Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-10-2024 05:55
Static task
static1
Behavioral task
behavioral1
Sample
6180b3da99cd93c2166f7bb9a893d3ba3eef3dbe9ddd136e880d732cd7cc80d6N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
6180b3da99cd93c2166f7bb9a893d3ba3eef3dbe9ddd136e880d732cd7cc80d6N.exe
Resource
win10v2004-20241007-en
General
-
Target
6180b3da99cd93c2166f7bb9a893d3ba3eef3dbe9ddd136e880d732cd7cc80d6N.exe
-
Size
367KB
-
MD5
3a9599a7c8254282d0634d446b8df8b0
-
SHA1
db3c5b6812b172b6c678693b4bfbcad030472043
-
SHA256
6180b3da99cd93c2166f7bb9a893d3ba3eef3dbe9ddd136e880d732cd7cc80d6
-
SHA512
3959021f6ef4b68a4ca49f9bc6411d6af16e4273fb73b872633e13982a348e4944f0f5f9b5c95e83c68a69add4fa902a2af2e34ba8d238211efa6bb36fc10789
-
SSDEEP
6144:S1eWTE1rkt826L4xd1EiftWt6empEVZlVISrt5AuK+FAk+7vtTuQrdlmTqtWx:S1bTE1rkt826L4xd1EiEt6empQ+uK++w
Malware Config
Extracted
mylobot
onthestage.ru:6521
krebson.ru:4685
stanislasarnoud.ru:5739
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3476 uequthut.exe 2428 uequthut.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gheai = "C:\\Users\\Admin\\AppData\\Roaming\\ttugyute\\uequthut.exe" cmd.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 5112 set thread context of 1344 5112 6180b3da99cd93c2166f7bb9a893d3ba3eef3dbe9ddd136e880d732cd7cc80d6N.exe 90 PID 3476 set thread context of 2428 3476 uequthut.exe 94 -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6180b3da99cd93c2166f7bb9a893d3ba3eef3dbe9ddd136e880d732cd7cc80d6N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6180b3da99cd93c2166f7bb9a893d3ba3eef3dbe9ddd136e880d732cd7cc80d6N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uequthut.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uequthut.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe -
Suspicious use of WriteProcessMemory 37 IoCs
description pid Process procid_target PID 5112 wrote to memory of 1344 5112 6180b3da99cd93c2166f7bb9a893d3ba3eef3dbe9ddd136e880d732cd7cc80d6N.exe 90 PID 5112 wrote to memory of 1344 5112 6180b3da99cd93c2166f7bb9a893d3ba3eef3dbe9ddd136e880d732cd7cc80d6N.exe 90 PID 5112 wrote to memory of 1344 5112 6180b3da99cd93c2166f7bb9a893d3ba3eef3dbe9ddd136e880d732cd7cc80d6N.exe 90 PID 5112 wrote to memory of 1344 5112 6180b3da99cd93c2166f7bb9a893d3ba3eef3dbe9ddd136e880d732cd7cc80d6N.exe 90 PID 5112 wrote to memory of 1344 5112 6180b3da99cd93c2166f7bb9a893d3ba3eef3dbe9ddd136e880d732cd7cc80d6N.exe 90 PID 5112 wrote to memory of 1344 5112 6180b3da99cd93c2166f7bb9a893d3ba3eef3dbe9ddd136e880d732cd7cc80d6N.exe 90 PID 5112 wrote to memory of 1344 5112 6180b3da99cd93c2166f7bb9a893d3ba3eef3dbe9ddd136e880d732cd7cc80d6N.exe 90 PID 5112 wrote to memory of 1344 5112 6180b3da99cd93c2166f7bb9a893d3ba3eef3dbe9ddd136e880d732cd7cc80d6N.exe 90 PID 5112 wrote to memory of 1344 5112 6180b3da99cd93c2166f7bb9a893d3ba3eef3dbe9ddd136e880d732cd7cc80d6N.exe 90 PID 5112 wrote to memory of 1344 5112 6180b3da99cd93c2166f7bb9a893d3ba3eef3dbe9ddd136e880d732cd7cc80d6N.exe 