Analysis
-
max time kernel
110s -
max time network
65s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
24-01-2025 15:51
Static task
static1
Behavioral task
behavioral1
Sample
85b41b6e00372fc722a5e7960b1bb0046b8a97566abc4a3f1072c3b3fe31277a.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
85b41b6e00372fc722a5e7960b1bb0046b8a97566abc4a3f1072c3b3fe31277a.exe
Resource
win10v2004-20241007-en
General
-
Target
85b41b6e00372fc722a5e7960b1bb0046b8a97566abc4a3f1072c3b3fe31277a.exe
-
Size
175KB
-
MD5
9d5aab67a846e6041c559f827996e562
-
SHA1
c066222ff58ef75101703b38d35caf5fb16c811c
-
SHA256
85b41b6e00372fc722a5e7960b1bb0046b8a97566abc4a3f1072c3b3fe31277a
-
SHA512
c69b4a69bcb3888d960e8bebecf9fc6af37b6c10ef50a14da31be034f7ea39f662938c250b95f61cf19638439239f28bdb29d5a1c396b1c3338ffdaf7e5e8a8d
-
SSDEEP
3072:KeF7Dpd7BzkiXI+wl9N/iqAx9xbWl/3u88Zw8WUL65+V3ZsXngi:KeFnpXzkCwbZ/3P8RLWe3uXnf
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2040-14-0x0000000000400000-0x0000000000445000-memory.dmp family_cycbot behavioral1/memory/2100-15-0x0000000000400000-0x0000000000445000-memory.dmp family_cycbot behavioral1/memory/2100-86-0x0000000000400000-0x0000000000445000-memory.dmp family_cycbot behavioral1/memory/1808-90-0x0000000000400000-0x0000000000445000-memory.dmp family_cycbot behavioral1/memory/2100-211-0x0000000000400000-0x0000000000445000-memory.dmp family_cycbot -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\conhost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\conhost.exe" 85b41b6e00372fc722a5e7960b1bb0046b8a97566abc4a3f1072c3b3fe31277a.exe -
resource yara_rule behavioral1/memory/2100-2-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2040-12-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2040-14-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2100-15-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2100-86-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/1808-88-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/1808-90-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2100-211-0x0000000000400000-0x0000000000445000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 85b41b6e00372fc722a5e7960b1bb0046b8a97566abc4a3f1072c3b3fe31277a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 85b41b6e00372fc722a5e7960b1bb0046b8a97566abc4a3f1072c3b3fe31277a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 85b41b6e00372fc722a5e7960b1bb0046b8a97566abc4a3f1072c3b3fe31277a.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2100 wrote to memory of 2040 2100 85b41b6e00372fc722a5e7960b1bb0046b8a97566abc4a3f1072c3b3fe31277a.exe 31 PID 2100 wrote to memory of 2040 2100 85b41b6e00372fc722a5e7960b1bb0046b8a97566abc4a3f1072c3b3fe31277a.exe 31 PID 2100 wrote to memory of 2040 2100 85b41b6e00372fc722a5e7960b1bb0046b8a97566abc4a3f1072c3b3fe31277a.exe 31 PID 2100 wrote to memory of 2040 2100 85b41b6e00372fc722a5e7960b1bb0046b8a97566abc4a3f1072c3b3fe31277a.exe 31 PID 2100 wrote to memory of 1808 2100 85b41b6e00372fc722a5e7960b1bb0046b8a97566abc4a3f1072c3b3fe31277a.exe 33 PID 2100 wrote to memory of 1808 2100 85b41b6e00372fc722a5e7960b1bb0046b8a97566abc4a3f1072c3b3fe31277a.exe 33 PID 2100 wrote to memory of 1808 2100 85b41b6e00372fc722a5e7960b1bb0046b8a97566abc4a3f1072c3b3fe31277a.exe 33 PID 2100 wrote to memory of 1808 2100 85b41b6e00372fc722a5e7960b1bb0046b8a97566abc4a3f1072c3b3fe31277a.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\85b41b6e00372fc722a5e7960b1bb0046b8a97566abc4a3f1072c3b3fe31277a.exe"C:\Users\Admin\AppData\Local\Temp\85b41b6e00372fc722a5e7960b1bb0046b8a97566abc4a3f1072c3b3fe31277a.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Users\Admin\AppData\Local\Temp\85b41b6e00372fc722a5e7960b1bb0046b8a97566abc4a3f1072c3b3fe31277a.exeC:\Users\Admin\AppData\Local\Temp\85b41b6e00372fc722a5e7960b1bb0046b8a97566abc4a3f1072c3b3fe31277a.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:2040
-
-
C:\Users\Admin\AppData\Local\Temp\85b41b6e00372fc722a5e7960b1bb0046b8a97566abc4a3f1072c3b3fe31277a.exeC:\Users\Admin\AppData\Local\Temp\85b41b6e00372fc722a5e7960b1bb0046b8a97566abc4a3f1072c3b3fe31277a.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵
- System Location Discovery: System Language Discovery
PID:1808
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5a25b55f168722108ebcac442f33c62b0
SHA168a11fbee6793724d085daab096c1dab4664e550
SHA25640b0a26f685672a6fa9755abe68c1d62325faecbdc35a6d9e6985adedb0888c5
SHA512497fc740a939c320d803722fbc8f9888bb783d4cf3e27b13ccc3d9a52a345f342813e654d2a14f17794e6fa6d5414951425df0526523c10e90141ecbb29fce38
-
Filesize
600B
MD55580a6ab1d76c4dafbad30dad22838fc
SHA149a4d6b1479f7846fba0d96b217ec030c00d3087
SHA25640cec79af4d3ea3ba37aa58b358792eef3d2b33e5f064443e26da6ffa62c27a3
SHA512a8565372ca4803297c0840fa8ec7502ddd7ada5acf4cb168ccbedace6cb87f31e3d828b05c22c896d0efbeb7672f71d46fb798ef2f02a5a2cd7903e2ab1e2cca
-
Filesize
996B
MD59d784ebc8d6701eb20b6a2acf26d5048
SHA118161401a540b606e7b892c0f448524b484c0682
SHA2561444571bcdb22e505e6e533a6df1095f9f0ebe5e9ef1cb66d65ef714c896fca4
SHA512343a77793c1d12dfb665467f7ec5c862538be262717e223a7b0c79671e84ec6cd3917bf04ded91afc97b541f82132e5002c66ee6b062dda553a6b589d988e8c6