Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-01-2025 14:46
Static task
static1
Behavioral task
behavioral1
Sample
1671eb7f8d0c0ba52b3dc8247e1b4f6fe21cc279eff0c671fd399c7a69460ff9N.exe
Resource
win7-20240903-en
General
-
Target
1671eb7f8d0c0ba52b3dc8247e1b4f6fe21cc279eff0c671fd399c7a69460ff9N.exe
-
Size
187KB
-
MD5
be440b21677ceac9aa978b2a6a773fa0
-
SHA1
d089628b91e710d9248caedd8460140498bb8346
-
SHA256
1671eb7f8d0c0ba52b3dc8247e1b4f6fe21cc279eff0c671fd399c7a69460ff9
-
SHA512
54b02e9d216b1e974496665429de3d6e5e4b61254fa81bbbf9ac59b53f4bd04576a97cb94ebc7da86b37e9a7ec27065b43bb3581e5b2f572717074d6fcd5d8cd
-
SSDEEP
3072:e16lfu9h227EdUDG1EGJAA2boHMLaIWP9bw6QwtzoK1xqKEnqlHhn:e1Gu9pP6AA2bVLaIWlRhTqKEWHh
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2896-10-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral1/memory/2432-11-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral1/memory/2432-12-0x0000000000400000-0x0000000000452000-memory.dmp family_cycbot behavioral1/memory/1396-113-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral1/memory/2432-292-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot -
resource yara_rule behavioral1/memory/2432-2-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2896-10-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2896-8-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2432-11-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2432-12-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral1/memory/1396-113-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2432-292-0x0000000000400000-0x0000000000455000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1671eb7f8d0c0ba52b3dc8247e1b4f6fe21cc279eff0c671fd399c7a69460ff9N.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2432 wrote to memory of 2896 2432 1671eb7f8d0c0ba52b3dc8247e1b4f6fe21cc279eff0c671fd399c7a69460ff9N.exe 30 PID 2432 wrote to memory of 2896 2432 1671eb7f8d0c0ba52b3dc8247e1b4f6fe21cc279eff0c671fd399c7a69460ff9N.exe 30 PID 2432 wrote to memory of 2896 2432 1671eb7f8d0c0ba52b3dc8247e1b4f6fe21cc279eff0c671fd399c7a69460ff9N.exe 30 PID 2432 wrote to memory of 2896 2432 1671eb7f8d0c0ba52b3dc8247e1b4f6fe21cc279eff0c671fd399c7a69460ff9N.exe 30 PID 2432 wrote to memory of 1396 2432 1671eb7f8d0c0ba52b3dc8247e1b4f6fe21cc279eff0c671fd399c7a69460ff9N.exe 31 PID 2432 wrote to memory of 1396 2432 1671eb7f8d0c0ba52b3dc8247e1b4f6fe21cc279eff0c671fd399c7a69460ff9N.exe 31 PID 2432 wrote to memory of 1396 2432 1671eb7f8d0c0ba52b3dc8247e1b4f6fe21cc279eff0c671fd399c7a69460ff9N.exe 31 PID 2432 wrote to memory of 1396 2432 1671eb7f8d0c0ba52b3dc8247e1b4f6fe21cc279eff0c671fd399c7a69460ff9N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\1671eb7f8d0c0ba52b3dc8247e1b4f6fe21cc279eff0c671fd399c7a69460ff9N.exe"C:\Users\Admin\AppData\Local\Temp\1671eb7f8d0c0ba52b3dc8247e1b4f6fe21cc279eff0c671fd399c7a69460ff9N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Users\Admin\AppData\Local\Temp\1671eb7f8d0c0ba52b3dc8247e1b4f6fe21cc279eff0c671fd399c7a69460ff9N.exeC:\Users\Admin\AppData\Local\Temp\1671eb7f8d0c0ba52b3dc8247e1b4f6fe21cc279eff0c671fd399c7a69460ff9N.exe startC:\Program Files (x86)\LP\7E6A\747.exe%C:\Program Files (x86)\LP\7E6A2⤵PID:2896
-
-
C:\Users\Admin\AppData\Local\Temp\1671eb7f8d0c0ba52b3dc8247e1b4f6fe21cc279eff0c671fd399c7a69460ff9N.exeC:\Users\Admin\AppData\Local\Temp\1671eb7f8d0c0ba52b3dc8247e1b4f6fe21cc279eff0c671fd399c7a69460ff9N.exe startC:\Users\Admin\AppData\Roaming\AD424\D117E.exe%C:\Users\Admin\AppData\Roaming\AD4242⤵PID:1396
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
300B
MD59c1060ea9e399f7eacf805d3aa6c66f7
SHA10838dd56456275cf329686d9285cd5006f91b0a5
SHA25634f9bcb997597f97d6d36aee585d59adc5f48f299e5e31a7913f6a1186999753
SHA512e78f04994290367e69215803191da495d0d73707f2da4e97cb9788421dfa5c92ac956cfcb0290a4dabe00ec80e21e0caf6ac0f702e91d2b4b53b9df08b5524e1
-
Filesize
696B
MD5e4c22e474e5521681e238e48e8c634b2
SHA1f1cb5e5f354f083f321fe41f8b94603d19f04ab0
SHA2566d098a4270f8930d77dea942f52123faf38cb030cef0382953e66903d120b366
SHA5124c8680bbd88320f157e774159ca88a431645e1caf753cf0651adbee3dbd264b9c2dc60eb46eb4a00f47ad734ff2159156dba5699a3517bcabd734f01ee1ea421
-
Filesize
1KB
MD5b111e61b5b003e96afddad49f381c2c0
SHA1763717eef79fd2181c9036d8f81738e627334dcf
SHA2568f1054680d2dd4a432817a13568fc2b74efcce25a1ca8c56af07ff36f7a963bd
SHA51291ce269b451895d0da38b7d0ec15810d1f8b07a14c614c661cb6212f26268a0a14dca1187ac8612c225dd329f678faab766830fa71f9543adcfdd0e847415e35