90 PID 1344 wrote to memory of 3476 1344 6180b3da99cd93c2166f7bb9a893d3ba3eef3dbe9ddd136e880d732cd7cc80d6N.exe 92 PID 1344 wrote to memory of 3476 1344 6180b3da99cd93c2166f7bb9a893d3ba3eef3dbe9ddd136e880d732cd7cc80d6N.exe 92 PID 1344 wrote to memory of 3476 1344 6180b3da99cd93c2166f7bb9a893d3ba3eef3dbe9ddd136e880d732cd7cc80d6N.exe 92 PID 3476 wrote to memory of 2428 3476 uequthut.exe 94 PID 3476 wrote to memory of 2428 3476 uequthut.exe 94 PID 3476 wrote to memory of 2428 3476 uequthut.exe 94 PID 3476 wrote to memory of 2428 3476 uequthut.exe 94 PID 3476 wrote to memory of 2428 3476 uequthut.exe 94 PID 3476 wrote to memory of 2428 3476 uequthut.exe 94 PID 3476 wrote to memory of 2428 3476 uequthut.exe 94 PID 3476 wrote to memory of 2428 3476 uequthut.exe 94 PID 3476 wrote to memory of 2428 3476 uequthut.exe 94 PID 3476 wrote to memory of 2428 3476 uequthut.exe 94 PID 2428 wrote to memory of 4568 2428 uequthut.exe 95 PID 2428 wrote to memory of 4568 2428 uequthut.exe 95 PID 2428 wrote to memory of 4568 2428 uequthut.exe 95 PID 2428 wrote to memory of 4568 2428 uequthut.exe 95 PID 2428 wrote to memory of 4568 2428 uequthut.exe 95 PID 2428 wrote to memory of 4568 2428 uequthut.exe 95 PID 2428 wrote to memory of 4568 2428 uequthut.exe 95 PID 4568 wrote to memory of 4036 4568 cmd.exe 97 PID 4568 wrote to memory of 4036 4568 cmd.exe 97 PID 4568 wrote to memory of 4036 4568 cmd.exe 97 PID 4568 wrote to memory of 4036 4568 cmd.exe 97 PID 4568 wrote to memory of 4036 4568 cmd.exe 97 PID 4568 wrote to memory of 4036 4568 cmd.exe 97 PID 4568 wrote to memory of 4036 4568 cmd.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\6180b3da99cd93c2166f7bb9a893d3ba3eef3dbe9ddd136e880d732cd7cc80d6N.exe"C:\Users\Admin\AppData\Local\Temp\6180b3da99cd93c2166f7bb9a893d3ba3eef3dbe9ddd136e880d732cd7cc80d6N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Users\Admin\AppData\Local\Temp\6180b3da99cd93c2166f7bb9a893d3ba3eef3dbe9ddd136e880d732cd7cc80d6N.exe"C:\Users\Admin\AppData\Local\Temp\6180b3da99cd93c2166f7bb9a893d3ba3eef3dbe9ddd136e880d732cd7cc80d6N.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Users\Admin\AppData\Roaming\ttugyute\uequthut.exe"C:\Users\Admin\AppData\Roaming\ttugyute\uequthut.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3476 -
C:\Users\Admin\AppData\Roaming\ttugyute\uequthut.exe"C:\Users\Admin\AppData\Roaming\ttugyute\uequthut.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"5⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4568 -
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"6⤵
- System Location Discovery: System Language Discovery
PID:4036
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
367KB
MD53a9599a7c8254282d0634d446b8df8b0
SHA1db3c5b6812b172b6c678693b4bfbcad030472043
SHA2566180b3da99cd93c2166f7bb9a893d3ba3eef3dbe9ddd136e880d732cd7cc80d6
SHA5123959021f6ef4b68a4ca49f9bc6411d6af16e4273fb73b872633e13982a348e4944f0f5f9b5c95e83c68a69add4fa902a2af2e34ba8d238211efa6bb36fc10789