Analysis

  • max time kernel
    113s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250129-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-02-2025 18:06

General

  • Target

    dc1552f07b340b6429f306909bfe7d8676ed6e96e6963d0ad51b0002b8e2bfcd.exe

  • Size

    183KB

  • MD5

    ffba4d3836584b69e0e2e678a6810896

  • SHA1

    e9f63a17c22460537d35d81bf5fb6c258b578d53

  • SHA256

    dc1552f07b340b6429f306909bfe7d8676ed6e96e6963d0ad51b0002b8e2bfcd

  • SHA512

    f1502bea8f80209f2db22ec02ecb89de554b7d72e5a8afbd36df4f6369d040feb90f842abc39ca35712cdde0995cdac8bad175e40b4ed26f5d899f2eefc9c4c9

  • SSDEEP

    3072:YengzC/YgWeTc+rCgiI0Qk9LFcuIiWq33YrK05saI9PB7TOcgZ7rQSJIhtm4:YenoC/YgtTcKCzIbgJlaqYJCtxbFbN

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 5 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dc1552f07b340b6429f306909bfe7d8676ed6e96e6963d0ad51b0002b8e2bfcd.exe
    "C:\Users\Admin\AppData\Local\Temp\dc1552f07b340b6429f306909bfe7d8676ed6e96e6963d0ad51b0002b8e2bfcd.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3568
    • C:\Users\Admin\AppData\Local\Temp\dc1552f07b340b6429f306909bfe7d8676ed6e96e6963d0ad51b0002b8e2bfcd.exe
      C:\Users\Admin\AppData\Local\Temp\dc1552f07b340b6429f306909bfe7d8676ed6e96e6963d0ad51b0002b8e2bfcd.exe startC:\Program Files (x86)\LP\4255\F21.exe%C:\Program Files (x86)\LP\4255
      2⤵
        PID:4440
      • C:\Users\Admin\AppData\Local\Temp\dc1552f07b340b6429f306909bfe7d8676ed6e96e6963d0ad51b0002b8e2bfcd.exe
        C:\Users\Admin\AppData\Local\Temp\dc1552f07b340b6429f306909bfe7d8676ed6e96e6963d0ad51b0002b8e2bfcd.exe startC:\Users\Admin\AppData\Roaming\5F948\30C42.exe%C:\Users\Admin\AppData\Roaming\5F948
        2⤵
          PID:2212

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\5F948\83FB.F94

        Filesize

        1KB

        MD5

        0620721a6582bee2fe7b44415d905d73

        SHA1

        b37e1a6b4d97e8452735e67cc7ef2fdc1ff86a6a

        SHA256

        80c68398b6c5daed160e14f14daee643ac6b18c207a306cabe9a6fae515c041c

        SHA512

        5b7635b702241d6754f9dd0cf4eff9015d55f613d9cb1b4775cb393863ec1398b2d42ec6133af2e237d575141d41e6cd034a215ab5e73a4f9b6149ba8856b749

      • C:\Users\Admin\AppData\Roaming\5F948\83FB.F94

        Filesize

        600B

        MD5

        6a00d92806a9c0d5153b4aa79ae309af

        SHA1

        c3b690629b65d4e4cd38b6ca2db49f2085bfbd95

        SHA256

        16004eb5e593d0f2cf823b5b372aa1cdebca0942a2cf041a666cbca45695e719

        SHA512

        11c4ee033208a13fe947dc658c55f71fb8011f9f1e1e75eb24cb706aabde99757a72cb0e527a910cb702045cb162c433cee4f5db632fd9d88ccfcc47b7d866dc

      • C:\Users\Admin\AppData\Roaming\5F948\83FB.F94

        Filesize

        996B

        MD5

        10c3c0b249ec202b1558bfec18070cde

        SHA1

        981361dba40fd7a48d9d4666726e4914f75043d6

        SHA256

        d98e5f3b8217907a9be40cec32e6dd712f1ece81f7e9b2e69fd89e6f26e5ba13

        SHA512

        f3805e35f9a8a68e218bcb069cc9530c4cf0f892e0e0ff390c980d95b4c069702ae76adeae0b8e1268aac50fea11f0c2bf27f2504d8ad792ff2ba038a5778a5b

      • memory/2212-79-0x0000000000400000-0x0000000000454000-memory.dmp

        Filesize

        336KB

      • memory/2212-78-0x0000000000400000-0x0000000000454000-memory.dmp

        Filesize

        336KB

      • memory/2212-77-0x0000000000400000-0x0000000000454000-memory.dmp

        Filesize

        336KB

      • memory/3568-13-0x0000000000400000-0x0000000000451000-memory.dmp

        Filesize

        324KB

      • memory/3568-14-0x0000000000400000-0x0000000000454000-memory.dmp

        Filesize

        336KB

      • memory/3568-1-0x0000000000400000-0x0000000000451000-memory.dmp

        Filesize

        324KB

      • memory/3568-2-0x0000000000400000-0x0000000000454000-memory.dmp

        Filesize

        336KB

      • memory/3568-180-0x0000000000400000-0x0000000000454000-memory.dmp

        Filesize

        336KB

      • memory/4440-12-0x0000000000400000-0x0000000000454000-memory.dmp

        Filesize

        336KB

      • memory/4440-11-0x0000000000400000-0x0000000000454000-memory.dmp

        Filesize

        336KB