Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-12-2024 10:38
Static task
static1
Behavioral task
behavioral1
Sample
ADOBEC~1.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
ADOBEC~1.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
CYBERG~1.exe
Resource
win7-20241010-en
General
-
Target
CYBERG~1.exe
-
Size
324KB
-
MD5
66a881c43f39821a1b0549b5f14a8d66
-
SHA1
c8928788664acab21d64872ffa6e36374f406adf
-
SHA256
8cdf60f38753481c688f6a12e26e6edeae19e2a781313bd01d802e53c66a6c31
-
SHA512
8ffe3e90ff53b978ab840dd043014ddf75f014fa2e0b6aa57b36c01ad39a6306934d09a86aad7209adfd2c033833c30d4cf0819fea3f43cb1ba3ccc0796cc4b2
-
SSDEEP
6144:XGWhtZitMYUH/abBAMMU6NStDQdRa1+IBfkeSDh+UsJA3XQyja/GqkrJOoXY:V9tzH/MKlXN5u1Zkeg+Usq3AyjaGqklz
Malware Config
Extracted
cybergate
v1.07.5
Jonah
jonahjameson.no-ip.biz:100
L7Y726M8KC7VN5
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
install
-
install_file
server.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
123456
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Signatures
-
Cybergate family
-
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\install\\server.exe" CYBERG~1.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run CYBERG~1.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\install\\server.exe" CYBERG~1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run CYBERG~1.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{4NB74UR8-1KM1-M450-561I-KEG45YGMRAJA} CYBERG~1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4NB74UR8-1KM1-M450-561I-KEG45YGMRAJA}\StubPath = "C:\\Windows\\system32\\install\\server.exe Restart" CYBERG~1.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{4NB74UR8-1KM1-M450-561I-KEG45YGMRAJA} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4NB74UR8-1KM1-M450-561I-KEG45YGMRAJA}\StubPath = "C:\\Windows\\system32\\install\\server.exe" explorer.exe -
Executes dropped EXE 2 IoCs
pid Process 1424 server.exe 4896 server.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\system32\\install\\server.exe" CYBERG~1.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\system32\\install\\server.exe" CYBERG~1.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\install\server.exe CYBERG~1.exe File opened for modification C:\Windows\SysWOW64\install\server.exe explorer.exe File opened for modification C:\Windows\SysWOW64\install\ explorer.exe File created C:\Windows\SysWOW64\install\server.exe CYBERG~1.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1400 set thread context of 2384 1400 CYBERG~1.exe 83 PID 1424 set thread context of 4896 1424 server.exe 87 -
resource yara_rule behavioral4/memory/2384-10-0x0000000010410000-0x0000000010475000-memory.dmp upx behavioral4/memory/2384-14-0x0000000010480000-0x00000000104E5000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 712 4896 WerFault.exe 87 -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CYBERG~1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CYBERG~1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 512 explorer.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 1400 CYBERG~1.exe Token: SeBackupPrivilege 3672 explorer.exe Token: SeRestorePrivilege 3672 explorer.exe Token: SeBackupPrivilege 512 explorer.exe Token: SeRestorePrivilege 512 explorer.exe Token: SeDebugPrivilege 512 explorer.exe Token: SeDebugPrivilege 512 explorer.exe Token: SeDebugPrivilege 1424 server.