Analysis
-
max time kernel
111s -
max time network
187s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
22-09-2021 21:00
Static task
static1
Behavioral task
behavioral1
Sample
????????????MV.cmd.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
????????????MV.cmd.exe
Resource
win10-en-20210920
General
-
Target
????????????MV.cmd.exe
-
Size
1.2MB
-
MD5
57523bab2ccf571fcecc172ea5f44959
-
SHA1
b214a6cc13e5022779b6ecaf0364a0464defa4ca
-
SHA256
ce2b941076f27243a2ef984e5d6b045c505a98bc73a5a3b1152112228079e68b
-
SHA512
197da439cac7e8eb38e60f4be9f832ac91d9b88cc5021ac9036822f87dfb9cb8c72171bceb7b1e5034074ae5de0cb40e2d60c3d73f9820cbd73c4ffeac0ae979
Malware Config
Signatures
-
Generic Chinese Botnet
A botnet originating from China which is currently unnamed publicly.
-
Chinese Botnet Payload 1 IoCs
resource yara_rule behavioral1/memory/1988-60-0x0000000010000000-0x0000000010018000-memory.dmp unk_chinese_botnet -
Executes dropped EXE 2 IoCs
pid Process 656 Dyydhdv.exe 1628 Dyydhdv.exe -
Loads dropped DLL 7 IoCs
pid Process 656 Dyydhdv.exe 656 Dyydhdv.exe 656 Dyydhdv.exe 656 Dyydhdv.exe 1628 Dyydhdv.exe 1628 Dyydhdv.exe 1628 Dyydhdv.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\V: ____________MV.cmd.exe File opened (read-only) \??\I: ____________MV.cmd.exe File opened (read-only) \??\M: ____________MV.cmd.exe File opened (read-only) \??\P: ____________MV.cmd.exe File opened (read-only) \??\S: ____________MV.cmd.exe File opened (read-only) \??\U: ____________MV.cmd.exe File opened (read-only) \??\Z: ____________MV.cmd.exe File opened (read-only) \??\B: ____________MV.cmd.exe File opened (read-only) \??\G: ____________MV.cmd.exe File opened (read-only) \??\K: ____________MV.cmd.exe File opened (read-only) \??\O: ____________MV.cmd.exe File opened (read-only) \??\Y: ____________MV.cmd.exe File opened (read-only) \??\E: ____________MV.cmd.exe File opened (read-only) \??\H: ____________MV.cmd.exe File opened (read-only) \??\J: ____________MV.cmd.exe File opened (read-only) \??\X: ____________MV.cmd.exe File opened (read-only) \??\R: ____________MV.cmd.exe File opened (read-only) \??\T: ____________MV.cmd.exe File opened (read-only) \??\W: ____________MV.cmd.exe File opened (read-only) \??\F: ____________MV.cmd.exe File opened (read-only) \??\L: ____________MV.cmd.exe File opened (read-only) \??\N: ____________MV.cmd.exe File opened (read-only) \??\Q: ____________MV.cmd.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Dyydhdv.exe ____________MV.cmd.exe File opened for modification C:\Program Files (x86)\Dyydhdv.exe ____________MV.cmd.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz ____________MV.cmd.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 ____________MV.cmd.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1988 ____________MV.cmd.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1988 ____________MV.cmd.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1988 ____________MV.cmd.exe 656 Dyydhdv.exe 1628 Dyydhdv.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 656 wrote to memory of 1628 656 Dyydhdv.exe 28 PID 656 wrote to memory of 1628 656 Dyydhdv.exe 28 PID 656 wrote to memory of 1628 656 Dyydhdv.exe 28 PID 656 wrote to memory of 1628 656 Dyydhdv.exe 28 PID 656 wrote to memory of 1628 656 Dyydhdv.exe 28 PID 656 wrote to memory of 1628 656 Dyydhdv.exe 28 PID 656 wrote to memory of 1628 656 Dyydhdv.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\____________MV.cmd.exe"C:\Users\Admin\AppData\Local\Temp\____________MV.cmd.exe"1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
PID:1988
-
C:\Program Files (x86)\Dyydhdv.exe"C:\Program Files (x86)\Dyydhdv.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:656 -
C:\Program Files (x86)\Dyydhdv.exe"C:\Program Files (x86)\Dyydhdv.exe" Win72⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1628
-