Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows11-21h2_x64 -
resource
win11-20250313-en -
resource tags
arch:x64arch:x86image:win11-20250313-enlocale:en-usos:windows11-21h2-x64system -
submitted
27/03/2025, 14:49
Static task
static1
Behavioral task
behavioral1
Sample
rid.gif.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
rid.gif.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
rid.gif.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral4
Sample
rid.gif.exe
Resource
win11-20250313-en
General
-
Target
rid.gif.exe
-
Size
367KB
-
MD5
871e489e879885db39c583b5cd90bc30
-
SHA1
19897738a379bfce7f1a19be11885f2334acadd8
-
SHA256
d50f7ead9e1d87a6b2f0812996bc8e4e9b1524b35324b75eeba9616cfc782b91
-
SHA512
b3a965841b33c55f0ab6d41a459eeeb66a29fd3b114bc82ccf953d0c459858755c97970152e346e794c2674a9cf9bd219014ecf344f3ce4ee2cfe9a2c4572fd3
-
SSDEEP
6144:aPeWTE1rkt826L4xd1EiftWt6empEVZlVISrt5AuK+FqktodbFQy+:aPbTE1rkt826L4xd1EiEt6empQ+uK+U8
Malware Config
Extracted
mylobot
onthestage.ru:6521
krebson.ru:4685
stanislasarnoud.ru:5739
Signatures
-
Mylobot family
-
Executes dropped EXE 4 IoCs
pid Process 3836 ucxurxup.exe 2828 ucxurxup.exe 4964 ucxurxup.exe 3340 ucxurxup.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2081498128-3109241912-2948996266-1000\Software\Microsoft\Windows\CurrentVersion\Run\rcgjq = "C:\\Users\\Admin\\AppData\\Roaming\\rpubrugd\\ucxurxup.exe" cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 5256 set thread context of 4108 5256 rid.gif.exe 81 PID 3836 set thread context of 2828 3836 ucxurxup.exe 83 PID 4964 set thread context of 3340 4964 ucxurxup.exe 90 -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ucxurxup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rid.gif.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rid.gif.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ucxurxup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ucxurxup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe -
Suspicious use of WriteProcessMemory 50 IoCs
description pid Process procid_target PID 5256 wrote to memory of 4108 5256 rid.gif.exe 81 PID 5256 wrote to memory of 4108 5256 rid.gif.exe 81 PID 5256 wrote to memory of 4108 5256 rid.gif.exe 81 PID 5256 wrote to memory of 4108 5256 rid.gif.exe 81 PID 5256 wrote to memory of 4108 5256 rid.gif.exe 81 PID 5256 wrote to memory of 4108 5256 rid.gif.exe 81 PID 5256 wrote to memory of 4108 5256 rid.gif.exe 81 PID 5256 wrote to memory of 4108 5256 rid.gif.exe 81 PID 5256 wrote to memory of 4108 5256 rid.gif.exe 81 PID 5256 wrote to memory of 4108 5256 rid.gif.exe 81 PID 4108 wrote to memory of 3836 4108 rid.gif.exe 82 PID 4108 wrote to memory of 3836 4108 rid.gif.exe 82 PID 4108 wrote to memory of 3836 4108 rid.gif.exe 82 PID 3836 wrote to memory of 2828 3836 ucxurxup.exe 83 PID 3836 wrote to memory of 2828 3836 ucxurxup.exe 83 PID 3836 wrote to memory of 2828 3836 ucxurxup.exe 83 PID 3836 wrote to memory of 2828 3836 ucxurxup.exe 83 PID 3836 wrote to memory of 2828 3836 ucxurxup.exe 83 PID 3836 wrote to memory of 2828 3836 ucxurxup.exe 83 PID 3836 wrote to memory of 2828 3836 ucxurxup.exe 83 PID 3836 