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2384 CYBERG~1.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1400 wrote to memory of 2384 1400 CYBERG~1.exe 83 PID 1400 wrote to memory of 2384 1400 CYBERG~1.exe 83 PID 1400 wrote to memory of 2384 1400 CYBERG~1.exe 83 PID 1400 wrote to memory of 2384 1400 CYBERG~1.exe 83 PID 1400 wrote to memory of 2384 1400 CYBERG~1.exe 83 PID 1400 wrote to memory of 2384 1400 CYBERG~1.exe 83 PID 1400 wrote to memory of 2384 1400 CYBERG~1.exe 83 PID 1400 wrote to memory of 2384 1400 CYBERG~1.exe 83 PID 1400 wrote to memory of 2384 1400 CYBERG~1.exe 83 PID 1400 wrote to memory of 2384 1400 CYBERG~1.exe 83 PID 1400 wrote to memory of 2384 1400 CYBERG~1.exe 83 PID 1400 wrote to memory of 2384 1400 CYBERG~1.exe 83 PID 1400 wrote to memory of 2384 1400 CYBERG~1.exe 83 PID 2384 wrote to memory of 3536 2384 CYBERG~1.exe 56 PID 2384 wrote to memory of 3536 2384 CYBERG~1.exe 56 PID 2384 wrote to memory of 3536 2384 CYBERG~1.exe 56 PID 2384 wrote to memory of 3536 2384 CYBERG~1.exe 56 PID 2384 wrote to memory of 3536 2384 CYBERG~1.exe 56 PID 2384 wrote to memory of 3536 2384 CYBERG~1.exe 56 PID 2384 wrote to memory of 3536 2384 CYBERG~1.exe 56 PID 2384 wrote to memory of 3536 2384 CYBERG~1.exe 56 PID 2384 wrote to memory of 3536 2384 CYBERG~1.exe 56 PID 2384 wrote to memory of 3536 2384 CYBERG~1.exe 56 PID 2384 wrote to memory of 3536 2384 CYBERG~1.exe 56 PID 2384 wrote to memory of 3536 2384 CYBERG~1.exe 56 PID 2384 wrote to memory of 3536 2384 CYBERG~1.exe 56 PID 2384 wrote to memory of 3536 2384 CYBERG~1.exe 56 PID 2384 wrote to memory of 3536 2384 CYBERG~1.exe 56 PID 2384 wrote to memory of 3536 2384 CYBERG~1.exe 56 PID 2384 wrote to memory of 3536 2384 CYBERG~1.exe 56 PID 2384 wrote to memory of 3536 2384 CYBERG~1.exe 56 PID 2384 wrote to memory of 3536 2384 CYBERG~1.exe 56 PID 2384 wrote to memory of 3536 2384 CYBERG~1.exe 56 PID 2384 wrote to memory of 3536 2384 CYBERG~1.exe 56 PID 2384 wrote to memory of 3536 2384 CYBERG~1.exe 56 PID 2384 wrote to memory of 3536 2384 CYBERG~1.exe 56 PID 2384 wrote to memory of 3536 2384 CYBERG~1.exe 56 PID 2384 wrote to memory of 3536 2384 CYBERG~1.exe 56 PID 2384 wrote to memory of 3536 2384 CYBERG~1.exe 56 PID 2384 wrote to memory of 3536 2384 CYBERG~1.exe 56 PID 2384 wrote to memory of 3536 2384 CYBERG~1.exe 56 PID 2384 wrote to memory of 3536 2384 CYBERG~1.exe 56 PID 2384 wrote to memory of 3536 2384 CYBERG~1.exe 56 PID 2384 wrote to memory of 3536 2384 CYBERG~1.exe 56 PID 2384 wrote to memory of 3536 2384 CYBERG~1.exe 56 PID 2384 wrote to memory of 3536 2384 CYBERG~1.exe 56 PID 2384 wrote to memory of 3536 2384 CYBERG~1.exe 56 PID 2384 wrote to memory of 3536 2384 CYBERG~1.exe 56 PID 2384 wrote to memory of 3536 2384 CYBERG~1.exe 56 PID 2384 wrote to memory of 3536 2384 CYBERG~1.exe 56 PID 2384 wrote to memory of 3536 2384 CYBERG~1.exe 56 PID 2384 wrote to memory of 3536 2384 CYBERG~1.exe 56 PID 2384 wrote to memory of 3536 2384 CYBERG~1.exe 56 PID 2384 wrote to memory of 3536 2384 CYBERG~1.exe 56 PID 2384 wrote to memory of 3536 2384 CYBERG~1.exe 56 PID 2384 wrote to memory of 3536 2384 CYBERG~1.exe 56 PID 2384 wrote to memory of 3536 2384 CYBERG~1.exe 56 PID 2384 wrote to memory of 3536 2384 CYBERG~1.exe 56 PID 2384 wrote to memory of 3536 2384 CYBERG~1.exe 56 PID 2384 wrote to memory of 3536 2384 CYBERG~1.exe 56 PID 2384 wrote to memory of 3536 2384 CYBERG~1.exe 56 PID 2384 wrote to memory of 3536 2384 CYBERG~1.exe 56 PID 2384 wrote to memory of 3536 2384 CYBERG~1.exe 56 PID 2384 wrote to memory of 3536 2384 CYBERG~1.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3536
