Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-01-2025 21:37
Static task
static1
Behavioral task
behavioral1
Sample
1ed7f06e7bbe466ee8827661103808235e8d86d115b39f9b802275de746638a9.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1ed7f06e7bbe466ee8827661103808235e8d86d115b39f9b802275de746638a9.exe
Resource
win10v2004-20241007-en
General
-
Target
1ed7f06e7bbe466ee8827661103808235e8d86d115b39f9b802275de746638a9.exe
-
Size
274KB
-
MD5
be32492e6aecda45740e1e93489a30ad
-
SHA1
524fab6a039db492c52ef9675900bc9369067cf2
-
SHA256
1ed7f06e7bbe466ee8827661103808235e8d86d115b39f9b802275de746638a9
-
SHA512
70e7444716b8baeea5bb8e4768d9e2371be07d9929f1490d0d8bb2ea5045a1db5d49f77887aec1ef21f295e47a8a15246b853a50a120d543915e31b182dbf108
-
SSDEEP
6144:tmZS7byibR/cFje+5EQ1NgnrGO7+HVUuYW+:zPbk5FyZru5+
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 6 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2840-71-0x0000000000400000-0x0000000000469000-memory.dmp family_cycbot behavioral1/memory/2744-73-0x0000000000400000-0x0000000000469000-memory.dmp family_cycbot behavioral1/memory/2840-186-0x0000000000400000-0x0000000000469000-memory.dmp family_cycbot behavioral1/memory/1304-188-0x0000000000400000-0x0000000000469000-memory.dmp family_cycbot behavioral1/memory/2840-367-0x0000000000400000-0x0000000000469000-memory.dmp family_cycbot behavioral1/memory/2840-372-0x0000000000400000-0x0000000000469000-memory.dmp family_cycbot -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "3" 1ed7f06e7bbe466ee8827661103808235e8d86d115b39f9b802275de746638a9.exe -
Pony family
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 1816 DEAC.tmp -
Loads dropped DLL 2 IoCs
pid Process 2840 1ed7f06e7bbe466ee8827661103808235e8d86d115b39f9b802275de746638a9.exe 2840 1ed7f06e7bbe466ee8827661103808235e8d86d115b39f9b802275de746638a9.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\C98.exe = "C:\\Program Files (x86)\\LP\\26F8\\C98.exe" 1ed7f06e7bbe466ee8827661103808235e8d86d115b39f9b802275de746638a9.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
resource yara_rule behavioral1/memory/2840-71-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/2744-73-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/2840-186-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/1304-188-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/2840-367-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/2840-372-0x0000000000400000-0x0000000000469000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\LP\26F8\C98.exe 1ed7f06e7bbe466ee8827661103808235e8d86d115b39f9b802275de746638a9.exe File opened for modification C:\Program Files (x86)\LP\26F8\C98.exe 1ed7f06e7bbe466ee8827661103808235e8d86d115b39f9b802275de746638a9.exe File opened for modification C:\Program Files (x86)\LP\26F8\DEAC.tmp 1ed7f06e7bbe466ee8827661103808235e8d86d115b39f9b802275de746638a9.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1ed7f06e7bbe466ee8827661103808235e8d86d115b39f9b802275de746638a9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1ed7f06e7bbe466ee8827661103808235e8d86d115b39f9b802275de746638a9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEAC.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1ed7f06e7bbe466ee8827661103808235e8d86d115b39f9b802275de746638a9.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_Classes\Local Settings explorer.