Analysis

  • max time kernel
    111s
  • max time network
    90s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250129-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-02-2025 06:19

General

  • Target

    6061e1667bdb5299cdc7ca7fa6b82641291d8e6a3cffe42077487400188b1a4fN.exe

  • Size

    183KB

  • MD5

    1e810f8abdfb7723631cce9584e0aa30

  • SHA1

    371dbee5f957f0c753befd029ca1279c83889a62

  • SHA256

    6061e1667bdb5299cdc7ca7fa6b82641291d8e6a3cffe42077487400188b1a4f

  • SHA512

    684d94c81e329db2d222b18e1dc03a5b8f93d2899701b51bdc1d4cded93a77463c4f73bb535aacd6961d4bba2f15471cf71d2b57f3b737d4b70ce934821405b7

  • SSDEEP

    3072:YengzC/YgWeTc+rCgiI0Qk9LFcuIiWq33YrK05saI9PB7TOcgZ7rQSJIhtm:YenoC/YgtTcKCzIbgJlaqYJCtxbFb

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 5 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6061e1667bdb5299cdc7ca7fa6b82641291d8e6a3cffe42077487400188b1a4fN.exe
    "C:\Users\Admin\AppData\Local\Temp\6061e1667bdb5299cdc7ca7fa6b82641291d8e6a3cffe42077487400188b1a4fN.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4596
    • C:\Users\Admin\AppData\Local\Temp\6061e1667bdb5299cdc7ca7fa6b82641291d8e6a3cffe42077487400188b1a4fN.exe
      C:\Users\Admin\AppData\Local\Temp\6061e1667bdb5299cdc7ca7fa6b82641291d8e6a3cffe42077487400188b1a4fN.exe startC:\Program Files (x86)\LP\B966\F53.exe%C:\Program Files (x86)\LP\B966
      2⤵
        PID:3432
      • C:\Users\Admin\AppData\Local\Temp\6061e1667bdb5299cdc7ca7fa6b82641291d8e6a3cffe42077487400188b1a4fN.exe
        C:\Users\Admin\AppData\Local\Temp\6061e1667bdb5299cdc7ca7fa6b82641291d8e6a3cffe42077487400188b1a4fN.exe startC:\Users\Admin\AppData\Roaming\62914\E54B9.exe%C:\Users\Admin\AppData\Roaming\62914
        2⤵
          PID:4996

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\62914\4454.291

        Filesize

        1KB

        MD5

        b0899cbee3bab1ac1f560fc5a238e29b

        SHA1

        b38ca7c96248bccfb332af4a4d17c8e440e4a86e

        SHA256

        fe13b4229aa3688adac23cb0af7cd34f65e8237cf15568c167d2b52e09c2ab06

        SHA512

        b2bb9101c9e7c63b678ad348ab68e3baf483b6cc4843166dbcd3eb52771bc641cf1c8968f49025a0070f064fa2b8873aa95eddc127e8fa1eb18a6c790b5b71a3

      • C:\Users\Admin\AppData\Roaming\62914\4454.291

        Filesize

        600B

        MD5

        685883e9055fbfb4e818733fe89f5d33

        SHA1

        3e64c2508b26452a1138dcff259d00a1c5fad219

        SHA256

        abbdd341bebabfad3bc906258ac2cee5f4917d0c687737c6ac61e70c5efb8c19

        SHA512

        4cc164f58856966b0ae10c5593dadc1c350441f2e96f837ab00014da09b33a80041f128663f6fd4237189e66bc1ffebe5d21d14d49e6265f86b4bf888c033067

      • C:\Users\Admin\AppData\Roaming\62914\4454.291

        Filesize

        996B

        MD5

        cbcd603301415a0abf54857951909660

        SHA1

        d0920c28b471d0e1de2a6134bc5acd5e15e98398

        SHA256

        a04016765a187cb4c9f387ddfdeea738be6c0b0551bad7d65901c14266797e9c

        SHA512

        766bcec85279def675fcff89a805cef566a8e19e6073995d8f6e3d47edbe863d5b6c5eb648f0acd1b1e831dda336d31d57915d192e720ffcff2128b477b81043

      • memory/3432-12-0x0000000000400000-0x0000000000454000-memory.dmp

        Filesize

        336KB

      • memory/3432-11-0x0000000000400000-0x0000000000454000-memory.dmp

        Filesize

        336KB

      • memory/4596-13-0x0000000000400000-0x0000000000451000-memory.dmp

        Filesize

        324KB

      • memory/4596-14-0x0000000000400000-0x0000000000454000-memory.dmp

        Filesize

        336KB

      • memory/4596-1-0x0000000000400000-0x0000000000451000-memory.dmp

        Filesize

        324KB

      • memory/4596-2-0x0000000000400000-0x0000000000454000-memory.dmp

        Filesize

        336KB

      • memory/4596-176-0x0000000000400000-0x0000000000454000-memory.dmp

        Filesize

        336KB

      • memory/4996-76-0x0000000000400000-0x0000000000454000-memory.dmp

        Filesize

        336KB

      • memory/4996-75-0x0000000000400000-0x0000000000454000-memory.dmp

        Filesize

        336KB

      • memory/4996-77-0x0000000000400000-0x0000000000454000-memory.dmp

        Filesize

        336KB