-
C:\Users\Admin\AppData\Local\Temp\CYBERG~1.exe"C:\Users\Admin\AppData\Local\Temp\CYBERG~1.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Users\Admin\AppData\Local\Temp\CYBERG~1.exeCYBERG~1.exe3⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3672
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:512 -
C:\Windows\SysWOW64\install\server.exe"C:\Windows\system32\install\server.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1424 -
C:\Windows\SysWOW64\install\server.exeserver.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4896 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4896 -s 5887⤵
- Program crash
PID:712
-
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4896 -ip 48961⤵PID:4192
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD581fc4abeaf078a1ae0cc553a755819b8
SHA166cb0ddf7bcd1f41aea6e938f64d186db2d1493f
SHA256e0c94bc9c07bf96267a9cb968b5d5e101234cff157ab7b8a5f289531ca5273a5
SHA51234b4475225452b20bc2be03692ccea03a3570e7f3275aabb011ad449e16df6f0fe949dbbb77d5c17ef77645c593da612742d902bad8f8585afef848614cdad6c
-
Filesize
8B
MD55d02bc2128fd3afa49a49c77c09b7d04
SHA12c53510b72fb68ab2fdec0ae656969e846c699ff
SHA25606e045fb11d0c3ad8e4890f5b8a371a93d38cb279954db82409689a36e1abea0
SHA51234cf365ddc4faa6f82047bf23ca8901ad5b21f9b9f7a8c634b88d8584b2b82a5a50346c3ea9aea599f431091fa173a10fcdc88f119a2bdb7cfd6f5becc8476b9
-
Filesize
8B
MD54ab4d6e7924e7afc0d3cc58dbe8a2dab
SHA1ba2bc60b2a49482d5df750cb3bc005e210796174
SHA2561e7ec29ab47e9585ae0c7bcc132f0249075538811f04021ce71e7ac7287d9031
SHA512c51b4ca92513052528899dcde31d6abaa5a3fb4cdce027fc27faa1e884ff2e86be3fbb08f7c2d843c13ba78f801bd71fb24619331ea7b4abf489f0dbbfac30f4
-
Filesize
8B
MD503ceb99a85c6f62eb7ed71b0a9790799
SHA1799c20ea0aa5013afb07a0b0e29846cb235ab4ba
SHA25640fc514d0fbf34b05eb95b2e9869a47c2a9ce778322caa62015b2524459b7a5d
SHA512a0036ee79b4cbe818aeec4e917c0ebe6e9783e81b1426613c6ba9b5ef11623d1b901e2022f5a17e924925506232e1315be16462f9d0da76b126560dd727f759f
-
Filesize
8B
MD5913fa4c4ee0ec264badbe795576af2ac
SHA16237a29586a90dd0845bc45c309a81dfae4144b4
SHA256a962527285e846441bf352570b34efa1b311fc5333c3330358780d538b7f44e1
SHA5124687a54b3808f04a42257e42a20a3d98d0f2d51656f1bc17ea91842059dd28fea0c281922be461fca204b73862593db6238d50da708885f87be00eb6695bb824
-
Filesize
8B
MD5a0327b4626f9bcd9a23e6e6311d0e4f2
SHA1d026312837391f349e8f01204fa204da20037fda
SHA256fa7d87d12e7c67fe5f0cd3c12927befe5a5e95a305f75139eea88cc13df7469a
SHA51200fa9bb8fb7300a3a299524d6d945ec061c47c6b52cabbbb9f87e6d317f9ebafd3a165859bb1414e73b6474e98272b1f1e30f2ffe00793b2c19f642185ed2456
-
Filesize
15B
MD5bf3dba41023802cf6d3f8c5fd683a0c7
SHA1466530987a347b68ef28faad238d7b50db8656a5
SHA2564a8e75390856bf822f492f7f605ca0c21f1905172f6d3ef610162533c140507d
SHA512fec60f447dcc90753d693014135e24814f6e8294f6c0f436bc59d892b24e91552108dba6cf5a6fa7c0421f6d290d1bafee9f9f2d95ea8c4c05c2ad0f7c1bb314
-
Filesize
324KB
MD566a881c43f39821a1b0549b5f14a8d66
SHA1c8928788664acab21d64872ffa6e36374f406adf
SHA2568cdf60f38753481c688f6a12e26e6edeae19e2a781313bd01d802e53c66a6c31
SHA5128ffe3e90ff53b978ab840dd043014ddf75f014fa2e0b6aa57b36c01ad39a6306934d09a86aad7209adfd2c033833c30d4cf0819fea3f43cb1ba3ccc0796cc4b2