Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
27/03/2025, 15:14
Static task
static1
Behavioral task
behavioral1
Sample
rid.gif.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
rid.gif.exe
Resource
win10v2004-20250314-en
General
-
Target
rid.gif.exe
-
Size
367KB
-
MD5
871e489e879885db39c583b5cd90bc30
-
SHA1
19897738a379bfce7f1a19be11885f2334acadd8
-
SHA256
d50f7ead9e1d87a6b2f0812996bc8e4e9b1524b35324b75eeba9616cfc782b91
-
SHA512
b3a965841b33c55f0ab6d41a459eeeb66a29fd3b114bc82ccf953d0c459858755c97970152e346e794c2674a9cf9bd219014ecf344f3ce4ee2cfe9a2c4572fd3
-
SSDEEP
6144:aPeWTE1rkt826L4xd1EiftWt6empEVZlVISrt5AuK+FqktodbFQy+:aPbTE1rkt826L4xd1EiEt6empQ+uK+U8
Malware Config
Extracted
mylobot
onthestage.ru:6521
krebson.ru:4685
stanislasarnoud.ru:5739
Signatures
-
Mylobot family
-
Executes dropped EXE 4 IoCs
pid Process 1056 uuxubpuu.exe 1176 uuxubpuu.exe 3924 uuxubpuu.exe 964 uuxubpuu.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-83325578-304917428-1200496059-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yfwgb = "C:\\Users\\Admin\\AppData\\Roaming\\deusxueq\\uuxubpuu.exe" cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 776 set thread context of 4596 776 rid.gif.exe 93 PID 1056 set thread context of 1176 1056 uuxubpuu.exe 96 PID 3924 set thread context of 964 3924 uuxubpuu.exe 105 -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rid.gif.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rid.gif.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uuxubpuu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uuxubpuu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uuxubpuu.exe -
Suspicious use of WriteProcessMemory 50 IoCs
description pid Process procid_target PID 776 wrote to memory of 4596 776 rid.gif.exe 93 PID 776 wrote to memory of 4596 776 rid.gif.exe 93 PID 776 wrote to memory of 4596 776 rid.gif.exe 93 PID 776 wrote to memory of 4596 776 rid.gif.exe 93 PID 776 wrote to memory of 4596 776 rid.gif.exe 93 PID 776 wrote to memory of 4596 776 rid.gif.exe 93 PID 776 wrote to memory of 4596 776 rid.gif.exe 93 PID 776 wrote to memory of 4596 776 rid.gif.exe 93 PID 776 wrote to memory of 4596 776 rid.gif.exe 93 PID 776 wrote to memory of 4596 776 rid.gif.exe 93 PID 4596 wrote to memory of 1056 4596 rid.gif.exe 94 PID 4596 wrote to memory of 1056 4596 rid.gif.exe 94 PID 4596 wrote to memory of 1056 4596 rid.gif.exe 94 PID 1056 wrote to memory of 1176 1056 uuxubpuu.exe 96 PID 1056 wrote to memory of 1176 1056 uuxubpuu.exe 96 PID 1056 wrote to memory of 1176 1056 uuxubpuu.exe 96 PID 1056 wrote to memory of 1176 1056 uuxubpuu.exe 96 PID 1056 wrote to memory of 1176 1056 uuxubpuu.exe 96 PID 1056 wrote to memory of 1176 1056 uuxubpuu.exe 96 PID 1056 wrote to memory of 1176 1056 uuxubpuu.exe 96 PID 1056 wrote to memory of 1176 1056 uuxubpuu.exe 96 PID 1056 wrote to memory of 1176 1056 uuxubpuu.exe 96 PID 1056 wrote to memory of 1176 1056 uuxubpuu.exe 96 PID 1176 wrote to memory of 4372 1176 uuxubpuu.exe 97 PID 1176 wrote to memory of 4372 1176 uuxubpuu.exe 97 PID 1176 wrote to memory of 4372 1176 uuxubpuu.exe 97 PID 1176 wrote to memory of 4372 1176 uuxubpuu.exe 97 PID 1176 wrote to memory of 4372 1176 uuxubpuu.exe 97 PID 1176 wrote to memory of 4372 1176 uuxubpuu.exe 97 PID 1176 wrote to memory of 4372 1176 uuxubpuu.exe 97 PID 4372 wrote to memory of 1452 4372 cmd.exe 99 PID 4372 wrote to memory of 1452 4372 cmd.exe 99 PID 4372 wrote to memory of 1452 4372 cmd.exe 99 PID 4372 wrote to memory of 1452 4372 cmd.exe 99 PID 4576 wrote to memory of 3924 4576 cmd.exe 102 PID 4576 wrote to memory of 3924 4576 cmd.exe 102 PID 4576 wrote to memory of 3924 4576 cmd.exe 102 PID 4372 wrote to memory of 1452 4372 cmd.exe 99 PID 4372 wrote to memory of 1452 4372 cmd.exe 99 PID 4372 wrote to memory of 1452 4372 cmd.exe 99 PID 3924 wrote to memory of 964 3924 uuxubpuu.exe 105 PID 3924 wrote to memory of 964 3924 uuxubpuu.exe 105 PID 3924 wrote to memory of 964 3924 uuxubpuu.exe 105 PID 3924 wrote to memory of 964 3924 uuxubpuu.exe 105 PID 3924 wrote to memory of 964 3924 uuxubpuu.exe 105 PID 3924 wrote to memory of 964 3924 uuxubpuu.exe 105 PID 3924 wrote to memory of 964 3924 uuxubpuu.exe 105 PID 3924 wrote to memory of 964 3924 uuxubpuu.exe 105 PID 3924 wrote to memory of 964 3924 uuxubpuu.exe 105 PID 3924 wrote to memory of 964 3924 uuxubpuu.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\rid.gif.exe"C:\Users\Admin\AppData\Local\Temp\rid.gif.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:776 -
C:\Users\Admin\AppData\Local\Temp\rid.gif.exe"C:\Users\Admin\AppData\Local\Temp\rid.gif.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4596 -
C:\Users\Admin\AppData\Roaming\deusxueq\uuxubpuu.exe"C:\Users\Admin\AppData\Roaming\deusxueq\uuxubpuu.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Users\Admin\AppData\Roaming\deusxueq\uuxubpuu.exe"C:\Users\Admin\AppData\Roaming\deusxueq\uuxubpuu.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"5⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4372 -
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"6⤵
- System Location Discovery: System Language Discovery
PID:1452
-
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\deusxueq\uuxubpuu.exe1⤵
- Suspicious use of WriteProcessMemory
PID:4576 -
C:\Users\Admin\AppData\Roaming\deusxueq\uuxubpuu.exeC:\Users\Admin\AppData\Roaming\deusxueq\uuxubpuu.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3924 -
C:\Users\Admin\AppData\Roaming\deusxueq\uuxubpuu.exeC:\Users\Admin\AppData\Roaming\deusxueq\uuxubpuu.exe3⤵
- Executes dropped EXE
PID:964
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
367KB
MD5871e489e879885db39c583b5cd90bc30
SHA119897738a379bfce7f1a19be11885f2334acadd8
SHA256d50f7ead9e1d87a6b2f0812996bc8e4e9b1524b35324b75eeba9616cfc782b91
SHA512b3a965841b33c55f0ab6d41a459eeeb66a29fd3b114bc82ccf953d0c459858755c97970152e346e794c2674a9cf9bd219014ecf344f3ce4ee2cfe9a2c4572fd3