Analysis
-
max time kernel
134s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
17-03-2022 04:20
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20220311-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-en-20220113
General
-
Target
tmp.exe
-
Size
4.4MB
-
MD5
549a8bb3b1c7ba1212b0bcd5d52ac483
-
SHA1
3be0de1d50a3a155e8c110538863c2858276745d
-
SHA256
ac13d53f8bdc2b3792eb241b7b112c528292c47cd35ad317cf413cdace03251e
-
SHA512
098818e5576682b21fb755d18d59585505815a257e3081dd3cabd1711c39f15f437bf69c376cfb1433118be86a7bc6931cde3226e3b6168bf91231588bb5ced7
Malware Config
Signatures
-
Generic Chinese Botnet
A botnet originating from China which is currently unnamed publicly.
-
suricata: ET MALWARE Possible Malicious Macro DL EXE Feb 2016
suricata: ET MALWARE Possible Malicious Macro DL EXE Feb 2016
-
Chinese Botnet Payload 1 IoCs
resource yara_rule behavioral2/memory/1564-137-0x0000000010000000-0x0000000010020000-memory.dmp unk_chinese_botnet -
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
pid Process 4548 444.exe 4244 444.tmp -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation tmp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\windowssafe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmp.exe" tmp.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\msvcp60.dll 444.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 4244 444.tmp 4244 444.tmp 4244 444.tmp 4244 444.tmp 4244 444.tmp 4244 444.tmp 4244 444.tmp 4244 444.tmp 4244 444.tmp 4244 444.tmp 4244 444.tmp 4244 444.tmp -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4244 444.tmp -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1564 tmp.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1564 wrote to memory of 4548 1564 tmp.exe 87 PID 1564 wrote to memory of 4548 1564 tmp.exe 87 PID 1564 wrote to memory of 4548 1564 tmp.exe 87 PID 4548 wrote to memory of 4244 4548 444.exe 88 PID 4548 wrote to memory of 4244 4548 444.exe 88 PID 4548 wrote to memory of 4244 4548 444.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\ProgramData\444.exe"C:\ProgramData\444.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4548 -
C:\Users\Admin\AppData\Local\Temp\is-79PMG.tmp\444.tmp"C:\Users\Admin\AppData\Local\Temp\is-79PMG.tmp\444.tmp" /SL5="$301CA,849651,770048,C:\ProgramData\444.exe"3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:4244
-
-