Analysis
-
max time kernel
110s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2025 14:46
Static task
static1
Behavioral task
behavioral1
Sample
1671eb7f8d0c0ba52b3dc8247e1b4f6fe21cc279eff0c671fd399c7a69460ff9N.exe
Resource
win7-20240903-en
General
-
Target
1671eb7f8d0c0ba52b3dc8247e1b4f6fe21cc279eff0c671fd399c7a69460ff9N.exe
-
Size
187KB
-
MD5
be440b21677ceac9aa978b2a6a773fa0
-
SHA1
d089628b91e710d9248caedd8460140498bb8346
-
SHA256
1671eb7f8d0c0ba52b3dc8247e1b4f6fe21cc279eff0c671fd399c7a69460ff9
-
SHA512
54b02e9d216b1e974496665429de3d6e5e4b61254fa81bbbf9ac59b53f4bd04576a97cb94ebc7da86b37e9a7ec27065b43bb3581e5b2f572717074d6fcd5d8cd
-
SSDEEP
3072:e16lfu9h227EdUDG1EGJAA2boHMLaIWP9bw6QwtzoK1xqKEnqlHhn:e1Gu9pP6AA2bVLaIWlRhTqKEWHh
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral2/memory/4568-10-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral2/memory/2604-11-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral2/memory/2604-12-0x0000000000400000-0x0000000000452000-memory.dmp family_cycbot behavioral2/memory/3276-105-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral2/memory/2604-268-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot -
resource yara_rule behavioral2/memory/2604-2-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral2/memory/4568-8-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral2/memory/4568-10-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral2/memory/2604-11-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral2/memory/2604-12-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral2/memory/3276-105-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral2/memory/2604-268-0x0000000000400000-0x0000000000455000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1671eb7f8d0c0ba52b3dc8247e1b4f6fe21cc279eff0c671fd399c7a69460ff9N.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2604 wrote to memory of 4568 2604 1671eb7f8d0c0ba52b3dc8247e1b4f6fe21cc279eff0c671fd399c7a69460ff9N.exe 82 PID 2604 wrote to memory of 4568 2604 1671eb7f8d0c0ba52b3dc8247e1b4f6fe21cc279eff0c671fd399c7a69460ff9N.exe 82 PID 2604 wrote to memory of 4568 2604 1671eb7f8d0c0ba52b3dc8247e1b4f6fe21cc279eff0c671fd399c7a69460ff9N.exe 82 PID 2604 wrote to memory of 3276 2604 1671eb7f8d0c0ba52b3dc8247e1b4f6fe21cc279eff0c671fd399c7a69460ff9N.exe 87 PID 2604 wrote to memory of 3276 2604 1671eb7f8d0c0ba52b3dc8247e1b4f6fe21cc279eff0c671fd399c7a69460ff9N.exe 87 PID 2604 wrote to memory of 3276 2604 1671eb7f8d0c0ba52b3dc8247e1b4f6fe21cc279eff0c671fd399c7a69460ff9N.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\1671eb7f8d0c0ba52b3dc8247e1b4f6fe21cc279eff0c671fd399c7a69460ff9N.exe"C:\Users\Admin\AppData\Local\Temp\1671eb7f8d0c0ba52b3dc8247e1b4f6fe21cc279eff0c671fd399c7a69460ff9N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Users\Admin\AppData\Local\Temp\1671eb7f8d0c0ba52b3dc8247e1b4f6fe21cc279eff0c671fd399c7a69460ff9N.exeC:\Users\Admin\AppData\Local\Temp\1671eb7f8d0c0ba52b3dc8247e1b4f6fe21cc279eff0c671fd399c7a69460ff9N.exe startC:\Program Files (x86)\LP\49FC\9EA.exe%C:\Program Files (x86)\LP\49FC2⤵PID:4568
-
-
C:\Users\Admin\AppData\Local\Temp\1671eb7f8d0c0ba52b3dc8247e1b4f6fe21cc279eff0c671fd399c7a69460ff9N.exeC:\Users\Admin\AppData\Local\Temp\1671eb7f8d0c0ba52b3dc8247e1b4f6fe21cc279eff0c671fd399c7a69460ff9N.exe startC:\Users\Admin\AppData\Roaming\C8571\07D49.exe%C:\Users\Admin\AppData\Roaming\C85712⤵PID:3276
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
696B
MD572357400efa693952e376b4747cedfe1
SHA1255b7e0e572a61584a2619b535543306d75aa8f4
SHA25644d1797666017041fc1172ad4e46aa284e34fb0363c660517771ad2545e82208
SHA51201be83b29f59334b8c23d397e3c9e64dbbdb9d0531b6ad462ec972e1e5de768571d4362b7d94955b2e2d94ef7033662d3e5d004f96a4d272e377d2863a194132
-
Filesize
300B
MD50b1cf1fd653b5326d0ea6ce8ba54b219
SHA1c07ca48c39f7f085fb60cec420cd5be4dd253909
SHA256b9904ac6303294cc80a33dc65ce27c8d25739f6c5e3813c41d2ec3ced42283ad
SHA512465b69cf44bbb2e45979cd57898707ec7f12c71846e6f61fd17ce5537b607b1147c36de49d172977e5328881f3c730413095450bcba4c061a10435f43ef514ed
-
Filesize
1KB
MD5b46e4557ea421bc82e2568044bbef22d
SHA16460617b7db3df657990ad2f6ab9dfdfd3d35601
SHA2563d0c3255eb59384b7bc869074190a6ebf8866605e539f33204c4ad1dca2dc2de
SHA51290a85bb91b5e173db02a769d195ef0828aeab143741c1fcaf884fdb9e9b494edc49d1175fe70026d0ae9b2f826e581e3d91b2d40dbe11828fe0b39b6c411fda9