Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10/12/2024, 20:21
Static task
static1
Behavioral task
behavioral1
Sample
1b3a4ba95af464fc222df26f71c5c8c44b4beca002176ae5372471caf2bb2418.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1b3a4ba95af464fc222df26f71c5c8c44b4beca002176ae5372471caf2bb2418.exe
Resource
win10v2004-20241007-en
General
-
Target
1b3a4ba95af464fc222df26f71c5c8c44b4beca002176ae5372471caf2bb2418.exe
-
Size
187KB
-
MD5
daad9b133d139f509a2ef348da66c146
-
SHA1
1f8730c8bc7a0765e2f0983ae88f64838eb7fa84
-
SHA256
1b3a4ba95af464fc222df26f71c5c8c44b4beca002176ae5372471caf2bb2418
-
SHA512
a62c92899220125132b5805140d9f43af86e35537ef362e069bd8da592bc925a502e20c7b7d386cef09532667c7d39b1d785e293bdad39deeeba3be531cc62d2
-
SSDEEP
3072:umpgG33H1u5F79GNgPrnw+fg+UbH8eIA6EfI73VrarwObkeLpp+RuDN4o:mwHobkCbw+fAmdzLparwWLpgSGo
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2412-7-0x0000000000400000-0x0000000000445000-memory.dmp family_cycbot behavioral1/memory/3000-15-0x0000000000400000-0x0000000000445000-memory.dmp family_cycbot behavioral1/memory/2456-77-0x0000000000400000-0x0000000000445000-memory.dmp family_cycbot behavioral1/memory/3000-78-0x0000000000400000-0x0000000000445000-memory.dmp family_cycbot behavioral1/memory/3000-185-0x0000000000400000-0x0000000000445000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\conhost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\conhost.exe" 1b3a4ba95af464fc222df26f71c5c8c44b4beca002176ae5372471caf2bb2418.exe -
resource yara_rule behavioral1/memory/3000-2-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2412-7-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2412-5-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/3000-15-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2456-76-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2456-77-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/3000-78-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/3000-185-0x0000000000400000-0x0000000000445000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1b3a4ba95af464fc222df26f71c5c8c44b4beca002176ae5372471caf2bb2418.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1b3a4ba95af464fc222df26f71c5c8c44b4beca002176ae5372471caf2bb2418.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1b3a4ba95af464fc222df26f71c5c8c44b4beca002176ae5372471caf2bb2418.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3000 wrote to memory of 2412 3000 1b3a4ba95af464fc222df26f71c5c8c44b4beca002176ae5372471caf2bb2418.exe 30 PID 3000 wrote to memory of 2412 3000 1b3a4ba95af464fc222df26f71c5c8c44b4beca002176ae5372471caf2bb2418.exe 30 PID 3000 wrote to memory of 2412 3000 1b3a4ba95af464fc222df26f71c5c8c44b4beca002176ae5372471caf2bb2418.exe 30 PID 3000 wrote to memory of 2412 3000 1b3a4ba95af464fc222df26f71c5c8c44b4beca002176ae5372471caf2bb2418.exe 30 PID 3000 wrote to memory of 2456 3000 1b3a4ba95af464fc222df26f71c5c8c44b4beca002176ae5372471caf2bb2418.exe 33 PID 3000 wrote to memory of 2456 3000 1b3a4ba95af464fc222df26f71c5c8c44b4beca002176ae5372471caf2bb2418.exe 33 PID 3000 wrote to memory of 2456 3000 1b3a4ba95af464fc222df26f71c5c8c44b4beca002176ae5372471caf2bb2418.exe 33 PID 3000 wrote to memory of 2456 3000 1b3a4ba95af464fc222df26f71c5c8c44b4beca002176ae5372471caf2bb2418.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\1b3a4ba95af464fc222df26f71c5c8c44b4beca002176ae5372471caf2bb2418.exe"C:\Users\Admin\AppData\Local\Temp\1b3a4ba95af464fc222df26f71c5c8c44b4beca002176ae5372471caf2bb2418.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Users\Admin\AppData\Local\Temp\1b3a4ba95af464fc222df26f71c5c8c44b4beca002176ae5372471caf2bb2418.exeC:\Users\Admin\AppData\Local\Temp\1b3a4ba95af464fc222df26f71c5c8c44b4beca002176ae5372471caf2bb2418.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:2412
-
-
C:\Users\Admin\AppData\Local\Temp\1b3a4ba95af464fc222df26f71c5c8c44b4beca002176ae5372471caf2bb2418.exeC:\Users\Admin\AppData\Local\Temp\1b3a4ba95af464fc222df26f71c5c8c44b4beca002176ae5372471caf2bb2418.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵
- System Location Discovery: System Language Discovery
PID:2456
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD52e87f0d1307d85a9f167fd89c46263f0
SHA1ab6c017f95630402ae9634f0efd4cb3b29336e9c
SHA256908b33bdba1340a0f9b07677ebe7970a8730947a148ba86d6f843d301d0084e3
SHA51249915ba0d34c57845e1055aa1d54542508fae89ab1e5dddc77531cbee2a2ee8293b9c54275fc410e572a9d35633a90bdcb8d0066eaeadf8d252ad5543da1fc06
-
Filesize
600B
MD580907817e64211b494d4b810c45ed5cd
SHA1584819033350e1461e6d9c26642b2f9bd4d44ce4
SHA256dc3dab4acc7e94911362f448f4c4576cda7a61eff37f049f7bbf597a814ba3a5
SHA5126ea7c264e53cbf5c51bd136eee3997f2523c7dbf822d27eb97282ba598c0160d8e5b851cc12e8c1aa54912e2f43550270b51e37ffa52d84bd434058efc6bde0e
-
Filesize
996B
MD5d4e35a8cb9ba7b64dbbdb92071cc9f92
SHA1351fdb965b1934ae77ed67b3cd5a88b92cfe8255
SHA25669e2e2f3a06a003ec0d0ddcae1a3abcab911a584267571786a7aa7a393e54483
SHA51254216b49353a869ed361ea50bdf2f070b5a22284f758ff9fd90f38825e7c410d9e18ec7380098779b8236d0748d82b42c433fe01ac0e72da56f39ca2543736ad