Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-11-2024 03:23
Static task
static1
Behavioral task
behavioral1
Sample
bb9addc975dfdf9dfde3a22e8b9dbba679549961676b4e4bce26caaeefc6a304.exe
Resource
win7-20240708-en
General
-
Target
bb9addc975dfdf9dfde3a22e8b9dbba679549961676b4e4bce26caaeefc6a304.exe
-
Size
180KB
-
MD5
9576ced894b1306bb46ea64e5e3cc1b3
-
SHA1
b0aedd64fd52a19d80df3381df1d3a2ff0fef3e9
-
SHA256
bb9addc975dfdf9dfde3a22e8b9dbba679549961676b4e4bce26caaeefc6a304
-
SHA512
a9caa0e61e5c356ef79bff9223e1db1a0a6d40690d7b59a601230c0aa2434bba90dbb7035d9e0d90ba9339e6ab79826d40f5c576c77288252119b6f40936c275
-
SSDEEP
3072:KEVm8FDMBRQW578SzOKdImBUdkDnnzUn0e4TZAQEjaPHEG4hJo5kLctnYZst6AZe:1NJMrdJ5dImBKckD4TKaPE3C5kLctnYn
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral2/memory/780-14-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral2/memory/548-15-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral2/memory/548-16-0x0000000000400000-0x0000000000452000-memory.dmp family_cycbot behavioral2/memory/2104-131-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral2/memory/548-310-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot -
resource yara_rule behavioral2/memory/548-3-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral2/memory/780-13-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral2/memory/780-14-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral2/memory/548-15-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral2/memory/548-16-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral2/memory/2104-130-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral2/memory/2104-131-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral2/memory/548-310-0x0000000000400000-0x0000000000455000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bb9addc975dfdf9dfde3a22e8b9dbba679549961676b4e4bce26caaeefc6a304.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 548 wrote to memory of 780 548 bb9addc975dfdf9dfde3a22e8b9dbba679549961676b4e4bce26caaeefc6a304.exe 91 PID 548 wrote to memory of 780 548 bb9addc975dfdf9dfde3a22e8b9dbba679549961676b4e4bce26caaeefc6a304.exe 91 PID 548 wrote to memory of 780 548 bb9addc975dfdf9dfde3a22e8b9dbba679549961676b4e4bce26caaeefc6a304.exe 91 PID 548 wrote to memory of 2104 548 bb9addc975dfdf9dfde3a22e8b9dbba679549961676b4e4bce26caaeefc6a304.exe 100 PID 548 wrote to memory of 2104 548 bb9addc975dfdf9dfde3a22e8b9dbba679549961676b4e4bce26caaeefc6a304.exe 100 PID 548 wrote to memory of 2104 548 bb9addc975dfdf9dfde3a22e8b9dbba679549961676b4e4bce26caaeefc6a304.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\bb9addc975dfdf9dfde3a22e8b9dbba679549961676b4e4bce26caaeefc6a304.exe"C:\Users\Admin\AppData\Local\Temp\bb9addc975dfdf9dfde3a22e8b9dbba679549961676b4e4bce26caaeefc6a304.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:548 -
C:\Users\Admin\AppData\Local\Temp\bb9addc975dfdf9dfde3a22e8b9dbba679549961676b4e4bce26caaeefc6a304.exeC:\Users\Admin\AppData\Local\Temp\bb9addc975dfdf9dfde3a22e8b9dbba679549961676b4e4bce26caaeefc6a304.exe startC:\Program Files (x86)\LP\0B01\619.exe%C:\Program Files (x86)\LP\0B012⤵PID:780
-
-
C:\Users\Admin\AppData\Local\Temp\bb9addc975dfdf9dfde3a22e8b9dbba679549961676b4e4bce26caaeefc6a304.exeC:\Users\Admin\AppData\Local\Temp\bb9addc975dfdf9dfde3a22e8b9dbba679549961676b4e4bce26caaeefc6a304.exe startC:\Users\Admin\AppData\Roaming\17D5C\97B0B.exe%C:\Users\Admin\AppData\Roaming\17D5C2⤵PID:2104
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
996B
MD55a1dd95f161827755eca051687447d57
SHA12819075a03cacfce886ab88df8edadb96381027b
SHA256dd1f7ef7bcc2a905b5e38aa03210ad8dae0d0de16641f8ce07c91850fbff05a2
SHA512cab058451765986b16490d8d1a8ca13a13362ea118c45fc811270beec752139922384595d676f8663e410188ee41ebebaf1416f985671b7ca393744c8c92584c
-
Filesize
600B
MD59943af79e8684d67354d9e44bcf581c2
SHA1d2d4f61850211f3f386d6e20bbddf6448149b257
SHA25653a90f68760f978e379d795ca2d312f12e81aa6e4c5b95dc640b96ad2b936b7c
SHA5123960c4cc750726b94691caa0cbe6ff27edc7467349a4dbc23b3cca6d35d7cf0f329fab5250623b6de32ae5abd6de864c085185f70838924ef8f0a58642f6d1f4
-
Filesize
1KB
MD5d3a9c1ded69a974ad221f4bb293a7936
SHA1c9d6b83802e0bd45141e7da63b61eb9c9d79cf02
SHA256c616e88008c628ef5e2273da58d336aeea198dab3d20a8b68df8e30819957f55
SHA512c885b204685a72f3948ce61b7ab0d05a29f9e9c91ab01356c3e0a6ce44514388018877ee43d6a25f884d3d3c9a9bb945a149babbbf925e423191d769110cd00b