Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
24-05-2022 21:56
Static task
static1
Behavioral task
behavioral1
Sample
a59f6414b9d01c85e750fec09c8986d1f3a729bd936ea41639faa4c3d516565a.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
a59f6414b9d01c85e750fec09c8986d1f3a729bd936ea41639faa4c3d516565a.exe
Resource
win10v2004-20220414-en
General
-
Target
a59f6414b9d01c85e750fec09c8986d1f3a729bd936ea41639faa4c3d516565a.exe
-
Size
3.5MB
-
MD5
9c2be565965857100e3aa9ae6aaf4dd3
-
SHA1
983b916aca832e67dbb7e04a705646ca92ce92ee
-
SHA256
a59f6414b9d01c85e750fec09c8986d1f3a729bd936ea41639faa4c3d516565a
-
SHA512
3384c625822c0d338c76f3fc01de42468fd1a4eb85e39769e309040caebd5214f3eabcbbc156d074ce2284dc33412572f43e7db9bcb1c911789268e4e6ba33eb
Malware Config
Signatures
-
Generic Chinese Botnet
A botnet originating from China which is currently unnamed publicly.
-
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x0009000000008527-60.dat acprotect behavioral1/files/0x0009000000008527-59.dat acprotect -
Chinese Botnet Payload 3 IoCs
resource yara_rule behavioral1/memory/976-72-0x0000000010000000-0x0000000010017000-memory.dmp unk_chinese_botnet behavioral1/memory/976-69-0x0000000000400000-0x0000000000957000-memory.dmp unk_chinese_botnet behavioral1/memory/588-78-0x0000000000400000-0x0000000000957000-memory.dmp unk_chinese_botnet -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Executes dropped EXE 3 IoCs
pid Process 1816 ϵͳ°²È«²¹¶¡.exe 976 lsass.exe 588 lsass.exe -
resource yara_rule behavioral1/files/0x0009000000008527-60.dat upx behavioral1/files/0x0009000000008527-59.dat upx -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion lsass.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion lsass.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion lsass.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion lsass.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Wine lsass.exe Key opened \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Wine lsass.exe -
Loads dropped DLL 5 IoCs
pid Process 324 a59f6414b9d01c85e750fec09c8986d1f3a729bd936ea41639faa4c3d516565a.exe 1816 ϵͳ°²È«²¹¶¡.exe 1816 ϵͳ°²È«²¹¶¡.exe 1816 ϵͳ°²È«²¹¶¡.exe 1816 ϵͳ°²È«²¹¶¡.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run ϵͳ°²È«²¹¶¡.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\360°²È«ºËÐÄ·þÎñ = "C:\\Users\\Public\\ϵͳ°²È«²¹¶¡.exe" ϵͳ°²È«²¹¶¡.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA lsass.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA lsass.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 324 a59f6414b9d01c85e750fec09c8986d1f3a729bd936ea41639faa4c3d516565a.exe 976 lsass.exe 588 lsass.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 324 a59f6414b9d01c85e750fec09c8986d1f3a729bd936ea41639faa4c3d516565a.exe 976 lsass.exe 588 lsass.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 324 a59f6414b9d01c85e750fec09c8986d1f3a729bd936ea41639faa4c3d516565a.exe 324 a59f6414b9d01c85e750fec09c8986d1f3a729bd936ea41639faa4c3d516565a.exe 976 lsass.exe 588 lsass.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 324 wrote to memory of 1816 324 a59f6414b9d01c85e750fec09c8986d1f3a729bd936ea41639faa4c3d516565a.exe 28 PID 324 wrote to memory of 1816 324 a59f6414b9d01c85e750fec09c8986d1f3a729bd936ea41639faa4c3d516565a.exe 28 PID 324 wrote to memory of 1816 324 a59f6414b9d01c85e750fec09c8986d1f3a729bd936ea41639faa4c3d516565a.exe 28 PID 324 wrote to memory of 1816 324 a59f6414b9d01c85e750fec09c8986d1f3a729bd936ea41639faa4c3d516565a.exe 28 PID 1816 wrote to memory of 976 1816 ϵͳ°²È«²¹¶¡.exe 29 PID 1816 wrote to memory of 976 1816 ϵͳ°²È«²¹¶¡.exe 29 PID 1816 wrote to memory of 976 1816 ϵͳ°²È«²¹¶¡.exe 29 PID 1816 wrote to memory of 976 1816 ϵͳ°²È«²¹¶¡.exe 29 PID 1816 wrote to memory of 588 1816 ϵͳ°²È«²¹¶¡.exe 30 PID 1816 wrote to memory of 588 1816 ϵͳ°²È«²¹¶¡.exe 30 PID 1816 wrote to memory of 588 1816 ϵͳ°²È«²¹¶¡.exe 30 PID 1816 wrote to memory of 588 1816 ϵͳ°²È«²¹¶¡.