Analysis

  • max time kernel
    140s
  • max time network
    138s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-11-2024 19:48

General

  • Target

    11ca7a96499fe12ee8f37a896ba43052bcd936775be2475db4c80469e298a0f6.exe

  • Size

    187KB

  • MD5

    d733b00a9267fb7569ac2b14e206eb67

  • SHA1

    276b638a41c807ee9a8d93b67f5599fb1bc30fff

  • SHA256

    11ca7a96499fe12ee8f37a896ba43052bcd936775be2475db4c80469e298a0f6

  • SHA512

    f407f7cdadc1889b6d55d021f3426bb80625de13c569c9df1753bea1b284b48e6833b1120e8596a4fd61800110a73269aed8ad3440506d248d957305983cc608

  • SSDEEP

    3072:VUHqpj+iHwsE3+64QSuedh+wyYE8pCaHSJaDf+HyUaP/wooi:iZsE3+SSuYxN4gD+SX

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 5 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\11ca7a96499fe12ee8f37a896ba43052bcd936775be2475db4c80469e298a0f6.exe
    "C:\Users\Admin\AppData\Local\Temp\11ca7a96499fe12ee8f37a896ba43052bcd936775be2475db4c80469e298a0f6.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:960
    • C:\Users\Admin\AppData\Local\Temp\11ca7a96499fe12ee8f37a896ba43052bcd936775be2475db4c80469e298a0f6.exe
      C:\Users\Admin\AppData\Local\Temp\11ca7a96499fe12ee8f37a896ba43052bcd936775be2475db4c80469e298a0f6.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming
      2⤵
      • System Location Discovery: System Language Discovery
      PID:748
    • C:\Users\Admin\AppData\Local\Temp\11ca7a96499fe12ee8f37a896ba43052bcd936775be2475db4c80469e298a0f6.exe
      C:\Users\Admin\AppData\Local\Temp\11ca7a96499fe12ee8f37a896ba43052bcd936775be2475db4c80469e298a0f6.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp
      2⤵
      • System Location Discovery: System Language Discovery
      PID:928

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\C906.C7A

    Filesize

    600B

    MD5

    d588d65511a1615d8e1c7848d4bd152e

    SHA1

    0649f765d79b8ac723b803ed931396952140d1fb

    SHA256

    6ce461f3bd832c399d7fde90d92d395f0d1ccaa446f18cc212f9f41a1a31931a

    SHA512

    06cb57e6e13cb816a600f1818f8b345f1cd09f6a334a437f2d9a41d46b4b7cbdc9943135503a74a4b00d492506f9661c9989baec5cc8f1697b0749cffb3273a4

  • C:\Users\Admin\AppData\Roaming\C906.C7A

    Filesize

    1KB

    MD5

    2712f6de9197dbea8423e5148df72d08

    SHA1

    faee491ba3c43a89c4c1bc61ecccaa1b40c75e5d

    SHA256

    3b99ee89077e14304d6222455facda18523e6c3659d9263e15d0e0a8cd01888b

    SHA512

    1e9bc65b6b8d3784d225f12a844b5541aa7f8b9a5c2e07275274ab375225c30066fb890b086ad6324a6f506b1622292c298d317b56fa0ace24e3cbd9c8b9ef31

  • C:\Users\Admin\AppData\Roaming\C906.C7A

    Filesize

    996B

    MD5

    9e879b794c1f6ed0ae16bc0526154346

    SHA1

    cccb9d16317093d209f7f67165626d7e224eb459

    SHA256

    cb52cf01728ecc8a4afee2bbcfd111b190caf3bcf32948ab1389edec48e722c4

    SHA512

    4452d42d1f57a9379f18a9974a051be9c1938c5bc7341b9fbe39fb0025cd8d5c8a7a22d782ac78c7c4d7372b67fc98369778eb1cb23d58bce01d7c4214397fc1

  • memory/748-12-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/748-13-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/928-80-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/928-79-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/960-1-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/960-2-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/960-14-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/960-77-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/960-193-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB