Analysis
-
max time kernel
149s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
03/04/2025, 11:45
Static task
static1
Behavioral task
behavioral1
Sample
2025-04-03_ce83433a14b93f60e6eb64e4b20790ba_black-basta_luca-stealer.exe
Resource
win10v2004-20250314-en
General
-
Target
2025-04-03_ce83433a14b93f60e6eb64e4b20790ba_black-basta_luca-stealer.exe
-
Size
2.2MB
-
MD5
ce83433a14b93f60e6eb64e4b20790ba
-
SHA1
be81c04340a43e99b8b0a065664c98be39040ca4
-
SHA256
11f19797364832d08cd3855035729a23e44c2237ff5cf880e45eba5e3d5f3158
-
SHA512
a4827a5000bd1db565606c349052650740f39aa24e3a75a49c9f4f4b1795b244dc18bd87c2509b498b6e32a689004ce209f72495e31bb2f14baa327d7da820d1
-
SSDEEP
49152:bTmpVJUOyTmpVJUOyTmpVJUOyTmpVJUOyTmpVJUOyTmpVJUO9:bTmpV4TmpV4TmpV4TmpV4TmpV4TmpVX
Malware Config
Extracted
mylobot
onthestage.ru:6521
krebson.ru:4685
stanislasarnoud.ru:5739
Signatures
-
Mylobot family
-
Executes dropped EXE 4 IoCs
pid Process 2352 uxfuxeuu.exe 5016 uxfuxeuu.exe 3612 uxfuxeuu.exe 3360 uxfuxeuu.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lfpjy = "C:\\Users\\Admin\\AppData\\Roaming\\ctubcuqx\\uxfuxeuu.exe" cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3304 set thread context of 1308 3304 2025-04-03_ce83433a14b93f60e6eb64e4b20790ba_black-basta_luca-stealer.exe 91 PID 2352 set thread context of 5016 2352 uxfuxeuu.exe 98 PID 3612 set thread context of 3360 3612 uxfuxeuu.exe 108 -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uxfuxeuu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uxfuxeuu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uxfuxeuu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-03_ce83433a14b93f60e6eb64e4b20790ba_black-basta_luca-stealer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-03_ce83433a14b93f60e6eb64e4b20790ba_black-basta_luca-stealer.exe -
Suspicious use of WriteProcessMemory 50 IoCs
description pid Process procid_target PID 3304 wrote to memory of 1308 3304 2025-04-03_ce83433a14b93f60e6eb64e4b20790ba_black-basta_luca-stealer.exe 91 PID 3304 wrote to memory of 1308 3304 2025-04-03_ce83433a14b93f60e6eb64e4b20790ba_black-basta_luca-stealer.exe 91 PID 3304 wrote to memory of 1308 3304 2025-04-03_ce83433a14b93f60e6eb64e4b20790ba_black-basta_luca-stealer.exe 91 PID 3304 wrote to memory of 1308 3304 2025-04-03_ce83433a14b93f60e6eb64e4b20790ba_black-basta_luca-stealer.exe 91 PID 3304 wrote to memory of 1308 3304 2025-04-03_ce83433a14b93f60e6eb64e4b20790ba_black-basta_luca-stealer.exe 91 PID 3304 wrote to memory of 1308 3304 2025-04-03_ce83433a14b93f60e6eb64e4b20790ba_black-basta_luca-stealer.exe 91 PID 3304 wrote to memory of 1308 3304 2025-04-03_ce83433a14b93f60e6eb64e4b20790ba_black-basta_luca-stealer.exe 91 PID 3304 wrote to memory of 1308 3304 2025-04-03_ce83433a14b93f60e6eb64e4b20790ba_black-basta_luca-stealer.exe 91 PID 3304 wrote to memory of 1308 3304 2025-04-03_ce83433a14b93f60e6eb64e4b20790ba_black-basta_luca-stealer.exe 91 PID 3304 wrote to memory of 1308 3304 2025-04-03_ce83433a14b93f60e6eb64e4b20790ba_black-basta_luca-stealer.exe 91 PID 1308 wrote to memory of 2352 1308 2025-04-03_ce83433a14b93f60e6eb64e4b20790ba_black-basta_luca-stealer.exe 93 PID 1308 wrote to memory of 2352 1308 2025-04-03_ce83433a14b93f60e6eb64e4b20790ba_black-basta_luca-stealer.exe 93 PID 1308 wrote to memory of 2352 1308 2025-04-03_ce83433a14b93f60e6eb64e4b20790ba_black-basta_luca-stealer.exe 93 PID 2352 wrote to memory of 5016 2352 uxfuxeuu.exe 98 PID 2352 wrote to memory of 5016 2352 uxfuxeuu.exe 98 PID 2352 wrote to memory of 5016 2352 uxfuxeuu.exe 98 PID 2352 wrote to memory of 5016 2352 