Analysis
-
max time kernel
118s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
16-01-2025 12:04
Static task
static1
Behavioral task
behavioral1
Sample
8a9a573b71f064e65e33b26bd5ef541eff9ac5e5b8f516c469ca4944e636fe70.exe
Resource
win7-20241010-en
General
-
Target
8a9a573b71f064e65e33b26bd5ef541eff9ac5e5b8f516c469ca4944e636fe70.exe
-
Size
278KB
-
MD5
dd223d2538c382b6728463175ad0d68c
-
SHA1
737eea7628ec4c2c2da8c5890376652778024f64
-
SHA256
8a9a573b71f064e65e33b26bd5ef541eff9ac5e5b8f516c469ca4944e636fe70
-
SHA512
2ad6a30a7f1cb428a5d87c478247322c66dc9f39cab9bbd7fe76db3de4afbe5173d0f6c115162c45138db754f18a9337a140c99bee587ebdf49620d514ec636b
-
SSDEEP
6144:lgRqbGn6NH+qcEDlCC/R4eilAZ88K8snV7mv+Juoq:l+qbGceGlD/yeLZV4A2JuN
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 8 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2856-3-0x0000000000400000-0x000000000046B000-memory.dmp family_cycbot behavioral1/memory/2856-4-0x0000000000400000-0x0000000000468000-memory.dmp family_cycbot behavioral1/memory/2856-13-0x0000000000400000-0x000000000046B000-memory.dmp family_cycbot behavioral1/memory/3008-17-0x0000000000400000-0x000000000046B000-memory.dmp family_cycbot behavioral1/memory/2244-101-0x0000000000400000-0x000000000046B000-memory.dmp family_cycbot behavioral1/memory/2856-102-0x0000000000400000-0x000000000046B000-memory.dmp family_cycbot behavioral1/memory/2856-186-0x0000000000400000-0x000000000046B000-memory.dmp family_cycbot behavioral1/memory/2856-192-0x0000000000400000-0x000000000046B000-memory.dmp family_cycbot -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "3" 8a9a573b71f064e65e33b26bd5ef541eff9ac5e5b8f516c469ca4944e636fe70.exe -
Pony family
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 2248 E070.tmp -
Loads dropped DLL 2 IoCs
pid Process 2856 8a9a573b71f064e65e33b26bd5ef541eff9ac5e5b8f516c469ca4944e636fe70.exe 2856 8a9a573b71f064e65e33b26bd5ef541eff9ac5e5b8f516c469ca4944e636fe70.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\D3A.exe = "C:\\Program Files (x86)\\LP\\2CD7\\D3A.exe" 8a9a573b71f064e65e33b26bd5ef541eff9ac5e5b8f516c469ca4944e636fe70.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
resource yara_rule behavioral1/memory/2856-2-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2856-3-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2856-4-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2856-13-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/3008-16-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/3008-17-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2244-101-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2856-102-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2856-186-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2856-192-0x0000000000400000-0x000000000046B000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\LP\2CD7\E070.tmp 8a9a573b71f064e65e33b26bd5ef541eff9ac5e5b8f516c469ca4944e636fe70.exe File created C:\Program Files (x86)\LP\2CD7\D3A.exe 8a9a573b71f064e65e33b26bd5ef541eff9ac5e5b8f516c469ca4944e636fe70.exe File opened for modification C:\Program Files (x86)\LP\2CD7\D3A.exe 8a9a573b71f064e65e33b26bd5ef541eff9ac5e5b8f516c469ca4944e636fe70.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8a9a573b71f064e65e33b26bd5ef541eff9ac5e5b8f516c469ca4944e636fe70.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8a9a573b71f064e65e33b26bd5ef541eff9ac5e5b8f516c469ca4944e636fe70.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8a9a573b71f064e65e33b26bd5ef541eff9ac5e5b8f516c469ca4944e636fe70.