Analysis
-
max time kernel
110s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-01-2025 08:32
Static task
static1
Behavioral task
behavioral1
Sample
1150039148fb937a29d6bb7124163316af05121698c371ee484830365fa2a5f2N.exe
Resource
win7-20240903-en
General
-
Target
1150039148fb937a29d6bb7124163316af05121698c371ee484830365fa2a5f2N.exe
-
Size
174KB
-
MD5
7892fac82ab62b2b006373ff7db24c40
-
SHA1
8c5a0b0506d6dcf9b3ab5fb6822f217167365079
-
SHA256
1150039148fb937a29d6bb7124163316af05121698c371ee484830365fa2a5f2
-
SHA512
e882b2b39f5c9a4c3a31081235bbe1f3375b14b91a98ed369ee4845c411163140e3e2906add14946a05e2eac1d7d7ba9e00fcc228781b7d36fc3314c1d0e7f03
-
SSDEEP
3072:8pRtjHU0Kgvu3BPbBniNxZYotlCSo9TyhW4ViLFWbVs5BJhUcge:SzHU0KgvSBPkaTnFWbVqzhUcT
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 6 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral2/memory/3516-15-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral2/memory/2508-16-0x0000000000400000-0x000000000048E000-memory.dmp family_cycbot behavioral2/memory/2508-17-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral2/memory/2508-80-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral2/memory/668-82-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot behavioral2/memory/2508-177-0x0000000000400000-0x0000000000491000-memory.dmp family_cycbot -
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\FD870\\B8ED3.exe" 1150039148fb937a29d6bb7124163316af05121698c371ee484830365fa2a5f2N.exe -
resource yara_rule behavioral2/memory/2508-2-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/3516-13-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/3516-15-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/2508-16-0x0000000000400000-0x000000000048E000-memory.dmp upx behavioral2/memory/2508-17-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/2508-80-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/668-82-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/2508-177-0x0000000000400000-0x0000000000491000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1150039148fb937a29d6bb7124163316af05121698c371ee484830365fa2a5f2N.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2508 wrote to memory of 3516 2508 1150039148fb937a29d6bb7124163316af05121698c371ee484830365fa2a5f2N.exe 83 PID 2508 wrote to memory of 3516 2508 1150039148fb937a29d6bb7124163316af05121698c371ee484830365fa2a5f2N.exe 83 PID 2508 wrote to memory of 3516 2508 1150039148fb937a29d6bb7124163316af05121698c371ee484830365fa2a5f2N.exe 83 PID 2508 wrote to memory of 668 2508 1150039148fb937a29d6bb7124163316af05121698c371ee484830365fa2a5f2N.exe 93 PID 2508 wrote to memory of 668 2508 1150039148fb937a29d6bb7124163316af05121698c371ee484830365fa2a5f2N.exe 93 PID 2508 wrote to memory of 668 2508 1150039148fb937a29d6bb7124163316af05121698c371ee484830365fa2a5f2N.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\1150039148fb937a29d6bb7124163316af05121698c371ee484830365fa2a5f2N.exe"C:\Users\Admin\AppData\Local\Temp\1150039148fb937a29d6bb7124163316af05121698c371ee484830365fa2a5f2N.exe"1⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Users\Admin\AppData\Local\Temp\1150039148fb937a29d6bb7124163316af05121698c371ee484830365fa2a5f2N.exeC:\Users\Admin\AppData\Local\Temp\1150039148fb937a29d6bb7124163316af05121698c371ee484830365fa2a5f2N.exe startC:\Program Files (x86)\LP\D3AF\0EB.exe%C:\Program Files (x86)\LP\D3AF2⤵PID:3516
-
-
C:\Users\Admin\AppData\Local\Temp\1150039148fb937a29d6bb7124163316af05121698c371ee484830365fa2a5f2N.exeC:\Users\Admin\AppData\Local\Temp\1150039148fb937a29d6bb7124163316af05121698c371ee484830365fa2a5f2N.exe startC:\Program Files (x86)\70C32\lvvm.exe%C:\Program Files (x86)\70C322⤵PID:668
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD586c78ba2b60316b5b0814c6a808793d0
SHA1522954363721a2f803fef0987fc3d5ba7f9a2c00
SHA256176c797cd65693a1418798ff6c8eb302ed7fe50541a720ab6e23a6395331834d
SHA5121bfcaf6034d558132ba087dc60934b58738e0c0b4874d7d5a5dbf10aec7e52071733fcee0c5249f000a969430b93055f8d1950c747ac82f7f6f5e03205957c4a
-
Filesize
600B
MD53665dce079fb8f434e75ad1af1b381f4
SHA1fd99ae9ba4da403a101f5d7e9e74e8cfcfaef981
SHA256a8c9bd593d9073dafeb8b5f8a3d63186c6dfe320b23124474e0e4cec2a020b79
SHA5126e9d295f1ba2575bb60524c67dbdfec4379434627b54a87a4ce3535585694ec8be14806b9f944e0b3e6456a60f61303e5996a1f465aaee7ad420512f6d039211
-
Filesize
996B
MD5e1cf1f46b5d2891a850486252d947996
SHA1b4b28fcd021c20338df9c747bd5a52ed635fb658
SHA256842b5090a5da005bef95c7ad7f2dac33f8842cde07989e31b6ac53aa2eb2f516
SHA512ffbcbca849eeda398ddfc56b2d9c0dc634759e50dbb7b180044424700c594f48d191459d7c6e2f1b5e7226b7abb35f84c1a6eda76ed5b4f8ded4da357b2fa582