Analysis
-
max time kernel
113s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
01-02-2025 18:06
Static task
static1
Behavioral task
behavioral1
Sample
dc1552f07b340b6429f306909bfe7d8676ed6e96e6963d0ad51b0002b8e2bfcd.exe
Resource
win7-20241010-en
General
-
Target
dc1552f07b340b6429f306909bfe7d8676ed6e96e6963d0ad51b0002b8e2bfcd.exe
-
Size
183KB
-
MD5
ffba4d3836584b69e0e2e678a6810896
-
SHA1
e9f63a17c22460537d35d81bf5fb6c258b578d53
-
SHA256
dc1552f07b340b6429f306909bfe7d8676ed6e96e6963d0ad51b0002b8e2bfcd
-
SHA512
f1502bea8f80209f2db22ec02ecb89de554b7d72e5a8afbd36df4f6369d040feb90f842abc39ca35712cdde0995cdac8bad175e40b4ed26f5d899f2eefc9c4c9
-
SSDEEP
3072:YengzC/YgWeTc+rCgiI0Qk9LFcuIiWq33YrK05saI9PB7TOcgZ7rQSJIhtm4:YenoC/YgtTcKCzIbgJlaqYJCtxbFbN
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral2/memory/4440-12-0x0000000000400000-0x0000000000454000-memory.dmp family_cycbot behavioral2/memory/3568-13-0x0000000000400000-0x0000000000451000-memory.dmp family_cycbot behavioral2/memory/3568-14-0x0000000000400000-0x0000000000454000-memory.dmp family_cycbot behavioral2/memory/2212-79-0x0000000000400000-0x0000000000454000-memory.dmp family_cycbot behavioral2/memory/3568-180-0x0000000000400000-0x0000000000454000-memory.dmp family_cycbot -
resource yara_rule behavioral2/memory/3568-2-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral2/memory/4440-11-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral2/memory/4440-12-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral2/memory/3568-13-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/3568-14-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral2/memory/2212-78-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral2/memory/2212-79-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral2/memory/3568-180-0x0000000000400000-0x0000000000454000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dc1552f07b340b6429f306909bfe7d8676ed6e96e6963d0ad51b0002b8e2bfcd.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3568 wrote to memory of 4440 3568 dc1552f07b340b6429f306909bfe7d8676ed6e96e6963d0ad51b0002b8e2bfcd.exe 85 PID 3568 wrote to memory of 4440 3568 dc1552f07b340b6429f306909bfe7d8676ed6e96e6963d0ad51b0002b8e2bfcd.exe 85 PID 3568 wrote to memory of 4440 3568 dc1552f07b340b6429f306909bfe7d8676ed6e96e6963d0ad51b0002b8e2bfcd.exe 85 PID 3568 wrote to memory of 2212 3568 dc1552f07b340b6429f306909bfe7d8676ed6e96e6963d0ad51b0002b8e2bfcd.exe 87 PID 3568 wrote to memory of 2212 3568 dc1552f07b340b6429f306909bfe7d8676ed6e96e6963d0ad51b0002b8e2bfcd.exe 87 PID 3568 wrote to memory of 2212 3568 dc1552f07b340b6429f306909bfe7d8676ed6e96e6963d0ad51b0002b8e2bfcd.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\dc1552f07b340b6429f306909bfe7d8676ed6e96e6963d0ad51b0002b8e2bfcd.exe"C:\Users\Admin\AppData\Local\Temp\dc1552f07b340b6429f306909bfe7d8676ed6e96e6963d0ad51b0002b8e2bfcd.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3568 -
C:\Users\Admin\AppData\Local\Temp\dc1552f07b340b6429f306909bfe7d8676ed6e96e6963d0ad51b0002b8e2bfcd.exeC:\Users\Admin\AppData\Local\Temp\dc1552f07b340b6429f306909bfe7d8676ed6e96e6963d0ad51b0002b8e2bfcd.exe startC:\Program Files (x86)\LP\4255\F21.exe%C:\Program Files (x86)\LP\42552⤵PID:4440
-
-
C:\Users\Admin\AppData\Local\Temp\dc1552f07b340b6429f306909bfe7d8676ed6e96e6963d0ad51b0002b8e2bfcd.exeC:\Users\Admin\AppData\Local\Temp\dc1552f07b340b6429f306909bfe7d8676ed6e96e6963d0ad51b0002b8e2bfcd.exe startC:\Users\Admin\AppData\Roaming\5F948\30C42.exe%C:\Users\Admin\AppData\Roaming\5F9482⤵PID:2212
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD50620721a6582bee2fe7b44415d905d73
SHA1b37e1a6b4d97e8452735e67cc7ef2fdc1ff86a6a
SHA25680c68398b6c5daed160e14f14daee643ac6b18c207a306cabe9a6fae515c041c
SHA5125b7635b702241d6754f9dd0cf4eff9015d55f613d9cb1b4775cb393863ec1398b2d42ec6133af2e237d575141d41e6cd034a215ab5e73a4f9b6149ba8856b749
-
Filesize
600B
MD56a00d92806a9c0d5153b4aa79ae309af
SHA1c3b690629b65d4e4cd38b6ca2db49f2085bfbd95
SHA25616004eb5e593d0f2cf823b5b372aa1cdebca0942a2cf041a666cbca45695e719
SHA51211c4ee033208a13fe947dc658c55f71fb8011f9f1e1e75eb24cb706aabde99757a72cb0e527a910cb702045cb162c433cee4f5db632fd9d88ccfcc47b7d866dc
-
Filesize
996B
MD510c3c0b249ec202b1558bfec18070cde
SHA1981361dba40fd7a48d9d4666726e4914f75043d6
SHA256d98e5f3b8217907a9be40cec32e6dd712f1ece81f7e9b2e69fd89e6f26e5ba13
SHA512f3805e35f9a8a68e218bcb069cc9530c4cf0f892e0e0ff390c980d95b4c069702ae76adeae0b8e1268aac50fea11f0c2bf27f2504d8ad792ff2ba038a5778a5b