Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04-01-2025 05:30
Static task
static1
Behavioral task
behavioral1
Sample
ca5fa8be93f118fdb26fcb970ec6194691a80ed4d51721f8ab5dba32afaf3590.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ca5fa8be93f118fdb26fcb970ec6194691a80ed4d51721f8ab5dba32afaf3590.exe
Resource
win10v2004-20241007-en
General
-
Target
ca5fa8be93f118fdb26fcb970ec6194691a80ed4d51721f8ab5dba32afaf3590.exe
-
Size
183KB
-
MD5
64f9b94be51e2e97bbdb62d77c27355e
-
SHA1
28bf3b4e18bfecf3ca0f128e0237a4b0e2414b02
-
SHA256
ca5fa8be93f118fdb26fcb970ec6194691a80ed4d51721f8ab5dba32afaf3590
-
SHA512
686c4823c7263180c4fc698f16f255ee7626cfeb4a8f365b43a6842cccd90203ed75b7884bda42d11f2dc9d7afcce47e94c5c3662c2acaae7286dc525a84c3eb
-
SSDEEP
3072:nFmbzWn7+CwH2aXwQNFWwqRaTW0MgxntUn3YuBL5xM68:FCmF9aA+qQkggoSLDMj
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 4 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2088-14-0x0000000000400000-0x0000000000471000-memory.dmp family_cycbot behavioral1/memory/1992-15-0x0000000000400000-0x0000000000471000-memory.dmp family_cycbot behavioral1/memory/2628-75-0x0000000000400000-0x0000000000471000-memory.dmp family_cycbot behavioral1/memory/1992-177-0x0000000000400000-0x0000000000471000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/1992-2-0x0000000000400000-0x0000000000471000-memory.dmp upx behavioral1/memory/2088-14-0x0000000000400000-0x0000000000471000-memory.dmp upx behavioral1/memory/1992-15-0x0000000000400000-0x0000000000471000-memory.dmp upx behavioral1/memory/2628-74-0x0000000000400000-0x0000000000471000-memory.dmp upx behavioral1/memory/2628-75-0x0000000000400000-0x0000000000471000-memory.dmp upx behavioral1/memory/1992-177-0x0000000000400000-0x0000000000471000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ca5fa8be93f118fdb26fcb970ec6194691a80ed4d51721f8ab5dba32afaf3590.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ca5fa8be93f118fdb26fcb970ec6194691a80ed4d51721f8ab5dba32afaf3590.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ca5fa8be93f118fdb26fcb970ec6194691a80ed4d51721f8ab5dba32afaf3590.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1992 wrote to memory of 2088 1992 ca5fa8be93f118fdb26fcb970ec6194691a80ed4d51721f8ab5dba32afaf3590.exe 30 PID 1992 wrote to memory of 2088 1992 ca5fa8be93f118fdb26fcb970ec6194691a80ed4d51721f8ab5dba32afaf3590.exe 30 PID 1992 wrote to memory of 2088 1992 ca5fa8be93f118fdb26fcb970ec6194691a80ed4d51721f8ab5dba32afaf3590.exe 30 PID 1992 wrote to memory of 2088 1992 ca5fa8be93f118fdb26fcb970ec6194691a80ed4d51721f8ab5dba32afaf3590.exe 30 PID 1992 wrote to memory of 2628 1992 ca5fa8be93f118fdb26fcb970ec6194691a80ed4d51721f8ab5dba32afaf3590.exe 33 PID 1992 wrote to memory of 2628 1992 ca5fa8be93f118fdb26fcb970ec6194691a80ed4d51721f8ab5dba32afaf3590.exe 33 PID 1992 wrote to memory of 2628 1992 ca5fa8be93f118fdb26fcb970ec6194691a80ed4d51721f8ab5dba32afaf3590.exe 33 PID 1992 wrote to memory of 2628 1992 ca5fa8be93f118fdb26fcb970ec6194691a80ed4d51721f8ab5dba32afaf3590.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\ca5fa8be93f118fdb26fcb970ec6194691a80ed4d51721f8ab5dba32afaf3590.exe"C:\Users\Admin\AppData\Local\Temp\ca5fa8be93f118fdb26fcb970ec6194691a80ed4d51721f8ab5dba32afaf3590.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Users\Admin\AppData\Local\Temp\ca5fa8be93f118fdb26fcb970ec6194691a80ed4d51721f8ab5dba32afaf3590.exeC:\Users\Admin\AppData\Local\Temp\ca5fa8be93f118fdb26fcb970ec6194691a80ed4d51721f8ab5dba32afaf3590.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵
- System Location Discovery: System Language Discovery
PID:2088
-
-
C:\Users\Admin\AppData\Local\Temp\ca5fa8be93f118fdb26fcb970ec6194691a80ed4d51721f8ab5dba32afaf3590.exeC:\Users\Admin\AppData\Local\Temp\ca5fa8be93f118fdb26fcb970ec6194691a80ed4d51721f8ab5dba32afaf3590.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:2628
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5f71bc435e1885fcba88207a40e2e519b
SHA10b996e6a4dc0b5003d96db621fd38ad80bd4cef6
SHA256d954f69282246ef27a6963bfa715c550713c4ae1bea5bc42b1aed5b16cffc2e0
SHA5121b7839683d65f137a0fc465bae89845a98765985dd0c57992c83762f59051c481984f8fb8bd433ce79dbe01a204dbadf3de36fde33fb494d13e90b1e8a4e26a2
-
Filesize
600B
MD541f8afe6b83d794446e46b627cefa398
SHA1f22cc9fc234395ecb747577950a644d4b5a68c1a
SHA256ebca73f147173608a593f95db8beb8a4b6432bfcf85ba6e5047a158d8d6a0482
SHA5126c69ad41ed663fca34d4890eb2f246b9b02dc59c73fe76403464472f06d3c8d1fdcd52979086ad36d99d7e23d32aad20f21aa380969fd31614a56d0c6baecfdc
-
Filesize
996B
MD5e4b97ce5551d2572f113f796368e5b71
SHA142ca9463c84c435bc8e19344e80fd97f59165be7
SHA256fa263033c225dfdcd47ded9cf195beed610b8f5f12537c429d9772a2e65e32a2
SHA51289e8f36f310c982edc6c1b8adee365f8f6bbc07517dd85cca29dbbdcf4dfed64cf196f3b1da6fac5fe42d37938ad7a3a1c97c443b891209346300421bf1c25ee