Analysis

  • max time kernel
    149s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    10-10-2022 07:25

General

  • Target

    53460de37325b4979177f832ae51f9de.exe

  • Size

    880KB

  • MD5

    53460de37325b4979177f832ae51f9de

  • SHA1

    f32dd3e711e5fc24c3e525ab835c83588cbc1558

  • SHA256

    bb10d1876255ac5c7beb971b9c3f748976eef78067690392f36e698939331ac1

  • SHA512

    19a489017baaa2adb1c9cf75a502725a28193e4a0661b8f7956169084884e82e07d9b980091d1f8c307cb6f7ae7e7bb3fd3012db0a30dedbe30621f1f60f1595

  • SSDEEP

    24576:7stUx5NK+HjoSIIJ2thqogNSNOKt5apf7xesN7:gtIS+dJgRkSNO0Qpow

Malware Config

Signatures

  • Generic Chinese Botnet

    A botnet originating from China which is currently unnamed publicly.

  • Chinese Botnet payload 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 30 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 13 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\53460de37325b4979177f832ae51f9de.exe
    "C:\Users\Admin\AppData\Local\Temp\53460de37325b4979177f832ae51f9de.exe"
    1⤵
    • Enumerates connected drives
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Program Files directory
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:1708
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c md C:\windowss64
      2⤵
        PID:1972
    • C:\Program Files (x86)\Ecigfam.exe
      "C:\Program Files (x86)\Ecigfam.exe"
      1⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Modifies data under HKEY_USERS
      • Suspicious use of WriteProcessMemory
      PID:108
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c md C:\windowss64
        2⤵
          PID:1696

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Ecigfam.exe

        Filesize

        880KB

        MD5

        53460de37325b4979177f832ae51f9de

        SHA1

        f32dd3e711e5fc24c3e525ab835c83588cbc1558

        SHA256

        bb10d1876255ac5c7beb971b9c3f748976eef78067690392f36e698939331ac1

        SHA512

        19a489017baaa2adb1c9cf75a502725a28193e4a0661b8f7956169084884e82e07d9b980091d1f8c307cb6f7ae7e7bb3fd3012db0a30dedbe30621f1f60f1595

      • C:\Program Files (x86)\Ecigfam.exe

        Filesize

        880KB

        MD5

        53460de37325b4979177f832ae51f9de

        SHA1

        f32dd3e711e5fc24c3e525ab835c83588cbc1558

        SHA256

        bb10d1876255ac5c7beb971b9c3f748976eef78067690392f36e698939331ac1

        SHA512

        19a489017baaa2adb1c9cf75a502725a28193e4a0661b8f7956169084884e82e07d9b980091d1f8c307cb6f7ae7e7bb3fd3012db0a30dedbe30621f1f60f1595

