Analysis
-
max time kernel
150s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21-09-2024 03:46
Static task
static1
Behavioral task
behavioral1
Sample
nex.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
nex.exe
Resource
win10v2004-20240802-en
General
-
Target
nex.exe
-
Size
367KB
-
MD5
5111c960148d9847a4b4fb25f0b6f1e6
-
SHA1
21c954d9ec208c169630983970f6a59cbe25ab2e
-
SHA256
598857ebe87e67db25ccf5a543cd553b77fe4be93e9808e236f90068432788a8
-
SHA512
e86cd82864f2daa6dbbed8d13f9cbe4c27dacfcd74fcaea43bd1e0c6dc2aaacfe96c1659513b9f4cfd5f7a7b6cf380db7441f5f491b3ef5d17e32e0aa38afab5
-
SSDEEP
6144:kfeWTE1rkt826L4xd1EiftWt6empEVZlVISrt5AuK+Fwk4/lqIN9P8GzgUy:kfbTE1rkt826L4xd1EiEt6empQ+uK+a4
Malware Config
Extracted
mylobot
onthestage.ru:6521
krebson.ru:4685
stanislasarnoud.ru:5739
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
urfuxeuy.exeurfuxeuy.exepid Process 1636 urfuxeuy.exe 1172 urfuxeuy.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
cmd.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lfkjl = "C:\\Users\\Admin\\AppData\\Roaming\\rtubcufb\\urfuxeuy.exe" cmd.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
nex.exeurfuxeuy.exedescription pid Process procid_target PID 2784 set thread context of 2520 2784 nex.exe 93 PID 1636 set thread context of 1172 1636 urfuxeuy.exe 97 -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
nex.exeurfuxeuy.exeurfuxeuy.execmd.exenotepad.exenex.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nex.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language urfuxeuy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language urfuxeuy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nex.exe -
Suspicious use of WriteProcessMemory 37 IoCs
Processes:
nex.exenex.exeurfuxeuy.exeurfuxeuy.execmd.exedescription pid Process procid_target PID 2784 wrote to memory of 2520 2784 nex.exe 93 PID 2784 wrote to memory of 2520 2784 nex.exe 93 PID 2784 wrote to memory of 2520 2784 nex.exe 93 PID 2784 wrote to memory of 2520 2784 nex.exe 93 PID 2784 wrote to memory of 2520 2784 nex.exe 93 PID 2784 wrote to memory of 2520 2784 nex.exe 93 PID 2784 wrote to memory of 2520 2784 nex.exe 93 PID 2784 wrote to memory of 2520 2784 nex.exe 93 PID 2784 wrote to memory of 2520 2784 nex.exe 93 PID 2784 wrote to memory of 2520 2784 nex.exe 93 PID 2520 wrote to memory of 1636 2520 nex.exe 94 PID 2520 wrote to memory of 1636 2520 nex.exe 94 PID 2520 wrote to memory of 1636 2520 nex.exe 94 PID 1636 wrote to memory of 1172 1636 urfuxeuy.exe 97 PID 1636 wrote to memory of 1172 1636 urfuxeuy.exe 97 PID 1636 wrote to memory of 1172 1636 urfuxeuy.exe 97 PID 1636 wrote to memory of 1172 1636 urfuxeuy.exe 97 PID 1636 wrote to memory of 1172 1636 urfuxeuy.exe 97 PID 1636 wrote to memory of 1172 1636 urfuxeuy.exe 97 PID 1636 wrote to memory of 1172 1636 urfuxeuy.exe 97 PID 1636 wrote to memory of 1172 1636 urfuxeuy.exe 97 PID 1636 wrote to memory of 1172 1636 urfuxeuy.exe 97 PID 1636 wrote to memory of 1172 1636 urfuxeuy.exe 97 PID 1172 wrote to memory of 3788 1172 urfuxeuy.exe 98 PID 1172 wrote to memory of 3788 1172 urfuxeuy.exe 98 PID 1172 wrote to memory of 3788 1172 urfuxeuy.exe 98 PID 1172 wrote to memory of 3788 1172 urfuxeuy.exe 98 PID 1172 wrote to memory of 3788 1172 urfuxeuy.exe 98 PID 1172 wrote to memory of 3788 1172 urfuxeuy.exe 98 PID 1172 wrote to memory of 3788 1172 urfuxeuy.exe 98 PID 3788 wrote to memory of 1500 3788 cmd.exe 100 PID 3788 wrote to memory of 1500 3788 cmd.exe 100 PID 3788 wrote to memory of 1500 3788 cmd.exe 100 PID 3788 wrote to memory of 1500 3788 cmd.exe 100 PID 3788 wrote to memory of 1500 3788 cmd.exe 100 PID 3788 wrote to memory of 1500 3788 cmd.exe 100 PID 3788 wrote to memory of 1500 3788 cmd.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\nex.exe"C:\Users\Admin\AppData\Local\Temp\nex.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Users\Admin\AppData\Local\Temp\nex.exe"C:\Users\Admin\AppData\Local\Temp\nex.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Users\Admin\AppData\Roaming\rtubcufb\urfuxeuy.exe"C:\Users\Admin\AppData\Roaming\rtubcufb\urfuxeuy.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Users\Admin\AppData\Roaming\rtubcufb\urfuxeuy.exe"C:\Users\Admin\AppData\Roaming\rtubcufb\urfuxeuy.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"5⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3788 -
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"6⤵
- System Location Discovery: System Language Discovery
PID:1500
-
-
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4344,i,11391966286255097843,10588851088187498028,262144 --variations-seed-version --mojo-platform-channel-handle=4116 /prefetch:81⤵PID:2708
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
367KB
MD55111c960148d9847a4b4fb25f0b6f1e6
SHA121c954d9ec208c169630983970f6a59cbe25ab2e
SHA256598857ebe87e67db25ccf5a543cd553b77fe4be93e9808e236f90068432788a8
SHA512e86cd82864f2daa6dbbed8d13f9cbe4c27dacfcd74fcaea43bd1e0c6dc2aaacfe96c1659513b9f4cfd5f7a7b6cf380db7441f5f491b3ef5d17e32e0aa38afab5