General
-
Target
YourCyanide.cmd
-
Size
153KB
-
Sample
220519-vskh7acghq
-
MD5
69eb09a987e1bfe31418cd020811b81d
-
SHA1
d7dd4d7f065f078cf55a7c0c1f4bcd9ec52096d6
-
SHA256
4b3efbf87fb31216a93954617e149825b9f029b4a37ea0fff9851eb363693424
-
SHA512
8ff7aafd71231704edd19f5aef32ebf181918d3e02afb909e82271c11ec2d16da3bebc8eeb0246821bcda07f8c499a7c0e4fb438f723b448945d27d3b714815b
Static task
static1
Behavioral task
behavioral1
Sample
YourCyanide.cmd
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
YourCyanide.cmd
Resource
win10v2004-20220414-en
Malware Config
Extracted
https://cdn.discordapp.com/attachments/974798125011198003/976894591552860220/NoKeyB.exe
Extracted
https://cdn.discordapp.com/attachments/971160786015772724/971191444410875914/GetToken.exe
Extracted
C:\Users\Admin\Desktop\YcynNote.txt
Targets
-
-
Target
YourCyanide.cmd
-
Size
153KB
-
MD5
69eb09a987e1bfe31418cd020811b81d
-
SHA1
d7dd4d7f065f078cf55a7c0c1f4bcd9ec52096d6
-
SHA256
4b3efbf87fb31216a93954617e149825b9f029b4a37ea0fff9851eb363693424
-
SHA512
8ff7aafd71231704edd19f5aef32ebf181918d3e02afb909e82271c11ec2d16da3bebc8eeb0246821bcda07f8c499a7c0e4fb438f723b448945d27d3b714815b
Score10/10-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
Blocklisted process makes network request
-
Disables Task Manager via registry modification
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Modifies Windows Firewall
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-