Analysis
-
max time kernel
143s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
15/04/2024, 22:30
Static task
static1
Behavioral task
behavioral1
Sample
cycdSetup.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cycdSetup.exe
Resource
win10v2004-20240226-en
General
-
Target
cycdSetup.exe
-
Size
11.0MB
-
MD5
b3b500155c22a110cd5c8348a2eba0a5
-
SHA1
b94e46019d7e3e0fa97da1bd3a414da6523bfd82
-
SHA256
b19af2f7bd1de137c1fdc6eb51e4a4142bf9b689ae3ded0af00f05400afc903f
-
SHA512
4b1d70e3f416bea1d3e23313200f2e2851b28b60f29c9236ffd4b758f6ab40408787b2e1d3c356d375a7a3095cbf44d091a27a30088b64c54257dd9df0cd7bb9
-
SSDEEP
196608:nBs2LoWnCmmghC66z0+OuF3cpv9B6NVGw+fNK9j79+5fDpZkycWf5PyeDjgdNG2:BrBCaTMOE3y9CVGw0NKVkDpnFfFO/
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 3292 cycdSetup.exe -
Enumerates connected drives 3 TTPs 2 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\A: cycdSetup.exe File opened (read-only) \??\B: cycdSetup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
Processes
-
C:\Users\Admin\AppData\Local\Temp\cycdSetup.exe"C:\Users\Admin\AppData\Local\Temp\cycdSetup.exe"1⤵
- Loads dropped DLL
- Enumerates connected drives
PID:3292
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3592 --field-trial-handle=2328,i,5873823382323802923,13134441441264702821,262144 --variations-seed-version /prefetch:81⤵PID:4808
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD50e36eb1ce14a3391a8073c6b22766908
SHA174b4f58d5a0b97b5226e41186bf00cb1493b991a
SHA2569d4b233201a2d0e22e3762e8a269ff8742c2097d6cfcf707e01fc7f0bbbcb951
SHA5122b708e24a5a0bc99d282c3465796e121421eb43c18295496291c3e21747fbd3de98250d0dc41d45950eeb7684dea6381ff37e8e2ab90228e7f27f87e86c9fe06
-
Filesize
18KB
MD5f372b11ff99bffed4cd279c0155adede
SHA189cbf60925076e9a14fd48b13790422b43a5b989
SHA256d9d5e28eb445e7986bdef4d409868af205d525f2f0729427dfe3e33a7251b15d
SHA512e902f0d7ff0e2af64ce3e8ae6d704ec21b04b35ac3f25a9acd53938b3b66fbaa02b25e816202f165e2d7339b62d2cd6fe9f764d64eefd5b24d1a108cb4b2679f
-
Filesize
500KB
MD52c93e8c9854cf42d621b2eb05c420cb4
SHA1515e440f64a141d6f82bb8a81a2f82a826f0ffc2
SHA25627170b52d5d6887824aef79ca546c9eca7755cf2eb632b1129302028c99aa7aa
SHA512420e45169a352d0575a9d1b1ab341b51ecf2be537ccf404d6ca02f24e0084591c5b200ed70842eec9eff7188c8d893c9303d283e8d4c131d96d05f3dab8df40a