Analysis
-
max time kernel
110s -
max time network
66s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-12-2024 19:06
Static task
static1
Behavioral task
behavioral1
Sample
30b2f7b57388ffbe29f99042d4d34812e6e8b2e68df5667709c24a589334cade.exe
Resource
win7-20240903-en
General
-
Target
30b2f7b57388ffbe29f99042d4d34812e6e8b2e68df5667709c24a589334cade.exe
-
Size
167KB
-
MD5
9e54d1068d912e2ad14d14ca6844114a
-
SHA1
dab658a004f10cc5af9e1db907c0f24d20a4b45e
-
SHA256
30b2f7b57388ffbe29f99042d4d34812e6e8b2e68df5667709c24a589334cade
-
SHA512
35b76faa74db79b700930899bb94d89ca438c58027b406aa4cb74ac537917e113b45d6271abee760230ca103b429bc30952c2422317651660f8b0ba03a1003aa
-
SSDEEP
3072:1/JT+YPf75ysw4dB6eWth+WU8wTtNUFLwvPITiyTRbd0v0m7:pJy+24dc7h+p8wwFZiSRbd67
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2712-14-0x0000000000400000-0x0000000000445000-memory.dmp family_cycbot behavioral1/memory/2148-15-0x0000000000400000-0x0000000000445000-memory.dmp family_cycbot behavioral1/memory/944-88-0x0000000000400000-0x0000000000445000-memory.dmp family_cycbot behavioral1/memory/2148-89-0x0000000000400000-0x0000000000445000-memory.dmp family_cycbot behavioral1/memory/2148-159-0x0000000000400000-0x0000000000445000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\conhost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\conhost.exe" 30b2f7b57388ffbe29f99042d4d34812e6e8b2e68df5667709c24a589334cade.exe -
resource yara_rule behavioral1/memory/2148-2-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2712-12-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2712-14-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2148-15-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/944-86-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/944-88-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2148-89-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2148-159-0x0000000000400000-0x0000000000445000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 30b2f7b57388ffbe29f99042d4d34812e6e8b2e68df5667709c24a589334cade.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 30b2f7b57388ffbe29f99042d4d34812e6e8b2e68df5667709c24a589334cade.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 30b2f7b57388ffbe29f99042d4d34812e6e8b2e68df5667709c24a589334cade.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2148 wrote to memory of 2712 2148 30b2f7b57388ffbe29f99042d4d34812e6e8b2e68df5667709c24a589334cade.exe 31 PID 2148 wrote to memory of 2712 2148 30b2f7b57388ffbe29f99042d4d34812e6e8b2e68df5667709c24a589334cade.exe 31 PID 2148 wrote to memory of 2712 2148 30b2f7b57388ffbe29f99042d4d34812e6e8b2e68df5667709c24a589334cade.exe 31 PID 2148 wrote to memory of 2712 2148 30b2f7b57388ffbe29f99042d4d34812e6e8b2e68df5667709c24a589334cade.exe 31 PID 2148 wrote to memory of 944 2148 30b2f7b57388ffbe29f99042d4d34812e6e8b2e68df5667709c24a589334cade.exe 33 PID 2148 wrote to memory of 944 2148 30b2f7b57388ffbe29f99042d4d34812e6e8b2e68df5667709c24a589334cade.exe 33 PID 2148 wrote to memory of 944 2148 30b2f7b57388ffbe29f99042d4d34812e6e8b2e68df5667709c24a589334cade.exe 33 PID 2148 wrote to memory of 944 2148 30b2f7b57388ffbe29f99042d4d34812e6e8b2e68df5667709c24a589334cade.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\30b2f7b57388ffbe29f99042d4d34812e6e8b2e68df5667709c24a589334cade.exe"C:\Users\Admin\AppData\Local\Temp\30b2f7b57388ffbe29f99042d4d34812e6e8b2e68df5667709c24a589334cade.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Users\Admin\AppData\Local\Temp\30b2f7b57388ffbe29f99042d4d34812e6e8b2e68df5667709c24a589334cade.exeC:\Users\Admin\AppData\Local\Temp\30b2f7b57388ffbe29f99042d4d34812e6e8b2e68df5667709c24a589334cade.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:2712
-
-
C:\Users\Admin\AppData\Local\Temp\30b2f7b57388ffbe29f99042d4d34812e6e8b2e68df5667709c24a589334cade.exeC:\Users\Admin\AppData\Local\Temp\30b2f7b57388ffbe29f99042d4d34812e6e8b2e68df5667709c24a589334cade.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵
- System Location Discovery: System Language Discovery
PID:944
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD55f6560dd4b86d12c590769856474af9b
SHA1674031949cfffeeb8dd9fac123f540228f1eb4cb
SHA2561eabe12280af5297589ab2f684a36f882f364ce99a8f67f4a9d7ebe61b4e3fe3
SHA5125ab58511934889266c42a38b20e5451a8287108bc0bed5d652f7743fbc296dbc4d47604664da2fa5cee7f046f95f8330f762c987f5c4b40a4c1a3457338d2579
-
Filesize
600B
MD535389420fec7d8d066a1c88ac268373d
SHA108a566516e1cae9d655d2682a2a52111aa7ee32c
SHA25647efe75d6f6271b3d732282f1b0e96891a5c56b0728f078f0238be93743e9ae5
SHA51211fbd4d196a68fb2e80a51094f7cd4925f02af43ec63f2d65b4fcd7a824d2031aab84ef30a04a5d6d351dc5321038d3a5c4c152dc03c4f4be5f297ace3609019
-
Filesize
996B
MD52d6b9e23a4faaad5e751498875680264
SHA137d4dbcba1ca4a22aca9e9221a7558ed32be438c
SHA256ff44501a56b5854e03a19371ad9616c654a2a8875db8eec93893e02d8c53cc5f
SHA512fd08d870cef9dd34497c6eeee5f3d6840094d25901506741f5efb40b23597328d548b5d41757a5307bbfea146cb16c2e795e7163ec3669d4aa1decc90b78a2e1