Analysis
-
max time kernel
148s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
03/04/2025, 11:47
Static task
static1
Behavioral task
behavioral1
Sample
2025-04-03_e4fe1cda1b965c4200e53953007721a6_black-basta_cobalt-strike_luca-stealer.exe
Resource
win10v2004-20250314-en
General
-
Target
2025-04-03_e4fe1cda1b965c4200e53953007721a6_black-basta_cobalt-strike_luca-stealer.exe
-
Size
784KB
-
MD5
e4fe1cda1b965c4200e53953007721a6
-
SHA1
e47cc08535efa0e3b38a518c44f827389699c6c9
-
SHA256
8f460857b46f1247edac09f59cc4b1535138ef2d4c191f3c923c93c3833fa46d
-
SHA512
26b783b145d1b300c37d12e39a037150ee5f29921344e90be154a73459f77badd6962a8c5701589160a714e01a59807efc04d97d1843de3e9402f031e604b6d0
-
SSDEEP
24576:S1818EiYTmpVJUOZ1818EiYTmpVJUOZ1L:bTmpVJUOyTmpVJUOP
Malware Config
Extracted
mylobot
onthestage.ru:6521
krebson.ru:4685
stanislasarnoud.ru:5739
Signatures
-
Mylobot family
-
Executes dropped EXE 4 IoCs
pid Process 2560 upeufauu.exe 3952 upeufauu.exe 1532 upeufauu.exe 4052 upeufauu.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gepap = "C:\\Users\\Admin\\AppData\\Roaming\\fauyhusf\\upeufauu.exe" cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 5988 set thread context of 2180 5988 2025-04-03_e4fe1cda1b965c4200e53953007721a6_black-basta_cobalt-strike_luca-stealer.exe 95 PID 2560 set thread context of 3952 2560 upeufauu.exe 98 PID 1532 set thread context of 4052 1532 upeufauu.exe 107 -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language upeufauu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language upeufauu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-03_e4fe1cda1b965c4200e53953007721a6_black-basta_cobalt-strike_luca-stealer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-03_e4fe1cda1b965c4200e53953007721a6_black-basta_cobalt-strike_luca-stealer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language upeufauu.exe -
Suspicious use of WriteProcessMemory 50 IoCs
description pid Process procid_target PID 5988 wrote to memory of 2180 5988 2025-04-03_e4fe1cda1b965c4200e53953007721a6_black-basta_cobalt-strike_luca-stealer.exe 95 PID 5988 wrote to memory of 2180 5988 2025-04-03_e4fe1cda1b965c4200e53953007721a6_black-basta_cobalt-strike_luca-stealer.exe 95 PID 5988 wrote to memory of 2180 5988 2025-04-03_e4fe1cda1b965c4200e53953007721a6_black-basta_cobalt-strike_luca-stealer.exe 95 PID 5988 wrote to memory of 2180 5988 2025-04-03_e4fe1cda1b965c4200e53953007721a6_black-basta_cobalt-strike_luca-stealer.exe 95 PID 5988 wrote to memory of 2180 5988 2025-04-03_e4fe1cda1b965c4200e53953007721a6_black-basta_cobalt-strike_luca-stealer.exe 95 PID 5988 wrote to memory of 2180 5988 2025-04-03_e4fe1cda1b965c4200e53953007721a6_black-basta_cobalt-strike_luca-stealer.exe 95 PID 5988 wrote to memory of 2180 5988 2025-04-03_e4fe1cda1b965c4200e53953007721a6_black-basta_cobalt-strike_luca-stealer.exe 95 PID 5988 wrote to memory of 2180 5988 2025-04-03_e4fe1cda1b965c4200e53953007721a6_black-basta_cobalt-strike_luca-stealer.exe 95 PID 5988 wrote to memory of 2180 5988 2025-04-03_e4fe1cda1b965c4200e53953007721a6_black-basta_cobalt-strike_luca-stealer.exe 95 PID 5988 wrote to memory of 2180 5988 2025-04-03_e4fe1cda1b965c4200e53953007721a6_black-basta_cobalt-strike_luca-stealer.exe 95 PID 2180 wrote to memory of 2560 2180 2025-04-03_e4fe1cda1b965c4200e53953007721a6_black-basta_cobalt-strike_luca-stealer.exe 96 PID 2180 wrote to memory of 2560 2180 2025-04-03_e4fe1cda1b965c4200e53953007721a6_black-basta_cobalt-strike_luca-stealer.exe 96 PID 2180 wrote to memory of 2560 2180 2025-04-03_e4fe1cda1b965c4200e53953007721a6_black-basta_cobalt-strike_luca-stealer.exe 96 PID 2560 wrote to memory of 3952 2560 upeufauu.exe 98 PID 2560 wrote to memory of 3952 2560 upeufauu.exe 98 PID 2560 wrote