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\a59f6414b9d01c85e750fec09c8986d1f3a729bd936ea41639faa4c3d516565a.exe"C:\Users\Admin\AppData\Local\Temp\a59f6414b9d01c85e750fec09c8986d1f3a729bd936ea41639faa4c3d516565a.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:324 -
C:\Users\Public\ϵͳ°²È«²¹¶¡.exeC:\Users\Public\ϵͳ°²È«²¹¶¡.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Users\Public\lsass.exeC:\Users\Public\lsass.exe3⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:976
-
-
C:\Users\Public\lsass.exeC:\Users\Public\lsass.exe3⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:588
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD5f96bc70c42b957a9b3a4cf597763e68c
SHA155d450a0711943e76983c89c125263d18dbe7599
SHA256db28d4caee3e77eaf246e72b1829118adcf9ad62727dbe680bafcc7629610cdd
SHA512f27be1c9ae6726f97497f7b8db84bb61a0c1270d8c0b3b01a07d661362d53c0414e817ebd2e15a37a25b9591f701038c372e85b82e09f3ceb78ffd1306808c53
-
Filesize
2.0MB
MD5fc8a0874e9e7fdb9df4437227a6e4558
SHA1c1845e499a9e047984961410784f46a14baf4267
SHA25606b48d99f3fe80d550d943cf67099788dc3f9ce712b2d5e4ff61b805203ac826
SHA5129955e642ad40799b41bd9289a5d6540abea230ead70d2d9e90455633bab512bc3d3537e72f0452c602f0597f69a35a482cf077cffa1c63b6665f7b69530d72de
-
Filesize
2.0MB
MD5fc8a0874e9e7fdb9df4437227a6e4558
SHA1c1845e499a9e047984961410784f46a14baf4267
SHA25606b48d99f3fe80d550d943cf67099788dc3f9ce712b2d5e4ff61b805203ac826
SHA5129955e642ad40799b41bd9289a5d6540abea230ead70d2d9e90455633bab512bc3d3537e72f0452c602f0597f69a35a482cf077cffa1c63b6665f7b69530d72de
-
Filesize
69KB
MD53d924b86f8dc8215ea1dcda84c218ad7
SHA1bff3baea1ea9f1eef642773382d6e8945fa5bf8c
SHA256a429ee865286dc2be99cb61ac2ed8f29c148aabd7f77943e65114744bc4df98b
SHA512bab02ad0a21b44692bf60db8600872290274b44212febae90c6cf99e09a30c516493253da52b3d80b4fe805100e90fde953b8674c4c8e11911e187dd12dbc7ff
-
Filesize
2.0MB
MD5f96bc70c42b957a9b3a4cf597763e68c
SHA155d450a0711943e76983c89c125263d18dbe7599
SHA256db28d4caee3e77eaf246e72b1829118adcf9ad62727dbe680bafcc7629610cdd
SHA512f27be1c9ae6726f97497f7b8db84bb61a0c1270d8c0b3b01a07d661362d53c0414e817ebd2e15a37a25b9591f701038c372e85b82e09f3ceb78ffd1306808c53
-
Filesize
2.0MB
MD5fc8a0874e9e7fdb9df4437227a6e4558
SHA1c1845e499a9e047984961410784f46a14baf4267
SHA25606b48d99f3fe80d550d943cf67099788dc3f9ce712b2d5e4ff61b805203ac826
SHA5129955e642ad40799b41bd9289a5d6540abea230ead70d2d9e90455633bab512bc3d3537e72f0452c602f0597f69a35a482cf077cffa1c63b6665f7b69530d72de
-
Filesize
2.0MB
MD5fc8a0874e9e7fdb9df4437227a6e4558
SHA1c1845e499a9e047984961410784f46a14baf4267
SHA25606b48d99f3fe80d550d943cf67099788dc3f9ce712b2d5e4ff61b805203ac826
SHA5129955e642ad40799b41bd9289a5d6540abea230ead70d2d9e90455633bab512bc3d3537e72f0452c602f0597f69a35a482cf077cffa1c63b6665f7b69530d72de
-
Filesize
2.0MB
MD5fc8a0874e9e7fdb9df4437227a6e4558
SHA1c1845e499a9e047984961410784f46a14baf4267
SHA25606b48d99f3fe80d550d943cf67099788dc3f9ce712b2d5e4ff61b805203ac826
SHA5129955e642ad40799b41bd9289a5d6540abea230ead70d2d9e90455633bab512bc3d3537e72f0452c602f0597f69a35a482cf077cffa1c63b6665f7b69530d72de
-
Filesize
69KB
MD53d924b86f8dc8215ea1dcda84c218ad7
SHA1bff3baea1ea9f1eef642773382d6e8945fa5bf8c
SHA256a429ee865286dc2be99cb61ac2ed8f29c148aabd7f77943e65114744bc4df98b
SHA512bab02ad0a21b44692bf60db8600872290274b44212febae90c6cf99e09a30c516493253da52b3d80b4fe805100e90fde953b8674c4c8e11911e187dd12dbc7ff