Analysis
-
max time kernel
147s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230621-en -
resource tags
arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system -
submitted
03/07/2023, 02:00
Static task
static1
Behavioral task
behavioral1
Sample
f391d08d54d780a6bd967810caf3d649d1dd538db9232ebd3c4a20ea74476b57.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
f391d08d54d780a6bd967810caf3d649d1dd538db9232ebd3c4a20ea74476b57.exe
Resource
win10v2004-20230621-en
General
-
Target
f391d08d54d780a6bd967810caf3d649d1dd538db9232ebd3c4a20ea74476b57.exe
-
Size
176KB
-
MD5
d9eddda7d5612d8d06f776ad3a7b02d8
-
SHA1
6668d5182ead5ae508ad9b88315ad5c05ead300f
-
SHA256
f391d08d54d780a6bd967810caf3d649d1dd538db9232ebd3c4a20ea74476b57
-
SHA512
01f35c458b8a5c6e3fbc81650877a328142875eac9200404c426c2e7419b2e5cae0ad70591e3ee615902cba9587aac7c7aebeb4d6edbd258c0f631ff525f7e07
-
SSDEEP
3072:kf5xz1afMRJnVIQJWafmU+qMoDfHHZOSHq8VNb/wddl1Udze1Wigr+:6hrRJnVPfj1MUfZhHq++nUdze4igi
Malware Config
Extracted
mylobot
fywkuzp.ru:7432
zdrussle.ru:2173
pseyumd.ru:5492
stydodo.ru:2619
tqzknrx.com:1123
mdcqrxw.com:4984
tpwtgyw.com:9631
cnoyucn.com:9426
qhloury.com:4759
fnjxpwy.com:3863
csxpzlz.com:5778
wlkjopy.com:8778
mynfwwk.com:8427
uuitwxg.com:6656
agnxomu.com:8881
wcagsib.com:3547
fmniltb.com:9582
oapwxiu.com:3922
petrrry.com:7531
poubauo.com:4623
jlrylzw.com:4762
tjdqist.com:1155
ypynjxr.com:5388
uhelntm.com:4788
goaawik.com:8811
ncnijgb.com:7766
ugxbwjl.com:3739
paeitqb.com:1416
jxikhzp.com:3466
orfiiff.com:9941
mqwbebx.com:7563
dbggepx.com:9186
yscdptr.com:4597
qawggwk.com:4335
dbwrtps.com:9152
plziafl.com:8468
blgujzi.com:1473
xdtssuy.com:4499
hjzosou.com:6632
umxjept.com:5448
jsqahgh.com:6421
jtumdod.com:6425
knzuwpl.com:6262
dgpwxgw.com:6584
xruogma.com:1695
qnxhcqf.com:3236
rddlqgj.com:6812
wbcjlxn.com:2812
uqqgirw.com:2198
mkeamjf.com:3736
nwsztox.com:1788
ifmpdod.com:7381
uyuhthp.com:9686
yiaqewn.com:1265
upfijra.com:6772
jqizuas.com:3383
oxduwil.com:9178
wurhfah.com:6637
bcpbamn.com:1681
zjljapl.com:6718
ujebxum.com:3676
zrjtczf.com:4277
zjutffq.com:6963
bdlfrtt.com:2114
khasffr.com:3692
giktmlk.com:5532
emwtlmf.com:8954
lwbojdn.com:4363
tnclqjb.com:4584
hwzzhlz.com:1537
cceognr.com:9689
guegyro.com:4677
qjhimza.com:5329
hyiqppb.com:9925
sslpysi.com:1589
eahqyrh.com:7835
muaejwt.com:9766
atfwuia.com:8168
ffdswwi.com:9414
zziqxcn.com:7838
apbjhiu.com:4975
muuiaxf.com:2673
hihrfxy.com:9592
tpgwhtf.com:4889
kiajrcx.com:1787
cldbnzm.com:2871
gsjxycs.com:8294
brmgkod.com:1586
ocalflg.com:3261
nctpkes.com:5114
izgbroj.com:8774
scaurrn.com:4196
ahblatp.com:4559
cwefsaz.com:1283
syrpjbu.com:1968
jqlwhsl.com:5243
iypgdps.com:7311
logibrj.com:9426