uxfuxeuu.exe 98 PID 2352 wrote to memory of 5016 2352 uxfuxeuu.exe 98 PID 2352 wrote to memory of 5016 2352 uxfuxeuu.exe 98 PID 2352 wrote to memory of 5016 2352 uxfuxeuu.exe 98 PID 2352 wrote to memory of 5016 2352 uxfuxeuu.exe 98 PID 2352 wrote to memory of 5016 2352 uxfuxeuu.exe 98 PID 2352 wrote to memory of 5016 2352 uxfuxeuu.exe 98 PID 5016 wrote to memory of 4760 5016 uxfuxeuu.exe 100 PID 5016 wrote to memory of 4760 5016 uxfuxeuu.exe 100 PID 5016 wrote to memory of 4760 5016 uxfuxeuu.exe 100 PID 5016 wrote to memory of 4760 5016 uxfuxeuu.exe 100 PID 5016 wrote to memory of 4760 5016 uxfuxeuu.exe 100 PID 5016 wrote to memory of 4760 5016 uxfuxeuu.exe 100 PID 5016 wrote to memory of 4760 5016 uxfuxeuu.exe 100 PID 4760 wrote to memory of 3400 4760 cmd.exe 102 PID 4760 wrote to memory of 3400 4760 cmd.exe 102 PID 4760 wrote to memory of 3400 4760 cmd.exe 102 PID 4760 wrote to memory of 3400 4760 cmd.exe 102 PID 3528 wrote to memory of 3612 3528 cmd.exe 105 PID 3528 wrote to memory of 3612 3528 cmd.exe 105 PID 3528 wrote to memory of 3612 3528 cmd.exe 105 PID 4760 wrote to memory of 3400 4760 cmd.exe 102 PID 4760 wrote to memory of 3400 4760 cmd.exe 102 PID 4760 wrote to memory of 3400 4760 cmd.exe 102 PID 3612 wrote to memory of 3360 3612 uxfuxeuu.exe 108 PID 3612 wrote to memory of 3360 3612 uxfuxeuu.exe 108 PID 3612 wrote to memory of 3360 3612 uxfuxeuu.exe 108 PID 3612 wrote to memory of 3360 3612 uxfuxeuu.exe 108 PID 3612 wrote to memory of 3360 3612 uxfuxeuu.exe 108 PID 3612 wrote to memory of 3360 3612 uxfuxeuu.exe 108 PID 3612 wrote to memory of 3360 3612 uxfuxeuu.exe 108 PID 3612 wrote to memory of 3360 3612 uxfuxeuu.exe 108 PID 3612 wrote to memory of 3360 3612 uxfuxeuu.exe 108 PID 3612 wrote to memory of 3360 3612 uxfuxeuu.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-04-03_ce83433a14b93f60e6eb64e4b20790ba_black-basta_luca-stealer.exe"C:\Users\Admin\AppData\Local\Temp\2025-04-03_ce83433a14b93f60e6eb64e4b20790ba_black-basta_luca-stealer.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3304 -
C:\Users\Admin\AppData\Local\Temp\2025-04-03_ce83433a14b93f60e6eb64e4b20790ba_black-basta_luca-stealer.exe"C:\Users\Admin\AppData\Local\Temp\2025-04-03_ce83433a14b93f60e6eb64e4b20790ba_black-basta_luca-stealer.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Users\Admin\AppData\Roaming\ctubcuqx\uxfuxeuu.exe"C:\Users\Admin\AppData\Roaming\ctubcuqx\uxfuxeuu.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Users\Admin\AppData\Roaming\ctubcuqx\uxfuxeuu.exe"C:\Users\Admin\AppData\Roaming\ctubcuqx\uxfuxeuu.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"5⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4760 -
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"6⤵
- System Location Discovery: System Language Discovery
PID:3400
-
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\ctubcuqx\uxfuxeuu.exe1⤵
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Users\Admin\AppData\Roaming\ctubcuqx\uxfuxeuu.exeC:\Users\Admin\AppData\Roaming\ctubcuqx\uxfuxeuu.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3612 -
C:\Users\Admin\AppData\Roaming\ctubcuqx\uxfuxeuu.exeC:\Users\Admin\AppData\Roaming\ctubcuqx\uxfuxeuu.exe3⤵
- Executes dropped EXE
PID:3360
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.2MB
MD5ce83433a14b93f60e6eb64e4b20790ba
SHA1be81c04340a43e99b8b0a065664c98be39040ca4
SHA25611f19797364832d08cd3855035729a23e44c2237ff5cf880e45eba5e3d5f3158
SHA512a4827a5000bd1db565606c349052650740f39aa24e3a75a49c9f4f4b1795b244dc18bd87c2509b498b6e32a689004ce209f72495e31bb2f14baa327d7da820d1