Analysis
-
max time kernel
110s -
max time network
63s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-12-2024 01:16
Static task
static1
Behavioral task
behavioral1
Sample
1e1bdfd4e612a1d832ec913ced852a906b28863e77f23b011013bd86ce1bbe6c.exe
Resource
win7-20240903-en
General
-
Target
1e1bdfd4e612a1d832ec913ced852a906b28863e77f23b011013bd86ce1bbe6c.exe
-
Size
188KB
-
MD5
7ee39b38f507ed65c497c49f2f6f0504
-
SHA1
7580cbfc8913a8f7d3582958bd428fd281882db2
-
SHA256
1e1bdfd4e612a1d832ec913ced852a906b28863e77f23b011013bd86ce1bbe6c
-
SHA512
a40fb026f693c715215de45286d10defff6cd5684f86f24ea0aa2b87f0c121ac3491d17b73ec049b8f9f39b93e0a449dd5775cf08e6bdc917f81a686675ab081
-
SSDEEP
3072:2s/pebp6nCyce+ORB7ur9WMQn+OQVm24KsOz8p5UhrJHWnTA+ims:9LPceHRBQWqwXEz8puRWnTy
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 4 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2412-13-0x0000000000400000-0x000000000044E000-memory.dmp family_cycbot behavioral1/memory/3044-14-0x0000000000400000-0x000000000044E000-memory.dmp family_cycbot behavioral1/memory/1052-81-0x0000000000400000-0x000000000044E000-memory.dmp family_cycbot behavioral1/memory/3044-182-0x0000000000400000-0x000000000044E000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/3044-2-0x0000000000400000-0x000000000044E000-memory.dmp upx behavioral1/memory/2412-13-0x0000000000400000-0x000000000044E000-memory.dmp upx behavioral1/memory/3044-14-0x0000000000400000-0x000000000044E000-memory.dmp upx behavioral1/memory/1052-80-0x0000000000400000-0x000000000044E000-memory.dmp upx behavioral1/memory/1052-81-0x0000000000400000-0x000000000044E000-memory.dmp upx behavioral1/memory/3044-182-0x0000000000400000-0x000000000044E000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1e1bdfd4e612a1d832ec913ced852a906b28863e77f23b011013bd86ce1bbe6c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1e1bdfd4e612a1d832ec913ced852a906b28863e77f23b011013bd86ce1bbe6c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1e1bdfd4e612a1d832ec913ced852a906b28863e77f23b011013bd86ce1bbe6c.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3044 wrote to memory of 2412 3044 1e1bdfd4e612a1d832ec913ced852a906b28863e77f23b011013bd86ce1bbe6c.exe 31 PID 3044 wrote to memory of 2412 3044 1e1bdfd4e612a1d832ec913ced852a906b28863e77f23b011013bd86ce1bbe6c.exe 31 PID 3044 wrote to memory of 2412 3044 1e1bdfd4e612a1d832ec913ced852a906b28863e77f23b011013bd86ce1bbe6c.exe 31 PID 3044 wrote to memory of 2412 3044 1e1bdfd4e612a1d832ec913ced852a906b28863e77f23b011013bd86ce1bbe6c.exe 31 PID 3044 wrote to memory of 1052 3044 1e1bdfd4e612a1d832ec913ced852a906b28863e77f23b011013bd86ce1bbe6c.exe 33 PID 3044 wrote to memory of 1052 3044 1e1bdfd4e612a1d832ec913ced852a906b28863e77f23b011013bd86ce1bbe6c.exe 33 PID 3044 wrote to memory of 1052 3044 1e1bdfd4e612a1d832ec913ced852a906b28863e77f23b011013bd86ce1bbe6c.exe 33 PID 3044 wrote to memory of 1052 3044 1e1bdfd4e612a1d832ec913ced852a906b28863e77f23b011013bd86ce1bbe6c.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\1e1bdfd4e612a1d832ec913ced852a906b28863e77f23b011013bd86ce1bbe6c.exe"C:\Users\Admin\AppData\Local\Temp\1e1bdfd4e612a1d832ec913ced852a906b28863e77f23b011013bd86ce1bbe6c.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Users\Admin\AppData\Local\Temp\1e1bdfd4e612a1d832ec913ced852a906b28863e77f23b011013bd86ce1bbe6c.exeC:\Users\Admin\AppData\Local\Temp\1e1bdfd4e612a1d832ec913ced852a906b28863e77f23b011013bd86ce1bbe6c.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵
- System Location Discovery: System Language Discovery
PID:2412
-
-
C:\Users\Admin\AppData\Local\Temp\1e1bdfd4e612a1d832ec913ced852a906b28863e77f23b011013bd86ce1bbe6c.exeC:\Users\Admin\AppData\Local\Temp\1e1bdfd4e612a1d832ec913ced852a906b28863e77f23b011013bd86ce1bbe6c.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:1052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5158096c277bd6db8f75f82bdcf1dec3d
SHA1ffe0b6d18b429bd7bc396fd1a56f144588d1226c
SHA25605e3447084d2110765fe6cac386c766ad5c52b38eb43efd2858838bc80040a2b
SHA51297c57ff6e8b8b8b006db0ccb314b7257a95aca8e9124a5ae79cbe6eab2697e0b6451574492dea72250a613a82b35301076a11e20cd9d9a78809ba29f807a9fd9
-
Filesize
600B
MD54232458e773583d0f12be07c2b74804e
SHA1e3ccdc72503b22eeec5a9e3cc00c48af7c6beaf6
SHA25624b3047172ece684fcfa4c143f62e13f7d14012295b79e3386a0ccd383423197
SHA512b0540f11f23cd7ab8c936713a4ff64ef745aa14e5598d02cbdb01cc97baac9a0c11495266f5a7a0affe82852ca184b236cc4950674702992a885e5a523e706bc