Analysis
-
max time kernel
149s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
03/04/2025, 11:48
Static task
static1
Behavioral task
behavioral1
Sample
2025-04-03_ce83433a14b93f60e6eb64e4b20790ba_black-basta_luca-stealer.exe
Resource
win10v2004-20250314-en
General
-
Target
2025-04-03_ce83433a14b93f60e6eb64e4b20790ba_black-basta_luca-stealer.exe
-
Size
2.2MB
-
MD5
ce83433a14b93f60e6eb64e4b20790ba
-
SHA1
be81c04340a43e99b8b0a065664c98be39040ca4
-
SHA256
11f19797364832d08cd3855035729a23e44c2237ff5cf880e45eba5e3d5f3158
-
SHA512
a4827a5000bd1db565606c349052650740f39aa24e3a75a49c9f4f4b1795b244dc18bd87c2509b498b6e32a689004ce209f72495e31bb2f14baa327d7da820d1
-
SSDEEP
49152:bTmpVJUOyTmpVJUOyTmpVJUOyTmpVJUOyTmpVJUOyTmpVJUO9:bTmpV4TmpV4TmpV4TmpV4TmpV4TmpVX
Malware Config
Extracted
mylobot
onthestage.ru:6521
krebson.ru:4685
stanislasarnoud.ru:5739
Signatures
-
Mylobot family
-
Executes dropped EXE 4 IoCs
pid Process 2372 uqtuxpus.exe 4656 uqtuxpus.exe 5228 uqtuxpus.exe 636 uqtuxpus.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-83325578-304917428-1200496059-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lrqgh = "C:\\Users\\Admin\\AppData\\Roaming\\eturcufe\\uqtuxpus.exe" cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1800 set thread context of 4504 1800 2025-04-03_ce83433a14b93f60e6eb64e4b20790ba_black-basta_luca-stealer.exe 93 PID 2372 set thread context of 4656 2372 uqtuxpus.exe 96 PID 5228 set thread context of 636 5228 uqtuxpus.exe 105 -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uqtuxpus.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-03_ce83433a14b93f60e6eb64e4b20790ba_black-basta_luca-stealer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-03_ce83433a14b93f60e6eb64e4b20790ba_black-basta_luca-stealer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uqtuxpus.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uqtuxpus.exe -
Suspicious use of WriteProcessMemory 50 IoCs
description pid Process procid_target PID 1800 wrote to memory of 4504 1800 2025-04-03_ce83433a14b93f60e6eb64e4b20790ba_black-basta_luca-stealer.exe 93 PID 1800 wrote to memory of 4504 1800 2025-04-03_ce83433a14b93f60e6eb64e4b20790ba_black-basta_luca-stealer.exe 93 PID 1800 wrote to memory of 4504 1800 2025-04-03_ce83433a14b93f60e6eb64e4b20790ba_black-basta_luca-stealer.exe 93 PID 1800 wrote to memory of 4504 1800 2025-04-03_ce83433a14b93f60e6eb64e4b20790ba_black-basta_luca-stealer.exe 93 PID 1800 wrote to memory of 4504 1800 2025-04-03_ce83433a14b93f60e6eb64e4b20790ba_black-basta_luca-stealer.exe 93 PID 1800 wrote to memory of 4504 1800 2025-04-03_ce83433a14b93f60e6eb64e4b20790ba_black-basta_luca-stealer.exe 93 PID 1800 wrote to memory of 4504 1800 2025-04-03_ce83433a14b93f60e6eb64e4b20790ba_black-basta_luca-stealer.exe 93 PID 1800 wrote to memory of 4504 1800 2025-04-03_ce83433a14b93f60e6eb64e4b20790ba_black-basta_luca-stealer.exe 93 PID 1800 wrote to memory of 4504 1800 2025-04-03_ce83433a14b93f60e6eb64e4b20790ba_black-basta_luca-stealer.exe 93 PID 1800 wrote to memory of 4504 1800 2025-04-03_ce83433a14b93f60e6eb64e4b20790ba_black-basta_luca-stealer.exe 93 PID 4504 wrote to memory of 2372 4504 2025-04-03_ce83433a14b93f60e6eb64e4b20790ba_black-basta_luca-stealer.exe 94 PID 4504 wrote to memory of 2372 4504 2025-04-03_ce83433a14b93f60e6eb64e4b20790ba_black-basta_luca-stealer.exe 94 PID 4504 wrote to memory of 2372 4504 2025-04-03_ce83433a14b93f60e6eb64e4b20790ba_black-basta_luca-stealer.exe 94 PID 2372 wrote to memory of 4656 2372 uqtuxpus.exe 96 PID 2372 wrote to memory of 4656 2372 uqtuxpus.exe 