Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
14-11-2023 01:47
Behavioral task
behavioral1
Sample
8848598d834c331cbdebd866377c14a0fb26b015fe48929551d45e70006dcf6d.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
8848598d834c331cbdebd866377c14a0fb26b015fe48929551d45e70006dcf6d.exe
Resource
win10v2004-20231023-en
General
-
Target
8848598d834c331cbdebd866377c14a0fb26b015fe48929551d45e70006dcf6d.exe
-
Size
36KB
-
MD5
d2338c78ee48e6dd1630c098bb6324e5
-
SHA1
278311f211e5dd14cb56b5867a53814ccfb0b50a
-
SHA256
8848598d834c331cbdebd866377c14a0fb26b015fe48929551d45e70006dcf6d
-
SHA512
8908251799094022f5b417b2b0c909914ae6795bedf79259782df375471a6f6a788c56589de4ef2e8c818de12643ca3974a28de8822a2055cb10ade2e63e88fe
-
SSDEEP
384:0ewNOnxK8uiEejM/wHQqhrXxGm4hEEZ+DMsuTmex+HFY+EKWbwFt+AYt9SKSMQMv:eO8Ni5jfwqh0hSexnTbgJrGPwb
Malware Config
Extracted
mylobot
onthestage.ru:6521
stanislasarnoud.ru:5739
krebson.ru:4685
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2196 uebupqus.exe -
Loads dropped DLL 2 IoCs
pid Process 2116 8848598d834c331cbdebd866377c14a0fb26b015fe48929551d45e70006dcf6d.exe 2116 8848598d834c331cbdebd866377c14a0fb26b015fe48929551d45e70006dcf6d.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Windows\CurrentVersion\Run\xgxex = "C:\\Users\\Admin\\AppData\\Roaming\\ceugbuag\\uebupqus.exe" cmd.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2116 wrote to memory of 2196 2116 8848598d834c331cbdebd866377c14a0fb26b015fe48929551d45e70006dcf6d.exe 28 PID 2116 wrote to memory of 2196 2116 8848598d834c331cbdebd866377c14a0fb26b015fe48929551d45e70006dcf6d.exe 28 PID 2116 wrote to memory of 2196 2116 8848598d834c331cbdebd866377c14a0fb26b015fe48929551d45e70006dcf6d.exe 28 PID 2116 wrote to memory of 2196 2116 8848598d834c331cbdebd866377c14a0fb26b015fe48929551d45e70006dcf6d.exe 28 PID 2196 wrote to memory of 1716 2196 uebupqus.exe 29 PID 2196 wrote to memory of 1716 2196 uebupqus.exe 29 PID 2196 wrote to memory of 1716 2196 uebupqus.exe 29 PID 2196 wrote to memory of 1716 2196 uebupqus.exe 29 PID 2196 wrote to memory of 1716 2196 uebupqus.exe 29 PID 2196 wrote to memory of 1716 2196 uebupqus.exe 29 PID 2196 wrote to memory of 1716 2196 uebupqus.exe 29 PID 2196 wrote to memory of 1716 2196 uebupqus.exe 29 PID 1716 wrote to memory of 1956 1716 cmd.exe 31 PID 1716 wrote to memory of 1956 1716 cmd.exe 31 PID 1716 wrote to memory of 1956 1716 cmd.exe 31 PID 1716 wrote to memory of 1956 1716 cmd.exe 31 PID 1716 wrote to memory of 1956 1716 cmd.exe 31 PID 1716 wrote to memory of 1956 1716 cmd.exe 31 PID 1716 wrote to memory of 1956 1716 cmd.exe 31 PID 1716 wrote to memory of 1956 1716 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\8848598d834c331cbdebd866377c14a0fb26b015fe48929551d45e70006dcf6d.exe"C:\Users\Admin\AppData\Local\Temp\8848598d834c331cbdebd866377c14a0fb26b015fe48929551d45e70006dcf6d.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Users\Admin\AppData\Roaming\ceugbuag\uebupqus.exe"C:\Users\Admin\AppData\Roaming\ceugbuag\uebupqus.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"3⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:1956
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD5d2338c78ee48e6dd1630c098bb6324e5
SHA1278311f211e5dd14cb56b5867a53814ccfb0b50a
SHA2568848598d834c331cbdebd866377c14a0fb26b015fe48929551d45e70006dcf6d
SHA5128908251799094022f5b417b2b0c909914ae6795bedf79259782df375471a6f6a788c56589de4ef2e8c818de12643ca3974a28de8822a2055cb10ade2e63e88fe
-
Filesize
36KB
MD5d2338c78ee48e6dd1630c098bb6324e5
SHA1278311f211e5dd14cb56b5867a53814ccfb0b50a
SHA2568848598d834c331cbdebd866377c14a0fb26b015fe48929551d45e70006dcf6d
SHA5128908251799094022f5b417b2b0c909914ae6795bedf79259782df375471a6f6a788c56589de4ef2e8c818de12643ca3974a28de8822a2055cb10ade2e63e88fe
-
Filesize
36KB
MD5d2338c78ee48e6dd1630c098bb6324e5
SHA1278311f211e5dd14cb56b5867a53814ccfb0b50a
SHA2568848598d834c331cbdebd866377c14a0fb26b015fe48929551d45e70006dcf6d
SHA5128908251799094022f5b417b2b0c909914ae6795bedf79259782df375471a6f6a788c56589de4ef2e8c818de12643ca3974a28de8822a2055cb10ade2e63e88fe
-
Filesize
36KB
MD5d2338c78ee48e6dd1630c098bb6324e5
SHA1278311f211e5dd14cb56b5867a53814ccfb0b50a
SHA2568848598d834c331cbdebd866377c14a0fb26b015fe48929551d45e70006dcf6d
SHA5128908251799094022f5b417b2b0c909914ae6795bedf79259782df375471a6f6a788c56589de4ef2e8c818de12643ca3974a28de8822a2055cb10ade2e63e88fe
-
Filesize
36KB
MD5d2338c78ee48e6dd1630c098bb6324e5
SHA1278311f211e5dd14cb56b5867a53814ccfb0b50a
SHA2568848598d834c331cbdebd866377c14a0fb26b015fe48929551d45e70006dcf6d
SHA5128908251799094022f5b417b2b0c909914ae6795bedf79259782df375471a6f6a788c56589de4ef2e8c818de12643ca3974a28de8822a2055cb10ade2e63e88fe