Analysis
-
max time kernel
151s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
25/05/2022, 01:51
Static task
static1
Behavioral task
behavioral1
Sample
fe0c0b0b671cccf510ee1075e6c73ad61f24ab8390ca608916861eb6385a6eb1.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
fe0c0b0b671cccf510ee1075e6c73ad61f24ab8390ca608916861eb6385a6eb1.exe
Resource
win10v2004-20220414-en
General
-
Target
fe0c0b0b671cccf510ee1075e6c73ad61f24ab8390ca608916861eb6385a6eb1.exe
-
Size
4.2MB
-
MD5
a97298f5d70fd3eb9c46bc5bb14b6cd6
-
SHA1
7fd6fe0c946ca25386c0402efa6d43f545193b6a
-
SHA256
fe0c0b0b671cccf510ee1075e6c73ad61f24ab8390ca608916861eb6385a6eb1
-
SHA512
2c4ee94382590a7a5427dd7c462767e6d6c5c38f379e181a13b1e300c5869f171722519f37eed095efa80449b738e0892fe01be3c38b695380ac86b8d5b2b10f
Malware Config
Signatures
-
Generic Chinese Botnet
A botnet originating from China which is currently unnamed publicly.
-
Chinese Botnet Payload 2 IoCs
resource yara_rule behavioral2/memory/1904-1494-0x0000000010000000-0x0000000010017000-memory.dmp unk_chinese_botnet behavioral2/memory/1904-1497-0x0000000000400000-0x000000000095E000-memory.dmp unk_chinese_botnet -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Executes dropped EXE 2 IoCs
pid Process 3492 ϵͳ°²È«²¹¶¡.exe 1904 lsass.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion lsass.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion lsass.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Wine lsass.exe -
Loads dropped DLL 1 IoCs
pid Process 3492 ϵͳ°²È«²¹¶¡.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\360°²È«ºËÐÄ·þÎñ = "C:\\Users\\Public\\ϵͳ°²È«²¹¶¡.exe" ϵͳ°²È«²¹¶¡.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA lsass.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 1876 fe0c0b0b671cccf510ee1075e6c73ad61f24ab8390ca608916861eb6385a6eb1.exe 1876 fe0c0b0b671cccf510ee1075e6c73ad61f24ab8390ca608916861eb6385a6eb1.exe 1876 fe0c0b0b671cccf510ee1075e6c73ad61f24ab8390ca608916861eb6385a6eb1.exe 1904 lsass.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1876 fe0c0b0b671cccf510ee1075e6c73ad61f24ab8390ca608916861eb6385a6eb1.exe 1876 fe0c0b0b671cccf510ee1075e6c73ad61f24ab8390ca608916861eb6385a6eb1.exe 1904 lsass.exe 1904 lsass.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1876 fe0c0b0b671cccf510ee1075e6c73ad61f24ab8390ca608916861eb6385a6eb1.exe 1876 fe0c0b0b671cccf510ee1075e6c73ad61f24ab8390ca608916861eb6385a6eb1.exe 3492 ϵͳ°²È«²¹¶¡.exe 1904 lsass.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1876 wrote to memory of 3492 1876 fe0c0b0b671cccf510ee1075e6c73ad61f24ab8390ca608916861eb6385a6eb1.exe 81 PID 1876 wrote to memory of 3492 1876 fe0c0b0b671cccf510ee1075e6c73ad61f24ab8390ca608916861eb6385a6eb1.exe 81 PID 1876 wrote to memory of 3492 1876 fe0c0b0b671cccf510ee1075e6c73ad61f24ab8390ca608916861eb6385a6eb1.exe 81 PID 3492 wrote to memory of 1904 3492 ϵͳ°²È«²¹¶¡.exe 84 PID 3492 wrote to memory of 1904 3492 ϵͳ°²È«²¹¶¡.exe 84 PID 3492 wrote to memory of 1904 3492 ϵͳ°²È«²¹¶¡.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\fe0c0b0b671cccf510ee1075e6c73ad61f24ab8390ca608916861eb6385a6eb1.exe"C:\Users\Admin\AppData\Local\Temp\fe0c0b0b671cccf510ee1075e6c73ad61f24ab8390ca608916861eb6385a6eb1.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Users\Public\ϵͳ°²È«²¹¶¡.exeC:\Users\Public\ϵͳ°²È«²¹¶¡.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3492 -
C:\Users\lsass.exeC:\Users\lsass.exe3⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1904
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD5aadc8962292c560caa2e9e3d39e32c4d
SHA1a01f04297284783381f950e45efafe3358e8751d
SHA2563d0ec418284fd1ef419fd8e57ce9adc84be51d1bff4910bb20aa319175a8f661
SHA51247dec97ae8f57d82326440cb2106836ea8831fdd5d76e36476ef8d0007ab88da0ec757f91cee94d285f4d123376d380c92df6d1ffd0b7a997d9f592a82c7848f
-
Filesize
2.7MB
MD5aadc8962292c560caa2e9e3d39e32c4d
SHA1a01f04297284783381f950e45efafe3358e8751d
SHA2563d0ec418284fd1ef419fd8e57ce9adc84be51d1bff4910bb20aa319175a8f661
SHA51247dec97ae8f57d82326440cb2106836ea8831fdd5d76e36476ef8d0007ab88da0ec757f91cee94d285f4d123376d380c92df6d1ffd0b7a997d9f592a82c7848f
-
Filesize
69KB
MD53d924b86f8dc8215ea1dcda84c218ad7
SHA1bff3baea1ea9f1eef642773382d6e8945fa5bf8c
SHA256a429ee865286dc2be99cb61ac2ed8f29c148aabd7f77943e65114744bc4df98b
SHA512bab02ad0a21b44692bf60db8600872290274b44212febae90c6cf99e09a30c516493253da52b3d80b4fe805100e90fde953b8674c4c8e11911e187dd12dbc7ff
-
Filesize
69KB
MD53d924b86f8dc8215ea1dcda84c218ad7
SHA1bff3baea1ea9f1eef642773382d6e8945fa5bf8c
SHA256a429ee865286dc2be99cb61ac2ed8f29c148aabd7f77943e65114744bc4df98b
SHA512bab02ad0a21b44692bf60db8600872290274b44212febae90c6cf99e09a30c516493253da52b3d80b4fe805100e90fde953b8674c4c8e11911e187dd12dbc7ff
-
Filesize
2.0MB
MD5b03c0e3bf47d84324c4dcefac159878e
SHA16dde0d9602241a61ce4550124c376257049486f0
SHA2567ab986781e1f88d46221748be9674a553b9f3f611e31859026a310ba0c1133ac
SHA512cc5f7dfafc6b677a392f953e92ce8c1dd1140ee037099d2ffab6ed564e8241682a23d55b8a89c54b18fc06d402d6c5620dc0c3083483d3fcce516b28d0108c2b
-
Filesize
2.0MB
MD5b03c0e3bf47d84324c4dcefac159878e
SHA16dde0d9602241a61ce4550124c376257049486f0
SHA2567ab986781e1f88d46221748be9674a553b9f3f611e31859026a310ba0c1133ac
SHA512cc5f7dfafc6b677a392f953e92ce8c1dd1140ee037099d2ffab6ed564e8241682a23d55b8a89c54b18fc06d402d6c5620dc0c3083483d3fcce516b28d0108c2b