Analysis
-
max time kernel
4294185s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20220310-en -
submitted
26-03-2022 15:43
Static task
static1
Behavioral task
behavioral1
Sample
e4b486fc6c9c138067e0b4e58f71125bc40dc27962f6bd8b361410183ee586fb.exe
Resource
win7-20220310-en
Behavioral task
behavioral2
Sample
e4b486fc6c9c138067e0b4e58f71125bc40dc27962f6bd8b361410183ee586fb.exe
Resource
win10v2004-en-20220113
General
-
Target
e4b486fc6c9c138067e0b4e58f71125bc40dc27962f6bd8b361410183ee586fb.exe
-
Size
435KB
-
MD5
fcf12b1a2765889b9d7457c56a70a4ab
-
SHA1
985a5cbaf7673d54117b4a0c8a280a19ada3dd6c
-
SHA256
e4b486fc6c9c138067e0b4e58f71125bc40dc27962f6bd8b361410183ee586fb
-
SHA512
c040b3a5f68302b4c23a0407b520b2876c5988a99ed22253e8526169606c5318f5f3ac6b5d5fb4ec95e3e6ce506f821f2dc97d6e3975bf08c50e3541e6e27591
Malware Config
Signatures
-
Generic Chinese Botnet
A botnet originating from China which is currently unnamed publicly.
-
Chinese Botnet Payload 1 IoCs
resource yara_rule behavioral1/memory/1056-56-0x0000000010000000-0x0000000010012000-memory.dmp unk_chinese_botnet -
Executes dropped EXE 2 IoCs
pid Process 1684 svchost.exe 1476 svchost.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\K: e4b486fc6c9c138067e0b4e58f71125bc40dc27962f6bd8b361410183ee586fb.exe File opened (read-only) \??\N: e4b486fc6c9c138067e0b4e58f71125bc40dc27962f6bd8b361410183ee586fb.exe File opened (read-only) \??\U: e4b486fc6c9c138067e0b4e58f71125bc40dc27962f6bd8b361410183ee586fb.exe File opened (read-only) \??\V: e4b486fc6c9c138067e0b4e58f71125bc40dc27962f6bd8b361410183ee586fb.exe File opened (read-only) \??\X: e4b486fc6c9c138067e0b4e58f71125bc40dc27962f6bd8b361410183ee586fb.exe File opened (read-only) \??\I: e4b486fc6c9c138067e0b4e58f71125bc40dc27962f6bd8b361410183ee586fb.exe File opened (read-only) \??\L: e4b486fc6c9c138067e0b4e58f71125bc40dc27962f6bd8b361410183ee586fb.exe File opened (read-only) \??\Q: e4b486fc6c9c138067e0b4e58f71125bc40dc27962f6bd8b361410183ee586fb.exe File opened (read-only) \??\Y: e4b486fc6c9c138067e0b4e58f71125bc40dc27962f6bd8b361410183ee586fb.exe File opened (read-only) \??\T: e4b486fc6c9c138067e0b4e58f71125bc40dc27962f6bd8b361410183ee586fb.exe File opened (read-only) \??\W: e4b486fc6c9c138067e0b4e58f71125bc40dc27962f6bd8b361410183ee586fb.exe File opened (read-only) \??\E: e4b486fc6c9c138067e0b4e58f71125bc40dc27962f6bd8b361410183ee586fb.exe File opened (read-only) \??\G: e4b486fc6c9c138067e0b4e58f71125bc40dc27962f6bd8b361410183ee586fb.exe File opened (read-only) \??\J: e4b486fc6c9c138067e0b4e58f71125bc40dc27962f6bd8b361410183ee586fb.exe File opened (read-only) \??\M: e4b486fc6c9c138067e0b4e58f71125bc40dc27962f6bd8b361410183ee586fb.exe File opened (read-only) \??\O: e4b486fc6c9c138067e0b4e58f71125bc40dc27962f6bd8b361410183ee586fb.exe File opened (read-only) \??\S: e4b486fc6c9c138067e0b4e58f71125bc40dc27962f6bd8b361410183ee586fb.exe File opened (read-only) \??\B: e4b486fc6c9c138067e0b4e58f71125bc40dc27962f6bd8b361410183ee586fb.exe File opened (read-only) \??