Analysis

  • max time kernel
    147s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-11-2023 02:19

General

  • Target

    789.exe

  • Size

    212KB

  • MD5

    d0a09a576bda333bdd0c774d30e3c87a

  • SHA1

    806b8e83860eca7f9c5f50baaa916589e294bc8a

  • SHA256

    70b6dde721d6dd8048ce2b832b581b04b35161efa3ab41659addd8e61ea4ff30

  • SHA512

    da9e9abdb023909fd615fa2b250232de69341940ab39243844eaf79e3457dc41e79bdc4b29cc83829d53543f84d1e64f1ce2a9ce8c90ec93a99b05e033e0d80e

  • SSDEEP

    1536:Nvl9eja1se+nsngcxNEsYMltfMpx7p5AzwB5GEvVVWbmZvM3R8krfaL+ETWfF99F:Nvln1p+nC7fUn5VVccPTWfFIzeSS

Malware Config

Extracted

Family

mylobot

C2

eakalra.ru:1281

op17.ru:6006

ad21822.ru:8742

urtuifc.ru:1692

nmernrh.ru:4163

bjbhtsc.ru:6239

jmbfgpn.ru:1344

hoebfle.ru:9593

okllxlr.ru:8335

klqzrze.ru:6999

xwstyrt.ru:8627

qgfhmmm.ru:1886

ygdgryq.ru:5843

unsyisl.ru:7365

snzglco.ru:3268

fchbwme.ru:7533

iqaagar.ru:2919

flkpuod.ru:5796

zuenhrs.ru:9439

lqejyjg.ru:4627

Signatures

  • Mylobot

    Botnet which first appeared in 2017 written in C++.

  • Deletes itself 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 2 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies registry class 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\789.exe
    "C:\Users\Admin\AppData\Local\Temp\789.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:2116
    • C:\Windows\SysWOW64\svchost.exe
      "C:\Windows\system32\svchost.exe"
      2⤵
      • Deletes itself
      • Adds Run key to start application
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:804
      • C:\Windows\SysWOW64\notepad.exe
        "C:\Windows\system32\notepad.exe"
        3⤵
          PID:2368

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\{E933FE39-43E4-AF76-7916-1C92DC9CEED6}\448c2ea6.exe

      Filesize

      212KB

      MD5

      d0a09a576bda333bdd0c774d30e3c87a

      SHA1

      806b8e83860eca7f9c5f50baaa916589e294bc8a

      SHA256

      70b6dde721d6dd8048ce2b832b581b04b35161efa3ab41659addd8e61ea4ff30

      SHA512

      da9e9abdb023909fd615fa2b250232de69341940ab39243844eaf79e3457dc41e79bdc4b29cc83829d53543f84d1e64f1ce2a9ce8c90ec93a99b05e033e0d80e

    • memory/804-0-0x0000000000CE0000-0x0000000000D15000-memory.dmp

      Filesize

      212KB

    • memory/804-1-0x0000000000CE0000-0x0000000000D15000-memory.dmp

      Filesize

      212KB

    • memory/804-2-0x0000000000CE0000-0x0000000000D15000-memory.dmp

      Filesize

      212KB

    • memory/804-4-0x0000000000CE0000-0x0000000000D15000-memory.dmp

      Filesize

      212KB

    • memory/804-5-0x0000000000CE0000-0x0000000000D15000-memory.dmp

      Filesize

      212KB

    • memory/804-3-0x0000000000CE0000-0x0000000000D15000-memory.dmp

      Filesize

      212KB

    • memory/804-7-0x0000000000CE0000-0x0000000000D15000-memory.dmp

      Filesize

      212KB

    • memory/804-8-0x0000000000CE0000-0x0000000000D15000-memory.dmp

      Filesize

      212KB

    • memory/2368-6-0x0000000000C90000-0x0000000000C91000-memory.dmp

      Filesize

      4KB