Analysis
-
max time kernel
110s -
max time network
66s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22/01/2025, 11:06
Static task
static1
Behavioral task
behavioral1
Sample
7c03f715a4a3497a11ea8a556d85cd3877b0f6728745be9ecab7759b3e7cccbd.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7c03f715a4a3497a11ea8a556d85cd3877b0f6728745be9ecab7759b3e7cccbd.exe
Resource
win10v2004-20241007-en
General
-
Target
7c03f715a4a3497a11ea8a556d85cd3877b0f6728745be9ecab7759b3e7cccbd.exe
-
Size
165KB
-
MD5
6f17717ee482e58f181ded2b5d2cea52
-
SHA1
7d4a117b40974ac656dc7ac100d9634cbd8ce97d
-
SHA256
7c03f715a4a3497a11ea8a556d85cd3877b0f6728745be9ecab7759b3e7cccbd
-
SHA512
0b7c8830f90914ad5b5f170b6244d8d2625b05e50f5f20d143c61e7860f53c181394d8469356af3c17ee61942610ecdcae094a5d1d4cdda841ad8f69ef93ade0
-
SSDEEP
3072:5iEEum9D4z1AUW/UM07G/zzNc08xqNuAFDCyuaDn7No2BuRaYEszmnws1R:5Guz1AUQUh7Grm0tNusCZ+u2Bm9gnws
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 6 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/1872-17-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral1/memory/2348-18-0x0000000000400000-0x000000000048E000-memory.dmp family_cycbot behavioral1/memory/2348-19-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral1/memory/2348-120-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral1/memory/848-122-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral1/memory/2348-277-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot -
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\CACE1\\37C9A.exe" 7c03f715a4a3497a11ea8a556d85cd3877b0f6728745be9ecab7759b3e7cccbd.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2348-3-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/1872-14-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/1872-15-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/1872-17-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2348-18-0x0000000000400000-0x000000000048E000-memory.dmp upx behavioral1/memory/2348-19-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2348-120-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/848-122-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/848-123-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2348-277-0x0000000000400000-0x0000000000491000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7c03f715a4a3497a11ea8a556d85cd3877b0f6728745be9ecab7759b3e7cccbd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7c03f715a4a3497a11ea8a556d85cd3877b0f6728745be9ecab7759b3e7cccbd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7c03f715a4a3497a11ea8a556d85cd3877b0f6728745be9ecab7759b3e7cccbd.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2348 wrote to memory of 1872 2348 7c03f715a4a3497a11ea8a556d85cd3877b0f6728745be9ecab7759b3e7cccbd.exe 30 PID 2348 wrote to memory of 1872 2348 7c03f715a4a3497a11ea8a556d85cd3877b0f6728745be9ecab7759b3e7cccbd.exe 30 PID 2348 wrote to memory of 1872 2348 7c03f715a4a3497a11ea8a556d85cd3877b0f6728745be9ecab7759b3e7cccbd.exe 30 PID 2348 wrote to memory of 1872 2348 7c03f715a4a3497a11ea8a556d85cd3877b0f6728745be9ecab7759b3e7cccbd.exe 30 PID 2348 wrote to memory of 848 2348 7c03f715a4a3497a11ea8a556d85cd3877b0f6728745be9ecab7759b3e7cccbd.exe 33 PID 2348 wrote to memory of 848 2348 7c03f715a4a3497a11ea8a556d85cd3877b0f6728745be9ecab7759b3e7cccbd.exe 33 PID 2348 wrote to memory of 848 2348 7c03f715a4a3497a11ea8a556d85cd3877b0f6728745be9ecab7759b3e7cccbd.exe 33 PID 2348 wrote to memory of 848 2348 7c03f715a4a3497a11ea8a556d85cd3877b0f6728745be9ecab7759b3e7cccbd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\7c03f715a4a3497a11ea8a556d85cd3877b0f6728745be9ecab7759b3e7cccbd.exe"C:\Users\Admin\AppData\Local\Temp\7c03f715a4a3497a11ea8a556d85cd3877b0f6728745be9ecab7759b3e7cccbd.exe"1⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Users\Admin\AppData\Local\Temp\7c03f715a4a3497a11ea8a556d85cd3877b0f6728745be9ecab7759b3e7cccbd.exeC:\Users\Admin\AppData\Local\Temp\7c03f715a4a3497a11ea8a556d85cd3877b0f6728745be9ecab7759b3e7cccbd.exe startC:\Program Files (x86)\LP\9A6C\EB5.exe%C:\Program Files (x86)\LP\9A6C2⤵
- System Location Discovery: System Language Discovery
PID:1872
-
-
C:\Users\Admin\AppData\Local\Temp\7c03f715a4a3497a11ea8a556d85cd3877b0f6728745be9ecab7759b3e7cccbd.exeC:\Users\Admin\AppData\Local\Temp\7c03f715a4a3497a11ea8a556d85cd3877b0f6728745be9ecab7759b3e7cccbd.exe startC:\Program Files (x86)\E11BE\lvvm.exe%C:\Program Files (x86)\E11BE2⤵
- System Location Discovery: System Language Discovery
PID:848
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
996B
MD52a5bb5a0ccb7b4ad1a30378f56b8962b
SHA107441cc67c2f7334099955fa1f69c62e5047acb3
SHA256a9957f35b8a35b1c583059dfd7b0cb1434622af3d02951c515da09d00a25e368
SHA5122c5c52063a7d826f4c1af9a3a9020142f92b298aa88606a63b5d7500962f1b3d4513f5949ed9c36544c884e3eb716b740261b4ee047fd8fbf180fdd85bcddd71
-
Filesize
600B
MD57699b4666aaa8b3a178e249a6f575d5a
SHA13eb938a9800658153098da9e0194cde557830e7b
SHA256048bdf589ccbe3372b6f2c6c7fdf5ab2f3122a0a7c14754d8118490d4be6ebf0
SHA5122a7dec9c903e0513080a68f0dfe6d6a3e31681930384fb6f48ab8d0dd4f1a16149aa9c8c0362c934043c846805b49962eed44e5cbeb315f4b62e82eba9e3a0fc
-
Filesize
1KB
MD5ee7dd943516ebe39bcbf633a22beb579
SHA1e48005564d96a7ae17bcf2ac63e7793eef75eee9
SHA256f4e0b7dba021cc34e42ef5489982eec0161abf6b39b90ae7cbb8ded8255a72e4
SHA5123875082612a141aa239558057f010c6653734896fcc8e16129d837b3ebac207aa3f6ac69b2b28ee59c73a49fa6eb091213af10ed41c91d17e02c0969270c9d57