MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 7c2906c9277e39c2d1be87adbd342e6faba7b0aa593233663d0007cb4119ccc6. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Cutwail


Vendor detections: 16


Intelligence 16 IOCs YARA 14 File information Comments 1

SHA256 hash: 7c2906c9277e39c2d1be87adbd342e6faba7b0aa593233663d0007cb4119ccc6
SHA3-384 hash: 116d06c409af4c4b498991b7b01498920f5a389e30af41c14043a358003fa66bbdc834788c2c14daa67432722b0770bf
SHA1 hash: b1c2dd3bd27624a8aa310cbb481b9a64fdbaf921
MD5 hash: d9c7beeacdac2aae5d8c675556bfaae9
humanhash: east-mississippi-cola-oklahoma
File name:d9c7beeacdac2aae5d8c675556bfaae9
Download: download sample
Signature Cutwail
File size:1'948'160 bytes
First seen:2024-10-25 09:15:15 UTC
Last seen:2024-10-25 12:02:13 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash a7052ad8566216bfcf537f94ec6b5a66 (1 x Cutwail)
ssdeep 49152:3rLGA8M9iYz45FWeYTZxTUxXpKg+fmjcozmKxS:65FWBTZxYxJo
Threatray 1 similar samples on MalwareBazaar
TLSH T1C1955C233E4280F5E57301B05A397B6585699DF50B2245CB73FC3F399BB09E25A32A27
TrID 68.8% (.CPL) Windows Control Panel Item (generic) (57583/11/19)
12.5% (.EXE) Win64 Executable (generic) (10522/11/4)
6.0% (.EXE) Win16 NE executable (generic) (5038/12/1)
5.3% (.EXE) Win32 Executable (generic) (4504/4/1)
2.4% (.EXE) OS/2 Executable (generic) (2029/13)
Magika pebin
File icon (PE):PE icon
dhash icon ce3169696949718e (46 x Pikabot, 1 x RecordBreaker, 1 x Cutwail)
Reporter zbetcheckin
Tags:32 Cutwail exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
375
Origin country :
FR FR
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
d9c7beeacdac2aae5d8c675556bfaae9
Verdict:
Malicious activity
Analysis date:
2024-10-25 09:19:55 UTC
Tags:
pushdo cutwail backdoor sinkhole upx

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.9%
Tags:
Cutwail Emotet
Result
Verdict:
Malware
Maliciousness:
Result
Verdict:
SUSPICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
AI detected suspicious sample
Allocates memory in foreign processes
Contains functionality to inject code into remote processes
Contains functionality to inject threads in other processes
Drops PE files to the user root directory
Injects a PE file into a foreign processes
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Suspect Svchost Activity
Suricata IDS alerts for network traffic
System process connects to network (likely due to code injection or exploit)
Writes to foreign memory regions
Yara detected Backdoor Pushdo
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1541957 Sample: yGktPvplJn.exe Startdate: 25/10/2024 Architecture: WINDOWS Score: 100 52 xaicom.es 2->52 54 www.yoruksut.com 2->54 56 157 other IPs or domains 2->56 72 Suricata IDS alerts for network traffic 2->72 74 Multi AV Scanner detection for submitted file 2->74 76 Yara detected Backdoor Pushdo 2->76 78 2 other signatures 2->78 7 yGktPvplJn.exe 3 68 2->7         started        12 pigalicapi.exe 48 2->12         started        14 pigalicapi.exe 48 2->14         started        signatures3 process4 dnsIp5 58 item-pr.com 185.15.129.58, 52543, 52815, 52827 WAYCOM-ASWaycomInternational-EuropeanNetworkFR France 7->58 60 aevga.com 108.167.164.216, 52604, 52898, 52906 UNIFIEDLAYER-AS-1US United States 7->60 64 83 other IPs or domains 7->64 34 C:\Users\user\pigalicapi.exe, PE32 7->34 dropped 36 C:\Users\...\pigalicapi.exe:Zone.Identifier, ASCII 7->36 dropped 80 Drops PE files to the user root directory 7->80 82 Writes to foreign memory regions 7->82 84 Injects a PE file into a foreign processes 7->84 16 svchost.exe 7->16         started        20 svchost.exe 7->20         started        22 svchost.exe 7->22         started        24 svchost.exe 7->24         started        62 147.154.3.56, 52986, 80 ORACLE-BMC-31898US United States 12->62 86 Multi AV Scanner detection for dropped file 12->86 88 Allocates memory in foreign processes 12->88 26 svchost.exe 12->26         started        28 svchost.exe 12->28         started        30 svchost.exe 14->30         started        32 svchost.exe 14->32         started        file6 signatures7 process8 dnsIp9 38 mail.airmail.net 66.226.70.66, 25 INFB2-ASUS United States 16->38 40 gmail-smtp-in.l.google.com 142.251.168.27, 25 GOOGLEUS United States 16->40 66 System process connects to network (likely due to code injection or exploit) 16->66 68 Contains functionality to inject threads in other processes 16->68 70 Contains functionality to inject code into remote processes 16->70 42 smtp.mail.global.gm0.yahoodns.net 66.218.88.167 YAHOO-3US United States 20->42 44 mail.protonmail.ch 185.205.70.128 DEVINOTELECOM-ASRU unknown 24->44 46 smtp1.sbc.mail.am0.yahoodns.net 66.218.88.163 YAHOO-3US United States 26->46 48 smtp.aol.g03.yahoodns.net 87.248.97.31, 25 YAHOO-IRDGB United Kingdom 28->48 50 74.125.133.27 GOOGLEUS United States 28->50 signatures10
Threat name:
Win32.Trojan.Cutwail
Status:
Malicious
First seen:
2024-10-24 15:37:05 UTC
File Type:
PE (Exe)
Extracted files:
46
AV detection:
17 of 24 (70.83%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  6/10
Tags:
discovery persistence upx
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
System Location Discovery: System Language Discovery
Suspicious use of SetThreadContext
UPX packed file
Adds Run key to start application
Unpacked files
SH256 hash:
f812cff25ac78391ad0621231aa8556d459a3cea3205a04b097744f1e0116a60
MD5 hash:
ab0fa68fdf4a67b3a404250f073e15ba
SHA1 hash:
7eb499acfbe7a3d4d536ab2de8e95be4d7234bbf
SH256 hash:
7c2906c9277e39c2d1be87adbd342e6faba7b0aa593233663d0007cb4119ccc6
MD5 hash:
d9c7beeacdac2aae5d8c675556bfaae9
SHA1 hash:
b1c2dd3bd27624a8aa310cbb481b9a64fdbaf921
Malware family:
BazarLoader
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BLOWFISH_Constants
Author:phoul (@phoul)
Description:Look for Blowfish constants
Rule name:Check_OutputDebugStringA_iat
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerException__SetConsoleCtrl
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:maldoc_find_kernel32_base_method_1
Author:Didier Stevens (https://DidierStevens.com)
Rule name:malware_shellcode_hash
Author:JPCERT/CC Incident Response Group
Description:detect shellcode api hash value
Rule name:meth_stackstrings
Author:Willi Ballenthin
Rule name:pe_detect_tls_callbacks
Rule name:ThreadControl__Context
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Cutwail