to memory of 3952 2560 upeufauu.exe 98 PID 2560 wrote to memory of 3952 2560 upeufauu.exe 98 PID 2560 wrote to memory of 3952 2560 upeufauu.exe 98 PID 2560 wrote to memory of 3952 2560 upeufauu.exe 98 PID 2560 wrote to memory of 3952 2560 upeufauu.exe 98 PID 2560 wrote to memory of 3952 2560 upeufauu.exe 98 PID 2560 wrote to memory of 3952 2560 upeufauu.exe 98 PID 2560 wrote to memory of 3952 2560 upeufauu.exe 98 PID 3952 wrote to memory of 5748 3952 upeufauu.exe 99 PID 3952 wrote to memory of 5748 3952 upeufauu.exe 99 PID 3952 wrote to memory of 5748 3952 upeufauu.exe 99 PID 3952 wrote to memory of 5748 3952 upeufauu.exe 99 PID 3952 wrote to memory of 5748 3952 upeufauu.exe 99 PID 3952 wrote to memory of 5748 3952 upeufauu.exe 99 PID 3952 wrote to memory of 5748 3952 upeufauu.exe 99 PID 5748 wrote to memory of 3748 5748 cmd.exe 101 PID 5748 wrote to memory of 3748 5748 cmd.exe 101 PID 5748 wrote to memory of 3748 5748 cmd.exe 101 PID 5748 wrote to memory of 3748 5748 cmd.exe 101 PID 5440 wrote to memory of 1532 5440 cmd.exe 104 PID 5440 wrote to memory of 1532 5440 cmd.exe 104 PID 5440 wrote to memory of 1532 5440 cmd.exe 104 PID 5748 wrote to memory of 3748 5748 cmd.exe 101 PID 5748 wrote to memory of 3748 5748 cmd.exe 101 PID 5748 wrote to memory of 3748 5748 cmd.exe 101 PID 1532 wrote to memory of 4052 1532 upeufauu.exe 107 PID 1532 wrote to memory of 4052 1532 upeufauu.exe 107 PID 1532 wrote to memory of 4052 1532 upeufauu.exe 107 PID 1532 wrote to memory of 4052 1532 upeufauu.exe 107 PID 1532 wrote to memory of 4052 1532 upeufauu.exe 107 PID 1532 wrote to memory of 4052 1532 upeufauu.exe 107 PID 1532 wrote to memory of 4052 1532 upeufauu.exe 107 PID 1532 wrote to memory of 4052 1532 upeufauu.exe 107 PID 1532 wrote to memory of 4052 1532 upeufauu.exe 107 PID 1532 wrote to memory of 4052 1532 upeufauu.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-04-03_e4fe1cda1b965c4200e53953007721a6_black-basta_cobalt-strike_luca-stealer.exe"C:\Users\Admin\AppData\Local\Temp\2025-04-03_e4fe1cda1b965c4200e53953007721a6_black-basta_cobalt-strike_luca-stealer.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5988 -
C:\Users\Admin\AppData\Local\Temp\2025-04-03_e4fe1cda1b965c4200e53953007721a6_black-basta_cobalt-strike_luca-stealer.exe"C:\Users\Admin\AppData\Local\Temp\2025-04-03_e4fe1cda1b965c4200e53953007721a6_black-basta_cobalt-strike_luca-stealer.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Users\Admin\AppData\Roaming\fauyhusf\upeufauu.exe"C:\Users\Admin\AppData\Roaming\fauyhusf\upeufauu.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Users\Admin\AppData\Roaming\fauyhusf\upeufauu.exe"C:\Users\Admin\AppData\Roaming\fauyhusf\upeufauu.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3952 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"5⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5748 -
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"6⤵
- System Location Discovery: System Language Discovery
PID:3748
-
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\fauyhusf\upeufauu.exe1⤵
- Suspicious use of WriteProcessMemory
PID:5440 -
C:\Users\Admin\AppData\Roaming\fauyhusf\upeufauu.exeC:\Users\Admin\AppData\Roaming\fauyhusf\upeufauu.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Users\Admin\AppData\Roaming\fauyhusf\upeufauu.exeC:\Users\Admin\AppData\Roaming\fauyhusf\upeufauu.exe3⤵
- Executes dropped EXE
PID:4052
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
784KB
MD5e4fe1cda1b965c4200e53953007721a6
SHA1e47cc08535efa0e3b38a518c44f827389699c6c9
SHA2568f460857b46f1247edac09f59cc4b1535138ef2d4c191f3c923c93c3833fa46d
SHA51226b783b145d1b300c37d12e39a037150ee5f29921344e90be154a73459f77badd6962a8c5701589160a714e01a59807efc04d97d1843de3e9402f031e604b6d0