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language E070.tmp -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2856 8a9a573b71f064e65e33b26bd5ef541eff9ac5e5b8f516c469ca4944e636fe70.exe 2856 8a9a573b71f064e65e33b26bd5ef541eff9ac5e5b8f516c469ca4944e636fe70.exe 2856 8a9a573b71f064e65e33b26bd5ef541eff9ac5e5b8f516c469ca4944e636fe70.exe 2856 8a9a573b71f064e65e33b26bd5ef541eff9ac5e5b8f516c469ca4944e636fe70.exe 2856 8a9a573b71f064e65e33b26bd5ef541eff9ac5e5b8f516c469ca4944e636fe70.exe 2856 8a9a573b71f064e65e33b26bd5ef541eff9ac5e5b8f516c469ca4944e636fe70.exe 2856 8a9a573b71f064e65e33b26bd5ef541eff9ac5e5b8f516c469ca4944e636fe70.exe 2856 8a9a573b71f064e65e33b26bd5ef541eff9ac5e5b8f516c469ca4944e636fe70.exe 2856 8a9a573b71f064e65e33b26bd5ef541eff9ac5e5b8f516c469ca4944e636fe70.exe 2856 8a9a573b71f064e65e33b26bd5ef541eff9ac5e5b8f516c469ca4944e636fe70.exe 2856 8a9a573b71f064e65e33b26bd5ef541eff9ac5e5b8f516c469ca4944e636fe70.exe 2856 8a9a573b71f064e65e33b26bd5ef541eff9ac5e5b8f516c469ca4944e636fe70.exe 2856 8a9a573b71f064e65e33b26bd5ef541eff9ac5e5b8f516c469ca4944e636fe70.exe 2856 8a9a573b71f064e65e33b26bd5ef541eff9ac5e5b8f516c469ca4944e636fe70.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 520 explorer.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeRestorePrivilege 2916 msiexec.exe Token: SeTakeOwnershipPrivilege 2916 msiexec.exe Token: SeSecurityPrivilege 2916 msiexec.exe Token: SeShutdownPrivilege 520 explorer.exe Token: SeShutdownPrivilege 520 explorer.exe Token: SeShutdownPrivilege 520 explorer.exe Token: SeShutdownPrivilege 520 explorer.exe Token: SeShutdownPrivilege 520 explorer.exe Token: SeShutdownPrivilege 520 explorer.exe Token: SeShutdownPrivilege 520 explorer.exe Token: SeShutdownPrivilege 520 explorer.exe Token: SeShutdownPrivilege 520 explorer.exe Token: SeShutdownPrivilege 520 explorer.exe Token: SeShutdownPrivilege 520 explorer.exe Token: SeShutdownPrivilege 520 explorer.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 520 explorer.exe 520 explorer.exe 520 explorer.exe 520 explorer.exe 520 explorer.exe 520 explorer.exe 520 explorer.exe 520 explorer.exe 520 explorer.exe 520 explorer.exe 520 explorer.exe 520 explorer.exe 520 explorer.exe 520 explorer.exe 520 explorer.exe 520 explorer.exe 520 explorer.exe 520 explorer.exe 520 explorer.exe 520 explorer.exe 520 explorer.exe 520 explorer.exe 520 explorer.exe 520 explorer.exe 520 explorer.exe 520 explorer.exe 520 explorer.exe 520 explorer.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 520 explorer.exe 520 explorer.exe 520 explorer.exe 520 explorer.exe 520 explorer.exe 520 explorer.exe 520 explorer.exe 520 explorer.exe 520 explorer.exe 520 explorer.exe 520 explorer.exe 520 explorer.exe 520 explorer.exe 520 explorer.exe 520 explorer.exe 520 explorer.exe 520 explorer.exe 520 explorer.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2856 wrote to memory of 3008 2856 8a9a573b71f064e65e33b26bd5ef541eff9ac5e5b8f516c469ca4944e636fe70.exe 31 PID 2856 wrote to memory of 3008 2856 8a9a573b71f064e65e33b26bd5ef541eff9ac5e5b8f516c469ca4944e636fe70.exe 31 PID 2856 wrote to memory of 3008 2856 8a9a573b71f064e65e33b26bd5ef541eff9ac5e5b8f516c469ca4944e636fe70.exe 31 PID 2856 wrote to memory of 3008 2856 8a9a573b71f064e65e33b26bd5ef541eff9ac5e5b8f516c469ca4944e636fe70.exe 31 PID 2856 wrote to memory of 2244 2856 8a9a573b71f064e65e33b26bd5ef541eff9ac5e5b8f516c469ca4944e636fe70.exe 33 PID 2856 wrote to memory of 2244 2856 