Analysis

  • max time kernel
    110s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-01-2025 01:14

General

  • Target

    92c9f76f1bb05aea7b1f68f37d44740eb55c1b8c0985eda6a9b0125221a12ec3.exe

  • Size

    181KB

  • MD5

    2c5680f68e9c3629ea1847b3816a5253

  • SHA1

    0f305bdd70b83a966fc1a94f357d2016fc63ee68

  • SHA256

    92c9f76f1bb05aea7b1f68f37d44740eb55c1b8c0985eda6a9b0125221a12ec3

  • SHA512

    063b03de926d31e9261a4293cec7983d657a2c3a5a4b0c2d753f4b78a62d7f93849911c5b998b41ee1afab4a52df65fe360efdfd348098c7c75bbc8a50bfe09d

  • SSDEEP

    3072:fMyMzQw6ScvdO6gJKYpzKM/zB0E9IGOvNcbTt+vZu9MA4L9oMzy:fM+SMgJppnzKIbTt+s9MAI9oAy

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 5 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\92c9f76f1bb05aea7b1f68f37d44740eb55c1b8c0985eda6a9b0125221a12ec3.exe
    "C:\Users\Admin\AppData\Local\Temp\92c9f76f1bb05aea7b1f68f37d44740eb55c1b8c0985eda6a9b0125221a12ec3.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4740
    • C:\Users\Admin\AppData\Local\Temp\92c9f76f1bb05aea7b1f68f37d44740eb55c1b8c0985eda6a9b0125221a12ec3.exe
      C:\Users\Admin\AppData\Local\Temp\92c9f76f1bb05aea7b1f68f37d44740eb55c1b8c0985eda6a9b0125221a12ec3.exe startC:\Program Files (x86)\LP\24BD\C25.exe%C:\Program Files (x86)\LP\24BD
      2⤵
        PID:436
      • C:\Users\Admin\AppData\Local\Temp\92c9f76f1bb05aea7b1f68f37d44740eb55c1b8c0985eda6a9b0125221a12ec3.exe
        C:\Users\Admin\AppData\Local\Temp\92c9f76f1bb05aea7b1f68f37d44740eb55c1b8c0985eda6a9b0125221a12ec3.exe startC:\Users\Admin\AppData\Roaming\D55F5\FCE24.exe%C:\Users\Admin\AppData\Roaming\D55F5
        2⤵
          PID:3784

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\D55F5\5FDD.55F

        Filesize

        600B

        MD5

        6ad6e10a610c1d172923c369296539d7

        SHA1

        1f1f343011ad7ecb0c07cd1b968c5fa449abab80

        SHA256

        9e58c7c0c3b616b44454e55ae3b3a17c7616dbccf1b89c1cef03d7c75506887a

        SHA512

        ff9884a4f6bafd0e31ed6f007564394af52484c743a8eba9f7d934fe3c5600c071db2054ddb366f252a85c0a0da90ae8611a613c384c37cd7a7297fd012d29f2

      • C:\Users\Admin\AppData\Roaming\D55F5\5FDD.55F

        Filesize

        996B

        MD5

        684ae5bde1355853bbd6e0196ae2a216

        SHA1

        0ab1cd2d58605ac6425d95f6b85fce0c5acef0c4

        SHA256

        8a98335ea08ad4741591e040c24fc98b87e9003e24ec54d56ca0c74d64cfd9d4

        SHA512

        c4e1db626a8c0ee02103b8c97b96576e4a45604fe0f95b6d4def34f2ec34a63c07355b63091d4e79c094b6598a2f9a880d973e69c25e57e96c739c787408ea77

      • C:\Users\Admin\AppData\Roaming\D55F5\5FDD.55F

        Filesize

        1KB

        MD5

        368d26dc37a04755810395771d94fdf1

        SHA1

        7fdee50ae60386bb30954e098bb43f032b5895b5

        SHA256

        69f80f8d45c300b6dbe03755b16a9d5fe8aadbee458c164adc89b7cb0df57091

        SHA512

        03c0358364c4d19f7da31952aecae4a877471c7c314c45e023f9b517b77b5b4459b2d65be2832c4e8ca66d24e639c650ba2aab687170c9fd03634d27bf31b2f6

      • memory/436-13-0x0000000000400000-0x0000000000454000-memory.dmp

        Filesize

        336KB

      • memory/436-15-0x0000000000400000-0x0000000000454000-memory.dmp

        Filesize

        336KB

      • memory/3784-135-0x0000000000400000-0x0000000000454000-memory.dmp

        Filesize

        336KB

      • memory/4740-0-0x0000000000400000-0x0000000000454000-memory.dmp

        Filesize

        336KB

      • memory/4740-2-0x0000000000400000-0x0000000000452000-memory.dmp

        Filesize

        328KB

      • memory/4740-3-0x0000000000400000-0x0000000000454000-memory.dmp

        Filesize

        336KB

      • memory/4740-16-0x0000000000400000-0x0000000000454000-memory.dmp

        Filesize

        336KB

      • memory/4740-17-0x0000000000400000-0x0000000000452000-memory.dmp

        Filesize

        328KB

      • memory/4740-314-0x0000000000400000-0x0000000000454000-memory.dmp

        Filesize

        336KB