Analysis
-
max time kernel
117s -
max time network
111s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
22-10-2024 05:55
Static task
static1
Behavioral task
behavioral1
Sample
6180b3da99cd93c2166f7bb9a893d3ba3eef3dbe9ddd136e880d732cd7cc80d6N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
6180b3da99cd93c2166f7bb9a893d3ba3eef3dbe9ddd136e880d732cd7cc80d6N.exe
Resource
win10v2004-20241007-en
General
-
Target
6180b3da99cd93c2166f7bb9a893d3ba3eef3dbe9ddd136e880d732cd7cc80d6N.exe
-
Size
367KB
-
MD5
3a9599a7c8254282d0634d446b8df8b0
-
SHA1
db3c5b6812b172b6c678693b4bfbcad030472043
-
SHA256
6180b3da99cd93c2166f7bb9a893d3ba3eef3dbe9ddd136e880d732cd7cc80d6
-
SHA512
3959021f6ef4b68a4ca49f9bc6411d6af16e4273fb73b872633e13982a348e4944f0f5f9b5c95e83c68a69add4fa902a2af2e34ba8d238211efa6bb36fc10789
-
SSDEEP
6144:S1eWTE1rkt826L4xd1EiftWt6empEVZlVISrt5AuK+FAk+7vtTuQrdlmTqtWx:S1bTE1rkt826L4xd1EiEt6empQ+uK++w
Malware Config
Extracted
mylobot
onthestage.ru:6521
krebson.ru:4685
stanislasarnoud.ru:5739
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2568 uyyutcuu.exe 2960 uyyutcuu.exe -
Loads dropped DLL 2 IoCs
pid Process 2712 6180b3da99cd93c2166f7bb9a893d3ba3eef3dbe9ddd136e880d732cd7cc80d6N.exe 2568 uyyutcuu.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\epqnu = "C:\\Users\\Admin\\AppData\\Roaming\\sturhuft\\uyyutcuu.exe" cmd.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2644 set thread context of 2712 2644 6180b3da99cd93c2166f7bb9a893d3ba3eef3dbe9ddd136e880d732cd7cc80d6N.exe 30 PID 2568 set thread context of 2960 2568 uyyutcuu.exe 32 -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uyyutcuu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6180b3da99cd93c2166f7bb9a893d3ba3eef3dbe9ddd136e880d732cd7cc80d6N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6180b3da99cd93c2166f7bb9a893d3ba3eef3dbe9ddd136e880d732cd7cc80d6N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uyyutcuu.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 2644 wrote to memory of 2712 2644 6180b3da99cd93c2166f7bb9a893d3ba3eef3dbe9ddd136e880d732cd7cc80d6N.exe 30 PID 2644 wrote to memory of 2712 2644 6180b3da99cd93c2166f7bb9a893d3ba3eef3dbe9ddd136e880d732cd7cc80d6N.exe 30 PID 2644 wrote to memory of 2712 2644 6180b3da99cd93c2166f7bb9a893d3ba3eef3dbe9ddd136e880d732cd7cc80d6N.exe 30 PID 2644 wrote to memory of 2712 2644 6180b3da99cd93c2166f7bb9a893d3ba3eef3dbe9ddd136e880d732cd7cc80d6N.exe 30 PID 2644 wrote to memory of 2712 2644 6180b3da99cd93c2166f7bb9a893d3ba3eef3dbe9ddd136e880d732cd7cc80d6N.exe 30 PID 2644 wrote to memory of 2712 2644 6180b3da99cd93c2166f7bb9a893d3ba3eef3dbe9ddd136e880d732cd7cc80d6N.exe 30 PID 2644 wrote to memory of 2712 2644 6180b3da99cd93c2166f7bb9a893d3ba3eef3dbe9ddd136e880d732cd7cc80d6N.exe 30 PID 2644 wrote to memory of 2712 2644 6180b3da99cd93c2166f7bb9a893d3ba3eef3dbe9ddd136e880d732cd7cc80d6N.exe 30 PID 2644 wrote to memory of 2712 2644 6180b3da99cd93c2166f7bb9a893d3ba3eef3dbe9ddd136e880d732cd7cc80d6N.exe 30 PID 2644 wrote to memory of 2712 2644 6180b3da99cd93c2166f7bb9a893d3ba3eef3dbe9ddd136e880d732cd7cc80d6N.exe 30 PID 2644 wrote to memory of 2712 2644 6180b3da99cd93c2166f7bb9a893d3ba3eef3dbe9ddd136e880d732cd7cc80d6N.exe 