Analysis
-
max time kernel
140s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16-01-2025 05:21
Static task
static1
Behavioral task
behavioral1
Sample
d4e518e98bbbe18c36e773dc7baefaeb6f25138e498cdf084c96efa4969cfcf9.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d4e518e98bbbe18c36e773dc7baefaeb6f25138e498cdf084c96efa4969cfcf9.exe
Resource
win10v2004-20241007-en
General
-
Target
d4e518e98bbbe18c36e773dc7baefaeb6f25138e498cdf084c96efa4969cfcf9.exe
-
Size
167KB
-
MD5
7e491419646116c38b978f2ee850d804
-
SHA1
9077bfdc44afab533a9cdfaf1144fa133650bfdf
-
SHA256
d4e518e98bbbe18c36e773dc7baefaeb6f25138e498cdf084c96efa4969cfcf9
-
SHA512
400a44b83b25ead75c9d5389fce6e9f5beb3a45dfb67902104ca83ce028e8f58c95d0b5b4ecf53a6b973fb9ed7151cf1f0eb25a7d5bd87ed407b07b1e8081b2e
-
SSDEEP
3072:QOXbTyNkYhsO1d3NTw8RgA/LqNExmHURwslnInWbUt+w/o:vyNrhd1w8RDxmHURJlWWbU+
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2020-9-0x0000000000400000-0x000000000048A000-memory.dmp family_cycbot behavioral1/memory/1720-20-0x0000000000400000-0x000000000048A000-memory.dmp family_cycbot behavioral1/memory/1720-89-0x0000000000400000-0x000000000048A000-memory.dmp family_cycbot behavioral1/memory/2296-93-0x0000000000400000-0x000000000048A000-memory.dmp family_cycbot behavioral1/memory/1720-204-0x0000000000400000-0x000000000048A000-memory.dmp family_cycbot -
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\dwm.exe" d4e518e98bbbe18c36e773dc7baefaeb6f25138e498cdf084c96efa4969cfcf9.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/1720-2-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral1/memory/2020-7-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral1/memory/2020-8-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral1/memory/2020-9-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral1/memory/1720-20-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral1/memory/1720-89-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral1/memory/2296-91-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral1/memory/2296-93-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral1/memory/1720-204-0x0000000000400000-0x000000000048A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d4e518e98bbbe18c36e773dc7baefaeb6f25138e498cdf084c96efa4969cfcf9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d4e518e98bbbe18c36e773dc7baefaeb6f25138e498cdf084c96efa4969cfcf9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d4e518e98bbbe18c36e773dc7baefaeb6f25138e498cdf084c96efa4969cfcf9.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1720 wrote to memory of 2020 1720 d4e518e98bbbe18c36e773dc7baefaeb6f25138e498cdf084c96efa4969cfcf9.exe 30 PID 1720 wrote to memory of 2020 1720 d4e518e98bbbe18c36e773dc7baefaeb6f25138e498cdf084c96efa4969cfcf9.exe 30 PID 1720 wrote to memory of 2020 1720 d4e518e98bbbe18c36e773dc7baefaeb6f25138e498cdf084c96efa4969cfcf9.exe 30 PID 1720 wrote to memory of 2020 1720 d4e518e98bbbe18c36e773dc7baefaeb6f25138e498cdf084c96efa4969cfcf9.exe 30 PID 1720 wrote to memory of 2296 1720 d4e518e98bbbe18c36e773dc7baefaeb6f25138e498cdf084c96efa4969cfcf9.exe 33 PID 1720 wrote to memory of 2296 1720 d4e518e98bbbe18c36e773dc7baefaeb6f25138e498cdf084c96efa4969cfcf9.exe 33 PID 1720 wrote to memory of 2296 1720 d4e518e98bbbe18c36e773dc7baefaeb6f25138e498cdf084c96efa4969cfcf9.exe 33 PID 1720 wrote to memory of 2296 1720 d4e518e98bbbe18c36e773dc7baefaeb6f25138e498cdf084c96efa4969cfcf9.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\d4e518e98bbbe18c36e773dc7baefaeb6f25138e498cdf084c96efa4969cfcf9.exe"C:\Users\Admin\AppData\Local\Temp\d4e518e98bbbe18c36e773dc7baefaeb6f25138e498cdf084c96efa4969cfcf9.exe"1⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Users\Admin\AppData\Local\Temp\d4e518e98bbbe18c36e773dc7baefaeb6f25138e498cdf084c96efa4969cfcf9.exeC:\Users\Admin\AppData\Local\Temp\d4e518e98bbbe18c36e773dc7baefaeb6f25138e498cdf084c96efa4969cfcf9.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵
- System Location Discovery: System Language Discovery
PID:2020
-
-
C:\Users\Admin\AppData\Local\Temp\d4e518e98bbbe18c36e773dc7baefaeb6f25138e498cdf084c96efa4969cfcf9.exeC:\Users\Admin\AppData\Local\Temp\d4e518e98bbbe18c36e773dc7baefaeb6f25138e498cdf084c96efa4969cfcf9.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵
- System Location Discovery: System Language Discovery
PID:2296
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
597B
MD53126d730bcc810e38dcd4512c5cfd0e6
SHA161f2e781b381d66ba52245ed2fa4ab27d8b2fafd
SHA256f896fe5b66f65cf1946d0734a15f8624f6ca7ee1ced4fdf9392fbc455acbe411
SHA512d5b3152f50d1c97d96119bb055004253b3ee307b27f9c73cc98d8d0fcbf5afe5f161d118202cb01823a8f9df8d951303cc7cc68252a16e999632c96da1914e69
-
Filesize
1KB
MD5c6bab44fe7dc4cd3c398602322c812d2
SHA159651975b84bf5372287d34cfb54a79bf1937a10
SHA256983265e3a6685f120c0fb812c89dd16fb7716dfa9ba67373e8e59ce257f548b5
SHA512f3d75bc71c2db5ac85cccda2ed43bad84802c560be21dedc65f29f32722950645e26f271aa74286c1478e3b49406a1e6b248478044f990b445872506d9f1f624
-
Filesize
897B
MD55994acac5a5e45b7ce2de93c47b836dc
SHA10d1fab0693c3fafd95fe4004e792960b72c29167
SHA2563bd5e425a2131882e0a23f49c28158255e006655294f9fe680d2489570e357fe
SHA512baf73ae53d87c7e013fd872e489aa2358b429d634a8d5a61d772faa440e6d96452a49ba7427ae90f15bfa3d253d7de87262a9f4ed1d32063717191bc8ae2b5da
-
Filesize
1KB
MD5b6b47f30c6567baf9c99292dd69e9b03
SHA16c7b1f72b05229ffdf2c14ce661513d024494999
SHA256c24552a998da95ee1e46f50841f4c11668dad0cdb02d5a1326903615a5bbd0f9
SHA512f872e6230209a3591ba0305ddd1c870e4ce15263062f7546ff19ecc134b0eed95c435b7b93915d96308296d6cc4dabffa763ef8a6e1b97ad35e8728548abd8d0