Executable exe 7c2906c9277e39c2d1be87adbd342e6faba7b0aa593233663d0007cb4119ccc6

(this sample)

  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high
CHECK_PIEMissing Position-Independent Executable (PIE) Protectionhigh
Reviews
IDCapabilitiesEvidence
AUTH_APIManipulates User AuthorizationADVAPI32.dll::ConvertSidToStringSidW
ADVAPI32.dll::GetNamedSecurityInfoW
ADVAPI32.dll::GetSidSubAuthorityCount
ADVAPI32.dll::GetSidSubAuthority
ADVAPI32.dll::IsWellKnownSid
ADVAPI32.dll::GetAce
COM_BASE_APICan Download & Execute componentsole32.dll::CoCreateInstance
ole32.dll::CoInitializeSecurity
DP_APIUses DP APICRYPT32.dll::CryptUnprotectData
MULTIMEDIA_APICan Play MultimediaWINMM.dll::timeGetTime
SECURITY_BASE_APIUses Security Base APIADVAPI32.dll::AdjustTokenPrivileges
ADVAPI32.dll::GetAclInformation
ADVAPI32.dll::GetFileSecurityW
ADVAPI32.dll::GetSecurityDescriptorDacl
ADVAPI32.dll::GetSidIdentifierAuthority
ADVAPI32.dll::GetTokenInformation
SHELL_APIManipulates System ShellSHELL32.dll::ShellExecuteW
WIN32_PROCESS_APICan Create Process and ThreadsKERNEL32.dll::CreateProcessW
KERNEL32.dll::OpenProcess
ADVAPI32.dll::OpenProcessToken
KERNEL32.dll::CloseHandle
KERNEL32.dll::CreateThreadpoolWork
KERNEL32.dll::CreateThreadpoolTimer
KERNEL32.dll::CreateThread
WIN_BASE_APIUses Win Base APIKERNEL32.dll::TerminateProcess
KERNEL32.dll::LoadLibraryA
KERNEL32.dll::LoadLibraryExW
KERNEL32.dll::LoadLibraryW
KERNEL32.dll::LoadLibraryExA
KERNEL32.dll::GetStartupInfoW
WIN_BASE_EXEC_APICan Execute other programsKERNEL32.dll::WriteConsoleW
KERNEL32.dll::ReadConsoleW
KERNEL32.dll::SetConsoleCtrlHandler
KERNEL32.dll::SetStdHandle
KERNEL32.dll::GetConsoleMode
KERNEL32.dll::GetConsoleOutputCP
WIN_BASE_IO_APICan Create FilesKERNEL32.dll::CreateDirectoryW
KERNEL32.dll::CreateFileW
KERNEL32.dll::DeleteFileW
SHLWAPI.dll::PathRemoveFileSpecW
KERNEL32.dll::GetWindowsDirectoryW
KERNEL32.dll::GetSystemDirectoryW
WIN_BASE_USER_APIRetrieves Account InformationADVAPI32.dll::LookupAccountSidW
ADVAPI32.dll::LookupPrivilegeValueW
KERNEL32.dll::QueryDosDeviceW
WIN_CRYPT_APIUses Windows Crypt APIADVAPI32.dll::CryptAcquireContextW
CRYPT32.dll::CryptBinaryToStringA
CRYPT32.dll::CryptBinaryToStringW
ADVAPI32.dll::CryptCreateHash
ADVAPI32.dll::CryptGetHashParam
ADVAPI32.dll::CryptHashData
WIN_REG_APICan Manipulate Windows RegistryADVAPI32.dll::RegCreateKeyExW
ADVAPI32.dll::RegGetValueW
ADVAPI32.dll::RegOpenKeyExW
ADVAPI32.dll::RegQueryValueExW
ADVAPI32.dll::RegSetValueExW
WIN_TRUST_APIUses Windows Trust APIWINTRUST.dll::WinVerifyTrust
WIN_USER_APIPerforms GUI ActionsUSER32.dll::BroadcastSystemMessageW
USER32.dll::EmptyClipboard
USER32.dll::FindWindowW
USER32.dll::OpenClipboard
USER32.dll::CreateWindowExW

Comments



Avatar
zbet commented on 2024-10-25 09:15:16 UTC

url : hxxps://samzafood.com.my/wp-content/images/pic6.jpg