Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
18-08-2022 13:34
Static task
static1
Behavioral task
behavioral1
Sample
xzw.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
xzw.exe
Resource
win10v2004-20220812-en
General
-
Target
xzw.exe
-
Size
872KB
-
MD5
d156b1ffd7d387927ee88491a26ccae6
-
SHA1
15764f67963a0e70f2b310510b95021d7e4aa27d
-
SHA256
18459ea969be44966cb9bdd8d65d93d91dc2635d952f02aee69d6e2eaec2c679
-
SHA512
0c213b94f86e49dfad8aed263ef11f5c24b9597591ae7f37b6451f513c1451f603c27676e547809976f636c86d2650fe12c988cdf2cea5ee6843612583ade283
Malware Config
Signatures
-
Generic Chinese Botnet
A botnet originating from China which is currently unnamed publicly.
-
Chinese Botnet payload 2 IoCs
resource yara_rule behavioral2/memory/2576-1486-0x0000000010000000-0x0000000010018000-memory.dmp unk_chinese_botnet behavioral2/memory/2576-1489-0x0000000000400000-0x0000000000527000-memory.dmp unk_chinese_botnet -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Msemswe.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\xzw.exe" xzw.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\L: xzw.exe File opened (read-only) \??\M: xzw.exe File opened (read-only) \??\R: xzw.exe File opened (read-only) \??\T: xzw.exe File opened (read-only) \??\V: xzw.exe File opened (read-only) \??\E: xzw.exe File opened (read-only) \??\F: xzw.exe File opened (read-only) \??\K: xzw.exe File opened (read-only) \??\X: xzw.exe File opened (read-only) \??\S: xzw.exe File opened (read-only) \??\U: xzw.exe File opened (read-only) \??\Y: xzw.exe File opened (read-only) \??\B: xzw.exe File opened (read-only) \??\G: xzw.exe File opened (read-only) \??\J: xzw.exe File opened (read-only) \??\Q: xzw.exe File opened (read-only) \??\H: xzw.exe File opened (read-only) \??\I: xzw.exe File opened (read-only) \??\O: xzw.exe File opened (read-only) \??\Z: xzw.exe File opened (read-only) \??\N: xzw.exe File opened (read-only) \??\P: xzw.exe File opened (read-only) \??\W: xzw.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 38 IoCs
pid Process 2576 xzw.exe 2576 xzw.exe 2576 xzw.exe 2576 xzw.exe 2576 xzw.exe 2576 xzw.exe 2576 xzw.exe 2576 xzw.exe 2576 xzw.exe 2576 xzw.exe 2576 xzw.exe 2576 xzw.exe 2576 xzw.exe 2576 xzw.exe 2576 xzw.exe 2576 xzw.exe 2576 xzw.exe 2576 xzw.exe 2576 xzw.exe 2576 xzw.exe 2576 xzw.exe 2576 xzw.exe 2576 xzw.exe 2576 xzw.exe 2576 xzw.exe 2576 xzw.exe 2576 xzw.exe 2576 xzw.exe 2576 xzw.exe 2576 xzw.exe 2576 xzw.exe 2576 xzw.exe 2576 xzw.exe 2576 xzw.exe 2576 xzw.exe 2576 xzw.exe 2576 xzw.exe 2576 xzw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 xzw.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz xzw.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2576 xzw.exe 2576 xzw.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\xzw.exe"C:\Users\Admin\AppData\Local\Temp\xzw.exe"1⤵
- Adds Run key to start application
- Enumerates connected drives
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:2576