Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
19-08-2023 12:27
Static task
static1
Behavioral task
behavioral1
Sample
EXonts.exe
Resource
win10v2004-20230703-en
General
-
Target
EXonts.exe
-
Size
110KB
-
MD5
ad4dcd0935d159515de56dbb9bb42402
-
SHA1
c4a309ad63dddd4c3a94cd6da13629a0a0d5d9b0
-
SHA256
533eea9cea752b72c34cd94727cb6d536e8153f01a61a61cdc367080c474d268
-
SHA512
8c117ca7415236f5196ac8d62f2749f5dfba35e6632fc4adf51c8885e241570435182b2dcf23eed7da7c2b18384dbdfac40b2788281010f5f49934dc6f5c1064
-
SSDEEP
1536:wLE75HunPrf5WR8LK9OY0zm778folWR8g2l7/FpiBtAJ0EZil1gHGXyvy0Ona:wRf5WRZOY0z0MWlf/QaJhuloyxa
Malware Config
Extracted
mylobot
onthestage.ru:6521
stanislasarnoud.ru:5739
krebson.ru:4685
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
utpuqruh.exeutpuqruh.exepid Process 4812 utpuqruh.exe 3112 utpuqruh.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
cmd.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bpglh = "C:\\Users\\Admin\\AppData\\Roaming\\reuyduuy\\utpuqruh.exe" cmd.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
EXonts.exeutpuqruh.exedescription pid Process procid_target PID 3404 set thread context of 4188 3404 EXonts.exe 83 PID 4812 set thread context of 3112 4812 utpuqruh.exe 88 -
Suspicious use of WriteProcessMemory 37 IoCs
Processes:
EXonts.exeEXonts.exeutpuqruh.exeutpuqruh.execmd.exedescription pid Process procid_target PID 3404 wrote to memory of 4188 3404 EXonts.exe 83 PID 3404 wrote to memory of 4188 3404 EXonts.exe 83 PID 3404 wrote to memory of 4188 3404 EXonts.exe 83 PID 3404 wrote to memory of 4188 3404 EXonts.exe 83 PID 3404 wrote to memory of 4188 3404 EXonts.exe 83 PID 3404 wrote to memory of 4188 3404 EXonts.exe 83 PID 3404 wrote to memory of 4188 3404 EXonts.exe 83 PID 3404 wrote to memory of 4188 3404 EXonts.exe 83 PID 3404 wrote to memory of 4188 3404 EXonts.exe 83 PID 3404 wrote to memory of 4188 3404 EXonts.exe 83 PID 4188 wrote to memory of 4812 4188 EXonts.exe 86 PID 4188 wrote to memory of 4812 4188 EXonts.exe 86 PID 4188 wrote to memory of 4812 4188 EXonts.exe 86 PID 4812 wrote to memory of 3112 4812 utpuqruh.exe 88 PID 4812 wrote to memory of 3112 4812 utpuqruh.exe 88 PID 4812 wrote to memory of 3112 4812 utpuqruh.exe 88 PID 4812 wrote to memory of 3112 4812 utpuqruh.exe 88 PID 4812 wrote to memory of 3112 4812 utpuqruh.exe 88 PID 4812 wrote to memory of 3112 4812 utpuqruh.exe 88 PID 4812 wrote to memory of 3112 4812 utpuqruh.exe 88 PID 4812 wrote to memory of 3112 4812 utpuqruh.exe 88 PID 4812 wrote to memory of 3112 4812 utpuqruh.exe 88 PID 4812 wrote to memory of 3112 4812 utpuqruh.exe 88 PID 3112 wrote to memory of 1792 3112 utpuqruh.exe 89 PID 3112 wrote to memory of 1792 3112 utpuqruh.exe 89 PID 3112 wrote to memory of 1792 3112 utpuqruh.exe 89 PID 3112 wrote to memory of 1792 3112 utpuqruh.exe 89 PID 3112 wrote to memory of 1792 3112 utpuqruh.exe 89 PID 3112 wrote to memory of 1792 3112 utpuqruh.exe 89 PID 3112 wrote to memory of 1792 3112 utpuqruh.exe 89 PID 1792 wrote to memory of 4924 1792 cmd.exe 93 PID 1792 wrote to memory of 4924 1792 cmd.exe 93 PID 1792 wrote to memory of 4924 1792 cmd.exe 93 PID 1792 wrote to memory of 4924 1792 cmd.exe 93 PID 1792 wrote to memory of 4924 1792 cmd.exe 93 PID 1792 wrote to memory of 4924 1792 cmd.exe 93 PID 1792 wrote to memory of 4924 1792 cmd.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\EXonts.exe"C:\Users\Admin\AppData\Local\Temp\EXonts.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3404 -
C:\Users\Admin\AppData\Local\Temp\EXonts.exe"C:\Users\Admin\AppData\Local\Temp\EXonts.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4188 -
C:\Users\Admin\AppData\Roaming\reuyduuy\utpuqruh.exe"C:\Users\Admin\AppData\Roaming\reuyduuy\utpuqruh.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Users\Admin\AppData\Roaming\reuyduuy\utpuqruh.exe"C:\Users\Admin\AppData\Roaming\reuyduuy\utpuqruh.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3112 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"5⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"6⤵PID:4924
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
110KB
MD5ad4dcd0935d159515de56dbb9bb42402
SHA1c4a309ad63dddd4c3a94cd6da13629a0a0d5d9b0
SHA256533eea9cea752b72c34cd94727cb6d536e8153f01a61a61cdc367080c474d268
SHA5128c117ca7415236f5196ac8d62f2749f5dfba35e6632fc4adf51c8885e241570435182b2dcf23eed7da7c2b18384dbdfac40b2788281010f5f49934dc6f5c1064
-
Filesize
110KB
MD5ad4dcd0935d159515de56dbb9bb42402
SHA1c4a309ad63dddd4c3a94cd6da13629a0a0d5d9b0
SHA256533eea9cea752b72c34cd94727cb6d536e8153f01a61a61cdc367080c474d268
SHA5128c117ca7415236f5196ac8d62f2749f5dfba35e6632fc4adf51c8885e241570435182b2dcf23eed7da7c2b18384dbdfac40b2788281010f5f49934dc6f5c1064
-
Filesize
110KB
MD5ad4dcd0935d159515de56dbb9bb42402
SHA1c4a309ad63dddd4c3a94cd6da13629a0a0d5d9b0
SHA256533eea9cea752b72c34cd94727cb6d536e8153f01a61a61cdc367080c474d268
SHA5128c117ca7415236f5196ac8d62f2749f5dfba35e6632fc4adf51c8885e241570435182b2dcf23eed7da7c2b18384dbdfac40b2788281010f5f49934dc6f5c1064