    12288:3e5Pcc8f3JNzNwEhQYNk/TUQengaFs//Vgs6+VFjPAR8zJDEu577sAc7Hr1Fhr9F:3eSOM+VkuE7HBrYYZ4

Malware Config

Extracted

Family

cybergate

Version

v1.07.5

Botnet

0

C2

damassi.no-ip.biz:82

Mutex

3635M888S8FD70

Attributes
  • enable_keylogger

    true

  • enable_message_box

    true

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    Core services

  • install_file

    services.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Album cannot be opened

  • message_box_title

    Album Error

  • password

    qwe19

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Signatures

  • CyberGate, Rebhip

    CyberGate is a lightweight remote administration tool with a wide array of functionalities.

  • Cybergate family
  • Adds policy Run key to start application 2 TTPs 4 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 11 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3516
      • C:\Users\Admin\AppData\Local\Temp\275778d4ed6e4798c4e523c35c6bf2bcf403a872a7dfc3e748191faf8e67ea79N.exe
        "C:\Users\Admin\AppData\Local\Temp\275778d4ed6e4798c4e523c35c6bf2bcf403a872a7dfc3e748191faf8e67ea79N.exe"
        2⤵
        • Checks computer location settings
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2452
        • C:\Users\Admin\AppData\Local\Temp\winamp\.exe
          C:\Users\Admin\AppData\Local\Temp\\winamp\.exe
          3⤵
            PID:2088
          • C:\Users\Admin\AppData\Local\Temp\winamp\.exe
            C:\Users\Admin\AppData\Local\Temp\\winamp\.exe
            3⤵
            • Adds policy Run key to start application
            • Boot or Logon Autostart Execution: Active Setup
            • Checks computer location settings
            • Executes dropped EXE
            • Adds Run key to start application
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            • Modifies registry class
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of WriteProcessMemory
            PID:1608
            • C:\Windows\SysWOW64\explorer.exe
              explorer.exe
              4⤵
              • Boot or Logon Autostart Execution: Active Setup
              • System Location Discovery: System Language Discovery
              • Suspicious use of AdjustPrivilegeToken
              PID:3536
            • C:\Windows\SysWOW64\explorer.exe
              explorer.exe
              4⤵
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              • Modifies registry class
              • Suspicious behavior: GetForegroundWindowSpam
              • Suspicious use of AdjustPrivilegeToken
              PID:228
              • C:\Windows\Core services\services.exe
                "C:\Windows\Core services\services.exe"
                5⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                PID:2880
            • C:\Windows\Core services\services.exe
              "C:\Windows\Core services\services.exe"
              4⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:3552

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\Admin2.txt

        Filesize

        224KB

        MD5

        574033fb0a37a48e0425b3b9d0894b84

        SHA1

        2c8d495139921f0eb107aa79700c4f10e8b4b1d8

        SHA256

        5038d41694c5d88fb4b6d10db7e2d40af18242762ea5e75e5533f7d6efc35091

        SHA512

        56a378915cd6c33becf7b40e4f0f4e1dfb4960e3cabb5a4358bbccea52f993951d6ed35fd3c4ef86efe13685647d3a6adf44486d6b319bad73552bc7722a7e45

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        adeea5f821acf6bac187bf387969c91a

        SHA1

        2f6f42934c6436c1d4604d7d161f2f57cce2899f

        SHA256

        29d3804b00368b87500a9a180055b0a1d1111c5e81e1748c6dbff0b6bcbc4df6

        SHA512

        1f3e4f6551381c174a79a40696efe5bfc2620b9768848069ee5d5dfafad42c7857736aef22c24b137880feb7d16da833ac1fb0a1dfcd22a25887750e80611ceb

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        2fa6876a555e2fe49421c93bea9ed9de

        SHA1

        0c20dd6c3b7f5e2821ab40ef105df418c1d8fac5

        SHA256

        793c2cba1baa5eba4bc2572ce578889bd319fd715d29a50c0e0ecda4fff83c74

        SHA512

        4c9455db1f9dbddccf6399b57241360f30d6b902b795dbfe33272ff202ee97e2297d10682673453563dc8884b1e6f733b5b74d38cf2df870329ef256daf4c4ca

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        25e692acd0363029f494352183ade71f

