Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-09-2024 03:46
Static task
static1
Behavioral task
behavioral1
Sample
nex.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
nex.exe
Resource
win10v2004-20240802-en
General
-
Target
nex.exe
-
Size
367KB
-
MD5
5111c960148d9847a4b4fb25f0b6f1e6
-
SHA1
21c954d9ec208c169630983970f6a59cbe25ab2e
-
SHA256
598857ebe87e67db25ccf5a543cd553b77fe4be93e9808e236f90068432788a8
-
SHA512
e86cd82864f2daa6dbbed8d13f9cbe4c27dacfcd74fcaea43bd1e0c6dc2aaacfe96c1659513b9f4cfd5f7a7b6cf380db7441f5f491b3ef5d17e32e0aa38afab5
-
SSDEEP
6144:kfeWTE1rkt826L4xd1EiftWt6empEVZlVISrt5AuK+Fwk4/lqIN9P8GzgUy:kfbTE1rkt826L4xd1EiEt6empQ+uK+a4
Malware Config
Extracted
mylobot
onthestage.ru:6521
krebson.ru:4685
stanislasarnoud.ru:5739
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
uppuudut.exeuppuudut.exepid Process 1976 uppuudut.exe 2520 uppuudut.exe -
Loads dropped DLL 1 IoCs
Processes:
nex.exepid Process 2948 nex.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
cmd.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\bgmov = "C:\\Users\\Admin\\AppData\\Roaming\\reuxcuac\\uppuudut.exe" cmd.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
nex.exeuppuudut.exedescription pid Process procid_target PID 1636 set thread context of 2948 1636 nex.exe 28 PID 1976 set thread context of 2520 1976 uppuudut.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
nex.exenex.exeuppuudut.exeuppuudut.execmd.exenotepad.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nex.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nex.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uppuudut.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uppuudut.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe -
Suspicious use of WriteProcessMemory 42 IoCs
Processes:
nex.exenex.exeuppuudut.exeuppuudut.execmd.exedescription pid Process procid_target PID 1636 wrote to memory of 2948 1636 nex.exe 28 PID 1636 wrote to memory of 2948 1636 nex.exe 28 PID 1636 wrote to memory of 2948 1636 nex.exe 28 PID 1636 wrote to memory of 2948 1636 nex.exe 28 PID 1636 wrote to memory of 2948 1636 nex.exe 28 PID 1636 wrote to memory of 2948 1636 nex.exe 28 PID 1636 wrote to memory of 2948 1636 nex.exe 28 PID 1636 wrote to memory of 2948 1636 nex.exe 28 PID 1636 wrote to memory of 2948 1636 nex.exe 28 PID 1636 wrote to memory of 2948 1636 nex.exe 28 PID 1636 wrote to memory of 2948 1636 nex.exe 28 PID 2948 wrote to memory of 1976 2948 nex.exe 29 PID 2948 wrote to memory of 1976 2948 nex.exe 29 PID 2948 wrote to memory of 1976 2948 nex.exe 29 PID 2948 wrote to memory of 1976 2948 nex.exe 29 PID 1976 wrote to memory of 2520 1976 uppuudut.exe 30 PID 1976 wrote to memory of 2520 1976 uppuudut.exe 30 PID 1976 wrote to memory of 2520 1976 uppuudut.exe 30 PID 1976 wrote to memory of 2520 1976 uppuudut.exe 30 PID 1976 wrote to memory of 2520 1976 uppuudut.exe 30 PID 1976 wrote to memory of 2520 1976 uppuudut.exe 30 PID 1976 wrote to memory of 2520 1976 uppuudut.exe 30 PID 1976 wrote to memory of 2520 1976 uppuudut.exe 30 PID 1976 wrote to memory of 2520 1976 uppuudut.exe 30 PID 1976 wrote to memory of 2520 1976 uppuudut.exe 30 PID 1976 wrote to memory of 2520 1976 uppuudut.exe 30 PID 2520 wrote to memory of 2424 2520 uppuudut.exe 31 PID 2520 wrote to memory of 2424 2520 uppuudut.exe 31 PID 2520 wrote to memory of 2424 2520 uppuudut.exe 31 PID 2520 wrote to memory of 2424 2520 uppuudut.exe 31 PID 2520 wrote to memory of 2424 2520 uppuudut.exe 31 PID 2520 wrote to memory of 2424 2520 uppuudut.exe 31 PID 2520 wrote to memory of 2424 2520 uppuudut.exe 31 PID 2520 wrote to memory of 2424 2520 uppuudut.exe 31 PID 2424 wrote to memory of 2000 2424 cmd.exe 33 PID 2424 wrote to memory of 2000 2424 cmd.exe 33 PID 2424 wrote to memory of 2000 2424 cmd.exe 33 PID 2424 wrote to memory of 2000 2424 cmd.exe 33 PID 2424 wrote to memory of 2000 2424 cmd.exe 33 PID 2424 wrote to memory of 2000 2424 cmd.exe 33 PID 2424 wrote to memory of 2000 2424 cmd.exe 33 PID 2424 wrote to memory of 2000 2424 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\nex.exe"C:\Users\Admin\AppData\Local\Temp\nex.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Users\Admin\AppData\Local\Temp\nex.exe"C:\Users\Admin\AppData\Local\Temp\nex.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Users\Admin\AppData\Roaming\reuxcuac\uppuudut.exe"C:\Users\Admin\AppData\Roaming\reuxcuac\uppuudut.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Users\Admin\AppData\Roaming\reuxcuac\uppuudut.exe"C:\Users\Admin\AppData\Roaming\reuxcuac\uppuudut.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"5⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"6⤵
- System Location Discovery: System Language Discovery
PID:2000
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
367KB
MD55111c960148d9847a4b4fb25f0b6f1e6
SHA121c954d9ec208c169630983970f6a59cbe25ab2e
SHA256598857ebe87e67db25ccf5a543cd553b77fe4be93e9808e236f90068432788a8
SHA512e86cd82864f2daa6dbbed8d13f9cbe4c27dacfcd74fcaea43bd1e0c6dc2aaacfe96c1659513b9f4cfd5f7a7b6cf380db7441f5f491b3ef5d17e32e0aa38afab5