Analysis
-
max time kernel
148s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20250313-en -
resource tags
arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system -
submitted
03/04/2025, 11:54
Static task
static1
Behavioral task
behavioral1
Sample
2025-04-03_e4fe1cda1b965c4200e53953007721a6_black-basta_cobalt-strike_luca-stealer.exe
Resource
win10v2004-20250313-en
General
-
Target
2025-04-03_e4fe1cda1b965c4200e53953007721a6_black-basta_cobalt-strike_luca-stealer.exe
-
Size
784KB
-
MD5
e4fe1cda1b965c4200e53953007721a6
-
SHA1
e47cc08535efa0e3b38a518c44f827389699c6c9
-
SHA256
8f460857b46f1247edac09f59cc4b1535138ef2d4c191f3c923c93c3833fa46d
-
SHA512
26b783b145d1b300c37d12e39a037150ee5f29921344e90be154a73459f77badd6962a8c5701589160a714e01a59807efc04d97d1843de3e9402f031e604b6d0
-
SSDEEP
24576:S1818EiYTmpVJUOZ1818EiYTmpVJUOZ1L:bTmpVJUOyTmpVJUOP
Malware Config
Extracted
mylobot
onthestage.ru:6521
krebson.ru:4685
stanislasarnoud.ru:5739
Signatures
-
Mylobot family
-
Executes dropped EXE 4 IoCs
pid Process 4896 uqfubxut.exe 5576 uqfubxut.exe 5504 uqfubxut.exe 2064 uqfubxut.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mnixq = "C:\\Users\\Admin\\AppData\\Roaming\\seuxbuxr\\uqfubxut.exe" cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2220 set thread context of 4992 2220 2025-04-03_e4fe1cda1b965c4200e53953007721a6_black-basta_cobalt-strike_luca-stealer.exe 94 PID 4896 set thread context of 5576 4896 uqfubxut.exe 97 PID 5504 set thread context of 2064 5504 uqfubxut.exe 106 -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uqfubxut.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-03_e4fe1cda1b965c4200e53953007721a6_black-basta_cobalt-strike_luca-stealer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-03_e4fe1cda1b965c4200e53953007721a6_black-basta_cobalt-strike_luca-stealer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uqfubxut.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uqfubxut.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe -
Suspicious use of WriteProcessMemory 50 IoCs
description pid Process procid_target PID 2220 wrote to memory of 4992 2220 2025-04-03_e4fe1cda1b965c4200e53953007721a6_black-basta_cobalt-strike_luca-stealer.exe 94 PID 2220 wrote to memory of 4992 2220 2025-04-03_e4fe1cda1b965c4200e53953007721a6_black-basta_cobalt-strike_luca-stealer.exe 94 PID 2220 wrote to memory of 4992 2220 2025-04-03_e4fe1cda1b965c4200e53953007721a6_black-basta_cobalt-strike_luca-stealer.exe 94 PID 2220 wrote to memory of 4992 2220 2025-04-03_e4fe1cda1b965c4200e53953007721a6_black-basta_cobalt-strike_luca-stealer.exe 94 PID 2220 wrote to memory of 4992 2220 2025-04-03_e4fe1cda1b965c4200e53953007721a6_black-basta_cobalt-strike_luca-stealer.exe 94 PID 2220 wrote to memory of 4992 2220 2025-04-03_e4fe1cda1b965c4200e53953007721a6_black-basta_cobalt-strike_luca-stealer.exe 94 PID 2220 wrote to memory of 4992 2220 2025-04-03_e4fe1cda1b965c4200e53953007721a6_black-basta_cobalt-strike_luca-stealer.exe 94 PID 2220 wrote to memory of 4992 2220 2025-04-03_e4fe1cda1b965c4200e53953007721a6_black-basta_cobalt-strike_luca-stealer.exe 94 PID 2220 wrote to memory of 4992 2220 2025-04-03_e4fe1cda1b965c4200e53953007721a6_black-basta_cobalt-strike_luca-stealer.exe 94 PID 2220 wrote to memory of 4992 2220 2025-04-03_e4fe1cda1b965c4200e53953007721a6_black-basta_cobalt-strike_luca-stealer.exe 94 PID 4992 wrote to memory of 4896 4992 2025-04-03_e4fe1cda1b965c4200e53953007721a6_black-basta_cobalt-strike_luca-stealer.exe 95 PID 4992 wrote to memory of 4896 4992 2025-04-03_e4fe1cda1b965c4200e53953007721a6_black-basta_cobalt-strike_luca-stealer.exe 95 PID 4992 wrote to memory of 4896 4992 2025-04-03_e4fe1cda1b965c4200e53953007721a6_black-basta_cobalt-strike_luca-stealer.exe 95 PID 4896 wrote to memory of 5576 4896 uqfubxut.exe 97 PID 