Analysis
-
max time kernel
78s -
max time network
143s -
platform
windows7_x64 -
resource
win7-en-20210920 -
submitted
22-09-2021 21:07
Static task
static1
Behavioral task
behavioral1
Sample
????????????????.cmd.exe
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
????????????????.cmd.exe
Resource
win10-en-20210920
General
-
Target
????????????????.cmd.exe
-
Size
1.2MB
-
MD5
57523bab2ccf571fcecc172ea5f44959
-
SHA1
b214a6cc13e5022779b6ecaf0364a0464defa4ca
-
SHA256
ce2b941076f27243a2ef984e5d6b045c505a98bc73a5a3b1152112228079e68b
-
SHA512
197da439cac7e8eb38e60f4be9f832ac91d9b88cc5021ac9036822f87dfb9cb8c72171bceb7b1e5034074ae5de0cb40e2d60c3d73f9820cbd73c4ffeac0ae979
Malware Config
Signatures
-
Generic Chinese Botnet
A botnet originating from China which is currently unnamed publicly.
-
Chinese Botnet Payload 1 IoCs
resource yara_rule behavioral1/memory/1384-55-0x0000000010000000-0x0000000010018000-memory.dmp unk_chinese_botnet -
Executes dropped EXE 2 IoCs
pid Process 1656 Dyydhdv.exe 1312 Dyydhdv.exe -
Loads dropped DLL 7 IoCs
pid Process 1656 Dyydhdv.exe 1656 Dyydhdv.exe 1656 Dyydhdv.exe 1656 Dyydhdv.exe 1312 Dyydhdv.exe 1312 Dyydhdv.exe 1312 Dyydhdv.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: ________________.cmd.exe File opened (read-only) \??\X: ________________.cmd.exe File opened (read-only) \??\B: ________________.cmd.exe File opened (read-only) \??\E: ________________.cmd.exe File opened (read-only) \??\G: ________________.cmd.exe File opened (read-only) \??\S: ________________.cmd.exe File opened (read-only) \??\U: ________________.cmd.exe File opened (read-only) \??\O: ________________.cmd.exe File opened (read-only) \??\W: ________________.cmd.exe File opened (read-only) \??\Z: ________________.cmd.exe File opened (read-only) \??\I: ________________.cmd.exe File opened (read-only) \??\J: ________________.cmd.exe File opened (read-only) \??\K: ________________.cmd.exe File opened (read-only) \??\L: ________________.cmd.exe File opened (read-only) \??\M: ________________.cmd.exe File opened (read-only) \??\T: ________________.cmd.exe File opened (read-only) \??\V: ________________.cmd.exe File opened (read-only) \??\Y: ________________.cmd.exe File opened (read-only) \??\H: ________________.cmd.exe File opened (read-only) \??\N: ________________.cmd.exe File opened (read-only) \??\P: ________________.cmd.exe File opened (read-only) \??\Q: ________________.cmd.exe File opened (read-only) \??\R: ________________.cmd.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Dyydhdv.exe ________________.cmd.exe File opened for modification C:\Program Files (x86)\Dyydhdv.exe ________________.cmd.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 ________________.cmd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz ________________.cmd.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1384 ________________.cmd.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1384 ________________.cmd.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1384 ________________.cmd.exe 1656 Dyydhdv.exe 1312 Dyydhdv.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1656 wrote to memory of 1312 1656 Dyydhdv.exe 28 PID 1656 wrote to memory of 1312 1656 Dyydhdv.exe 28 PID 1656 wrote to memory of 1312 1656 Dyydhdv.exe 28 PID 1656 wrote to memory of 1312 1656 Dyydhdv.exe 28 PID 1656 wrote to memory of 1312 1656 Dyydhdv.exe 28 PID 1656 wrote to memory of 1312 1656 Dyydhdv.exe 28 PID 1656 wrote to memory of 1312 1656 Dyydhdv.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\________________.cmd.exe"C:\Users\Admin\AppData\Local\Temp\________________.cmd.exe"1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
PID:1384
-
C:\Program Files (x86)\Dyydhdv.exe"C:\Program Files (x86)\Dyydhdv.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Program Files (x86)\Dyydhdv.exe"C:\Program Files (x86)\Dyydhdv.exe" Win72⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1312
-