Analysis

  • max time kernel
    135s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-09-2022 04:29

General

  • Target

    tmp.exe

  • Size

    362KB

  • MD5

    af50ecd46089929f90385f6c90000c20

  • SHA1

    9ae6f31c8f5b7f3b8c25d24bfe82c704b205beca

  • SHA256

    a985a64aa7b6f5175e0f4e47b0eb41db10b2cb1236862f4610bcd09ead2fe663

  • SHA512

    415a0a208b1ce87d2f43f4ff735afbc25ae4b6bfb683d39bca1ef8c6e81a07f9403182eebac912414da8fecef510375a8d4bb78b4934cd9dfcc3e53dc2a59259

  • SSDEEP

    3072:N8jSZi34eTzl5IVp7Kw9ftm0dmNk7pzyEO05SVp14aJiwFXr:quZ5e65Q0djzKtawF7

Malware Config

Signatures

  • Generic Chinese Botnet

    A botnet originating from China which is currently unnamed publicly.

  • Chinese Botnet payload 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\tmp.exe
    "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
    1⤵
    • Adds Run key to start application
    • Enumerates connected drives
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4148
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c md C:\windowss64
      2⤵
        PID:920

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4148-133-0x0000000010000000-0x0000000010018000-memory.dmp

      Filesize

      96KB