Analysis

  • max time kernel
    119s
  • max time network
    67s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    24-01-2025 14:19

General

  • Target

    1a9bfc6a675e53b2e1fdd150f10aa3d1546b9c63540d0a2dc52113cb434088b9N.exe

  • Size

    181KB

  • MD5

    c6a93c5b7fe7915de3b31f133c370ce0

  • SHA1

    984e837a21a137bf6cb74692dcab458ca7507fa4

  • SHA256

    1a9bfc6a675e53b2e1fdd150f10aa3d1546b9c63540d0a2dc52113cb434088b9

  • SHA512

    ccc4732f3eb02c8bd447f0772958e68d43eec18dcf325e6f9139f2d37a0855ba8794afcb9ccf8a1cc937b8578f7ce07a01415a63d1bb25de5d513525f54b260c

  • SSDEEP

    3072:fMyMzQw6ScvdO6gJKYpzKM/zB0E9IGOvNcbTt+vZu9MA4L9oMz:fM+SMgJppnzKIbTt+s9MAI9oA

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 5 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1a9bfc6a675e53b2e1fdd150f10aa3d1546b9c63540d0a2dc52113cb434088b9N.exe
    "C:\Users\Admin\AppData\Local\Temp\1a9bfc6a675e53b2e1fdd150f10aa3d1546b9c63540d0a2dc52113cb434088b9N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2920
    • C:\Users\Admin\AppData\Local\Temp\1a9bfc6a675e53b2e1fdd150f10aa3d1546b9c63540d0a2dc52113cb434088b9N.exe
      C:\Users\Admin\AppData\Local\Temp\1a9bfc6a675e53b2e1fdd150f10aa3d1546b9c63540d0a2dc52113cb434088b9N.exe startC:\Program Files (x86)\LP\AF03\82B.exe%C:\Program Files (x86)\LP\AF03
      2⤵
        PID:2756
      • C:\Users\Admin\AppData\Local\Temp\1a9bfc6a675e53b2e1fdd150f10aa3d1546b9c63540d0a2dc52113cb434088b9N.exe
        C:\Users\Admin\AppData\Local\Temp\1a9bfc6a675e53b2e1fdd150f10aa3d1546b9c63540d0a2dc52113cb434088b9N.exe startC:\Users\Admin\AppData\Roaming\3CB59\EC9AF.exe%C:\Users\Admin\AppData\Roaming\3CB59
        2⤵
          PID:2280

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\3CB59\9BC5.CB5

        Filesize

        996B

        MD5

        36f6b59a284dfb1c858baaad1ff98501

        SHA1

        1b8417515226e033bf20d8ececfd4095feaaa28c

        SHA256

        ff386669bbea6035b703cf813b21d7b343e699b71bcb1f5ccac22971d9f4159e

        SHA512

        0f4e5d5032c4041e12e6d3a4573de9bcae3806af21595e6dc51651dfaf58b14770a56964adf93bd9107582992a9c7211964db5dd32adbd9940ef7f870df425e2

      • C:\Users\Admin\AppData\Roaming\3CB59\9BC5.CB5

        Filesize

        600B

        MD5

        cbf09a7ed59dbba39a861d5eb61514f2

        SHA1

        b40cc4dec6880f29f693e84b7ca6c79462445aa6

        SHA256

        ed754fc4c7159892249175301e56a710533c3526df962fba134166fb4d09a899

        SHA512

        14c8d06f63806b8403f50a4f34fa0b79abb3c0305e1df613e03f0d5ff1315bdad5564e3f22f322012d8632bc05c5e1f84d8e83dda0377a7fb2949a9d7e934299

      • C:\Users\Admin\AppData\Roaming\3CB59\9BC5.CB5

        Filesize

        1KB

        MD5

        0ef4df8f9640b7186174c320fa072fe8

        SHA1

        1405cc6d7c0442a98641a5802c7798f2ddb0c952

        SHA256

        5204adab41b3a8c4112f4d4991f3e8d3552b7e87dee3dc44ab66301f5bf18379

        SHA512

        fb53bfb5405ea15ed2fadb6df974939a8ea08dda319b10a520df186c5cb8457ff564ea517e6fd915678d6003c5072dd2b49c1fcfb2dacf88be5475eb67794763

      • memory/2280-129-0x0000000000400000-0x0000000000454000-memory.dmp

        Filesize

        336KB

      • memory/2280-127-0x0000000000400000-0x0000000000454000-memory.dmp

        Filesize

        336KB

      • memory/2756-13-0x0000000000400000-0x0000000000454000-memory.dmp

        Filesize

        336KB

      • memory/2756-15-0x0000000000400000-0x0000000000454000-memory.dmp

        Filesize

        336KB

      • memory/2920-17-0x0000000000400000-0x0000000000452000-memory.dmp

        Filesize

        328KB

      • memory/2920-16-0x0000000000400000-0x0000000000454000-memory.dmp

        Filesize

        336KB

      • memory/2920-0-0x0000000000400000-0x0000000000454000-memory.dmp

        Filesize

        336KB

      • memory/2920-3-0x0000000000400000-0x0000000000454000-memory.dmp

        Filesize

        336KB

      • memory/2920-2-0x0000000000400000-0x0000000000452000-memory.dmp

        Filesize

        328KB

      • memory/2920-312-0x0000000000400000-0x0000000000454000-memory.dmp

        Filesize

        336KB