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2840 1ed7f06e7bbe466ee8827661103808235e8d86d115b39f9b802275de746638a9.exe 2840 1ed7f06e7bbe466ee8827661103808235e8d86d115b39f9b802275de746638a9.exe 2840 1ed7f06e7bbe466ee8827661103808235e8d86d115b39f9b802275de746638a9.exe 2840 1ed7f06e7bbe466ee8827661103808235e8d86d115b39f9b802275de746638a9.exe 2840 1ed7f06e7bbe466ee8827661103808235e8d86d115b39f9b802275de746638a9.exe 2840 1ed7f06e7bbe466ee8827661103808235e8d86d115b39f9b802275de746638a9.exe 2840 1ed7f06e7bbe466ee8827661103808235e8d86d115b39f9b802275de746638a9.exe 2840 1ed7f06e7bbe466ee8827661103808235e8d86d115b39f9b802275de746638a9.exe 2840 1ed7f06e7bbe466ee8827661103808235e8d86d115b39f9b802275de746638a9.exe 2840 1ed7f06e7bbe466ee8827661103808235e8d86d115b39f9b802275de746638a9.exe 2840 1ed7f06e7bbe466ee8827661103808235e8d86d115b39f9b802275de746638a9.exe 2840 1ed7f06e7bbe466ee8827661103808235e8d86d115b39f9b802275de746638a9.exe 2840 1ed7f06e7bbe466ee8827661103808235e8d86d115b39f9b802275de746638a9.exe 2840 1ed7f06e7bbe466ee8827661103808235e8d86d115b39f9b802275de746638a9.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1508 explorer.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeRestorePrivilege 2824 msiexec.exe Token: SeTakeOwnershipPrivilege 2824 msiexec.exe Token: SeSecurityPrivilege 2824 msiexec.exe Token: SeShutdownPrivilege 1508 explorer.exe Token: SeShutdownPrivilege 1508 explorer.exe Token: SeShutdownPrivilege 1508 explorer.exe Token: SeShutdownPrivilege 1508 explorer.exe Token: SeShutdownPrivilege 1508 explorer.exe Token: SeShutdownPrivilege 1508 explorer.exe Token: SeShutdownPrivilege 1508 explorer.exe Token: SeShutdownPrivilege 1508 explorer.exe Token: SeShutdownPrivilege 1508 explorer.exe Token: SeShutdownPrivilege 1508 explorer.exe Token: SeShutdownPrivilege 1508 explorer.exe Token: SeShutdownPrivilege 1508 explorer.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 1508 explorer.exe 1508 explorer.exe 1508 explorer.exe 1508 explorer.exe 1508 explorer.exe 1508 explorer.exe 1508 explorer.exe 1508 explorer.exe 1508 explorer.exe 1508 explorer.exe 1508 explorer.exe 1508 explorer.exe 1508 explorer.exe 1508 explorer.exe 1508 explorer.exe 1508 explorer.exe 1508 explorer.exe 1508 explorer.exe 1508 explorer.exe 1508 explorer.exe 1508 explorer.exe 1508 explorer.exe 1508 explorer.exe 1508 explorer.exe 1508 explorer.exe 1508 explorer.exe 1508 explorer.exe 1508 explorer.exe -
Suspicious use of SendNotifyMessage 20 IoCs
pid Process 1508 explorer.exe 1508 explorer.exe 1508 explorer.exe 1508 explorer.exe 1508 explorer.exe 1508 explorer.exe 1508 explorer.exe 1508 explorer.exe 1508 explorer.exe 1508 explorer.exe 1508 explorer.exe 1508 explorer.exe 1508 explorer.exe 1508 explorer.exe 1508 explorer.exe 1508 explorer.exe 1508 explorer.exe 1508 explorer.exe 1508 explorer.exe 1508 explorer.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2840 wrote to memory of 2744 2840 1ed7f06e7bbe466ee8827661103808235e8d86d115b39f9b802275de746638a9.exe 30 PID 2840 wrote to memory of 2744 2840 1ed7f06e7bbe466ee8827661103808235e8d86d115b39f9b802275de746638a9.exe 30 PID 2840 wrote to memory of 2744 2840 1ed7f06e7bbe466ee8827661103808235e8d86d115b39f9b802275de746638a9.exe 30 PID 2840 wrote to memory of 2744 2840 1ed7f06e7bbe466ee8827661103808235e8d86d115b39f9b802275de746638a9.exe 30 PID 2840 wrote to memory of 1304 2840 1ed7f06e7bbe466ee8827661103808235e8d86d115b39f9b802275de746638a9.exe 32 PID 2840 wrote to memory of 1304 2840 1ed7f06e7bbe466ee8827661103808235e8d86d115b39f9b802275de746638a9.exe 32 PID 2840 wrote to memory of 1304 2840 1ed7f06e7bbe466ee8827661103808235e8d86d115b39f9b802275de746638a9.exe 32 PID 2840 wrote to memory of 1304 2840 1ed7f06e7bbe466ee8827661103808235e8d86d115b39f9b802275de746638a9.exe 