\F: e4b486fc6c9c138067e0b4e58f71125bc40dc27962f6bd8b361410183ee586fb.exe File opened (read-only) \??\H: e4b486fc6c9c138067e0b4e58f71125bc40dc27962f6bd8b361410183ee586fb.exe File opened (read-only) \??\P: e4b486fc6c9c138067e0b4e58f71125bc40dc27962f6bd8b361410183ee586fb.exe File opened (read-only) \??\R: e4b486fc6c9c138067e0b4e58f71125bc40dc27962f6bd8b361410183ee586fb.exe File opened (read-only) \??\Z: e4b486fc6c9c138067e0b4e58f71125bc40dc27962f6bd8b361410183ee586fb.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\svchost.exe e4b486fc6c9c138067e0b4e58f71125bc40dc27962f6bd8b361410183ee586fb.exe File opened for modification C:\Program Files (x86)\svchost.exe e4b486fc6c9c138067e0b4e58f71125bc40dc27962f6bd8b361410183ee586fb.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 e4b486fc6c9c138067e0b4e58f71125bc40dc27962f6bd8b361410183ee586fb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz e4b486fc6c9c138067e0b4e58f71125bc40dc27962f6bd8b361410183ee586fb.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1056 e4b486fc6c9c138067e0b4e58f71125bc40dc27962f6bd8b361410183ee586fb.exe 1684 svchost.exe 1476 svchost.exe 1056 e4b486fc6c9c138067e0b4e58f71125bc40dc27962f6bd8b361410183ee586fb.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1056 e4b486fc6c9c138067e0b4e58f71125bc40dc27962f6bd8b361410183ee586fb.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1056 e4b486fc6c9c138067e0b4e58f71125bc40dc27962f6bd8b361410183ee586fb.exe 1684 svchost.exe 1476 svchost.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1684 wrote to memory of 1476 1684 svchost.exe 28 PID 1684 wrote to memory of 1476 1684 svchost.exe 28 PID 1684 wrote to memory of 1476 1684 svchost.exe 28 PID 1684 wrote to memory of 1476 1684 svchost.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\e4b486fc6c9c138067e0b4e58f71125bc40dc27962f6bd8b361410183ee586fb.exe"C:\Users\Admin\AppData\Local\Temp\e4b486fc6c9c138067e0b4e58f71125bc40dc27962f6bd8b361410183ee586fb.exe"1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
PID:1056
-
C:\Program Files (x86)\svchost.exe"C:\Program Files (x86)\svchost.exe"1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Program Files (x86)\svchost.exe"C:\Program Files (x86)\svchost.exe" Win72⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1476
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
435KB
MD5fcf12b1a2765889b9d7457c56a70a4ab
SHA1985a5cbaf7673d54117b4a0c8a280a19ada3dd6c
SHA256e4b486fc6c9c138067e0b4e58f71125bc40dc27962f6bd8b361410183ee586fb
SHA512c040b3a5f68302b4c23a0407b520b2876c5988a99ed22253e8526169606c5318f5f3ac6b5d5fb4ec95e3e6ce506f821f2dc97d6e3975bf08c50e3541e6e27591
-
Filesize
435KB
MD5fcf12b1a2765889b9d7457c56a70a4ab
SHA1985a5cbaf7673d54117b4a0c8a280a19ada3dd6c
SHA256e4b486fc6c9c138067e0b4e58f71125bc40dc27962f6bd8b361410183ee586fb
SHA512c040b3a5f68302b4c23a0407b520b2876c5988a99ed22253e8526169606c5318f5f3ac6b5d5fb4ec95e3e6ce506f821f2dc97d6e3975bf08c50e3541e6e27591