Analysis
-
max time kernel
148s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
14-11-2023 01:47
Behavioral task
behavioral1
Sample
8848598d834c331cbdebd866377c14a0fb26b015fe48929551d45e70006dcf6d.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
8848598d834c331cbdebd866377c14a0fb26b015fe48929551d45e70006dcf6d.exe
Resource
win10v2004-20231023-en
General
-
Target
8848598d834c331cbdebd866377c14a0fb26b015fe48929551d45e70006dcf6d.exe
-
Size
36KB
-
MD5
d2338c78ee48e6dd1630c098bb6324e5
-
SHA1
278311f211e5dd14cb56b5867a53814ccfb0b50a
-
SHA256
8848598d834c331cbdebd866377c14a0fb26b015fe48929551d45e70006dcf6d
-
SHA512
8908251799094022f5b417b2b0c909914ae6795bedf79259782df375471a6f6a788c56589de4ef2e8c818de12643ca3974a28de8822a2055cb10ade2e63e88fe
-
SSDEEP
384:0ewNOnxK8uiEejM/wHQqhrXxGm4hEEZ+DMsuTmex+HFY+EKWbwFt+AYt9SKSMQMv:eO8Ni5jfwqh0hSexnTbgJrGPwb
Malware Config
Extracted
mylobot
onthestage.ru:6521
stanislasarnoud.ru:5739
krebson.ru:4685
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1576 utcucgua.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\blavv = "C:\\Users\\Admin\\AppData\\Roaming\\cpurauuh\\utcucgua.exe" cmd.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 932 wrote to memory of 1576 932 8848598d834c331cbdebd866377c14a0fb26b015fe48929551d45e70006dcf6d.exe 89 PID 932 wrote to memory of 1576 932 8848598d834c331cbdebd866377c14a0fb26b015fe48929551d45e70006dcf6d.exe 89 PID 932 wrote to memory of 1576 932 8848598d834c331cbdebd866377c14a0fb26b015fe48929551d45e70006dcf6d.exe 89 PID 1576 wrote to memory of 3992 1576 utcucgua.exe 90 PID 1576 wrote to memory of 3992 1576 utcucgua.exe 90 PID 1576 wrote to memory of 3992 1576 utcucgua.exe 90 PID 1576 wrote to memory of 3992 1576 utcucgua.exe 90 PID 1576 wrote to memory of 3992 1576 utcucgua.exe 90 PID 1576 wrote to memory of 3992 1576 utcucgua.exe 90 PID 1576 wrote to memory of 3992 1576 utcucgua.exe 90 PID 3992 wrote to memory of 1656 3992 cmd.exe 94 PID 3992 wrote to memory of 1656 3992 cmd.exe 94 PID 3992 wrote to memory of 1656 3992 cmd.exe 94 PID 3992 wrote to memory of 1656 3992 cmd.exe 94 PID 3992 wrote to memory of 1656 3992 cmd.exe 94 PID 3992 wrote to memory of 1656 3992 cmd.exe 94 PID 3992 wrote to memory of 1656 3992 cmd.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\8848598d834c331cbdebd866377c14a0fb26b015fe48929551d45e70006dcf6d.exe"C:\Users\Admin\AppData\Local\Temp\8848598d834c331cbdebd866377c14a0fb26b015fe48929551d45e70006dcf6d.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:932 -
C:\Users\Admin\AppData\Roaming\cpurauuh\utcucgua.exe"C:\Users\Admin\AppData\Roaming\cpurauuh\utcucgua.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"3⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3992 -
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:1656
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD5d2338c78ee48e6dd1630c098bb6324e5
SHA1278311f211e5dd14cb56b5867a53814ccfb0b50a
SHA2568848598d834c331cbdebd866377c14a0fb26b015fe48929551d45e70006dcf6d
SHA5128908251799094022f5b417b2b0c909914ae6795bedf79259782df375471a6f6a788c56589de4ef2e8c818de12643ca3974a28de8822a2055cb10ade2e63e88fe
-
Filesize
36KB
MD5d2338c78ee48e6dd1630c098bb6324e5
SHA1278311f211e5dd14cb56b5867a53814ccfb0b50a
SHA2568848598d834c331cbdebd866377c14a0fb26b015fe48929551d45e70006dcf6d
SHA5128908251799094022f5b417b2b0c909914ae6795bedf79259782df375471a6f6a788c56589de4ef2e8c818de12643ca3974a28de8822a2055cb10ade2e63e88fe