Analysis

  • max time kernel
    146s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    02-11-2023 02:19

General

  • Target

    789.exe

  • Size

    212KB

  • MD5

    d0a09a576bda333bdd0c774d30e3c87a

  • SHA1

    806b8e83860eca7f9c5f50baaa916589e294bc8a

  • SHA256

    70b6dde721d6dd8048ce2b832b581b04b35161efa3ab41659addd8e61ea4ff30

  • SHA512

    da9e9abdb023909fd615fa2b250232de69341940ab39243844eaf79e3457dc41e79bdc4b29cc83829d53543f84d1e64f1ce2a9ce8c90ec93a99b05e033e0d80e

  • SSDEEP

    1536:Nvl9eja1se+nsngcxNEsYMltfMpx7p5AzwB5GEvVVWbmZvM3R8krfaL+ETWfF99F:Nvln1p+nC7fUn5VVccPTWfFIzeSS

Malware Config

Extracted

Family

mylobot

C2

eakalra.ru:1281

op17.ru:6006

ad21822.ru:8742

urtuifc.ru:1692

nmernrh.ru:4163

bjbhtsc.ru:6239

jmbfgpn.ru:1344

hoebfle.ru:9593

okllxlr.ru:8335

klqzrze.ru:6999

xwstyrt.ru:8627

qgfhmmm.ru:1886

ygdgryq.ru:5843

unsyisl.ru:7365

snzglco.ru:3268

fchbwme.ru:7533

iqaagar.ru:2919

flkpuod.ru:5796

zuenhrs.ru:9439

lqejyjg.ru:4627

Signatures

  • Mylobot

    Botnet which first appeared in 2017 written in C++.

  • Deletes itself 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Modifies registry class 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\789.exe
    "C:\Users\Admin\AppData\Local\Temp\789.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:2244
    • C:\Windows\SysWOW64\svchost.exe
      "C:\Windows\system32\svchost.exe"
      2⤵
      • Deletes itself
      • Adds Run key to start application
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2112
      • C:\Windows\SysWOW64\notepad.exe
        "C:\Windows\system32\notepad.exe"
        3⤵
          PID:2316

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\{74B31256-D9DF-A6CA-53C2-7AD9B258C958}\d90cc2c9.exe

      Filesize

      212KB

      MD5

      d0a09a576bda333bdd0c774d30e3c87a

      SHA1

      806b8e83860eca7f9c5f50baaa916589e294bc8a

      SHA256

      70b6dde721d6dd8048ce2b832b581b04b35161efa3ab41659addd8e61ea4ff30

      SHA512

      da9e9abdb023909fd615fa2b250232de69341940ab39243844eaf79e3457dc41e79bdc4b29cc83829d53543f84d1e64f1ce2a9ce8c90ec93a99b05e033e0d80e

    • memory/2112-0-0x0000000000080000-0x00000000000B5000-memory.dmp

      Filesize

      212KB

    • memory/2112-2-0x00000000000C0000-0x00000000000F5000-memory.dmp

      Filesize

      212KB

    • memory/2112-3-0x00000000000C0000-0x00000000000F5000-memory.dmp

      Filesize

      212KB

    • memory/2112-4-0x00000000000C0000-0x00000000000F5000-memory.dmp

      Filesize

      212KB

    • memory/2112-6-0x00000000000C0000-0x00000000000F5000-memory.dmp

      Filesize

      212KB

    • memory/2112-7-0x00000000000C0000-0x00000000000F5000-memory.dmp

      Filesize

      212KB

    • memory/2112-5-0x00000000000C0000-0x00000000000F5000-memory.dmp

      Filesize

      212KB

    • memory/2112-14-0x00000000000C0000-0x00000000000F5000-memory.dmp

      Filesize

      212KB

    • memory/2316-13-0x0000000000080000-0x0000000000081000-memory.dmp

      Filesize

      4KB

    • memory/2316-9-0x0000000000090000-0x0000000000091000-memory.dmp

      Filesize

      4KB