32 PID 2840 wrote to memory of 1816 2840 1ed7f06e7bbe466ee8827661103808235e8d86d115b39f9b802275de746638a9.exe 36 PID 2840 wrote to memory of 1816 2840 1ed7f06e7bbe466ee8827661103808235e8d86d115b39f9b802275de746638a9.exe 36 PID 2840 wrote to memory of 1816 2840 1ed7f06e7bbe466ee8827661103808235e8d86d115b39f9b802275de746638a9.exe 36 PID 2840 wrote to memory of 1816 2840 1ed7f06e7bbe466ee8827661103808235e8d86d115b39f9b802275de746638a9.exe 36 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" 1ed7f06e7bbe466ee8827661103808235e8d86d115b39f9b802275de746638a9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 1ed7f06e7bbe466ee8827661103808235e8d86d115b39f9b802275de746638a9.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\1ed7f06e7bbe466ee8827661103808235e8d86d115b39f9b802275de746638a9.exe"C:\Users\Admin\AppData\Local\Temp\1ed7f06e7bbe466ee8827661103808235e8d86d115b39f9b802275de746638a9.exe"1⤵
- Modifies security service
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2840 -
C:\Users\Admin\AppData\Local\Temp\1ed7f06e7bbe466ee8827661103808235e8d86d115b39f9b802275de746638a9.exeC:\Users\Admin\AppData\Local\Temp\1ed7f06e7bbe466ee8827661103808235e8d86d115b39f9b802275de746638a9.exe startC:\Users\Admin\AppData\Roaming\8D121\DC526.exe%C:\Users\Admin\AppData\Roaming\8D1212⤵
- System Location Discovery: System Language Discovery
PID:2744
-
-
C:\Users\Admin\AppData\Local\Temp\1ed7f06e7bbe466ee8827661103808235e8d86d115b39f9b802275de746638a9.exeC:\Users\Admin\AppData\Local\Temp\1ed7f06e7bbe466ee8827661103808235e8d86d115b39f9b802275de746638a9.exe startC:\Program Files (x86)\21CB0\lvvm.exe%C:\Program Files (x86)\21CB02⤵
- System Location Discovery: System Language Discovery
PID:1304
-
-
C:\Program Files (x86)\LP\26F8\DEAC.tmp"C:\Program Files (x86)\LP\26F8\DEAC.tmp"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1816
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2824
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1508
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
297B
MD5f35de969e48aeafe599485c0bb8a77f8
SHA1a13e667d2f138998fd8d84cd3b38584dfbe0f679
SHA2560e022b233d7359815c17c203beb3395c10e7332f5d47ccc50b239a8df8da7390
SHA512429d040fa55156fd62072d7d3c33b2126f2532e37e31502033206488a78a73ed6994f847791b8896f9d1d3a48d717d0ab3ec469c081bacac588e7c3dea93b044
-
Filesize
993B
MD5e51e8fb6837f80e4dbb9af6c13538f3f
SHA17188d57fed1549dc28f594da20cc249ef35c623d
SHA256fac694579050ceac9f466fa17b75794e495a17d3fbc2d3419c1697ed432399b4
SHA512d5da3ad82a87328f8184e8830860643c1a955537beedba353249dfead9079ad9f16a2f40b6404bd86cb06fdda0fac23860b47f0745eaecd9861a4dfe4b3eb499
-
Filesize
1KB
MD5cf1ddc394aa3bae5672b94b86baa45db
SHA146c5c629705ec8cf251baf93cabcd17eba13d504
SHA2564000dbcf0a27124180f548b3a2c70f8a9c37dc1e48dc9673e71be0de4a3301ae
SHA51239f2122f19328446936fe76954c78b95a0bca0825e09caa464efb4fc72eddf40b30d45f90f3e61f748bca7a90951479ef3ee244c259354370d8641d638c6f14f
-
Filesize
597B
MD50c99e62b417e00ac621a23867ddf1c79
SHA13b1f5f2d3154b3822d82c07ab75e44a7c670efe7
SHA256319953d39c93ccc41ef8141c478d2c79daba09dd1341e4205c6271bc3a557abd
SHA5126a949448d6b4eb741e870c5fd9306c41978cfed45a660170cf2b19cae9ebc99351b00e3e84fb1f85828842586a77c4eeb73d8eb3d591087b9600938577f3bcf4
-
Filesize
97KB
MD59a18bd23f4487c251adf429fc5a9eb48
SHA142439c39140f1ab0df8d866191c07ca36f78085f
SHA25681a27826df1f66fed1d492b5e8257a367ce535bbdb123b743493f788e2d5d39d
SHA512210dcf04da40d11dccd81ca7f3f050bdc581e5ca79f4688b4ab93e255d33733000b0a7990ad1f9f4500b9f9e9620c263cc72bc4806cedcf8920b5fb830b540e4