wrote to memory of 2828 3836 ucxurxup.exe 83 PID 3836 wrote to memory of 2828 3836 ucxurxup.exe 83 PID 3836 wrote to memory of 2828 3836 ucxurxup.exe 83 PID 2828 wrote to memory of 2532 2828 ucxurxup.exe 84 PID 2828 wrote to memory of 2532 2828 ucxurxup.exe 84 PID 2828 wrote to memory of 2532 2828 ucxurxup.exe 84 PID 2828 wrote to memory of 2532 2828 ucxurxup.exe 84 PID 2828 wrote to memory of 2532 2828 ucxurxup.exe 84 PID 2828 wrote to memory of 2532 2828 ucxurxup.exe 84 PID 2828 wrote to memory of 2532 2828 ucxurxup.exe 84 PID 2532 wrote to memory of 4412 2532 cmd.exe 86 PID 2532 wrote to memory of 4412 2532 cmd.exe 86 PID 2532 wrote to memory of 4412 2532 cmd.exe 86 PID 2532 wrote to memory of 4412 2532 cmd.exe 86 PID 1668 wrote to memory of 4964 1668 cmd.exe 89 PID 1668 wrote to memory of 4964 1668 cmd.exe 89 PID 1668 wrote to memory of 4964 1668 cmd.exe 89 PID 2532 wrote to memory of 4412 2532 cmd.exe 86 PID 2532 wrote to memory of 4412 2532 cmd.exe 86 PID 2532 wrote to memory of 4412 2532 cmd.exe 86 PID 4964 wrote to memory of 3340 4964 ucxurxup.exe 90 PID 4964 wrote to memory of 3340 4964 ucxurxup.exe 90 PID 4964 wrote to memory of 3340 4964 ucxurxup.exe 90 PID 4964 wrote to memory of 3340 4964 ucxurxup.exe 90 PID 4964 wrote to memory of 3340 4964 ucxurxup.exe 90 PID 4964 wrote to memory of 3340 4964 ucxurxup.exe 90 PID 4964 wrote to memory of 3340 4964 ucxurxup.exe 90 PID 4964 wrote to memory of 3340 4964 ucxurxup.exe 90 PID 4964 wrote to memory of 3340 4964 ucxurxup.exe 90 PID 4964 wrote to memory of 3340 4964 ucxurxup.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\rid.gif.exe"C:\Users\Admin\AppData\Local\Temp\rid.gif.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5256 -
C:\Users\Admin\AppData\Local\Temp\rid.gif.exe"C:\Users\Admin\AppData\Local\Temp\rid.gif.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4108 -
C:\Users\Admin\AppData\Roaming\rpubrugd\ucxurxup.exe"C:\Users\Admin\AppData\Roaming\rpubrugd\ucxurxup.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3836 -
C:\Users\Admin\AppData\Roaming\rpubrugd\ucxurxup.exe"C:\Users\Admin\AppData\Roaming\rpubrugd\ucxurxup.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"5⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\SysWOW64\notepad.exe㊈ū嘸ūWindows\system32\notepad.exe"6⤵
- System Location Discovery: System Language Discovery
PID:4412
-
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\rpubrugd\ucxurxup.exe1⤵
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Users\Admin\AppData\Roaming\rpubrugd\ucxurxup.exeC:\Users\Admin\AppData\Roaming\rpubrugd\ucxurxup.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Users\Admin\AppData\Roaming\rpubrugd\ucxurxup.exeC:\Users\Admin\AppData\Roaming\rpubrugd\ucxurxup.exe3⤵
- Executes dropped EXE
PID:3340
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
367KB
MD5871e489e879885db39c583b5cd90bc30
SHA119897738a379bfce7f1a19be11885f2334acadd8
SHA256d50f7ead9e1d87a6b2f0812996bc8e4e9b1524b35324b75eeba9616cfc782b91
SHA512b3a965841b33c55f0ab6d41a459eeeb66a29fd3b114bc82ccf953d0c459858755c97970152e346e794c2674a9cf9bd219014ecf344f3ce4ee2cfe9a2c4572fd3