      • memory/108-4623-0x0000000000400000-0x0000000000529000-memory.dmp

        Filesize

        1.2MB

      • memory/108-6147-0x0000000001DC0000-0x0000000001EC0000-memory.dmp

        Filesize

        1024KB

      • memory/108-6149-0x0000000001FF0000-0x0000000002171000-memory.dmp

        Filesize

        1.5MB

      • memory/108-9295-0x0000000001DC0000-0x0000000001EC0000-memory.dmp

        Filesize

        1024KB

      • memory/108-9294-0x0000000000400000-0x0000000000529000-memory.dmp

        Filesize

        1.2MB

      • memory/108-9293-0x00000000022A0000-0x00000000023B1000-memory.dmp

        Filesize

        1.1MB

      • memory/1708-512-0x0000000002190000-0x00000000022A1000-memory.dmp

        Filesize

        1.1MB

      • memory/1708-470-0x0000000002190000-0x00000000022A1000-memory.dmp

        Filesize

        1.1MB

      • memory/1708-467-0x0000000000400000-0x0000000000529000-memory.dmp

        Filesize

        1.2MB

      • memory/1708-468-0x0000000002190000-0x00000000022A1000-memory.dmp

        Filesize

        1.1MB

      • memory/1708-509-0x0000000002190000-0x00000000022A1000-memory.dmp

        Filesize

        1.1MB

      • memory/1708-508-0x0000000002190000-0x00000000022A1000-memory.dmp

        Filesize

        1.1MB

      • memory/1708-469-0x0000000002190000-0x00000000022A1000-memory.dmp

        Filesize

        1.1MB

      • memory/1708-473-0x0000000002190000-0x00000000022A1000-memory.dmp

        Filesize

        1.1MB

      • memory/1708-474-0x0000000002190000-0x00000000022A1000-memory.dmp

        Filesize

        1.1MB

      • memory/1708-472-0x0000000002190000-0x00000000022A1000-memory.dmp

        Filesize

        1.1MB

      • memory/1708-475-0x0000000002190000-0x00000000022A1000-memory.dmp

        Filesize

        1.1MB

      • memory/1708-476-0x0000000002190000-0x00000000022A1000-memory.dmp

        Filesize

        1.1MB

      • memory/1708-481-0x0000000002190000-0x00000000022A1000-memory.dmp

        Filesize

        1.1MB

      • memory/1708-480-0x0000000002190000-0x00000000022A1000-memory.dmp

        Filesize

        1.1MB

      • memory/1708-479-0x0000000002190000-0x00000000022A1000-memory.dmp

        Filesize

        1.1MB

      • memory/1708-478-0x0000000002190000-0x00000000022A1000-memory.dmp

        Filesize

        1.1MB

      • memory/1708-477-0x0000000002190000-0x00000000022A1000-memory.dmp

        Filesize

        1.1MB

      • memory/1708-485-0x0000000002190000-0x00000000022A1000-memory.dmp

        Filesize

        1.1MB

      • memory/1708-484-0x0000000002190000-0x00000000022A1000-memory.dmp

        Filesize

        1.1MB

      • memory/1708-524-0x0000000002190000-0x00000000022A1000-memory.dmp

        Filesize

        1.1MB

      • memory/1708-523-0x0000000002190000-0x00000000022A1000-memory.dmp

        Filesize

        1.1MB

      • memory/1708-522-0x0000000002190000-0x00000000022A1000-memory.dmp

        Filesize

        1.1MB

      • memory/1708-521-0x0000000002190000-0x00000000022A1000-memory.dmp

        Filesize

        1.1MB

      • memory/1708-520-0x0000000002190000-0x00000000022A1000-memory.dmp

        Filesize

        1.1MB

      • memory/1708-519-0x0000000002190000-0x00000000022A1000-memory.dmp

        Filesize

        1.1MB

      • memory/1708-518-0x0000000002190000-0x00000000022A1000-memory.dmp

        Filesize

        1.1MB

      • memory/1708-517-0x0000000002190000-0x00000000022A1000-memory.dmp

        Filesize

        1.1MB

      • memory/1708-516-0x0000000002190000-0x00000000022A1000-memory.dmp

        Filesize

        1.1MB

      • memory/1708-515-0x0000000002190000-0x00000000022A1000-memory.dmp

        Filesize

        1.1MB

      • memory/1708-514-0x0000000002190000-0x00000000022A1000-memory.dmp

        Filesize

        1.1MB

      • memory/1708-513-0x0000000002190000-0x00000000022A1000-memory.dmp

        Filesize

        1.1MB

      • memory/1708-464-0x0000000002190000-0x00000000022A1000-memory.dmp

        Filesize

        1.1MB

      • memory/1708-511-0x0000000002190000-0x00000000022A1000-memory.dmp

