Analysis
-
max time kernel
4294183s -
max time network
157s -
platform
windows7_x64 -
resource
win7-20220311-en -
submitted
20-03-2022 01:41
Static task
static1
Behavioral task
behavioral1
Sample
4c0a663f8e4ef5bf257dbf1f38174a74828151382d1d9918d629fbae04263a0c.exe
Resource
win7-20220311-en
Behavioral task
behavioral2
Sample
4c0a663f8e4ef5bf257dbf1f38174a74828151382d1d9918d629fbae04263a0c.exe
Resource
win10v2004-en-20220113
General
-
Target
4c0a663f8e4ef5bf257dbf1f38174a74828151382d1d9918d629fbae04263a0c.exe
-
Size
564KB
-
MD5
6fb8c809e635fbc46adad84e9c78415a
-
SHA1
f884cc366990915da0d9681d73622070f616bc39
-
SHA256
4c0a663f8e4ef5bf257dbf1f38174a74828151382d1d9918d629fbae04263a0c
-
SHA512
b07c94fe006f65bc984cce1d55d217a1beadc97d5554365f81e91143b3901436308e4e2b57f772e6c554124ba1b3e46e0d7c9ae2db678478f2b8478653a67eb3
Malware Config
Signatures
-
Generic Chinese Botnet
A botnet originating from China which is currently unnamed publicly.
-
Chinese Botnet Payload 1 IoCs
resource yara_rule behavioral1/memory/1192-55-0x0000000010000000-0x0000000010017000-memory.dmp unk_chinese_botnet -
Executes dropped EXE 2 IoCs
pid Process 656 Pmumejm.exe 2012 Pmumejm.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\I: 4c0a663f8e4ef5bf257dbf1f38174a74828151382d1d9918d629fbae04263a0c.exe File opened (read-only) \??\K: 4c0a663f8e4ef5bf257dbf1f38174a74828151382d1d9918d629fbae04263a0c.exe File opened (read-only) \??\L: 4c0a663f8e4ef5bf257dbf1f38174a74828151382d1d9918d629fbae04263a0c.exe File opened (read-only) \??\P: 4c0a663f8e4ef5bf257dbf1f38174a74828151382d1d9918d629fbae04263a0c.exe File opened (read-only) \??\W: 4c0a663f8e4ef5bf257dbf1f38174a74828151382d1d9918d629fbae04263a0c.exe File opened (read-only) \??\F: 4c0a663f8e4ef5bf257dbf1f38174a74828151382d1d9918d629fbae04263a0c.exe File opened (read-only) \??\E: 4c0a663f8e4ef5bf257dbf1f38174a74828151382d1d9918d629fbae04263a0c.exe File opened (read-only) \??\G: 4c0a663f8e4ef5bf257dbf1f38174a74828151382d1d9918d629fbae04263a0c.exe File opened (read-only) \??\H: 4c0a663f8e4ef5bf257dbf1f38174a74828151382d1d9918d629fbae04263a0c.exe File opened (read-only) \??\N: 4c0a663f8e4ef5bf257dbf1f38174a74828151382d1d9918d629fbae04263a0c.exe File opened (read-only) \??\Q: 4c0a663f8e4ef5bf257dbf1f38174a74828151382d1d9918d629fbae04263a0c.exe File opened (read-only) \??\T: 4c0a663f8e4ef5bf257dbf1f38174a74828151382d1d9918d629fbae04263a0c.exe File opened (read-only) \??\V: 4c0a663f8e4ef5bf257dbf1f38174a74828151382d1d9918d629fbae04263a0c.exe File opened (read-only) \??\B: 4c0a663f8e4ef5bf257dbf1f38174a74828151382d1d9918d629fbae04263a0c.exe File opened (read-only) \??\O: 4c0a663f8e4ef5bf257dbf1f38174a74828151382d1d9918d629fbae04263a0c.exe File opened (read-only) \??\R: 4c0a663f8e4ef5bf257dbf1f38174a74828151382d1d9918d629fbae04263a0c.exe File opened (read-only) \??\Y: 4c0a663f8e4ef5bf257dbf1f38174a74828151382d1d9918d629fbae04263a0c.exe File opened (read-only) \??\Z: 4c0a663f8e4ef5bf257dbf1f38174a74828151382d1d9918d629fbae04263a0c.exe File opened (read-only) \??\J: 4c0a663f8e4ef5bf257dbf1f38174a74828151382d1d9918d629fbae04263a0c.exe File opened (read-only) \??\S: 4c0a663f8e4ef5bf257dbf1f38174a74828151382d1d9918d629fbae04263a0c.exe File opened (read-only) \??\U: 4c0a663f8e4ef5bf257dbf1f38174a74828151382d1d9918d629fbae04263a0c.exe File opened (read-only) \??\X: 4c0a663f8e4ef5bf257dbf1f38174a74828151382d1d9918d629fbae04263a0c.exe File opened (read-only) \??\M: 4c0a663f8e4ef5bf257dbf1f38174a74828151382d1d9918d629fbae04263a0c.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Pmumejm.exe 4c0a663f8e4ef5bf257dbf1f38174a74828151382d1d9918d629fbae04263a0c.exe File opened for modification C:\Program Files (x86)\Pmumejm.exe 4c0a663f8e4ef5bf257dbf1f38174a74828151382d1d9918d629fbae04263a0c.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 4c0a663f8e4ef5bf257dbf1f38174a74828151382d1d9918d629fbae04263a0c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz 4c0a663f8e4ef5bf257dbf1f38174a74828151382d1d9918d629fbae04263a0c.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1192 4c0a663f8e4ef5bf257dbf1f38174a74828151382d1d9918d629fbae04263a0c.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1192 4c0a663f8e4ef5bf257dbf1f38174a74828151382d1d9918d629fbae04263a0c.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1192 4c0a663f8e4ef5bf257dbf1f38174a74828151382d1d9918d629fbae04263a0c.exe 656 Pmumejm.exe 2012 Pmumejm.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 656 wrote to memory of 2012 656 Pmumejm.exe 28 PID 656 wrote to memory of 2012 656 Pmumejm.exe 28 PID 656 wrote to memory of 2012 656 Pmumejm.exe 28 PID 656 wrote to memory of 2012 656 Pmumejm.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\4c0a663f8e4ef5bf257dbf1f38174a74828151382d1d9918d629fbae04263a0c.exe"C:\Users\Admin\AppData\Local\Temp\4c0a663f8e4ef5bf257dbf1f38174a74828151382d1d9918d629fbae04263a0c.exe"1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
PID:1192
-
C:\Program Files (x86)\Pmumejm.exe"C:\Program Files (x86)\Pmumejm.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:656 -
C:\Program Files (x86)\Pmumejm.exe"C:\Program Files (x86)\Pmumejm.exe" Win72⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2012
-