Analysis
-
max time kernel
110s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-01-2025 01:14
Static task
static1
Behavioral task
behavioral1
Sample
92c9f76f1bb05aea7b1f68f37d44740eb55c1b8c0985eda6a9b0125221a12ec3.exe
Resource
win7-20240903-en
General
-
Target
92c9f76f1bb05aea7b1f68f37d44740eb55c1b8c0985eda6a9b0125221a12ec3.exe
-
Size
181KB
-
MD5
2c5680f68e9c3629ea1847b3816a5253
-
SHA1
0f305bdd70b83a966fc1a94f357d2016fc63ee68
-
SHA256
92c9f76f1bb05aea7b1f68f37d44740eb55c1b8c0985eda6a9b0125221a12ec3
-
SHA512
063b03de926d31e9261a4293cec7983d657a2c3a5a4b0c2d753f4b78a62d7f93849911c5b998b41ee1afab4a52df65fe360efdfd348098c7c75bbc8a50bfe09d
-
SSDEEP
3072:fMyMzQw6ScvdO6gJKYpzKM/zB0E9IGOvNcbTt+vZu9MA4L9oMzy:fM+SMgJppnzKIbTt+s9MAI9oAy
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral2/memory/436-15-0x0000000000400000-0x0000000000454000-memory.dmp family_cycbot behavioral2/memory/4740-16-0x0000000000400000-0x0000000000454000-memory.dmp family_cycbot behavioral2/memory/4740-17-0x0000000000400000-0x0000000000452000-memory.dmp family_cycbot behavioral2/memory/3784-135-0x0000000000400000-0x0000000000454000-memory.dmp family_cycbot behavioral2/memory/4740-314-0x0000000000400000-0x0000000000454000-memory.dmp family_cycbot -
resource yara_rule behavioral2/memory/4740-3-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral2/memory/436-13-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral2/memory/436-15-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral2/memory/4740-16-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral2/memory/4740-17-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral2/memory/3784-135-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral2/memory/4740-314-0x0000000000400000-0x0000000000454000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 92c9f76f1bb05aea7b1f68f37d44740eb55c1b8c0985eda6a9b0125221a12ec3.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4740 wrote to memory of 436 4740 92c9f76f1bb05aea7b1f68f37d44740eb55c1b8c0985eda6a9b0125221a12ec3.exe 82 PID 4740 wrote to memory of 436 4740 92c9f76f1bb05aea7b1f68f37d44740eb55c1b8c0985eda6a9b0125221a12ec3.exe 82 PID 4740 wrote to memory of 436 4740 92c9f76f1bb05aea7b1f68f37d44740eb55c1b8c0985eda6a9b0125221a12ec3.exe 82 PID 4740 wrote to memory of 3784 4740 92c9f76f1bb05aea7b1f68f37d44740eb55c1b8c0985eda6a9b0125221a12ec3.exe 87 PID 4740 wrote to memory of 3784 4740 92c9f76f1bb05aea7b1f68f37d44740eb55c1b8c0985eda6a9b0125221a12ec3.exe 87 PID 4740 wrote to memory of 3784 4740 92c9f76f1bb05aea7b1f68f37d44740eb55c1b8c0985eda6a9b0125221a12ec3.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\92c9f76f1bb05aea7b1f68f37d44740eb55c1b8c0985eda6a9b0125221a12ec3.exe"C:\Users\Admin\AppData\Local\Temp\92c9f76f1bb05aea7b1f68f37d44740eb55c1b8c0985eda6a9b0125221a12ec3.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Users\Admin\AppData\Local\Temp\92c9f76f1bb05aea7b1f68f37d44740eb55c1b8c0985eda6a9b0125221a12ec3.exeC:\Users\Admin\AppData\Local\Temp\92c9f76f1bb05aea7b1f68f37d44740eb55c1b8c0985eda6a9b0125221a12ec3.exe startC:\Program Files (x86)\LP\24BD\C25.exe%C:\Program Files (x86)\LP\24BD2⤵PID:436
-
-
C:\Users\Admin\AppData\Local\Temp\92c9f76f1bb05aea7b1f68f37d44740eb55c1b8c0985eda6a9b0125221a12ec3.exeC:\Users\Admin\AppData\Local\Temp\92c9f76f1bb05aea7b1f68f37d44740eb55c1b8c0985eda6a9b0125221a12ec3.exe startC:\Users\Admin\AppData\Roaming\D55F5\FCE24.exe%C:\Users\Admin\AppData\Roaming\D55F52⤵PID:3784
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
600B
MD56ad6e10a610c1d172923c369296539d7
SHA11f1f343011ad7ecb0c07cd1b968c5fa449abab80
SHA2569e58c7c0c3b616b44454e55ae3b3a17c7616dbccf1b89c1cef03d7c75506887a
SHA512ff9884a4f6bafd0e31ed6f007564394af52484c743a8eba9f7d934fe3c5600c071db2054ddb366f252a85c0a0da90ae8611a613c384c37cd7a7297fd012d29f2
-
Filesize
996B
MD5684ae5bde1355853bbd6e0196ae2a216
SHA10ab1cd2d58605ac6425d95f6b85fce0c5acef0c4
SHA2568a98335ea08ad4741591e040c24fc98b87e9003e24ec54d56ca0c74d64cfd9d4
SHA512c4e1db626a8c0ee02103b8c97b96576e4a45604fe0f95b6d4def34f2ec34a63c07355b63091d4e79c094b6598a2f9a880d973e69c25e57e96c739c787408ea77
-
Filesize
1KB
MD5368d26dc37a04755810395771d94fdf1
SHA17fdee50ae60386bb30954e098bb43f032b5895b5
SHA25669f80f8d45c300b6dbe03755b16a9d5fe8aadbee458c164adc89b7cb0df57091
SHA51203c0358364c4d19f7da31952aecae4a877471c7c314c45e023f9b517b77b5b4459b2d65be2832c4e8ca66d24e639c650ba2aab687170c9fd03634d27bf31b2f6