Analysis
-
max time kernel
76s -
max time network
147s -
platform
windows7_x64 -
resource
win7-en-20210920 -
submitted
22-09-2021 20:59
Static task
static1
Behavioral task
behavioral1
Sample
????????????MV.cmd.exe
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
????????????MV.cmd.exe
Resource
win10-en-20210920
General
-
Target
????????????MV.cmd.exe
-
Size
2.0MB
-
MD5
0889ac4ebfcc906fa3dc17f3a97862da
-
SHA1
dcf4239b4535a3bc4a2a83fadab113984421d086
-
SHA256
07ebb19e273995bef00aa19ad538b5cacb5eb0527288c3f5a31be66bfc1d9bb9
-
SHA512
419d4c89cd9607e2140b0f1eb49c47ed2a0998d40777914bf5b443e5c6906da875407f769b286da390b36f19fcdd9411dd0b6583e3513d1460d3e11533e45bf3
Malware Config
Signatures
-
Generic Chinese Botnet
A botnet originating from China which is currently unnamed publicly.
-
Chinese Botnet Payload 1 IoCs
resource yara_rule behavioral1/memory/1364-54-0x0000000010000000-0x0000000010018000-memory.dmp unk_chinese_botnet -
Executes dropped EXE 2 IoCs
pid Process 1356 Dyydhdv.exe 964 Dyydhdv.exe -
Loads dropped DLL 7 IoCs
pid Process 1356 Dyydhdv.exe 1356 Dyydhdv.exe 1356 Dyydhdv.exe 1356 Dyydhdv.exe 964 Dyydhdv.exe 964 Dyydhdv.exe 964 Dyydhdv.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Y: ____________MV.cmd.exe File opened (read-only) \??\N: ____________MV.cmd.exe File opened (read-only) \??\T: ____________MV.cmd.exe File opened (read-only) \??\U: ____________MV.cmd.exe File opened (read-only) \??\V: ____________MV.cmd.exe File opened (read-only) \??\W: ____________MV.cmd.exe File opened (read-only) \??\F: ____________MV.cmd.exe File opened (read-only) \??\H: ____________MV.cmd.exe File opened (read-only) \??\P: ____________MV.cmd.exe File opened (read-only) \??\Q: ____________MV.cmd.exe File opened (read-only) \??\R: ____________MV.cmd.exe File opened (read-only) \??\Z: ____________MV.cmd.exe File opened (read-only) \??\E: ____________MV.cmd.exe File opened (read-only) \??\G: ____________MV.cmd.exe File opened (read-only) \??\K: ____________MV.cmd.exe File opened (read-only) \??\M: ____________MV.cmd.exe File opened (read-only) \??\O: ____________MV.cmd.exe File opened (read-only) \??\X: ____________MV.cmd.exe File opened (read-only) \??\B: ____________MV.cmd.exe File opened (read-only) \??\I: ____________MV.cmd.exe File opened (read-only) \??\J: ____________MV.cmd.exe File opened (read-only) \??\L: ____________MV.cmd.exe File opened (read-only) \??\S: ____________MV.cmd.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Dyydhdv.exe ____________MV.cmd.exe File opened for modification C:\Program Files (x86)\Dyydhdv.exe ____________MV.cmd.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 ____________MV.cmd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz ____________MV.cmd.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1364 ____________MV.cmd.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1364 ____________MV.cmd.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1364 ____________MV.cmd.exe 1356 Dyydhdv.exe 964 Dyydhdv.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1356 wrote to memory of 964 1356 Dyydhdv.exe 28 PID 1356 wrote to memory of 964 1356 Dyydhdv.exe 28 PID 1356 wrote to memory of 964 1356 Dyydhdv.exe 28 PID 1356 wrote to memory of 964 1356 Dyydhdv.exe 28 PID 1356 wrote to memory of 964 1356 Dyydhdv.exe 28 PID 1356 wrote to memory of 964 1356 Dyydhdv.exe 28 PID 1356 wrote to memory of 964 1356 Dyydhdv.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\____________MV.cmd.exe"C:\Users\Admin\AppData\Local\Temp\____________MV.cmd.exe"1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
PID:1364
-
C:\Program Files (x86)\Dyydhdv.exe"C:\Program Files (x86)\Dyydhdv.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Program Files (x86)\Dyydhdv.exe"C:\Program Files (x86)\Dyydhdv.exe" Win72⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:964
-