ulqssaq.com:7863
uzhqgqr.com:2751
akpsxcf.com:3349
notwljg.com:2364
wiiarsk.com:1293
lgdlgqy.com:3546
eeakuno.net:3624
hpqxfes.net:8345
jfpfpmd.net:7752
ynazxcq.net:6325
uofiuzk.net:9221
xbkanjb.net:4862
jsojybj.net:6579
wpjbxsc.net:4859
pkhxopa.net:5719
ncrejzk.net:9193
giuwzmh.net:6815
zkaxxct.net:4237
xfceqzt.net:1322
hiixbda.net:3911
woicghe.net:9891
xxaautr.net:5642
fbteyne.net:8277
tsdcild.net:6444
ukznghq.net:3263
sjtkcrl.net:7242
qmheqsg.net:6522
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 692 vvivravi.exe 1120 vvivravi.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-922299981-3641064733-3870770889-1000\Software\Microsoft\Windows\CurrentVersion\Run cmd.exe Set value (str) \REGISTRY\USER\S-1-5-21-922299981-3641064733-3870770889-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tmokx = "C:\\Users\\Admin\\AppData\\Roaming\\gcvbcvrc\\vvivravi.exe딀" cmd.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1900 set thread context of 4132 1900 f391d08d54d780a6bd967810caf3d649d1dd538db9232ebd3c4a20ea74476b57.exe 88 PID 692 set thread context of 1120 692 vvivravi.exe 92 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 1284 taskmgr.exe 1284 taskmgr.exe 1284 taskmgr.exe 1284 taskmgr.exe 1284 taskmgr.exe 1284 taskmgr.exe 1284 taskmgr.exe 1284 taskmgr.exe 1284 taskmgr.exe 1284 taskmgr.exe 1284 taskmgr.exe 1284 taskmgr.exe 1284 taskmgr.exe 1284 taskmgr.exe 1284 taskmgr.exe 1284 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 1284 taskmgr.exe Token: SeSystemProfilePrivilege 1284 taskmgr.exe Token: SeCreateGlobalPrivilege 1284 taskmgr.exe Token: 33 1284 taskmgr.exe Token: SeIncBasePriorityPrivilege 1284 taskmgr.exe -
Suspicious use of FindShellTrayWindow 41 IoCs
pid Process 1284 taskmgr.exe 1284 taskmgr.exe 1284 taskmgr.exe 1284 taskmgr.exe 1284 taskmgr.exe 1284 taskmgr.exe 1284 taskmgr.exe 1284 taskmgr.exe 1284 taskmgr.exe 1284 taskmgr.exe 1284 taskmgr.exe 1284 taskmgr.exe 1284 taskmgr.exe 1284 taskmgr.exe 1284 taskmgr.exe 1284 taskmgr.exe 1284 taskmgr.exe 1284 taskmgr.exe 1284 taskmgr.exe 1284 taskmgr.exe 1284 taskmgr.exe 1284 taskmgr.exe 1284 taskmgr.exe 1284 taskmgr.exe 1284 taskmgr.exe 1284 taskmgr.exe 1284 taskmgr.exe 1284 taskmgr.exe 1284 taskmgr.exe 1284 taskmgr.exe 1284 taskmgr.exe 1284 taskmgr.exe 1284 taskmgr.exe 1284 taskmgr.exe 1284 taskmgr.exe 1284 taskmgr.exe 1284 taskmgr.exe 1284 taskmgr.exe 1284 taskmgr.exe 1284 taskmgr.exe 1284 taskmgr.exe -
Suspicious use of SendNotifyMessage 41 IoCs
