Analysis
-
max time kernel
111s -
max time network
90s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
02-02-2025 06:19
Static task
static1
Behavioral task
behavioral1
Sample
6061e1667bdb5299cdc7ca7fa6b82641291d8e6a3cffe42077487400188b1a4fN.exe
Resource
win7-20240903-en
General
-
Target
6061e1667bdb5299cdc7ca7fa6b82641291d8e6a3cffe42077487400188b1a4fN.exe
-
Size
183KB
-
MD5
1e810f8abdfb7723631cce9584e0aa30
-
SHA1
371dbee5f957f0c753befd029ca1279c83889a62
-
SHA256
6061e1667bdb5299cdc7ca7fa6b82641291d8e6a3cffe42077487400188b1a4f
-
SHA512
684d94c81e329db2d222b18e1dc03a5b8f93d2899701b51bdc1d4cded93a77463c4f73bb535aacd6961d4bba2f15471cf71d2b57f3b737d4b70ce934821405b7
-
SSDEEP
3072:YengzC/YgWeTc+rCgiI0Qk9LFcuIiWq33YrK05saI9PB7TOcgZ7rQSJIhtm:YenoC/YgtTcKCzIbgJlaqYJCtxbFb
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral2/memory/3432-12-0x0000000000400000-0x0000000000454000-memory.dmp family_cycbot behavioral2/memory/4596-13-0x0000000000400000-0x0000000000451000-memory.dmp family_cycbot behavioral2/memory/4596-14-0x0000000000400000-0x0000000000454000-memory.dmp family_cycbot behavioral2/memory/4996-77-0x0000000000400000-0x0000000000454000-memory.dmp family_cycbot behavioral2/memory/4596-176-0x0000000000400000-0x0000000000454000-memory.dmp family_cycbot -
resource yara_rule behavioral2/memory/4596-2-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral2/memory/3432-11-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral2/memory/3432-12-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral2/memory/4596-13-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/4596-14-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral2/memory/4996-76-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral2/memory/4996-77-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral2/memory/4596-176-0x0000000000400000-0x0000000000454000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6061e1667bdb5299cdc7ca7fa6b82641291d8e6a3cffe42077487400188b1a4fN.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4596 wrote to memory of 3432 4596 6061e1667bdb5299cdc7ca7fa6b82641291d8e6a3cffe42077487400188b1a4fN.exe 84 PID 4596 wrote to memory of 3432 4596 6061e1667bdb5299cdc7ca7fa6b82641291d8e6a3cffe42077487400188b1a4fN.exe 84 PID 4596 wrote to memory of 3432 4596 6061e1667bdb5299cdc7ca7fa6b82641291d8e6a3cffe42077487400188b1a4fN.exe 84 PID 4596 wrote to memory of 4996 4596 6061e1667bdb5299cdc7ca7fa6b82641291d8e6a3cffe42077487400188b1a4fN.exe 86 PID 4596 wrote to memory of 4996 4596 6061e1667bdb5299cdc7ca7fa6b82641291d8e6a3cffe42077487400188b1a4fN.exe 86 PID 4596 wrote to memory of 4996 4596 6061e1667bdb5299cdc7ca7fa6b82641291d8e6a3cffe42077487400188b1a4fN.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\6061e1667bdb5299cdc7ca7fa6b82641291d8e6a3cffe42077487400188b1a4fN.exe"C:\Users\Admin\AppData\Local\Temp\6061e1667bdb5299cdc7ca7fa6b82641291d8e6a3cffe42077487400188b1a4fN.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4596 -
C:\Users\Admin\AppData\Local\Temp\6061e1667bdb5299cdc7ca7fa6b82641291d8e6a3cffe42077487400188b1a4fN.exeC:\Users\Admin\AppData\Local\Temp\6061e1667bdb5299cdc7ca7fa6b82641291d8e6a3cffe42077487400188b1a4fN.exe startC:\Program Files (x86)\LP\B966\F53.exe%C:\Program Files (x86)\LP\B9662⤵PID:3432
-
-
C:\Users\Admin\AppData\Local\Temp\6061e1667bdb5299cdc7ca7fa6b82641291d8e6a3cffe42077487400188b1a4fN.exeC:\Users\Admin\AppData\Local\Temp\6061e1667bdb5299cdc7ca7fa6b82641291d8e6a3cffe42077487400188b1a4fN.exe startC:\Users\Admin\AppData\Roaming\62914\E54B9.exe%C:\Users\Admin\AppData\Roaming\629142⤵PID:4996
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5b0899cbee3bab1ac1f560fc5a238e29b
SHA1b38ca7c96248bccfb332af4a4d17c8e440e4a86e
SHA256fe13b4229aa3688adac23cb0af7cd34f65e8237cf15568c167d2b52e09c2ab06
SHA512b2bb9101c9e7c63b678ad348ab68e3baf483b6cc4843166dbcd3eb52771bc641cf1c8968f49025a0070f064fa2b8873aa95eddc127e8fa1eb18a6c790b5b71a3
-
Filesize
600B
MD5685883e9055fbfb4e818733fe89f5d33
SHA13e64c2508b26452a1138dcff259d00a1c5fad219
SHA256abbdd341bebabfad3bc906258ac2cee5f4917d0c687737c6ac61e70c5efb8c19
SHA5124cc164f58856966b0ae10c5593dadc1c350441f2e96f837ab00014da09b33a80041f128663f6fd4237189e66bc1ffebe5d21d14d49e6265f86b4bf888c033067
-
Filesize
996B
MD5cbcd603301415a0abf54857951909660
SHA1d0920c28b471d0e1de2a6134bc5acd5e15e98398
SHA256a04016765a187cb4c9f387ddfdeea738be6c0b0551bad7d65901c14266797e9c
SHA512766bcec85279def675fcff89a805cef566a8e19e6073995d8f6e3d47edbe863d5b6c5eb648f0acd1b1e831dda336d31d57915d192e720ffcff2128b477b81043