Analysis

  • max time kernel
    152s
  • max time network
    160s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    24-05-2022 21:56

General

  • Target

    a59f6414b9d01c85e750fec09c8986d1f3a729bd936ea41639faa4c3d516565a.exe

  • Size

    3.5MB

  • MD5

    9c2be565965857100e3aa9ae6aaf4dd3

  • SHA1

    983b916aca832e67dbb7e04a705646ca92ce92ee

  • SHA256

    a59f6414b9d01c85e750fec09c8986d1f3a729bd936ea41639faa4c3d516565a

  • SHA512

    3384c625822c0d338c76f3fc01de42468fd1a4eb85e39769e309040caebd5214f3eabcbbc156d074ce2284dc33412572f43e7db9bcb1c911789268e4e6ba33eb

Malware Config

Signatures

  • Generic Chinese Botnet

    A botnet originating from China which is currently unnamed publicly.

  • ACProtect 1.3x - 1.4x DLL software 2 IoCs

    Detects file using ACProtect software.

  • Chinese Botnet Payload 2 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
  • Executes dropped EXE 3 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Identifies Wine through registry keys 2 TTPs 2 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a59f6414b9d01c85e750fec09c8986d1f3a729bd936ea41639faa4c3d516565a.exe
    "C:\Users\Admin\AppData\Local\Temp\a59f6414b9d01c85e750fec09c8986d1f3a729bd936ea41639faa4c3d516565a.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4084
    • C:\Users\Public\ϵͳ°²È«²¹¶¡.exe
      C:\Users\Public\ϵͳ°²È«²¹¶¡.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4652
      • C:\Users\Public\lsass.exe
        C:\Users\Public\lsass.exe
        3⤵
        • Executes dropped EXE
        • Checks BIOS information in registry
        • Identifies Wine through registry keys
        • Checks whether UAC is enabled
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:4304
      • C:\Users\Public\lsass.exe
        C:\Users\Public\lsass.exe
        3⤵
        • Executes dropped EXE
        • Checks BIOS information in registry
        • Identifies Wine through registry keys
        • Checks whether UAC is enabled
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:4588

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Public\ExceptCatch.dll

    Filesize

    2.0MB

    MD5

    f96bc70c42b957a9b3a4cf597763e68c

    SHA1

    55d450a0711943e76983c89c125263d18dbe7599

    SHA256

    db28d4caee3e77eaf246e72b1829118adcf9ad62727dbe680bafcc7629610cdd

    SHA512

    f27be1c9ae6726f97497f7b8db84bb61a0c1270d8c0b3b01a07d661362d53c0414e817ebd2e15a37a25b9591f701038c372e85b82e09f3ceb78ffd1306808c53

  • C:\Users\Public\ExceptCatch.dll

    Filesize

    2.0MB

    MD5

    f96bc70c42b957a9b3a4cf597763e68c

    SHA1

    55d450a0711943e76983c89c125263d18dbe7599

    SHA256

    db28d4caee3e77eaf246e72b1829118adcf9ad62727dbe680bafcc7629610cdd

    SHA512

    f27be1c9ae6726f97497f7b8db84bb61a0c1270d8c0b3b01a07d661362d53c0414e817ebd2e15a37a25b9591f701038c372e85b82e09f3ceb78ffd1306808c53

  • C:\Users\Public\lsass.exe

    Filesize

    2.0MB

    MD5

    fc8a0874e9e7fdb9df4437227a6e4558

    SHA1

    c1845e499a9e047984961410784f46a14baf4267

    SHA256

    06b48d99f3fe80d550d943cf67099788dc3f9ce712b2d5e4ff61b805203ac826

    SHA512

    9955e642ad40799b41bd9289a5d6540abea230ead70d2d9e90455633bab512bc3d3537e72f0452c602f0597f69a35a482cf077cffa1c63b6665f7b69530d72de

  • C:\Users\Public\lsass.exe

    Filesize

    2.0MB

    MD5

    fc8a0874e9e7fdb9df4437227a6e4558

    SHA1

    c1845e499a9e047984961410784f46a14baf4267

    SHA256

    06b48d99f3fe80d550d943cf67099788dc3f9ce712b2d5e4ff61b805203ac826

    SHA512

    9955e642ad40799b41bd9289a5d6540abea230ead70d2d9e90455633bab512bc3d3537e72f0452c602f0597f69a35a482cf077cffa1c63b6665f7b69530d72de

  • C:\Users\Public\lsass.exe

    Filesize

    2.0MB

    MD5

    fc8a0874e9e7fdb9df4437227a6e4558

    SHA1

    c1845e499a9e047984961410784f46a14baf4267

    SHA256

    06b48d99f3fe80d550d943cf67099788dc3f9ce712b2d5e4ff61b805203ac826

    SHA512

    9955e642ad40799b41bd9289a5d6540abea230ead70d2d9e90455633bab512bc3d3537e72f0452c602f0597f69a35a482cf077cffa1c63b6665f7b69530d72de

  • C:\Users\Public\ϵͳ°²È«²¹¶¡.exe

    Filesize

    69KB

    MD5

    3d924b86f8dc8215ea1dcda84c218ad7

    SHA1

    bff3baea1ea9f1eef642773382d6e8945fa5bf8c

    SHA256

    a429ee865286dc2be99cb61ac2ed8f29c148aabd7f77943e65114744bc4df98b

    SHA512

    bab02ad0a21b44692bf60db8600872290274b44212febae90c6cf99e09a30c516493253da52b3d80b4fe805100e90fde953b8674c4c8e11911e187dd12dbc7ff

  • C:\Users\Public\ϵͳ°²È«²¹¶¡.exe

    Filesize

    69KB

    MD5

    3d924b86f8dc8215ea1dcda84c218ad7

    SHA1

    bff3baea1ea9f1eef642773382d6e8945fa5bf8c

    SHA256

    a429ee865286dc2be99cb61ac2ed8f29c148aabd7f77943e65114744bc4df98b

    SHA512

    bab02ad0a21b44692bf60db8600872290274b44212febae90c6cf99e09a30c516493253da52b3d80b4fe805100e90fde953b8674c4c8e11911e187dd12dbc7ff

  • memory/4084-138-0x0000000000400000-0x00000000007FD000-memory.dmp

    Filesize

    4.0MB

  • memory/4304-141-0x0000000077760000-0x0000000077903000-memory.dmp

    Filesize

    1.6MB

  • memory/4304-142-0x0000000000400000-0x0000000000957000-memory.dmp

    Filesize

    5.3MB

  • memory/4304-143-0x0000000010000000-0x0000000010017000-memory.dmp

    Filesize

    92KB

  • memory/4588-144-0x0000000077760000-0x0000000077903000-memory.dmp

    Filesize

    1.6MB

  • memory/4588-147-0x0000000000400000-0x0000000000957000-memory.dmp

    Filesize

    5.3MB