Analysis
-
max time kernel
119s -
max time network
67s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24-01-2025 14:19
Static task
static1
Behavioral task
behavioral1
Sample
1a9bfc6a675e53b2e1fdd150f10aa3d1546b9c63540d0a2dc52113cb434088b9N.exe
Resource
win7-20240903-en
General
-
Target
1a9bfc6a675e53b2e1fdd150f10aa3d1546b9c63540d0a2dc52113cb434088b9N.exe
-
Size
181KB
-
MD5
c6a93c5b7fe7915de3b31f133c370ce0
-
SHA1
984e837a21a137bf6cb74692dcab458ca7507fa4
-
SHA256
1a9bfc6a675e53b2e1fdd150f10aa3d1546b9c63540d0a2dc52113cb434088b9
-
SHA512
ccc4732f3eb02c8bd447f0772958e68d43eec18dcf325e6f9139f2d37a0855ba8794afcb9ccf8a1cc937b8578f7ce07a01415a63d1bb25de5d513525f54b260c
-
SSDEEP
3072:fMyMzQw6ScvdO6gJKYpzKM/zB0E9IGOvNcbTt+vZu9MA4L9oMz:fM+SMgJppnzKIbTt+s9MAI9oA
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2756-15-0x0000000000400000-0x0000000000454000-memory.dmp family_cycbot behavioral1/memory/2920-16-0x0000000000400000-0x0000000000454000-memory.dmp family_cycbot behavioral1/memory/2920-17-0x0000000000400000-0x0000000000452000-memory.dmp family_cycbot behavioral1/memory/2280-129-0x0000000000400000-0x0000000000454000-memory.dmp family_cycbot behavioral1/memory/2920-312-0x0000000000400000-0x0000000000454000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2920-3-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral1/memory/2756-13-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral1/memory/2756-15-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral1/memory/2920-16-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral1/memory/2920-17-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral1/memory/2280-127-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral1/memory/2280-129-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral1/memory/2920-312-0x0000000000400000-0x0000000000454000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1a9bfc6a675e53b2e1fdd150f10aa3d1546b9c63540d0a2dc52113cb434088b9N.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2920 wrote to memory of 2756 2920 1a9bfc6a675e53b2e1fdd150f10aa3d1546b9c63540d0a2dc52113cb434088b9N.exe 28 PID 2920 wrote to memory of 2756 2920 1a9bfc6a675e53b2e1fdd150f10aa3d1546b9c63540d0a2dc52113cb434088b9N.exe 28 PID 2920 wrote to memory of 2756 2920 1a9bfc6a675e53b2e1fdd150f10aa3d1546b9c63540d0a2dc52113cb434088b9N.exe 28 PID 2920 wrote to memory of 2756 2920 1a9bfc6a675e53b2e1fdd150f10aa3d1546b9c63540d0a2dc52113cb434088b9N.exe 28 PID 2920 wrote to memory of 2280 2920 1a9bfc6a675e53b2e1fdd150f10aa3d1546b9c63540d0a2dc52113cb434088b9N.exe 30 PID 2920 wrote to memory of 2280 2920 1a9bfc6a675e53b2e1fdd150f10aa3d1546b9c63540d0a2dc52113cb434088b9N.exe 30 PID 2920 wrote to memory of 2280 2920 1a9bfc6a675e53b2e1fdd150f10aa3d1546b9c63540d0a2dc52113cb434088b9N.exe 30 PID 2920 wrote to memory of 2280 2920 1a9bfc6a675e53b2e1fdd150f10aa3d1546b9c63540d0a2dc52113cb434088b9N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\1a9bfc6a675e53b2e1fdd150f10aa3d1546b9c63540d0a2dc52113cb434088b9N.exe"C:\Users\Admin\AppData\Local\Temp\1a9bfc6a675e53b2e1fdd150f10aa3d1546b9c63540d0a2dc52113cb434088b9N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Users\Admin\AppData\Local\Temp\1a9bfc6a675e53b2e1fdd150f10aa3d1546b9c63540d0a2dc52113cb434088b9N.exeC:\Users\Admin\AppData\Local\Temp\1a9bfc6a675e53b2e1fdd150f10aa3d1546b9c63540d0a2dc52113cb434088b9N.exe startC:\Program Files (x86)\LP\AF03\82B.exe%C:\Program Files (x86)\LP\AF032⤵PID:2756
-
-
C:\Users\Admin\AppData\Local\Temp\1a9bfc6a675e53b2e1fdd150f10aa3d1546b9c63540d0a2dc52113cb434088b9N.exeC:\Users\Admin\AppData\Local\Temp\1a9bfc6a675e53b2e1fdd150f10aa3d1546b9c63540d0a2dc52113cb434088b9N.exe startC:\Users\Admin\AppData\Roaming\3CB59\EC9AF.exe%C:\Users\Admin\AppData\Roaming\3CB592⤵PID:2280
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
996B
MD536f6b59a284dfb1c858baaad1ff98501
SHA11b8417515226e033bf20d8ececfd4095feaaa28c
SHA256ff386669bbea6035b703cf813b21d7b343e699b71bcb1f5ccac22971d9f4159e
SHA5120f4e5d5032c4041e12e6d3a4573de9bcae3806af21595e6dc51651dfaf58b14770a56964adf93bd9107582992a9c7211964db5dd32adbd9940ef7f870df425e2
-
Filesize
600B
MD5cbf09a7ed59dbba39a861d5eb61514f2
SHA1b40cc4dec6880f29f693e84b7ca6c79462445aa6
SHA256ed754fc4c7159892249175301e56a710533c3526df962fba134166fb4d09a899
SHA51214c8d06f63806b8403f50a4f34fa0b79abb3c0305e1df613e03f0d5ff1315bdad5564e3f22f322012d8632bc05c5e1f84d8e83dda0377a7fb2949a9d7e934299
-
Filesize
1KB
MD50ef4df8f9640b7186174c320fa072fe8
SHA11405cc6d7c0442a98641a5802c7798f2ddb0c952
SHA2565204adab41b3a8c4112f4d4991f3e8d3552b7e87dee3dc44ab66301f5bf18379
SHA512fb53bfb5405ea15ed2fadb6df974939a8ea08dda319b10a520df186c5cb8457ff564ea517e6fd915678d6003c5072dd2b49c1fcfb2dacf88be5475eb67794763