Analysis

  • max time kernel
    150s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    19-12-2023 16:06

General

  • Target

    584c115e2d68d99c1bbf33f01a795295.exe

  • Size

    339KB

  • MD5

    584c115e2d68d99c1bbf33f01a795295

  • SHA1

    aecafef6df8304bf7a1bba821a3303075523a677

  • SHA256

    b14743519ca2f7477f3f24050203b97a5df64d20fb3cd12b6455bdd0271b6f2a

  • SHA512

    bae2bd68d6e804407841a4a3ade1350c9d960521a5337027f7fffe4304e9875f3ec048003212dc8c8eb8094fed53af425cecae1950e6c1a2ff3d7bd68496fc44

  • SSDEEP

    6144:PL0jtKk5nAOXg/oaeIFSl+hDGSlsKiy8Gu5xZ5cLc:PyKqnFwBFSl+hDRsp8GxZCLc

Malware Config

Extracted

Family

mylobot

C2

op17.ru:6006

eakalra.ru:1281

zgclgdb.ru:8518

hpifnad.ru:3721

lbjcwix.ru:8326

rykacfb.ru:8483

benkofx.ru:3333

fpzskbc.ru:9364

ouxtjzd.ru:8658

schwpxp.ru:2956

pspkgya.ru:2675

lmlwtdm.ru:2768

rzwnsph.ru:5898

awtiwzk.ru:9816

pzljenb.ru:3486

yhjtpyf.ru:3565

ogkbsoq.ru:2553

rjngcbj.ru:5655

jlfeopz.ru:4698

wqcruiz.ru:2165

Signatures

  • Mylobot

    Botnet which first appeared in 2017 written in C++.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Modifies registry class 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\584c115e2d68d99c1bbf33f01a795295.exe
    "C:\Users\Admin\AppData\Local\Temp\584c115e2d68d99c1bbf33f01a795295.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2196
    • C:\Users\Admin\AppData\Local\Temp\584c115e2d68d99c1bbf33f01a795295.exe
      "C:\Users\Admin\AppData\Local\Temp\584c115e2d68d99c1bbf33f01a795295.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:1644
      • C:\Windows\SysWOW64\svchost.exe
        "C:\Windows\system32\svchost.exe"
        3⤵
        • Adds Run key to start application
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2620
    • C:\Users\Admin\AppData\Local\Temp\584c115e2d68d99c1bbf33f01a795295.exe
      "C:\Users\Admin\AppData\Local\Temp\584c115e2d68d99c1bbf33f01a795295.exe"
      2⤵
        PID:2132
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2196 -s 132
        2⤵
        • Program crash
        PID:3028

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\{A4C4A185-B532-331D-1FF1-0073CE2A6CEA}\097b711a.exe

      Filesize

      339KB

      MD5

      584c115e2d68d99c1bbf33f01a795295

      SHA1

      aecafef6df8304bf7a1bba821a3303075523a677

      SHA256

      b14743519ca2f7477f3f24050203b97a5df64d20fb3cd12b6455bdd0271b6f2a

      SHA512

      bae2bd68d6e804407841a4a3ade1350c9d960521a5337027f7fffe4304e9875f3ec048003212dc8c8eb8094fed53af425cecae1950e6c1a2ff3d7bd68496fc44

    • memory/1644-38-0x0000000000250000-0x0000000000251000-memory.dmp

      Filesize

      4KB

    • memory/1644-2-0x0000000000400000-0x000000000042B000-memory.dmp

      Filesize

      172KB

    • memory/1644-29-0x0000000000400000-0x000000000042B000-memory.dmp

      Filesize

      172KB

    • memory/1644-5-0x0000000000400000-0x000000000042B000-memory.dmp

      Filesize

      172KB

    • memory/1644-9-0x0000000000400000-0x000000000042B000-memory.dmp

      Filesize

      172KB

    • memory/1644-13-0x0000000000400000-0x000000000042B000-memory.dmp

      Filesize

      172KB

    • memory/1644-17-0x0000000000400000-0x000000000042B000-memory.dmp

      Filesize

      172KB

    • memory/1644-21-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/1644-25-0x0000000000400000-0x000000000042B000-memory.dmp

      Filesize

      172KB

    • memory/1644-37-0x0000000000400000-0x000000000042B000-memory.dmp

      Filesize

      172KB

    • memory/1644-28-0x0000000000400000-0x000000000042B000-memory.dmp

      Filesize

      172KB

    • memory/2132-45-0x00000000001B0000-0x00000000001B1000-memory.dmp

      Filesize

      4KB

    • memory/2196-4-0x0000000002ED0000-0x0000000002ED1000-memory.dmp

      Filesize

      4KB

    • memory/2196-1-0x00000000004E0000-0x00000000004E1000-memory.dmp

      Filesize

      4KB

    • memory/2196-0-0x0000000000230000-0x0000000000231000-memory.dmp

      Filesize

      4KB

    • memory/2620-32-0x00000000000E0000-0x000000000010B000-memory.dmp

      Filesize

      172KB

    • memory/2620-33-0x00000000000E0000-0x000000000010B000-memory.dmp

      Filesize

      172KB

    • memory/2620-34-0x00000000000E0000-0x000000000010B000-memory.dmp

      Filesize

      172KB

    • memory/2620-35-0x00000000000E0000-0x000000000010B000-memory.dmp

      Filesize

      172KB

    • memory/2620-31-0x00000000000E0000-0x000000000010B000-memory.dmp

      Filesize

      172KB

    • memory/2620-36-0x00000000000E0000-0x000000000010B000-memory.dmp

      Filesize

      172KB

    • memory/2620-46-0x00000000000E0000-0x000000000010B000-memory.dmp

      Filesize

      172KB

    • memory/2620-30-0x0000000000080000-0x00000000000D5000-memory.dmp

      Filesize

      340KB