        SHA1

        ac326849727636844f6888d41543f7355a93fd45

        SHA256

        1c04c1670298e1b1839227a6b98ab7539e639816d9475deb585e088cacf3ad2a

        SHA512

        edd2f40338cd0555464bde6c4ec67327756e723df2b6c04535896ac52c8736aeebd047d40f184d889bdb25ffa944e45310168788afed68c36c02aa1222e6fe28

      • C:\Users\Admin\AppData\Local\Temp\Admin7

        Filesize

        8B

        MD5

        51b469f07aabf043ba6998dd2294165d

        SHA1

        326a2d930cbaecb1af63093648ae5498de456d03

        SHA256

        4e567757b3855a86b7a192ad861a59eb8731fdbf05757144438fb7c22b5e35a9

        SHA512

        48212b0282be1b82828de2bdfce768a6656e9a5f1af2f9d9918f363c1d18f1db8da121c2b8c66b20f98dd0e967ca5eb6a42f9d897532f0fea5cbc80bc2dab310

      • C:\Users\Admin\AppData\Local\Temp\winamp\.exe

        Filesize

        1.1MB

        MD5

        d881de17aa8f2e2c08cbb7b265f928f9

        SHA1

        08936aebc87decf0af6e8eada191062b5e65ac2a

        SHA256

        b3a37093609f9a20ad60b85a9fa9de2ba674cba9b5bd687729440c70ba619ca0

        SHA512

        5f23bfb1b8740247b36ed0ab741738c7d4c949736129e767213e321607d1ccd3e3a8428e4ba44bd28a275b5e3f6206285b1a522514b7ef7ea5e698d90a713d34

      • C:\Users\Admin\AppData\Roaming\Adminlog.dat

        Filesize

        15B

        MD5

        bf3dba41023802cf6d3f8c5fd683a0c7

        SHA1

        466530987a347b68ef28faad238d7b50db8656a5

        SHA256

        4a8e75390856bf822f492f7f605ca0c21f1905172f6d3ef610162533c140507d

        SHA512

        fec60f447dcc90753d693014135e24814f6e8294f6c0f436bc59d892b24e91552108dba6cf5a6fa7c0421f6d290d1bafee9f9f2d95ea8c4c05c2ad0f7c1bb314

      • memory/228-176-0x00000000751F0000-0x00000000757F8000-memory.dmp

        Filesize

        6.0MB

      • memory/228-122-0x00000000751F0000-0x00000000757F8000-memory.dmp

        Filesize

        6.0MB

      • memory/1608-13-0x0000000000400000-0x0000000000456000-memory.dmp

        Filesize

        344KB

      • memory/1608-170-0x0000000000400000-0x0000000000456000-memory.dmp

        Filesize

        344KB

      • memory/1608-7-0x0000000000400000-0x0000000000456000-memory.dmp

        Filesize

        344KB

      • memory/1608-23-0x0000000010480000-0x00000000104E5000-memory.dmp

        Filesize

        404KB

      • memory/1608-11-0x0000000000400000-0x0000000000456000-memory.dmp

        Filesize

        344KB

      • memory/1608-12-0x0000000000400000-0x0000000000456000-memory.dmp

        Filesize

        344KB

      • memory/1608-19-0x0000000010410000-0x0000000010475000-memory.dmp

        Filesize

        404KB

      • memory/2452-15-0x0000000075250000-0x0000000075801000-memory.dmp

        Filesize

        5.7MB

      • memory/2452-0-0x0000000075252000-0x0000000075253000-memory.dmp

        Filesize

        4KB

      • memory/2452-2-0x0000000075250000-0x0000000075801000-memory.dmp

        Filesize

        5.7MB

      • memory/2452-1-0x0000000075250000-0x0000000075801000-memory.dmp

        Filesize

        5.7MB

      • memory/3536-89-0x00000000751F0000-0x00000000757F8000-memory.dmp

        Filesize

        6.0MB

      • memory/3536-86-0x00000000751F0000-0x00000000757F8000-memory.dmp

        Filesize

        6.0MB

      • memory/3536-24-0x0000000000DA0000-0x0000000000DA1000-memory.dmp

        Filesize

        4KB

      • memory/3536-73-0x00000000751F0000-0x00000000757F8000-memory.dmp

        Filesize

        6.0MB

      • memory/3536-25-0x0000000001060000-0x0000000001061000-memory.dmp

        Filesize

        4KB