pid Process 1284 taskmgr.exe 1284 taskmgr.exe 1284 taskmgr.exe 1284 taskmgr.exe 1284 taskmgr.exe 1284 taskmgr.exe 1284 taskmgr.exe 1284 taskmgr.exe 1284 taskmgr.exe 1284 taskmgr.exe 1284 taskmgr.exe 1284 taskmgr.exe 1284 taskmgr.exe 1284 taskmgr.exe 1284 taskmgr.exe 1284 taskmgr.exe 1284 taskmgr.exe 1284 taskmgr.exe 1284 taskmgr.exe 1284 taskmgr.exe 1284 taskmgr.exe 1284 taskmgr.exe 1284 taskmgr.exe 1284 taskmgr.exe 1284 taskmgr.exe 1284 taskmgr.exe 1284 taskmgr.exe 1284 taskmgr.exe 1284 taskmgr.exe 1284 taskmgr.exe 1284 taskmgr.exe 1284 taskmgr.exe 1284 taskmgr.exe 1284 taskmgr.exe 1284 taskmgr.exe 1284 taskmgr.exe 1284 taskmgr.exe 1284 taskmgr.exe 1284 taskmgr.exe 1284 taskmgr.exe 1284 taskmgr.exe -
Suspicious use of WriteProcessMemory 37 IoCs
description pid Process procid_target PID 1900 wrote to memory of 4132 1900 f391d08d54d780a6bd967810caf3d649d1dd538db9232ebd3c4a20ea74476b57.exe 88 PID 1900 wrote to memory of 4132 1900 f391d08d54d780a6bd967810caf3d649d1dd538db9232ebd3c4a20ea74476b57.exe 88 PID 1900 wrote to memory of 4132 1900 f391d08d54d780a6bd967810caf3d649d1dd538db9232ebd3c4a20ea74476b57.exe 88 PID 1900 wrote to memory of 4132 1900 f391d08d54d780a6bd967810caf3d649d1dd538db9232ebd3c4a20ea74476b57.exe 88 PID 1900 wrote to memory of 4132 1900 f391d08d54d780a6bd967810caf3d649d1dd538db9232ebd3c4a20ea74476b57.exe 88 PID 1900 wrote to memory of 4132 1900 f391d08d54d780a6bd967810caf3d649d1dd538db9232ebd3c4a20ea74476b57.exe 88 PID 1900 wrote to memory of 4132 1900 f391d08d54d780a6bd967810caf3d649d1dd538db9232ebd3c4a20ea74476b57.exe 88 PID 1900 wrote to memory of 4132 1900 f391d08d54d780a6bd967810caf3d649d1dd538db9232ebd3c4a20ea74476b57.exe 88 PID 1900 wrote to memory of 4132 1900 f391d08d54d780a6bd967810caf3d649d1dd538db9232ebd3c4a20ea74476b57.exe 88 PID 1900 wrote to memory of 4132 1900 f391d08d54d780a6bd967810caf3d649d1dd538db9232ebd3c4a20ea74476b57.exe 88 PID 4132 wrote to memory of 692 4132 f391d08d54d780a6bd967810caf3d649d1dd538db9232ebd3c4a20ea74476b57.exe 89 PID 4132 wrote to memory of 692 4132 f391d08d54d780a6bd967810caf3d649d1dd538db9232ebd3c4a20ea74476b57.exe 89 PID 4132 wrote to memory of 692 4132 f391d08d54d780a6bd967810caf3d649d1dd538db9232ebd3c4a20ea74476b57.exe 89 PID 692 wrote to memory of 1120 692 vvivravi.exe 92 PID 692 wrote to memory of 1120 692 vvivravi.exe 92 PID 692 wrote to memory of 1120 692 vvivravi.exe 92 PID 692 wrote to memory of 1120 692 vvivravi.exe 92 PID 692 wrote to memory of 1120 692 vvivravi.exe 92 PID 692 wrote to memory of 1120 692 vvivravi.exe 92 PID 692 wrote to memory of 1120 692 vvivravi.exe 92 PID 692 wrote to memory of 1120 692 vvivravi.exe 92 PID 692 wrote to memory of 1120 692 vvivravi.exe 92 PID 692 wrote to memory of 1120 692 vvivravi.exe 92 PID 1120 wrote to memory of 4872 1120 vvivravi.exe 93 PID 1120 wrote to memory of 4872 1120 vvivravi.exe 93 