Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 18:53
Static task
static1
Behavioral task
behavioral1
Sample
1c037e1068d9f718d9686a1c71939b925edba2ed236d218351e76f390e124ee5.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1c037e1068d9f718d9686a1c71939b925edba2ed236d218351e76f390e124ee5.exe
Resource
win10v2004-20240802-en
General
-
Target
1c037e1068d9f718d9686a1c71939b925edba2ed236d218351e76f390e124ee5.exe
-
Size
208KB
-
MD5
b881e969b3000bb334e8dafbc7dbe0eb
-
SHA1
e70fbce90f3b6ef2e6664a253003e4027e91783b
-
SHA256
1c037e1068d9f718d9686a1c71939b925edba2ed236d218351e76f390e124ee5
-
SHA512
94102470d7b44ce171d2e9bd4837689a0a8b82da8f5b3038510b0207581ac4b02a3bc32bf7ebdd967512d2132cc97d7ba84592c2e7364ddc5bea146ce927373d
-
SSDEEP
3072:zpSV2jk89a0CZI+om9jkA4d39Wv0fMDYVHtKHwUfqSady9m+7gi4NLthEjQT6:3/a055OcNDMEFt3UfqSadyl7dQEj
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2880 MYKO.exe -
Loads dropped DLL 2 IoCs
pid Process 2464 cmd.exe 2464 cmd.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\windows\system\MYKO.exe 1c037e1068d9f718d9686a1c71939b925edba2ed236d218351e76f390e124ee5.exe File opened for modification C:\windows\system\MYKO.exe 1c037e1068d9f718d9686a1c71939b925edba2ed236d218351e76f390e124ee5.exe File created C:\windows\system\MYKO.exe.bat 1c037e1068d9f718d9686a1c71939b925edba2ed236d218351e76f390e124ee5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1c037e1068d9f718d9686a1c71939b925edba2ed236d218351e76f390e124ee5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MYKO.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2280 1c037e1068d9f718d9686a1c71939b925edba2ed236d218351e76f390e124ee5.exe 2280 1c037e1068d9f718d9686a1c71939b925edba2ed236d218351e76f390e124ee5.exe 2880 MYKO.exe 2880 MYKO.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2280 1c037e1068d9f718d9686a1c71939b925edba2ed236d218351e76f390e124ee5.exe 2280 1c037e1068d9f718d9686a1c71939b925edba2ed236d218351e76f390e124ee5.exe 2880 MYKO.exe 2880 MYKO.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2280 wrote to memory of 2464 2280 1c037e1068d9f718d9686a1c71939b925edba2ed236d218351e76f390e124ee5.exe 31 PID 2280 wrote to memory of 2464 2280 1c037e1068d9f718d9686a1c71939b925edba2ed236d218351e76f390e124ee5.exe 31 PID 2280 wrote to memory of 2464 2280 1c037e1068d9f718d9686a1c71939b925edba2ed236d218351e76f390e124ee5.exe 31 PID 2280 wrote to memory of 2464 2280 1c037e1068d9f718d9686a1c71939b925edba2ed236d218351e76f390e124ee5.exe 31 PID 2464 wrote to memory of 2880 2464 cmd.exe 33 PID 2464 wrote to memory of 2880 2464 cmd.exe 33 PID 2464 wrote to memory of 2880 2464 cmd.exe 33 PID 2464 wrote to memory of 2880 2464 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\1c037e1068d9f718d9686a1c71939b925edba2ed236d218351e76f390e124ee5.exe"C:\Users\Admin\AppData\Local\Temp\1c037e1068d9f718d9686a1c71939b925edba2ed236d218351e76f390e124ee5.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\windows\system\MYKO.exe.bat" "2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\windows\system\MYKO.exeC:\windows\system\MYKO.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2880
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
208KB
MD5374bad6700ba3d9df679c7066b6d6881
SHA1497820b7bf4cce29da329dcac87349de2719b610
SHA2561bf7500587a5fc876e172fb68468044e9cf370aa52e417d3814fae8f359b79f3
SHA5124526d6e77e81f2fc8b3805a19f8351ae41509ea08e42c87eb6df9701bdcef5d34950d82a840628da6857014911bc5516b37f25bd0c114c0ee60b3bf75784bd40
-
Filesize
68B
MD5736423c42dd5bdb899d11d9facab3d13
SHA194700b59bc767237bac8551240a17d46f2393519
SHA256c706f22c27ee52c9308dc4244e84dd4b28e9d21be75dbc4bd8e4b205ea40598f
SHA512a7f5bca5e5162de1b31b8db297914dbbfd8f70fa0015576e0f8e7f71f9d8e9d89f5642b3c5a00a750c09be503c16b6ced0beb25a69cf20c469ac1dcbe8c93f03