4896 wrote to memory of 5576 4896 uqfubxut.exe 97 PID 4896 wrote to memory of 5576 4896 uqfubxut.exe 97 PID 4896 wrote to memory of 5576 4896 uqfubxut.exe 97 PID 4896 wrote to memory of 5576 4896 uqfubxut.exe 97 PID 4896 wrote to memory of 5576 4896 uqfubxut.exe 97 PID 4896 wrote to memory of 5576 4896 uqfubxut.exe 97 PID 4896 wrote to memory of 5576 4896 uqfubxut.exe 97 PID 4896 wrote to memory of 5576 4896 uqfubxut.exe 97 PID 4896 wrote to memory of 5576 4896 uqfubxut.exe 97 PID 5576 wrote to memory of 3336 5576 uqfubxut.exe 98 PID 5576 wrote to memory of 3336 5576 uqfubxut.exe 98 PID 5576 wrote to memory of 3336 5576 uqfubxut.exe 98 PID 5576 wrote to memory of 3336 5576 uqfubxut.exe 98 PID 5576 wrote to memory of 3336 5576 uqfubxut.exe 98 PID 5576 wrote to memory of 3336 5576 uqfubxut.exe 98 PID 5576 wrote to memory of 3336 5576 uqfubxut.exe 98 PID 3336 wrote to memory of 4416 3336 cmd.exe 100 PID 3336 wrote to memory of 4416 3336 cmd.exe 100 PID 3336 wrote to memory of 4416 3336 cmd.exe 100 PID 3336 wrote to memory of 4416 3336 cmd.exe 100 PID 5764 wrote to memory of 5504 5764 cmd.exe 103 PID 5764 wrote to memory of 5504 5764 cmd.exe 103 PID 5764 wrote to memory of 5504 5764 cmd.exe 103 PID 3336 wrote to memory of 4416 3336 cmd.exe 100 PID 3336 wrote to memory of 4416 3336 cmd.exe 100 PID 3336 wrote to memory of 4416 3336 cmd.exe 100 PID 5504 wrote to memory of 2064 5504 uqfubxut.exe 106 PID 5504 wrote to memory of 2064 5504 uqfubxut.exe 106 PID 5504 wrote to memory of 2064 5504 uqfubxut.exe 106 PID 5504 wrote to memory of 2064 5504 uqfubxut.exe 106 PID 5504 wrote to memory of 2064 5504 uqfubxut.exe 106 PID 5504 wrote to memory of 2064 5504 uqfubxut.exe 106 PID 5504 wrote to memory of 2064 5504 uqfubxut.exe 106 PID 5504 wrote to memory of 2064 5504 uqfubxut.exe 106 PID 5504 wrote to memory of 2064 5504 uqfubxut.exe 106 PID 5504 wrote to memory of 2064 5504 uqfubxut.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-04-03_e4fe1cda1b965c4200e53953007721a6_black-basta_cobalt-strike_luca-stealer.exe"C:\Users\Admin\AppData\Local\Temp\2025-04-03_e4fe1cda1b965c4200e53953007721a6_black-basta_cobalt-strike_luca-stealer.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Users\Admin\AppData\Local\Temp\2025-04-03_e4fe1cda1b965c4200e53953007721a6_black-basta_cobalt-strike_luca-stealer.exe"C:\Users\Admin\AppData\Local\Temp\2025-04-03_e4fe1cda1b965c4200e53953007721a6_black-basta_cobalt-strike_luca-stealer.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Users\Admin\AppData\Roaming\seuxbuxr\uqfubxut.exe"C:\Users\Admin\AppData\Roaming\seuxbuxr\uqfubxut.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Users\Admin\AppData\Roaming\seuxbuxr\uqfubxut.exe"C:\Users\Admin\AppData\Roaming\seuxbuxr\uqfubxut.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5576 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"5⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3336 -
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"6⤵
- System Location Discovery: System Language Discovery
PID:4416
-
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\seuxbuxr\uqfubxut.exe1⤵
- Suspicious use of WriteProcessMemory
PID:5764 -
C:\Users\Admin\AppData\Roaming\seuxbuxr\uqfubxut.exeC:\Users\Admin\AppData\Roaming\seuxbuxr\uqfubxut.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5504 -
C:\Users\Admin\AppData\Roaming\seuxbuxr\uqfubxut.exeC:\Users\Admin\AppData\Roaming\seuxbuxr\uqfubxut.exe3⤵
- Executes dropped EXE
PID:2064
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
784KB
MD5e4fe1cda1b965c4200e53953007721a6
SHA1e47cc08535efa0e3b38a518c44f827389699c6c9
SHA2568f460857b46f1247edac09f59cc4b1535138ef2d4c191f3c923c93c3833fa46d
SHA51226b783b145d1b300c37d12e39a037150ee5f29921344e90be154a73459f77badd6962a8c5701589160a714e01a59807efc04d97d1843de3e9402f031e604b6d0