Analysis
-
max time kernel
148s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
27/03/2025, 14:49
Static task
static1
Behavioral task
behavioral1
Sample
rid.gif.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
rid.gif.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
rid.gif.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral4
Sample
rid.gif.exe
Resource
win11-20250313-en
General
-
Target
rid.gif.exe
-
Size
367KB
-
MD5
871e489e879885db39c583b5cd90bc30
-
SHA1
19897738a379bfce7f1a19be11885f2334acadd8
-
SHA256
d50f7ead9e1d87a6b2f0812996bc8e4e9b1524b35324b75eeba9616cfc782b91
-
SHA512
b3a965841b33c55f0ab6d41a459eeeb66a29fd3b114bc82ccf953d0c459858755c97970152e346e794c2674a9cf9bd219014ecf344f3ce4ee2cfe9a2c4572fd3
-
SSDEEP
6144:aPeWTE1rkt826L4xd1EiftWt6empEVZlVISrt5AuK+FqktodbFQy+:aPbTE1rkt826L4xd1EiEt6empQ+uK+U8
Malware Config
Extracted
mylobot
onthestage.ru:6521
krebson.ru:4685
stanislasarnoud.ru:5739
Signatures
-
Mylobot family
-
Executes dropped EXE 4 IoCs
pid Process 2232 utcuebuy.exe 1912 utcuebuy.exe 1040 utcuebuy.exe 1592 utcuebuy.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\flofm = "C:\\Users\\Admin\\AppData\\Roaming\\dpuhsurc\\utcuebuy.exe" cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1424 set thread context of 1084 1424 rid.gif.exe 95 PID 2232 set thread context of 1912 2232 utcuebuy.exe 98 PID 1040 set thread context of 1592 1040 utcuebuy.exe 107 -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rid.gif.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rid.gif.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language utcuebuy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language utcuebuy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language utcuebuy.exe -
Suspicious use of WriteProcessMemory 50 IoCs
description pid Process procid_target PID 1424 wrote to memory of 1084 1424 rid.gif.exe 95 PID 1424 wrote to memory of 1084 1424 rid.gif.exe 95 PID 1424 wrote to memory of 1084 1424 rid.gif.exe 95 PID 1424 wrote to memory of 1084 1424 rid.gif.exe 95 PID 1424 wrote to memory of 1084 1424 rid.gif.exe 95 PID 1424 wrote to memory of 1084 1424 rid.gif.exe 95 PID 1424 wrote to memory of 1084 1424 rid.gif.exe 95 PID 1424 wrote to memory of 1084 1424 rid.gif.exe 95 PID 1424 wrote to memory of 1084 1424 rid.gif.exe 95 PID 1424 wrote to memory of 1084 1424 rid.gif.exe 95 PID 1084 wrote to memory of 2232 1084 rid.gif.exe 96 PID 1084 wrote to memory of 2232 1084 rid.gif.exe 96 PID 1084 wrote to memory of 2232 1084 rid.gif.exe 96 PID 2232 wrote to memory of 1912 2232 utcuebuy.exe 98 PID 2232 wrote to memory of 1912 2232 utcuebuy.exe 98 PID 2232 wrote to memory of 1912 2232 utcuebuy.exe 98 PID 2232 wrote to memory of 1912 2232 utcuebuy.exe 98 PID 2232 wrote to memory of 1912 2232 utcuebuy.exe 98 PID 2232 wrote to memory of 1912 2232 utcuebuy.exe 98 PID 2232 wrote to memory of 1912 2232 utcuebuy.exe 98 PID 2232 wrote to memory of 1912 2232 utcuebuy.exe 98 PID 2232 wrote to memory of 1912 2232 utcuebuy.exe 98 PID 2232 wrote to memory of 1912 2232 utcuebuy.exe 98 PID 1912 wrote to memory of 392 1912 utcuebuy.exe 99 PID 1912 wrote to memory of 392 1912 utcuebuy.exe 99 PID 1912 wrote to memory of 392 1912 utcuebuy.exe 99 PID 1912 wrote to memory of 392 1912 utcuebuy.exe 99 PID 1912 wrote to memory of 392 1912 utcuebuy.exe 99 PID 1912 wrote to memory of 392 1912 utcuebuy.exe 99 PID 1912 wrote to memory of 392 1912 utcuebuy.exe 99 PID 392 wrote to memory of 4776 392 cmd.exe 101 PID 392 wrote to memory of 4776 392 cmd.exe 101 PID 392 wrote to memory of 4776 392 cmd.exe 101 PID 392 wrote to memory of 4776 392 cmd.exe 101 PID 4544 wrote to memory of 1040 4544 cmd.exe 104 PID 4544 wrote to memory of 1040 4544 cmd.exe 104 PID 4544 wrote to memory of 1040 4544 cmd.exe 104 PID 392 wrote to memory of 4776 392 cmd.exe 101 PID 392 wrote to memory of 4776 392 cmd.exe 101 PID 392 wrote to memory of 4776 392 cmd.exe 101 PID 1040 wrote to memory of 1592 1040 utcuebuy.exe 107 PID 1040 wrote to memory of 1592 1040 utcuebuy.exe 107 PID 1040 wrote to memory of 1592 1040 utcuebuy.exe 107 PID 1040 wrote to memory of 1592 1040 utcuebuy.exe 107 PID 1040 wrote to memory of 1592 1040 utcuebuy.exe 107 PID 1040 wrote to memory of 1592 1040 utcuebuy.exe 107 PID 1040 wrote to memory of 1592 1040 utcuebuy.exe 107 PID 1040 wrote to memory of 1592 1040 utcuebuy.exe 107 PID 1040 wrote to memory of 1592 1040 utcuebuy.exe 107 PID 1040 wrote to memory of 1592 1040 utcuebuy.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\rid.gif.exe"C:\Users\Admin\AppData\Local\Temp\rid.gif.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Users\Admin\AppData\Local\Temp\rid.gif.exe"C:\Users\Admin\AppData\Local\Temp\rid.gif.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Users\Admin\AppData\Roaming\dpuhsurc\utcuebuy.exe"C:\Users\Admin\AppData\Roaming\dpuhsurc\utcuebuy.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Users\Admin\AppData\Roaming\dpuhsurc\utcuebuy.exe"C:\Users\Admin\AppData\Roaming\dpuhsurc\utcuebuy.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"5⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:392 -
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"6⤵
- System Location Discovery: System Language Discovery
PID:4776
-
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\dpuhsurc\utcuebuy.exe1⤵
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Users\Admin\AppData\Roaming\dpuhsurc\utcuebuy.exeC:\Users\Admin\AppData\Roaming\dpuhsurc\utcuebuy.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Users\Admin\AppData\Roaming\dpuhsurc\utcuebuy.exeC:\Users\Admin\AppData\Roaming\dpuhsurc\utcuebuy.exe3⤵
- Executes dropped EXE
PID:1592
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
367KB
MD5871e489e879885db39c583b5cd90bc30
SHA119897738a379bfce7f1a19be11885f2334acadd8
SHA256d50f7ead9e1d87a6b2f0812996bc8e4e9b1524b35324b75eeba9616cfc782b91
SHA512b3a965841b33c55f0ab6d41a459eeeb66a29fd3b114bc82ccf953d0c459858755c97970152e346e794c2674a9cf9bd219014ecf344f3ce4ee2cfe9a2c4572fd3