Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    140s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    10/12/2024, 22:13

General

  • Target

    508aa5c3004bee26836a4cd2f81cf56e22d7b6d9cf9dbb124a375880c16b8bde.exe

  • Size

    182KB

  • MD5

    da609639cd6b332859be2ef83572692b

  • SHA1

    170b8aaaf252402369111bc90836abe17d123d58

  • SHA256

    508aa5c3004bee26836a4cd2f81cf56e22d7b6d9cf9dbb124a375880c16b8bde

  • SHA512

    323e976247969d4c6d85a88f5c970190786dbdeadd25aa866c43e217c6105de3c82e9453345d5e0d096df42df1f7d9f678701cc9efc2f42ce989814024592a16

  • SSDEEP

    3072:ds4J1ymzfWOjnwGOn1UnfsofawcnZ6nf5MrAyIOJEWSfOuE6IGTm/nQ:dHJUEfo13FwuZo4JIHOu2G

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 4 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\508aa5c3004bee26836a4cd2f81cf56e22d7b6d9cf9dbb124a375880c16b8bde.exe
    "C:\Users\Admin\AppData\Local\Temp\508aa5c3004bee26836a4cd2f81cf56e22d7b6d9cf9dbb124a375880c16b8bde.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2316
    • C:\Users\Admin\AppData\Local\Temp\508aa5c3004bee26836a4cd2f81cf56e22d7b6d9cf9dbb124a375880c16b8bde.exe
      C:\Users\Admin\AppData\Local\Temp\508aa5c3004bee26836a4cd2f81cf56e22d7b6d9cf9dbb124a375880c16b8bde.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2820
    • C:\Users\Admin\AppData\Local\Temp\508aa5c3004bee26836a4cd2f81cf56e22d7b6d9cf9dbb124a375880c16b8bde.exe
      C:\Users\Admin\AppData\Local\Temp\508aa5c3004bee26836a4cd2f81cf56e22d7b6d9cf9dbb124a375880c16b8bde.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2224

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\2C01.CDF

    Filesize

    1KB

    MD5

    0733bc90c4c1f6178b45bbd8a9c6e1ec

    SHA1

    17ba007c9899f529b430129a5fd783aab0c91aa2

    SHA256

    c8a5b73226f0d8c798b7642eb1da391750d8063b2e5345101be664c67a7ad83d

    SHA512

    ac48e0723507ab7eed41bccb292f10cbdb413a0e49a943b1beb584af95ca5b7c5207888a86d0b46080bb8bcea00a2d8fdff9076c0da83f5527dab6296510dd28

  • C:\Users\Admin\AppData\Roaming\2C01.CDF

    Filesize

    600B

    MD5

    e2f3f2436020d6baa73931e917aac7df

    SHA1

    86b4690bdf1fd30619bec42221623e08b4049f95

    SHA256

    d21e86891c67f1b5f16485ddd95a0d7dc2ee66299aba2c83442eb0fb8e6aff50

    SHA512

    f6ef06e291fc262d0caeec30ffab130814c024cd9dd7a7ecb62269adbfaf700fefb99c5a84fb4512cb0bf5d58db56196d83ceb672c5ffbbce4a03874d3966bb7

  • C:\Users\Admin\AppData\Roaming\2C01.CDF

    Filesize

    996B

    MD5

    16fe7dad28039f545ba953b6c3e6aecb

    SHA1

    1c8d37898f1cff03ab1be57f21dc40d2c42e0be4

    SHA256

    9fc329235ae162312ce7c5a8fa035801300e03dd6c68890468c51505691071c4

    SHA512

    f9c2a9473db7029bfecf2fa1bb2e35954218b59940bf73f4dfd11b5f9665f829eb220fb729f0a70e5b55f15351b746eb33109f924d55b8ce6a46c745a29a8460

  • memory/2224-89-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2316-1-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2316-2-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2316-15-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2316-188-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2820-12-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2820-14-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB