Analysis
-
max time kernel
27s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
14-08-2023 17:04
Behavioral task
behavioral1
Sample
a41daba8424dc768e8591846a0cf334807bc6a05c712e8a13b7e1bf98b341560.exe
Resource
win7-20230712-en
General
-
Target
a41daba8424dc768e8591846a0cf334807bc6a05c712e8a13b7e1bf98b341560.exe
-
Size
36KB
-
MD5
5f2aff67459bfdb75f1dd51f3a2b380f
-
SHA1
9939563ac43b09fbcca6ca32630084df55e07746
-
SHA256
a41daba8424dc768e8591846a0cf334807bc6a05c712e8a13b7e1bf98b341560
-
SHA512
6e2acb78db850ba82b0e37f4d70196c908316b28f6bda565ae086292b48bab513860fffc2f1970fbf1575c6bb0a665b09d96733833c5f2cec18c0deac96345c4
-
SSDEEP
768:zOEMiDQsGijtlhlgJTRDrfYLfGPwbuUT:aRV2t/S7Dr0yUT
Malware Config
Extracted
mylobot
fywkuzp.ru:6391
zdrussle.ru:4507
pseyumd.ru:8597
stydodo.ru:7094
wasyellowindexhotel.ru:7393
fywkuzp.ru:6401
rxzyglt.ru:1973
qhrywlc.ru:8926
fgqjwdl.ru:3485
qwwzlam.ru:5576
dqoudex.ru:7396
ssopuyk.ru:3367
gqlgpob.ru:8977
yboqlxs.ru:9336
qmwekpe.ru:1343
pyjhhpx.ru:6769
qyccsug.ru:4256
nrxboty.ru:3757
reczrhm.ru:2587
uzpadrm.ru:4254
diacfxa.ru:8671
bhzlyxh.ru:1812
lyfsnwj.ru:7749
nmtydik.ru:8842
kulfxxy.ru:9732
kmgcsug.ru:1861
tdmxpmi.ru:9974
fyxkmbh.ru:9528
wyudsya.ru:9441
qwoumzw.ru:3731
neffcrf.ru:3441
sbckhnb.ru:5576
gwjijru.ru:1525
qsxxzni.ru:8573
hmiwbxq.ru:8233
rbzygpj.ru:5826
gdibsqa.ru:4135
tqinkyp.ru:1589
zrnbbls.ru:3739
dobohfd.ru:3667
pnrlmxm.ru:8388
axonyso.ru:6425
xcatuqu.ru:6798
wpemrsn.ru:5934
hdesknp.ru:4395
ejjiqxr.ru:9953
qrrdprl.ru:2761
blsciph.ru:5164
nsdmxdc.ru:2219
xtidmxw.ru:3465
ccrocuw.ru:5919
whbeaxk.ru:9143
mfoiysd.ru:1251
codiftm.ru:5653
qzejmlp.ru:5686
rmrgayn.ru:4262
tmlmnom.ru:6679
ohehjjy.ru:3616
tgdfgjm.ru:3387
khilyix.ru:4667
agagzil.ru:1566
whikxcq.ru:9951
ozxrwhf.ru:5718
jolrchd.ru:9435
btmarcq.ru:4616
jhycwgo.ru:4733
imiborh.ru:3632
hlfueyc.ru:1572
aqlwahm.ru:7947
yglzfmx.ru:5521
yubjjko.ru:7966
rmqsnln.ru:3266
iwtslmi.ru:7774
pzezqgm.ru:8648
duyoqkc.ru:2259
ifbgioj.ru:3313
gxyitef.ru:7186
ywdggzp.ru:6613
gnxmajx.ru:2185
tteiigg.ru:2239
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
urtuhfut.exepid Process 1456 urtuhfut.exe -
Loads dropped DLL 2 IoCs
Processes:
a41daba8424dc768e8591846a0cf334807bc6a05c712e8a13b7e1bf98b341560.exepid Process 3012 a41daba8424dc768e8591846a0cf334807bc6a05c712e8a13b7e1bf98b341560.exe 3012 a41daba8424dc768e8591846a0cf334807bc6a05c712e8a13b7e1bf98b341560.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
cmd.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Windows\CurrentVersion\Run\dwvqe = "C:\\Users\\Admin\\AppData\\Roaming\\seubtuxd\\urtuhfut.exe" cmd.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
a41daba8424dc768e8591846a0cf334807bc6a05c712e8a13b7e1bf98b341560.exeurtuhfut.execmd.exedescription pid Process procid_target PID 3012 wrote to memory of 1456 3012 a41daba8424dc768e8591846a0cf334807bc6a05c712e8a13b7e1bf98b341560.exe 30 PID 3012 wrote to memory of 1456 3012 a41daba8424dc768e8591846a0cf334807bc6a05c712e8a13b7e1bf98b341560.exe 30 PID 3012 wrote to memory of 1456 3012 a41daba8424dc768e8591846a0cf334807bc6a05c712e8a13b7e1bf98b341560.exe 30 PID 3012 wrote to memory of 1456 3012 a41daba8424dc768e8591846a0cf334807bc6a05c712e8a13b7e1bf98b341560.exe 30 PID 1456 wrote to memory of 2136 1456 urtuhfut.exe 31 PID 1456 wrote to memory of 2136 1456 urtuhfut.exe 31 PID 1456 wrote to memory of 2136 1456 urtuhfut.exe 31 PID 1456 wrote to memory of 2136 1456 urtuhfut.exe 31 PID 1456 wrote to memory of 2136 1456 urtuhfut.exe 31 PID 1456 wrote to memory of 2136 1456 urtuhfut.exe 31 PID 1456 wrote to memory of 2136 1456 urtuhfut.exe 31 PID 1456 wrote to memory of 2136 1456 urtuhfut.exe 31 PID 2136 wrote to memory of 2768 2136 cmd.exe 33 PID 2136 wrote to memory of 2768 2136 cmd.exe 33 PID 2136 wrote to memory of 2768 2136 cmd.exe 33 PID 2136 wrote to memory of 2768 2136 cmd.exe 33 PID 2136 wrote to memory of 2768 2136 cmd.exe 33 PID 2136 wrote to memory of 2768 2136 cmd.exe 33 PID 2136 wrote to memory of 2768 2136 cmd.exe 33 PID 2136 wrote to memory of 2768 2136 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\a41daba8424dc768e8591846a0cf334807bc6a05c712e8a13b7e1bf98b341560.exe"C:\Users\Admin\AppData\Local\Temp\a41daba8424dc768e8591846a0cf334807bc6a05c712e8a13b7e1bf98b341560.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Users\Admin\AppData\Roaming\seubtuxd\urtuhfut.exe"C:\Users\Admin\AppData\Roaming\seubtuxd\urtuhfut.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"3⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:2768
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD55f2aff67459bfdb75f1dd51f3a2b380f
SHA19939563ac43b09fbcca6ca32630084df55e07746
SHA256a41daba8424dc768e8591846a0cf334807bc6a05c712e8a13b7e1bf98b341560
SHA5126e2acb78db850ba82b0e37f4d70196c908316b28f6bda565ae086292b48bab513860fffc2f1970fbf1575c6bb0a665b09d96733833c5f2cec18c0deac96345c4
-
Filesize
36KB
MD55f2aff67459bfdb75f1dd51f3a2b380f
SHA19939563ac43b09fbcca6ca32630084df55e07746
SHA256a41daba8424dc768e8591846a0cf334807bc6a05c712e8a13b7e1bf98b341560
SHA5126e2acb78db850ba82b0e37f4d70196c908316b28f6bda565ae086292b48bab513860fffc2f1970fbf1575c6bb0a665b09d96733833c5f2cec18c0deac96345c4
-
Filesize
36KB
MD55f2aff67459bfdb75f1dd51f3a2b380f
SHA19939563ac43b09fbcca6ca32630084df55e07746
SHA256a41daba8424dc768e8591846a0cf334807bc6a05c712e8a13b7e1bf98b341560
SHA5126e2acb78db850ba82b0e37f4d70196c908316b28f6bda565ae086292b48bab513860fffc2f1970fbf1575c6bb0a665b09d96733833c5f2cec18c0deac96345c4
-
Filesize
36KB
MD55f2aff67459bfdb75f1dd51f3a2b380f
SHA19939563ac43b09fbcca6ca32630084df55e07746
SHA256a41daba8424dc768e8591846a0cf334807bc6a05c712e8a13b7e1bf98b341560
SHA5126e2acb78db850ba82b0e37f4d70196c908316b28f6bda565ae086292b48bab513860fffc2f1970fbf1575c6bb0a665b09d96733833c5f2cec18c0deac96345c4
-
Filesize
36KB
MD55f2aff67459bfdb75f1dd51f3a2b380f
SHA19939563ac43b09fbcca6ca32630084df55e07746
SHA256a41daba8424dc768e8591846a0cf334807bc6a05c712e8a13b7e1bf98b341560
SHA5126e2acb78db850ba82b0e37f4d70196c908316b28f6bda565ae086292b48bab513860fffc2f1970fbf1575c6bb0a665b09d96733833c5f2cec18c0deac96345c4