Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10-ltsc_2021_x64 -
resource
win10ltsc2021-20250314-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250314-enlocale:en-usos:windows10-ltsc_2021-x64system -
submitted
27/03/2025, 14:49
Static task
static1
Behavioral task
behavioral1
Sample
rid.gif.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
rid.gif.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
rid.gif.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral4
Sample
rid.gif.exe
Resource
win11-20250313-en
General
-
Target
rid.gif.exe
-
Size
367KB
-
MD5
871e489e879885db39c583b5cd90bc30
-
SHA1
19897738a379bfce7f1a19be11885f2334acadd8
-
SHA256
d50f7ead9e1d87a6b2f0812996bc8e4e9b1524b35324b75eeba9616cfc782b91
-
SHA512
b3a965841b33c55f0ab6d41a459eeeb66a29fd3b114bc82ccf953d0c459858755c97970152e346e794c2674a9cf9bd219014ecf344f3ce4ee2cfe9a2c4572fd3
-
SSDEEP
6144:aPeWTE1rkt826L4xd1EiftWt6empEVZlVISrt5AuK+FqktodbFQy+:aPbTE1rkt826L4xd1EiEt6empQ+uK+U8
Malware Config
Extracted
mylobot
onthestage.ru:6521
krebson.ru:4685
stanislasarnoud.ru:5739
Signatures
-
Mylobot family
-
Executes dropped EXE 4 IoCs
pid Process 396 ucpuycud.exe 2272 ucpuycud.exe 1232 ucpuycud.exe 1356 ucpuycud.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3174447216-2582055397-1659630574-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\huswu = "C:\\Users\\Admin\\AppData\\Roaming\\rtuppues\\ucpuycud.exe" cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3312 set thread context of 3524 3312 rid.gif.exe 85 PID 396 set thread context of 2272 396 ucpuycud.exe 88 PID 1232 set thread context of 1356 1232 ucpuycud.exe 97 -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ucpuycud.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ucpuycud.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ucpuycud.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rid.gif.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rid.gif.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3080 cmd.exe 3080 cmd.exe -
Suspicious use of WriteProcessMemory 50 IoCs
description pid Process procid_target PID 3312 wrote to memory of 3524 3312 rid.gif.exe 85 PID 3312 wrote to memory of 3524 3312 rid.gif.exe 85 PID 3312 wrote to memory of 3524 3312 rid.gif.exe 85 PID 3312 wrote to memory of 3524 3312 rid.gif.exe 85 PID 3312 wrote to memory of 3524 3312 rid.gif.exe 85 PID 3312 wrote to memory of 3524 3312 rid.gif.exe 85 PID 3312 wrote to memory of 3524 3312 rid.gif.exe 85 PID 3312 wrote to memory of 3524 3312 rid.gif.exe 85 PID 3312 wrote to memory of 3524 3312 rid.gif.exe 85 PID 3312 wrote to memory of 3524 3312 rid.gif.exe 85 PID 3524 wrote to memory of 396 3524 rid.gif.exe 86 PID 3524 wrote to memory of 396 3524 rid.gif.exe 86 PID 3524 wrote to memory of 396 3524 rid.gif.exe 86 PID 396 wrote to memory of 2272 396 ucpuycud.exe 88 PID 396 wrote to memory of 2272 396 ucpuycud.exe 88 PID 396 wrote to memory of 2272 396 ucpuycud.exe 88 PID 396 wrote to memory of 2272 396 ucpuycud.exe 88 PID 396 wrote to memory of 2272 396 ucpuycud.exe 88 PID 396 wrote to memory of 2272 396 ucpuycud.exe 88 PID 396 wrote to memory of 2272 396 ucpuycud.exe 88 PID 396 wrote to memory of 2272 396 ucpuycud.exe 88 PID 396 wrote to memory of 2272 396 ucpuycud.exe 88 PID 396 wrote to memory of 2272 396 ucpuycud.exe 88 PID 2272 wrote to memory of 3080 2272 ucpuycud.exe 89 PID 2272 wrote to memory of 3080 2272 ucpuycud.exe 89 PID 2272 wrote to memory of 3080 2272 ucpuycud.exe 89 PID 2272 wrote to memory of 3080 2272 ucpuycud.exe 89 PID 2272 wrote to memory of 3080 2272 ucpuycud.exe 89 PID 2272 wrote to memory of 3080 2272 ucpuycud.exe 89 PID 2272 wrote to memory of 3080 2272 ucpuycud.exe 89 PID 3080 wrote to memory of 1760 3080 cmd.exe 91 PID 3080 wrote to memory of 1760 3080 cmd.exe 91 PID 3080 wrote to memory of 1760 3080 cmd.exe 91 PID 3080 wrote to memory of 1760 3080 cmd.exe 91 PID 4356 wrote to memory of 1232 4356 cmd.exe 94 PID 4356 wrote to memory of 1232 4356 cmd.exe 94 PID 4356 wrote to memory of 1232 4356 cmd.exe 94 PID 3080 wrote to memory of 1760 3080 cmd.exe 91 PID 3080 wrote to memory of 1760 3080 cmd.exe 91 PID 3080 wrote to memory of 1760 3080 cmd.exe 91 PID 1232 wrote to memory of 1356 1232 ucpuycud.exe 97 PID 1232 wrote to memory of 1356 1232 ucpuycud.exe 97 PID 1232 wrote to memory of 1356 1232 ucpuycud.exe 97 PID 1232 wrote to memory of 1356 1232 ucpuycud.exe 97 PID 1232 wrote to memory of 1356 1232 ucpuycud.exe 97 PID 1232 wrote to memory of 1356 1232 ucpuycud.exe 97 PID 1232 wrote to memory of 1356 1232 ucpuycud.exe 97 PID 1232 wrote to memory of 1356 1232 ucpuycud.exe 97 PID 1232 wrote to memory of 1356 1232 ucpuycud.exe 97 PID 1232 wrote to memory of 1356 1232 ucpuycud.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\rid.gif.exe"C:\Users\Admin\AppData\Local\Temp\rid.gif.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3312 -
C:\Users\Admin\AppData\Local\Temp\rid.gif.exe"C:\Users\Admin\AppData\Local\Temp\rid.gif.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3524 -
C:\Users\Admin\AppData\Roaming\rtuppues\ucpuycud.exe"C:\Users\Admin\AppData\Roaming\rtuppues\ucpuycud.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Users\Admin\AppData\Roaming\rtuppues\ucpuycud.exe"C:\Users\Admin\AppData\Roaming\rtuppues\ucpuycud.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"5⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3080 -
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"6⤵
- System Location Discovery: System Language Discovery
PID:1760
-
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\rtuppues\ucpuycud.exe1⤵
- Suspicious use of WriteProcessMemory
PID:4356 -
C:\Users\Admin\AppData\Roaming\rtuppues\ucpuycud.exeC:\Users\Admin\AppData\Roaming\rtuppues\ucpuycud.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Users\Admin\AppData\Roaming\rtuppues\ucpuycud.exeC:\Users\Admin\AppData\Roaming\rtuppues\ucpuycud.exe3⤵
- Executes dropped EXE
PID:1356
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
367KB
MD5871e489e879885db39c583b5cd90bc30
SHA119897738a379bfce7f1a19be11885f2334acadd8
SHA256d50f7ead9e1d87a6b2f0812996bc8e4e9b1524b35324b75eeba9616cfc782b91
SHA512b3a965841b33c55f0ab6d41a459eeeb66a29fd3b114bc82ccf953d0c459858755c97970152e346e794c2674a9cf9bd219014ecf344f3ce4ee2cfe9a2c4572fd3