Analysis
-
max time kernel
111s -
max time network
64s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-12-2024 11:34
Static task
static1
Behavioral task
behavioral1
Sample
6723e2105e8f015634d802495b04e871bdacacb08faa0faf68eda0bb235b565dN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
6723e2105e8f015634d802495b04e871bdacacb08faa0faf68eda0bb235b565dN.exe
Resource
win10v2004-20241007-en
General
-
Target
6723e2105e8f015634d802495b04e871bdacacb08faa0faf68eda0bb235b565dN.exe
-
Size
164KB
-
MD5
ff03531ad8c83399ce5fc9f96c883e70
-
SHA1
ccf7eb9e44bb5b95f732c4dcef87760ded5184cd
-
SHA256
6723e2105e8f015634d802495b04e871bdacacb08faa0faf68eda0bb235b565d
-
SHA512
0e806b078053fb3e76fe87ab5c52d270ba3d27307bedb28cb6f5684c1d04fc504e155a1811bcc6910cadb0e1f98cb753bceaa54d6e023e6de3cdb94bc30b59b6
-
SSDEEP
3072:Nq2QaPFCJm5y/MC/ikf4jNDAL0nAftn6s4GAS:NJPF7kMCfM1AeAft6L
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/1424-10-0x0000000000400000-0x0000000000445000-memory.dmp family_cycbot behavioral1/memory/2460-15-0x0000000000400000-0x0000000000445000-memory.dmp family_cycbot behavioral1/memory/3036-80-0x0000000000400000-0x0000000000445000-memory.dmp family_cycbot behavioral1/memory/2460-81-0x0000000000400000-0x0000000000445000-memory.dmp family_cycbot behavioral1/memory/2460-197-0x0000000000400000-0x0000000000445000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\conhost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\conhost.exe" 6723e2105e8f015634d802495b04e871bdacacb08faa0faf68eda0bb235b565dN.exe -
resource yara_rule behavioral1/memory/2460-2-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/1424-8-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/1424-10-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2460-15-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/3036-80-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2460-81-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2460-197-0x0000000000400000-0x0000000000445000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6723e2105e8f015634d802495b04e871bdacacb08faa0faf68eda0bb235b565dN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6723e2105e8f015634d802495b04e871bdacacb08faa0faf68eda0bb235b565dN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6723e2105e8f015634d802495b04e871bdacacb08faa0faf68eda0bb235b565dN.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2460 wrote to memory of 1424 2460 6723e2105e8f015634d802495b04e871bdacacb08faa0faf68eda0bb235b565dN.exe 31 PID 2460 wrote to memory of 1424 2460 6723e2105e8f015634d802495b04e871bdacacb08faa0faf68eda0bb235b565dN.exe 31 PID 2460 wrote to memory of 1424 2460 6723e2105e8f015634d802495b04e871bdacacb08faa0faf68eda0bb235b565dN.exe 31 PID 2460 wrote to memory of 1424 2460 6723e2105e8f015634d802495b04e871bdacacb08faa0faf68eda0bb235b565dN.exe 31 PID 2460 wrote to memory of 3036 2460 6723e2105e8f015634d802495b04e871bdacacb08faa0faf68eda0bb235b565dN.exe 33 PID 2460 wrote to memory of 3036 2460 6723e2105e8f015634d802495b04e871bdacacb08faa0faf68eda0bb235b565dN.exe 33 PID 2460 wrote to memory of 3036 2460 6723e2105e8f015634d802495b04e871bdacacb08faa0faf68eda0bb235b565dN.exe 33 PID 2460 wrote to memory of 3036 2460 6723e2105e8f015634d802495b04e871bdacacb08faa0faf68eda0bb235b565dN.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\6723e2105e8f015634d802495b04e871bdacacb08faa0faf68eda0bb235b565dN.exe"C:\Users\Admin\AppData\Local\Temp\6723e2105e8f015634d802495b04e871bdacacb08faa0faf68eda0bb235b565dN.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Users\Admin\AppData\Local\Temp\6723e2105e8f015634d802495b04e871bdacacb08faa0faf68eda0bb235b565dN.exeC:\Users\Admin\AppData\Local\Temp\6723e2105e8f015634d802495b04e871bdacacb08faa0faf68eda0bb235b565dN.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:1424
-
-
C:\Users\Admin\AppData\Local\Temp\6723e2105e8f015634d802495b04e871bdacacb08faa0faf68eda0bb235b565dN.exeC:\Users\Admin\AppData\Local\Temp\6723e2105e8f015634d802495b04e871bdacacb08faa0faf68eda0bb235b565dN.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵
- System Location Discovery: System Language Discovery
PID:3036
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
300B
MD5d8dcfd62273bc2ab7befbccd2b892d12
SHA15bc12cf0807ff1f49b411d396ac320d9d9d5b2a3
SHA256c038d07b65dd505ed7d5d46811fac51e0e373dd7b2be76c6c254b9a8b356e095
SHA5127ca5bd8b794d991e4e5488d5d0c9c36f60025e3a132471a66a6db36adfcd0df96a13e34bad10cfe51fd4bedbd158d5fe210532cabb1ae407b6adedbb69bc6bb6
-
Filesize
1KB
MD5433bd2eaecd0430e29c9ec736a13a424
SHA1ba727e5bfdd385778a872d100844054e6583c690
SHA2567290971c04443231bf9e865250c940115ace84a8b1c82d88571aaab8d2efe03a
SHA5127ab55ae63dd20d00eaeadbbc4f8db71c3b1c89e263a9da1f8cbd1ef3df010e40b8d699f273b986fb55026b4a8f4c0cb0377ec56e9cca271906e1630af4b7f8db
-
Filesize
600B
MD5d3fe0d68246449905f4dfa10085be57a
SHA10b673dabf1577129eb468f6b23f03a6156b535c7
SHA256a10e51235a7e91b249d64de1c8fc1536ab2e0e62dfd98d0d6d7260e50897c1dc
SHA512d787398812fb5f85f04c2ad8291649074b599cf21e4ab41679c8141a96862f5e3f8853dffe02541bf3c3c63fd7517a9f22361461008782e31487ed990294e7d0
-
Filesize
996B
MD5e28f10a32424411f646de83a064c3098
SHA162096fcf5658dffdecf4510ecfc7875ff5ddc92e
SHA256d804227f206ad762d3f686b33b3a19fe70abecd70dda283e49a76d59acb89135
SHA5127e86ad9eaf52bfb0ad8eac078901e98b09c8adb50d004c1262b24793d20288567a912ff1b2e31bb3c48e8d3fe879ecea90e66167568f932f604534e4183ff82a