Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    110s
  • max time network
    102s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/12/2024, 21:04

General

  • Target

    e43ad0436de2e63421f23dcc16bccfc0cb229b86ff64ce1f44b1c5db4f453e85.exe

  • Size

    169KB

  • MD5

    991d96d8c7baedda2df4ee1586a13f7c

  • SHA1

    5c4b93c23cba17479c581b967bb2b8b63b37453c

  • SHA256

    e43ad0436de2e63421f23dcc16bccfc0cb229b86ff64ce1f44b1c5db4f453e85

  • SHA512

    c0652f7f7d8f67a2e1d4b1cd5e0c3c01626262ab050e8b380f330bfb0ad984347cefb645e2da872dcec2fe5378e8585ff22eceb8d22723a62e38b406fa73c415

  • SSDEEP

    3072:pYtI3xw7+scZSKf9OnYqjbsYUdhV+ZF+Q0kx+p9s4lgUBS9Rh/duUkv:pP3xeNcZSKf9yYosXdhTksp9IdEl

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 7 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • UPX packed file 10 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e43ad0436de2e63421f23dcc16bccfc0cb229b86ff64ce1f44b1c5db4f453e85.exe
    "C:\Users\Admin\AppData\Local\Temp\e43ad0436de2e63421f23dcc16bccfc0cb229b86ff64ce1f44b1c5db4f453e85.exe"
    1⤵
    • Modifies WinLogon for persistence
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2604
    • C:\Users\Admin\AppData\Local\Temp\e43ad0436de2e63421f23dcc16bccfc0cb229b86ff64ce1f44b1c5db4f453e85.exe
      C:\Users\Admin\AppData\Local\Temp\e43ad0436de2e63421f23dcc16bccfc0cb229b86ff64ce1f44b1c5db4f453e85.exe startC:\Program Files (x86)\LP\24BE\FF0.exe%C:\Program Files (x86)\LP\24BE
      2⤵
        PID:2068
      • C:\Users\Admin\AppData\Local\Temp\e43ad0436de2e63421f23dcc16bccfc0cb229b86ff64ce1f44b1c5db4f453e85.exe
        C:\Users\Admin\AppData\Local\Temp\e43ad0436de2e63421f23dcc16bccfc0cb229b86ff64ce1f44b1c5db4f453e85.exe startC:\Program Files (x86)\C730A\lvvm.exe%C:\Program Files (x86)\C730A
        2⤵
          PID:3776

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\E89C7\730A.89C

        Filesize

        1KB

        MD5

        589d6f12abb9c743adf48a33c1e45a57

        SHA1

        76070cea8b859b6d937850aa7880709696930c71

        SHA256

        7c08355a4c916751dbbf4da3d478facf73c293f1d8a5221781f2a4f8be6bec8a

        SHA512

        e92fb50f1019677dd74770d1409bbd0758692966ff8b07036184d08ecc8464e4d3c63cefff125eff0d1c90d7c85223f012c2fcf68a0a404d985f45d9b349e9a1

      • C:\Users\Admin\AppData\Roaming\E89C7\730A.89C

        Filesize

        600B

        MD5

        d50ab195b074df10d3aaba156d05a9fd

        SHA1

        00ff0792856dfef599ccb3a60d17964c5b0ba586

        SHA256

        8f174b5bc1a06eb8c8edf9259a183e8363360304418deb17e18e397cb5da1a03

        SHA512

        bd69be98d388bb12d421c2610d6ecbc76d7581fc69c7625dedf6f422e445f31dc67624acf71a25321bd48cff02f605270641a1e5e42b2f126c345931fe1d5b2c

      • C:\Users\Admin\AppData\Roaming\E89C7\730A.89C

        Filesize

        996B

        MD5

        76dc526d183066ebb74ec6dbabb33214

        SHA1

        a841c72f7c50e03f918499d0a6d3d464999673d1

        SHA256

        04252599c1112bbdef5d6c578cce6dfe4b685b7bab6fe802101f9070b950b39f

        SHA512

        975af1fcdff67679c9ed5b8610f9e698ca567b4aac07022faa3b127e8f217a8a36783fc747f12c4e1c399383be310148ce7b5348e8cef26e71294d467a4b8dac

      • memory/2068-15-0x0000000000400000-0x0000000000491000-memory.dmp

        Filesize

        580KB

      • memory/2068-13-0x0000000000400000-0x0000000000491000-memory.dmp

        Filesize

        580KB

      • memory/2604-16-0x0000000000400000-0x000000000048E000-memory.dmp

        Filesize

        568KB

      • memory/2604-17-0x0000000000400000-0x0000000000491000-memory.dmp

        Filesize

        580KB

      • memory/2604-1-0x0000000000400000-0x000000000048E000-memory.dmp

        Filesize

        568KB

      • memory/2604-86-0x0000000000400000-0x0000000000491000-memory.dmp

        Filesize

        580KB

      • memory/2604-2-0x0000000000400000-0x0000000000491000-memory.dmp

        Filesize

        580KB

      • memory/2604-188-0x0000000000400000-0x0000000000491000-memory.dmp

        Filesize

        580KB

      • memory/2604-191-0x0000000000400000-0x0000000000491000-memory.dmp

        Filesize

        580KB

      • memory/3776-88-0x0000000000400000-0x0000000000491000-memory.dmp

        Filesize

        580KB

      • memory/3776-89-0x0000000000400000-0x0000000000491000-memory.dmp

        Filesize

        580KB

      • memory/3776-91-0x0000000000400000-0x0000000000491000-memory.dmp

        Filesize

        580KB