30 PID 2712 wrote to memory of 2568 2712 6180b3da99cd93c2166f7bb9a893d3ba3eef3dbe9ddd136e880d732cd7cc80d6N.exe 31 PID 2712 wrote to memory of 2568 2712 6180b3da99cd93c2166f7bb9a893d3ba3eef3dbe9ddd136e880d732cd7cc80d6N.exe 31 PID 2712 wrote to memory of 2568 2712 6180b3da99cd93c2166f7bb9a893d3ba3eef3dbe9ddd136e880d732cd7cc80d6N.exe 31 PID 2712 wrote to memory of 2568 2712 6180b3da99cd93c2166f7bb9a893d3ba3eef3dbe9ddd136e880d732cd7cc80d6N.exe 31 PID 2568 wrote to memory of 2960 2568 uyyutcuu.exe 32 PID 2568 wrote to memory of 2960 2568 uyyutcuu.exe 32 PID 2568 wrote to memory of 2960 2568 uyyutcuu.exe 32 PID 2568 wrote to memory of 2960 2568 uyyutcuu.exe 32 PID 2568 wrote to memory of 2960 2568 uyyutcuu.exe 32 PID 2568 wrote to memory of 2960 2568 uyyutcuu.exe 32 PID 2568 wrote to memory of 2960 2568 uyyutcuu.exe 32 PID 2568 wrote to memory of 2960 2568 uyyutcuu.exe 32 PID 2568 wrote to memory of 2960 2568 uyyutcuu.exe 32 PID 2568 wrote to memory of 2960 2568 uyyutcuu.exe 32 PID 2568 wrote to memory of 2960 2568 uyyutcuu.exe 32 PID 2960 wrote to memory of 1708 2960 uyyutcuu.exe 33 PID 2960 wrote to memory of 1708 2960 uyyutcuu.exe 33 PID 2960 wrote to memory of 1708 2960 uyyutcuu.exe 33 PID 2960 wrote to memory of 1708 2960 uyyutcuu.exe 33 PID 2960 wrote to memory of 1708 2960 uyyutcuu.exe 33 PID 2960 wrote to memory of 1708 2960 uyyutcuu.exe 33 PID 2960 wrote to memory of 1708 2960 uyyutcuu.exe 33 PID 2960 wrote to memory of 1708 2960 uyyutcuu.exe 33 PID 1708 wrote to memory of 2640 1708 cmd.exe 35 PID 1708 wrote to memory of 2640 1708 cmd.exe 35 PID 1708 wrote to memory of 2640 1708 cmd.exe 35 PID 1708 wrote to memory of 2640 1708 cmd.exe 35 PID 1708 wrote to memory of 2640 1708 cmd.exe 35 PID 1708 wrote to memory of 2640 1708 cmd.exe 35 PID 1708 wrote to memory of 2640 1708 cmd.exe 35 PID 1708 wrote to memory of 2640 1708 cmd.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\6180b3da99cd93c2166f7bb9a893d3ba3eef3dbe9ddd136e880d732cd7cc80d6N.exe"C:\Users\Admin\AppData\Local\Temp\6180b3da99cd93c2166f7bb9a893d3ba3eef3dbe9ddd136e880d732cd7cc80d6N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Users\Admin\AppData\Local\Temp\6180b3da99cd93c2166f7bb9a893d3ba3eef3dbe9ddd136e880d732cd7cc80d6N.exe"C:\Users\Admin\AppData\Local\Temp\6180b3da99cd93c2166f7bb9a893d3ba3eef3dbe9ddd136e880d732cd7cc80d6N.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Users\Admin\AppData\Roaming\sturhuft\uyyutcuu.exe"C:\Users\Admin\AppData\Roaming\sturhuft\uyyutcuu.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Users\Admin\AppData\Roaming\sturhuft\uyyutcuu.exe"C:\Users\Admin\AppData\Roaming\sturhuft\uyyutcuu.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"5⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"6⤵
- System Location Discovery: System Language Discovery
PID:2640
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
367KB
MD53a9599a7c8254282d0634d446b8df8b0
SHA1db3c5b6812b172b6c678693b4bfbcad030472043
SHA2566180b3da99cd93c2166f7bb9a893d3ba3eef3dbe9ddd136e880d732cd7cc80d6
SHA5123959021f6ef4b68a4ca49f9bc6411d6af16e4273fb73b872633e13982a348e4944f0f5f9b5c95e83c68a69add4fa902a2af2e34ba8d238211efa6bb36fc10789