8a9a573b71f064e65e33b26bd5ef541eff9ac5e5b8f516c469ca4944e636fe70.exe 33 PID 2856 wrote to memory of 2244 2856 8a9a573b71f064e65e33b26bd5ef541eff9ac5e5b8f516c469ca4944e636fe70.exe 33 PID 2856 wrote to memory of 2244 2856 8a9a573b71f064e65e33b26bd5ef541eff9ac5e5b8f516c469ca4944e636fe70.exe 33 PID 2856 wrote to memory of 2248 2856 8a9a573b71f064e65e33b26bd5ef541eff9ac5e5b8f516c469ca4944e636fe70.exe 36 PID 2856 wrote to memory of 2248 2856 8a9a573b71f064e65e33b26bd5ef541eff9ac5e5b8f516c469ca4944e636fe70.exe 36 PID 2856 wrote to memory of 2248 2856 8a9a573b71f064e65e33b26bd5ef541eff9ac5e5b8f516c469ca4944e636fe70.exe 36 PID 2856 wrote to memory of 2248 2856 8a9a573b71f064e65e33b26bd5ef541eff9ac5e5b8f516c469ca4944e636fe70.exe 36 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 8a9a573b71f064e65e33b26bd5ef541eff9ac5e5b8f516c469ca4944e636fe70.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" 8a9a573b71f064e65e33b26bd5ef541eff9ac5e5b8f516c469ca4944e636fe70.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\8a9a573b71f064e65e33b26bd5ef541eff9ac5e5b8f516c469ca4944e636fe70.exe"C:\Users\Admin\AppData\Local\Temp\8a9a573b71f064e65e33b26bd5ef541eff9ac5e5b8f516c469ca4944e636fe70.exe"1⤵
- Modifies security service
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2856 -
C:\Users\Admin\AppData\Local\Temp\8a9a573b71f064e65e33b26bd5ef541eff9ac5e5b8f516c469ca4944e636fe70.exeC:\Users\Admin\AppData\Local\Temp\8a9a573b71f064e65e33b26bd5ef541eff9ac5e5b8f516c469ca4944e636fe70.exe startC:\Users\Admin\AppData\Roaming\78C93\2062C.exe%C:\Users\Admin\AppData\Roaming\78C932⤵
- System Location Discovery: System Language Discovery
PID:3008
-
-
C:\Users\Admin\AppData\Local\Temp\8a9a573b71f064e65e33b26bd5ef541eff9ac5e5b8f516c469ca4944e636fe70.exeC:\Users\Admin\AppData\Local\Temp\8a9a573b71f064e65e33b26bd5ef541eff9ac5e5b8f516c469ca4944e636fe70.exe startC:\Program Files (x86)\93E36\lvvm.exe%C:\Program Files (x86)\93E362⤵
- System Location Discovery: System Language Discovery
PID:2244
-
-
C:\Program Files (x86)\LP\2CD7\E070.tmp"C:\Program Files (x86)\LP\2CD7\E070.tmp"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2248
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2916
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:520
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5169c683577618904b389d56c2e25d770
SHA14299bcce25c37c3e3ee25a30bc2607f104b7c477
SHA256393529e7a495ee03134f16af6040f4402ff1f84bb7f6f225d9c2578abbef578c
SHA5121ff1e0a52c7d8fc886b3339d20856e33ea7a69a03917c12bbb4022f72b107e49faa5c22b849d0c4371f5d5c74594e3cb95f3299abda7a7e67e96218c812c3478
-
Filesize
600B
MD59c4922fdf8c1b38113240a232bdfdb33
SHA18b2ffee5ce9aa874835788f9680c395d82b1ba77
SHA2567106e3effa741335eea1c4ecdeac4f24ceda959f5d6aacfdd3f12949a34b1495
SHA512c34d081fe7f8adddc050c11ee81e03af0f915842338f620abe6e357944c5d8b52ef8f861f9228eddbc56d75f8eeb0efa172c787dc9c4f210ba7951a58f72edac
-
Filesize
996B
MD52c803016d5daaa725c05b623a33ba74d
SHA1fc62d54687cbc86410d219038c594f714d359d4e
SHA2560ca734c332e59f7b095d43d46941f45b52b6ae751d15ab0d89e3b3abd4e4d7d8
SHA5128f5c529845ff625e66902c7f4e7c7368e3520747d90ec0ca6174e8303936cc3e0cd1b68a03d6231e0272ca821d6462ad92649c21aa1aad060ecdf215d852d62a
-
Filesize
99KB
MD555ce0a78d2d9f3b77a707191cbb289cc
SHA1a45bfce1c2de0de0f3222f9e388a1d19a84c0c07
SHA2561cd3bf36ce50f03435f912f72092a561a9106f92f1a94b6028db3012960c5c2a
SHA51250727fd305ef36f6dc28a8a1a7f12df2e82e024a89be0d51e79e034c8de99fbf3a0c71b5578a0c1171296724e7c39121443d2568b62edc4ef5a75da626e7b319