Analysis

  • max time kernel
    140s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    16-01-2025 05:21

General

  • Target

    d4e518e98bbbe18c36e773dc7baefaeb6f25138e498cdf084c96efa4969cfcf9.exe

  • Size

    167KB

  • MD5

    7e491419646116c38b978f2ee850d804

  • SHA1

    9077bfdc44afab533a9cdfaf1144fa133650bfdf

  • SHA256

    d4e518e98bbbe18c36e773dc7baefaeb6f25138e498cdf084c96efa4969cfcf9

  • SHA512

    400a44b83b25ead75c9d5389fce6e9f5beb3a45dfb67902104ca83ce028e8f58c95d0b5b4ecf53a6b973fb9ed7151cf1f0eb25a7d5bd87ed407b07b1e8081b2e

  • SSDEEP

    3072:QOXbTyNkYhsO1d3NTw8RgA/LqNExmHURwslnInWbUt+w/o:vyNrhd1w8RDxmHURJlWWbU+

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 5 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 9 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d4e518e98bbbe18c36e773dc7baefaeb6f25138e498cdf084c96efa4969cfcf9.exe
    "C:\Users\Admin\AppData\Local\Temp\d4e518e98bbbe18c36e773dc7baefaeb6f25138e498cdf084c96efa4969cfcf9.exe"
    1⤵
    • Modifies WinLogon for persistence
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1720
    • C:\Users\Admin\AppData\Local\Temp\d4e518e98bbbe18c36e773dc7baefaeb6f25138e498cdf084c96efa4969cfcf9.exe
      C:\Users\Admin\AppData\Local\Temp\d4e518e98bbbe18c36e773dc7baefaeb6f25138e498cdf084c96efa4969cfcf9.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2020
    • C:\Users\Admin\AppData\Local\Temp\d4e518e98bbbe18c36e773dc7baefaeb6f25138e498cdf084c96efa4969cfcf9.exe
      C:\Users\Admin\AppData\Local\Temp\d4e518e98bbbe18c36e773dc7baefaeb6f25138e498cdf084c96efa4969cfcf9.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2296

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\2DC3.3E7

    Filesize

    597B

    MD5

    3126d730bcc810e38dcd4512c5cfd0e6

    SHA1

    61f2e781b381d66ba52245ed2fa4ab27d8b2fafd

    SHA256

    f896fe5b66f65cf1946d0734a15f8624f6ca7ee1ced4fdf9392fbc455acbe411

    SHA512

    d5b3152f50d1c97d96119bb055004253b3ee307b27f9c73cc98d8d0fcbf5afe5f161d118202cb01823a8f9df8d951303cc7cc68252a16e999632c96da1914e69

  • C:\Users\Admin\AppData\Roaming\2DC3.3E7

    Filesize

    1KB

    MD5

    c6bab44fe7dc4cd3c398602322c812d2

    SHA1

    59651975b84bf5372287d34cfb54a79bf1937a10

    SHA256

    983265e3a6685f120c0fb812c89dd16fb7716dfa9ba67373e8e59ce257f548b5

    SHA512

    f3d75bc71c2db5ac85cccda2ed43bad84802c560be21dedc65f29f32722950645e26f271aa74286c1478e3b49406a1e6b248478044f990b445872506d9f1f624

  • C:\Users\Admin\AppData\Roaming\2DC3.3E7

    Filesize

    897B

    MD5

    5994acac5a5e45b7ce2de93c47b836dc

    SHA1

    0d1fab0693c3fafd95fe4004e792960b72c29167

    SHA256

    3bd5e425a2131882e0a23f49c28158255e006655294f9fe680d2489570e357fe

    SHA512

    baf73ae53d87c7e013fd872e489aa2358b429d634a8d5a61d772faa440e6d96452a49ba7427ae90f15bfa3d253d7de87262a9f4ed1d32063717191bc8ae2b5da

  • C:\Users\Admin\AppData\Roaming\2DC3.3E7

    Filesize

    1KB

    MD5

    b6b47f30c6567baf9c99292dd69e9b03

    SHA1

    6c7b1f72b05229ffdf2c14ce661513d024494999

    SHA256

    c24552a998da95ee1e46f50841f4c11668dad0cdb02d5a1326903615a5bbd0f9

    SHA512

    f872e6230209a3591ba0305ddd1c870e4ce15263062f7546ff19ecc134b0eed95c435b7b93915d96308296d6cc4dabffa763ef8a6e1b97ad35e8728548abd8d0

  • memory/1720-89-0x0000000000400000-0x000000000048A000-memory.dmp

    Filesize

    552KB

  • memory/1720-20-0x0000000000400000-0x000000000048A000-memory.dmp

    Filesize

    552KB

  • memory/1720-1-0x0000000000400000-0x000000000048A000-memory.dmp

    Filesize

    552KB

  • memory/1720-2-0x0000000000400000-0x000000000048A000-memory.dmp

    Filesize

    552KB

  • memory/1720-204-0x0000000000400000-0x000000000048A000-memory.dmp

    Filesize

    552KB

  • memory/2020-9-0x0000000000400000-0x000000000048A000-memory.dmp

    Filesize

    552KB

  • memory/2020-8-0x0000000000400000-0x000000000048A000-memory.dmp

    Filesize

    552KB

  • memory/2020-7-0x0000000000400000-0x000000000048A000-memory.dmp

    Filesize

    552KB

  • memory/2296-91-0x0000000000400000-0x000000000048A000-memory.dmp

    Filesize

    552KB

  • memory/2296-93-0x0000000000400000-0x000000000048A000-memory.dmp

    Filesize

    552KB