Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
06-12-2024 03:25
Static task
static1
Behavioral task
behavioral1
Sample
dd3693e034ca9b32d866d4215d67d2c6e6cd0b758c57499d941458a62344e0ea.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
dd3693e034ca9b32d866d4215d67d2c6e6cd0b758c57499d941458a62344e0ea.exe
Resource
win10v2004-20241007-en
General
-
Target
dd3693e034ca9b32d866d4215d67d2c6e6cd0b758c57499d941458a62344e0ea.exe
-
Size
197KB
-
MD5
c5828e12d2e3d70cd73e8868f603abaa
-
SHA1
c22e8fddb6af667521428aaaa35ef8711b1130a7
-
SHA256
dd3693e034ca9b32d866d4215d67d2c6e6cd0b758c57499d941458a62344e0ea
-
SHA512
d4229c12c974f2a796e4aef38e3e39f970403c2df308d59e75e5c099aa354dc426bea204035ca5fdf11b805489ff99de1df6a8d5f71741971318d99f78b3f503
-
SSDEEP
3072:AjB33b++Q0Yg5l5D+H/AWVEDbqrB1YSEh0TAMvRKThRuxEBylvAoDrIb75GMYyRF:Aj4+QpE+BEsbbvRWexEk1tIkMBxM
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 6 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2376-8-0x0000000000400000-0x000000000048B000-memory.dmp family_cycbot behavioral1/memory/2376-10-0x0000000000400000-0x000000000048B000-memory.dmp family_cycbot behavioral1/memory/2432-22-0x0000000000400000-0x000000000048B000-memory.dmp family_cycbot behavioral1/memory/800-93-0x0000000000400000-0x000000000048B000-memory.dmp family_cycbot behavioral1/memory/2432-94-0x0000000000400000-0x000000000048B000-memory.dmp family_cycbot behavioral1/memory/2432-200-0x0000000000400000-0x000000000048B000-memory.dmp family_cycbot -
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\dwm.exe" dd3693e034ca9b32d866d4215d67d2c6e6cd0b758c57499d941458a62344e0ea.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2432-2-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral1/memory/2376-7-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral1/memory/2376-8-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral1/memory/2376-10-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral1/memory/2432-22-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral1/memory/800-93-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral1/memory/2432-94-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral1/memory/2432-200-0x0000000000400000-0x000000000048B000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dd3693e034ca9b32d866d4215d67d2c6e6cd0b758c57499d941458a62344e0ea.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dd3693e034ca9b32d866d4215d67d2c6e6cd0b758c57499d941458a62344e0ea.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dd3693e034ca9b32d866d4215d67d2c6e6cd0b758c57499d941458a62344e0ea.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2432 wrote to memory of 2376 2432 dd3693e034ca9b32d866d4215d67d2c6e6cd0b758c57499d941458a62344e0ea.exe 30 PID 2432 wrote to memory of 2376 2432 dd3693e034ca9b32d866d4215d67d2c6e6cd0b758c57499d941458a62344e0ea.exe 30 PID 2432 wrote to memory of 2376 2432 dd3693e034ca9b32d866d4215d67d2c6e6cd0b758c57499d941458a62344e0ea.exe 30 PID 2432 wrote to memory of 2376 2432 dd3693e034ca9b32d866d4215d67d2c6e6cd0b758c57499d941458a62344e0ea.exe 30 PID 2432 wrote to memory of 800 2432 dd3693e034ca9b32d866d4215d67d2c6e6cd0b758c57499d941458a62344e0ea.exe 32 PID 2432 wrote to memory of 800 2432 dd3693e034ca9b32d866d4215d67d2c6e6cd0b758c57499d941458a62344e0ea.exe 32 PID 2432 wrote to memory of 800 2432 dd3693e034ca9b32d866d4215d67d2c6e6cd0b758c57499d941458a62344e0ea.exe 32 PID 2432 wrote to memory of 800 2432 dd3693e034ca9b32d866d4215d67d2c6e6cd0b758c57499d941458a62344e0ea.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\dd3693e034ca9b32d866d4215d67d2c6e6cd0b758c57499d941458a62344e0ea.exe"C:\Users\Admin\AppData\Local\Temp\dd3693e034ca9b32d866d4215d67d2c6e6cd0b758c57499d941458a62344e0ea.exe"1⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Users\Admin\AppData\Local\Temp\dd3693e034ca9b32d866d4215d67d2c6e6cd0b758c57499d941458a62344e0ea.exeC:\Users\Admin\AppData\Local\Temp\dd3693e034ca9b32d866d4215d67d2c6e6cd0b758c57499d941458a62344e0ea.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵
- System Location Discovery: System Language Discovery
PID:2376
-
-
C:\Users\Admin\AppData\Local\Temp\dd3693e034ca9b32d866d4215d67d2c6e6cd0b758c57499d941458a62344e0ea.exeC:\Users\Admin\AppData\Local\Temp\dd3693e034ca9b32d866d4215d67d2c6e6cd0b758c57499d941458a62344e0ea.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵
- System Location Discovery: System Language Discovery
PID:800
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
597B
MD59a3336c51a790e8dcbfe78dc01062b6b
SHA172747e024125fb97f88f5fb875513b9c977299f3
SHA256a1b160d69789d45e5e97c3748f5cb13bafca6fbadbc8e06ea1cc50e5d65b5970
SHA51265c1946d09b23cf4a2447c3154b9ccb4d38aed3db4750aebb0f6f50936457785ad9d3f42b64adf15c7db5f75bd6e566ce45240c5019fc1fd48a59a02fd60bcef
-
Filesize
1KB
MD50ff35ea297b07464307c6a424a82198d
SHA17464b78d5aa35094be1da5800fecf017a41dff79
SHA25673386eda48d93d133005205a7d0f9e5ddd06133ea28cd5ec67904e988a37e104
SHA5122b19cef1e9eb94dda5d091830e3e53ace185b31cc462796ad8a9092cbb02a1956589c9c1b19d8e8c079fda650b0a8a2d0b797af380a9a410b7f46a34136132c4
-
Filesize
897B
MD50b2528422d9910da7788de15aedb8a2f
SHA15876fc61998f6ff1567527190b60adbc334b8686
SHA256d7ebf6be7ea3b76e5ec8a6ab8afe4369c57cfbe70d51e6d49edef86865d35c86
SHA5126d31a5577e78ec10798cc93ee9801e771e286892594852df9a3018c79ae8e20c98696bec43b790986dc76dc3d68d5287d84c6bff63817d07fd2383c4f965a765
-
Filesize
1KB
MD5f72bc908a0110a085655d32d8e0b9fb4
SHA1a2926b3f26bb4b6bf429dbbb482745ec1f8e56ff
SHA256b115f21bc7b26111886767c024940d8db5232412c82cf1dbbd4676d9da731851
SHA51283a936d43e1db0f9cc350385590201010cd1b5bb81744eb0ceec6a57c87b7a048f4d2376005d1aa3633fd4ea23a09542450b977f23402cc27950d111e5ce1b9d