PID 1120 wrote to memory of 4872 1120 vvivravi.exe 93 PID 1120 wrote to memory of 4872 1120 vvivravi.exe 93 PID 1120 wrote to memory of 4872 1120 vvivravi.exe 93 PID 1120 wrote to memory of 4872 1120 vvivravi.exe 93 PID 1120 wrote to memory of 4872 1120 vvivravi.exe 93 PID 4872 wrote to memory of 3680 4872 cmd.exe 95 PID 4872 wrote to memory of 3680 4872 cmd.exe 95 PID 4872 wrote to memory of 3680 4872 cmd.exe 95 PID 4872 wrote to memory of 3680 4872 cmd.exe 95 PID 4872 wrote to memory of 3680 4872 cmd.exe 95 PID 4872 wrote to memory of 3680 4872 cmd.exe 95 PID 4872 wrote to memory of 3680 4872 cmd.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\f391d08d54d780a6bd967810caf3d649d1dd538db9232ebd3c4a20ea74476b57.exe"C:\Users\Admin\AppData\Local\Temp\f391d08d54d780a6bd967810caf3d649d1dd538db9232ebd3c4a20ea74476b57.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Users\Admin\AppData\Local\Temp\f391d08d54d780a6bd967810caf3d649d1dd538db9232ebd3c4a20ea74476b57.exe"C:\Users\Admin\AppData\Local\Temp\f391d08d54d780a6bd967810caf3d649d1dd538db9232ebd3c4a20ea74476b57.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4132 -
C:\Users\Admin\AppData\Roaming\gcvbcvrc\vvivravi.exe"C:\Users\Admin\AppData\Roaming\gcvbcvrc\vvivravi.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:692 -
C:\Users\Admin\AppData\Roaming\gcvbcvrc\vvivravi.exe"C:\Users\Admin\AppData\Roaming\gcvbcvrc\vvivravi.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"5⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4872 -
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"6⤵PID:3680
-
-
-
-
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /71⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1284
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
176KB
MD5d9eddda7d5612d8d06f776ad3a7b02d8
SHA16668d5182ead5ae508ad9b88315ad5c05ead300f
SHA256f391d08d54d780a6bd967810caf3d649d1dd538db9232ebd3c4a20ea74476b57
SHA51201f35c458b8a5c6e3fbc81650877a328142875eac9200404c426c2e7419b2e5cae0ad70591e3ee615902cba9587aac7c7aebeb4d6edbd258c0f631ff525f7e07
-
Filesize
176KB
MD5d9eddda7d5612d8d06f776ad3a7b02d8
SHA16668d5182ead5ae508ad9b88315ad5c05ead300f
SHA256f391d08d54d780a6bd967810caf3d649d1dd538db9232ebd3c4a20ea74476b57
SHA51201f35c458b8a5c6e3fbc81650877a328142875eac9200404c426c2e7419b2e5cae0ad70591e3ee615902cba9587aac7c7aebeb4d6edbd258c0f631ff525f7e07
-
Filesize
176KB
MD5d9eddda7d5612d8d06f776ad3a7b02d8
SHA16668d5182ead5ae508ad9b88315ad5c05ead300f
SHA256f391d08d54d780a6bd967810caf3d649d1dd538db9232ebd3c4a20ea74476b57
SHA51201f35c458b8a5c6e3fbc81650877a328142875eac9200404c426c2e7419b2e5cae0ad70591e3ee615902cba9587aac7c7aebeb4d6edbd258c0f631ff525f7e07