Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
09/12/2024, 20:25
Static task
static1
Behavioral task
behavioral1
Sample
conhost.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
conhost.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
csrss.exe
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
csrss.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
dwm.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
dwm.exe
Resource
win10v2004-20241007-en
General
-
Target
conhost.exe
-
Size
170KB
-
MD5
7ac38de1d2bbed88a7a11e015d12a2a6
-
SHA1
661e558267e5b301e0df29e88ff12a3d783353d7
-
SHA256
81ba9b2a1b6cb4955eaa2e98181c0857f5debadf0c2c5db6c73edbebbf5a61ae
-
SHA512
c02a29345ea4898f5f0b98b3f08558adb0e9cfd681ff1be1979a672005f83107f8b1ede6623719fd9417fb9e8ed42ff9ceac10060ef360a7818959feaef94906
-
SSDEEP
3072:+YahorLVDXDnvSUldxcNsplALB+VvcS2lagG2ranXx/WU5kqlZJ5tV4fd6hRH:+Do3VDfZcOLAF+Vv2wH2raXpWy5rVwy
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/1548-6-0x0000000000400000-0x000000000043E000-memory.dmp family_cycbot behavioral1/memory/2968-13-0x0000000000400000-0x000000000043E000-memory.dmp family_cycbot behavioral1/memory/2508-76-0x0000000000400000-0x000000000043E000-memory.dmp family_cycbot behavioral1/memory/2968-77-0x0000000000400000-0x000000000043E000-memory.dmp family_cycbot behavioral1/memory/2968-186-0x0000000000400000-0x000000000043E000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\conhost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\conhost.exe" conhost.exe -
resource yara_rule behavioral1/memory/2968-2-0x0000000000400000-0x000000000043E000-memory.dmp upx behavioral1/memory/1548-5-0x0000000000400000-0x000000000043E000-memory.dmp upx behavioral1/memory/1548-6-0x0000000000400000-0x000000000043E000-memory.dmp upx behavioral1/memory/2968-13-0x0000000000400000-0x000000000043E000-memory.dmp upx behavioral1/memory/2508-75-0x0000000000400000-0x000000000043E000-memory.dmp upx behavioral1/memory/2508-76-0x0000000000400000-0x000000000043E000-memory.dmp upx behavioral1/memory/2968-77-0x0000000000400000-0x000000000043E000-memory.dmp upx behavioral1/memory/2968-186-0x0000000000400000-0x000000000043E000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language conhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language conhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language conhost.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2968 wrote to memory of 1548 2968 conhost.exe 28 PID 2968 wrote to memory of 1548 2968 conhost.exe 28 PID 2968 wrote to memory of 1548 2968 conhost.exe 28 PID 2968 wrote to memory of 1548 2968 conhost.exe 28 PID 2968 wrote to memory of 2508 2968 conhost.exe 30 PID 2968 wrote to memory of 2508 2968 conhost.exe 30 PID 2968 wrote to memory of 2508 2968 conhost.exe 30 PID 2968 wrote to memory of 2508 2968 conhost.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\conhost.exe"C:\Users\Admin\AppData\Local\Temp\conhost.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Users\Admin\AppData\Local\Temp\conhost.exeC:\Users\Admin\AppData\Local\Temp\conhost.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:1548
-
-
C:\Users\Admin\AppData\Local\Temp\conhost.exeC:\Users\Admin\AppData\Local\Temp\conhost.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵
- System Location Discovery: System Language Discovery
PID:2508
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD54f926180d681bb29230ef31aa736a1dc
SHA18f18c014d39f4b1494803990fdb2558937cb4d7c
SHA256e231e016a873c261cb13a99259d129c89cb32e808d3c9978952dcdca5c30acd3
SHA512882e39f39e898434a93e85e90c253bf28ece1eb77846404cbd6d73c115a512e4856e43defe005bbbb81c5bb26eab42e62975eb64100884361dfd9f84b4f52be8
-
Filesize
600B
MD524dff2fb570c93a8d8338048e5195a79
SHA125160bca5215e5068bcc8d7b9131a1f437d2b3bd
SHA256e907b645e4595edc3e3cc8e6287e3ded8ffe5ebcb793b4a2f60a1b023ab87fdb
SHA512eb12102c876fae2846bc49977194d42621359ac3747248b042dca3b9d9ab7b2d156bea683459d0617a12bb32d329c1456acf14c25ece125aabb4c2d08152e366
-
Filesize
996B
MD58f5a2d625c5efb19d6384346be55e7c4
SHA150705f073bffdd16af5f9a66e2a8091e66aca54e
SHA256415a04f8cf5435dbac53c3ed4a1bbb68f6cdab10f58cbbf651ea58417587c764
SHA5126dfb25dd0a79fd2843feba1e9fce33701e5d4791caca97acb95764ba2d9aff25d109891e976be2838b9f7ed1d2b9718e60fd0299fcb7401e39792da75b678ccd