Analysis
-
max time kernel
110s -
max time network
62s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
11-12-2024 05:42
Static task
static1
Behavioral task
behavioral1
Sample
ca873c83169b6e3143a6eb78a812241ae9a88bae50bec3832c0df0815c2bffd6N.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
ca873c83169b6e3143a6eb78a812241ae9a88bae50bec3832c0df0815c2bffd6N.exe
Resource
win10v2004-20241007-en
General
-
Target
ca873c83169b6e3143a6eb78a812241ae9a88bae50bec3832c0df0815c2bffd6N.exe
-
Size
176KB
-
MD5
cca84829dde5696ba97397cfee06d180
-
SHA1
19a3d095c83cae37f6deaa5edbfe7143c13bdb14
-
SHA256
ca873c83169b6e3143a6eb78a812241ae9a88bae50bec3832c0df0815c2bffd6
-
SHA512
368ad3bb998ffc8f030616f3f9ba0cfd6e2847ac6f98f83342e868ea7f214c0a99c01a6659fee1848c225690cdc99db91f3eb63059710ad02cfe61ea96bde186
-
SSDEEP
3072:bRC/UmzULMWQzL8+j+Fegyht8y7dTMiT5NrAvLs0pne8gRQ:NPmAMWKo+S0rv8ytMsrAvIbRQ
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2368-14-0x0000000000400000-0x000000000046C000-memory.dmp family_cycbot behavioral1/memory/2556-15-0x0000000000400000-0x000000000046C000-memory.dmp family_cycbot behavioral1/memory/2556-94-0x0000000000400000-0x000000000046C000-memory.dmp family_cycbot behavioral1/memory/1964-99-0x0000000000400000-0x000000000046C000-memory.dmp family_cycbot behavioral1/memory/2556-100-0x0000000000400000-0x000000000046C000-memory.dmp family_cycbot -
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\dwm.exe" ca873c83169b6e3143a6eb78a812241ae9a88bae50bec3832c0df0815c2bffd6N.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2556-2-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2368-14-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2556-15-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2556-94-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1964-97-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1964-99-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2556-100-0x0000000000400000-0x000000000046C000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ca873c83169b6e3143a6eb78a812241ae9a88bae50bec3832c0df0815c2bffd6N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ca873c83169b6e3143a6eb78a812241ae9a88bae50bec3832c0df0815c2bffd6N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ca873c83169b6e3143a6eb78a812241ae9a88bae50bec3832c0df0815c2bffd6N.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2556 wrote to memory of 2368 2556 ca873c83169b6e3143a6eb78a812241ae9a88bae50bec3832c0df0815c2bffd6N.exe 31 PID 2556 wrote to memory of 2368 2556 ca873c83169b6e3143a6eb78a812241ae9a88bae50bec3832c0df0815c2bffd6N.exe 31 PID 2556 wrote to memory of 2368 2556 ca873c83169b6e3143a6eb78a812241ae9a88bae50bec3832c0df0815c2bffd6N.exe 31 PID 2556 wrote to memory of 2368 2556 ca873c83169b6e3143a6eb78a812241ae9a88bae50bec3832c0df0815c2bffd6N.exe 31 PID 2556 wrote to memory of 1964 2556 ca873c83169b6e3143a6eb78a812241ae9a88bae50bec3832c0df0815c2bffd6N.exe 33 PID 2556 wrote to memory of 1964 2556 ca873c83169b6e3143a6eb78a812241ae9a88bae50bec3832c0df0815c2bffd6N.exe 33 PID 2556 wrote to memory of 1964 2556 ca873c83169b6e3143a6eb78a812241ae9a88bae50bec3832c0df0815c2bffd6N.exe 33 PID 2556 wrote to memory of 1964 2556 ca873c83169b6e3143a6eb78a812241ae9a88bae50bec3832c0df0815c2bffd6N.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\ca873c83169b6e3143a6eb78a812241ae9a88bae50bec3832c0df0815c2bffd6N.exe"C:\Users\Admin\AppData\Local\Temp\ca873c83169b6e3143a6eb78a812241ae9a88bae50bec3832c0df0815c2bffd6N.exe"1⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Users\Admin\AppData\Local\Temp\ca873c83169b6e3143a6eb78a812241ae9a88bae50bec3832c0df0815c2bffd6N.exeC:\Users\Admin\AppData\Local\Temp\ca873c83169b6e3143a6eb78a812241ae9a88bae50bec3832c0df0815c2bffd6N.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵
- System Location Discovery: System Language Discovery
PID:2368
-
-
C:\Users\Admin\AppData\Local\Temp\ca873c83169b6e3143a6eb78a812241ae9a88bae50bec3832c0df0815c2bffd6N.exeC:\Users\Admin\AppData\Local\Temp\ca873c83169b6e3143a6eb78a812241ae9a88bae50bec3832c0df0815c2bffd6N.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵
- System Location Discovery: System Language Discovery
PID:1964
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
600B
MD59e456be129945fb39d953d3ac7930421
SHA14510001f07f7ef60387dc178da845c0948d95fe3
SHA256689beeecb6d5fbe57537a98f7ddadb765191fee46d6977deb45414556d6e7bbf
SHA512fe19812344ba223f463d6937d90e4d4a56fecc5993afa9f31862ddefcaee1c77aac53dc93196bd30c3cfe39650cf4942f1879e797b2a1f4f2216011ed6bf651b
-
Filesize
996B
MD54d938a07972e97c2eeb87b8bc43cd426
SHA1479ff6392f5e70a337cbdf92b917d2d794d9d2dd
SHA2563a39ebd2be0f4d13e2c2109dc9f3dd7592c3c45330fd9670cf3564855c524d51
SHA512209c0c19c0a47fabbd448c4c5664ecd8f645e9013e310deca9e99b3de0d8608d0e8d8fd9c170ee06da498a3c47de268f49949b40fb9076d0004e57e1feb8e85d