        Filesize

        1.1MB

      • memory/1708-510-0x0000000002190000-0x00000000022A1000-memory.dmp

        Filesize

        1.1MB

      • memory/1708-507-0x0000000002190000-0x00000000022A1000-memory.dmp

        Filesize

        1.1MB

      • memory/1708-463-0x0000000002190000-0x00000000022A1000-memory.dmp

        Filesize

        1.1MB

      • memory/1708-471-0x0000000002190000-0x00000000022A1000-memory.dmp

        Filesize

        1.1MB

      • memory/1708-506-0x0000000002190000-0x00000000022A1000-memory.dmp

        Filesize

        1.1MB

      • memory/1708-505-0x0000000002190000-0x00000000022A1000-memory.dmp

        Filesize

        1.1MB

      • memory/1708-504-0x0000000002190000-0x00000000022A1000-memory.dmp

        Filesize

        1.1MB

      • memory/1708-503-0x0000000002190000-0x00000000022A1000-memory.dmp

        Filesize

        1.1MB

      • memory/1708-502-0x0000000002190000-0x00000000022A1000-memory.dmp

        Filesize

        1.1MB

      • memory/1708-501-0x0000000002190000-0x00000000022A1000-memory.dmp

        Filesize

        1.1MB

      • memory/1708-500-0x0000000002190000-0x00000000022A1000-memory.dmp

        Filesize

        1.1MB

      • memory/1708-499-0x0000000002190000-0x00000000022A1000-memory.dmp

        Filesize

        1.1MB

      • memory/1708-498-0x0000000002190000-0x00000000022A1000-memory.dmp

        Filesize

        1.1MB

      • memory/1708-497-0x0000000002190000-0x00000000022A1000-memory.dmp

        Filesize

        1.1MB

      • memory/1708-496-0x0000000002190000-0x00000000022A1000-memory.dmp

        Filesize

        1.1MB

      • memory/1708-495-0x0000000002190000-0x00000000022A1000-memory.dmp

        Filesize

        1.1MB

      • memory/1708-494-0x0000000002190000-0x00000000022A1000-memory.dmp

        Filesize

        1.1MB

      • memory/1708-493-0x0000000002190000-0x00000000022A1000-memory.dmp

        Filesize

        1.1MB

      • memory/1708-492-0x0000000002190000-0x00000000022A1000-memory.dmp

        Filesize

        1.1MB

      • memory/1708-491-0x0000000002190000-0x00000000022A1000-memory.dmp

        Filesize

        1.1MB

      • memory/1708-490-0x0000000002190000-0x00000000022A1000-memory.dmp

        Filesize

        1.1MB

      • memory/1708-489-0x0000000002190000-0x00000000022A1000-memory.dmp

        Filesize

        1.1MB

      • memory/1708-488-0x0000000002190000-0x00000000022A1000-memory.dmp

        Filesize

        1.1MB

      • memory/1708-487-0x0000000002190000-0x00000000022A1000-memory.dmp

        Filesize

        1.1MB

      • memory/1708-486-0x0000000002190000-0x00000000022A1000-memory.dmp

        Filesize

        1.1MB

      • memory/1708-483-0x0000000002190000-0x00000000022A1000-memory.dmp

        Filesize

        1.1MB

      • memory/1708-482-0x0000000002190000-0x00000000022A1000-memory.dmp

        Filesize

        1.1MB

      • memory/1708-1524-0x0000000000530000-0x0000000000630000-memory.dmp

        Filesize

        1024KB

      • memory/1708-1526-0x0000000002000000-0x0000000002181000-memory.dmp

        Filesize

        1.5MB

      • memory/1708-4615-0x0000000002190000-0x00000000022A1000-memory.dmp

        Filesize

        1.1MB

      • memory/1708-4616-0x0000000000400000-0x0000000000529000-memory.dmp

        Filesize

        1.2MB

      • memory/1708-466-0x0000000002190000-0x00000000022A1000-memory.dmp

        Filesize

        1.1MB

      • memory/1708-465-0x0000000002190000-0x00000000022A1000-memory.dmp

        Filesize

        1.1MB

      • memory/1708-462-0x0000000002190000-0x00000000022A1000-memory.dmp

        Filesize

        1.1MB

      • memory/1708-56-0x00000000769E0000-0x0000000076A27000-memory.dmp

        Filesize

        284KB

      • memory/1708-54-0x0000000075111000-0x0000000075113000-memory.dmp

        Filesize

        8KB

      • memory/1708-4617-0x0000000000530000-0x0000000000630000-memory.dmp

        Filesize

        1024KB

      • memory/1708-5423-0x0000000000400000-0x0000000000529000-memory.dmp

        Filesize

        1.2MB