96 PID 2372 wrote to memory of 4656 2372 uqtuxpus.exe 96 PID 2372 wrote to memory of 4656 2372 uqtuxpus.exe 96 PID 2372 wrote to memory of 4656 2372 uqtuxpus.exe 96 PID 2372 wrote to memory of 4656 2372 uqtuxpus.exe 96 PID 2372 wrote to memory of 4656 2372 uqtuxpus.exe 96 PID 2372 wrote to memory of 4656 2372 uqtuxpus.exe 96 PID 2372 wrote to memory of 4656 2372 uqtuxpus.exe 96 PID 2372 wrote to memory of 4656 2372 uqtuxpus.exe 96 PID 4656 wrote to memory of 4476 4656 uqtuxpus.exe 97 PID 4656 wrote to memory of 4476 4656 uqtuxpus.exe 97 PID 4656 wrote to memory of 4476 4656 uqtuxpus.exe 97 PID 4656 wrote to memory of 4476 4656 uqtuxpus.exe 97 PID 4656 wrote to memory of 4476 4656 uqtuxpus.exe 97 PID 4656 wrote to memory of 4476 4656 uqtuxpus.exe 97 PID 4656 wrote to memory of 4476 4656 uqtuxpus.exe 97 PID 4476 wrote to memory of 4436 4476 cmd.exe 99 PID 4476 wrote to memory of 4436 4476 cmd.exe 99 PID 4476 wrote to memory of 4436 4476 cmd.exe 99 PID 4476 wrote to memory of 4436 4476 cmd.exe 99 PID 4144 wrote to memory of 5228 4144 cmd.exe 103 PID 4144 wrote to memory of 5228 4144 cmd.exe 103 PID 4144 wrote to memory of 5228 4144 cmd.exe 103 PID 4476 wrote to memory of 4436 4476 cmd.exe 99 PID 4476 wrote to memory of 4436 4476 cmd.exe 99 PID 4476 wrote to memory of 4436 4476 cmd.exe 99 PID 5228 wrote to memory of 636 5228 uqtuxpus.exe 105 PID 5228 wrote to memory of 636 5228 uqtuxpus.exe 105 PID 5228 wrote to memory of 636 5228 uqtuxpus.exe 105 PID 5228 wrote to memory of 636 5228 uqtuxpus.exe 105 PID 5228 wrote to memory of 636 5228 uqtuxpus.exe 105 PID 5228 wrote to memory of 636 5228 uqtuxpus.exe 105 PID 5228 wrote to memory of 636 5228 uqtuxpus.exe 105 PID 5228 wrote to memory of 636 5228 uqtuxpus.exe 105 PID 5228 wrote to memory of 636 5228 uqtuxpus.exe 105 PID 5228 wrote to memory of 636 5228 uqtuxpus.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-04-03_ce83433a14b93f60e6eb64e4b20790ba_black-basta_luca-stealer.exe"C:\Users\Admin\AppData\Local\Temp\2025-04-03_ce83433a14b93f60e6eb64e4b20790ba_black-basta_luca-stealer.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Users\Admin\AppData\Local\Temp\2025-04-03_ce83433a14b93f60e6eb64e4b20790ba_black-basta_luca-stealer.exe"C:\Users\Admin\AppData\Local\Temp\2025-04-03_ce83433a14b93f60e6eb64e4b20790ba_black-basta_luca-stealer.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Users\Admin\AppData\Roaming\eturcufe\uqtuxpus.exe"C:\Users\Admin\AppData\Roaming\eturcufe\uqtuxpus.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\AppData\Roaming\eturcufe\uqtuxpus.exe"C:\Users\Admin\AppData\Roaming\eturcufe\uqtuxpus.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"5⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"6⤵
- System Location Discovery: System Language Discovery
PID:4436
-
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\eturcufe\uqtuxpus.exe1⤵
- Suspicious use of WriteProcessMemory
PID:4144 -
C:\Users\Admin\AppData\Roaming\eturcufe\uqtuxpus.exeC:\Users\Admin\AppData\Roaming\eturcufe\uqtuxpus.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5228 -
C:\Users\Admin\AppData\Roaming\eturcufe\uqtuxpus.exeC:\Users\Admin\AppData\Roaming\eturcufe\uqtuxpus.exe3⤵
- Executes dropped EXE
PID:636
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.2MB
MD5ce83433a14b93f60e6eb64e4b20790ba
SHA1be81c04340a43e99b8b0a065664c98be39040ca4
SHA25611f19797364832d08cd3855035729a23e44c2237ff5cf880e45eba5e3d5f3158
SHA512a4827a5000bd1db565606c349052650740f39aa24e3a75a49c9f4f4b1795b244dc18bd87c2509b498b6e32a689004ce209f72495e31bb2f14baa327d7da820d1