Analysis
-
max time kernel
142s -
max time network
149s -
platform
windows7_x64 -
resource
win7-en-20210920 -
submitted
22-09-2021 21:07
Static task
static1
Behavioral task
behavioral1
Sample
????????????Mp4.cmd.exe
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
????????????Mp4.cmd.exe
Resource
win10v20210408
General
-
Target
????????????Mp4.cmd.exe
-
Size
1.8MB
-
MD5
61a6445842bfd501f8e8c63a18e899cd
-
SHA1
5c2c9e20f5607534128265bbbd03794be01e9e1d
-
SHA256
ec694d5b05f7aa43e3e701e40686039a38d6827e5e944ba73de07f31da18d608
-
SHA512
96a7f74e40b391c3a06a3da4a4b026862f13493f4307073e24e426046015db5b993de536c709f014c69474117442614dc53ec70efe039520723801374dedb8d9
Malware Config
Signatures
-
Generic Chinese Botnet
A botnet originating from China which is currently unnamed publicly.
-
Chinese Botnet Payload 1 IoCs
resource yara_rule behavioral1/memory/1092-55-0x0000000010000000-0x0000000010018000-memory.dmp unk_chinese_botnet -
Executes dropped EXE 2 IoCs
pid Process 1756 Gmoksas.exe 976 Gmoksas.exe -
Loads dropped DLL 7 IoCs
pid Process 1756 Gmoksas.exe 1756 Gmoksas.exe 1756 Gmoksas.exe 1756 Gmoksas.exe 976 Gmoksas.exe 976 Gmoksas.exe 976 Gmoksas.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\I: ____________Mp4.cmd.exe File opened (read-only) \??\L: ____________Mp4.cmd.exe File opened (read-only) \??\N: ____________Mp4.cmd.exe File opened (read-only) \??\Q: ____________Mp4.cmd.exe File opened (read-only) \??\S: ____________Mp4.cmd.exe File opened (read-only) \??\V: ____________Mp4.cmd.exe File opened (read-only) \??\B: ____________Mp4.cmd.exe File opened (read-only) \??\F: ____________Mp4.cmd.exe File opened (read-only) \??\Y: ____________Mp4.cmd.exe File opened (read-only) \??\P: ____________Mp4.cmd.exe File opened (read-only) \??\W: ____________Mp4.cmd.exe File opened (read-only) \??\Z: ____________Mp4.cmd.exe File opened (read-only) \??\J: ____________Mp4.cmd.exe File opened (read-only) \??\X: ____________Mp4.cmd.exe File opened (read-only) \??\H: ____________Mp4.cmd.exe File opened (read-only) \??\K: ____________Mp4.cmd.exe File opened (read-only) \??\M: ____________Mp4.cmd.exe File opened (read-only) \??\O: ____________Mp4.cmd.exe File opened (read-only) \??\R: ____________Mp4.cmd.exe File opened (read-only) \??\T: ____________Mp4.cmd.exe File opened (read-only) \??\E: ____________Mp4.cmd.exe File opened (read-only) \??\G: ____________Mp4.cmd.exe File opened (read-only) \??\U: ____________Mp4.cmd.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Gmoksas.exe ____________Mp4.cmd.exe File opened for modification C:\Program Files (x86)\Gmoksas.exe ____________Mp4.cmd.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 ____________Mp4.cmd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz ____________Mp4.cmd.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1092 ____________Mp4.cmd.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1092 ____________Mp4.cmd.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1092 ____________Mp4.cmd.exe 1756 Gmoksas.exe 976 Gmoksas.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1756 wrote to memory of 976 1756 Gmoksas.exe 28 PID 1756 wrote to memory of 976 1756 Gmoksas.exe 28 PID 1756 wrote to memory of 976 1756 Gmoksas.exe 28 PID 1756 wrote to memory of 976 1756 Gmoksas.exe 28 PID 1756 wrote to memory of 976 1756 Gmoksas.exe 28 PID 1756 wrote to memory of 976 1756 Gmoksas.exe 28 PID 1756 wrote to memory of 976 1756 Gmoksas.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\____________Mp4.cmd.exe"C:\Users\Admin\AppData\Local\Temp\____________Mp4.cmd.exe"1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
PID:1092
-
C:\Program Files (x86)\Gmoksas.exe"C:\Program Files (x86)\Gmoksas.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Program Files (x86)\Gmoksas.exe"C:\Program Files (x86)\Gmoksas.exe" Win72⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:976
-