Analysis
-
max time kernel
169s -
max time network
185s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
22-10-2022 14:41
Static task
static1
Behavioral task
behavioral1
Sample
7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe
Resource
win10v2004-20220812-en
General
-
Target
7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe
-
Size
652KB
-
MD5
bc6cba1924615d3419b578ec0dacb52a
-
SHA1
e52ac072219ef95fd4594b6c882642fa1791eeb6
-
SHA256
7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c
-
SHA512
8212bf03afad0cd7c4ca1cb519baf36798d04a81dfce000b29f8e47ac4297628633fe35fbdfe9fca2cf75df77c53e5a9f57c8244761ba729990a4d6acb9a2483
-
SSDEEP
12288:PIgegV1Ye7I9Kjj7D+pbAqmNlV2NCM3vHoFN6WtljaElI5w:Po41YKIGnqmNlkvHoFN6WtljaEy5w
Malware Config
Signatures
-
Generic Chinese Botnet
A botnet originating from China which is currently unnamed publicly.
-
Chinese Botnet payload 2 IoCs
resource yara_rule behavioral1/memory/1364-68-0x0000000010000000-0x0000000010018000-memory.dmp unk_chinese_botnet behavioral1/memory/1364-74-0x0000000000400000-0x0000000000567000-memory.dmp unk_chinese_botnet -
resource yara_rule behavioral1/files/0x000c0000000054a8-55.dat aspack_v212_v242 behavioral1/files/0x000c0000000054a8-56.dat aspack_v212_v242 behavioral1/files/0x000c0000000054a8-58.dat aspack_v212_v242 behavioral1/files/0x000c0000000054a8-60.dat aspack_v212_v242 -
Executes dropped EXE 1 IoCs
pid Process 480 vlMOSo.exe -
Loads dropped DLL 2 IoCs
pid Process 1364 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe 1364 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\K: 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe File opened (read-only) \??\O: 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe File opened (read-only) \??\S: 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe File opened (read-only) \??\T: 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe File opened (read-only) \??\W: 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe File opened (read-only) \??\X: 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe File opened (read-only) \??\Z: 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe File opened (read-only) \??\E: 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe File opened (read-only) \??\F: 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe File opened (read-only) \??\L: 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe File opened (read-only) \??\M: 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe File opened (read-only) \??\Y: 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe File opened (read-only) \??\B: 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe File opened (read-only) \??\H: 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe File opened (read-only) \??\I: 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe File opened (read-only) \??\N: 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe File opened (read-only) \??\Q: 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe File opened (read-only) \??\U: 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe File opened (read-only) \??\V: 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe File opened (read-only) \??\G: 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe File opened (read-only) \??\J: 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe File opened (read-only) \??\P: 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe File opened (read-only) \??\R: 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jre7\bin\ktab.exe vlMOSo.exe File opened for modification C:\Program Files\Mozilla Firefox\plugin-container.exe vlMOSo.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\XLICONS.EXE vlMOSo.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\rmiregistry.exe vlMOSo.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\serialver.exe vlMOSo.exe File opened for modification C:\Program Files\Java\jre7\bin\servertool.exe vlMOSo.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Spades\shvlzm.exe vlMOSo.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc-cache-gen.exe vlMOSo.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AdobeCollabSync.exe vlMOSo.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSOHTMED.EXE vlMOSo.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\WORDICON.EXE vlMOSo.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe vlMOSo.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\kinit.exe vlMOSo.exe File opened for modification C:\Program Files\Java\jre7\bin\kinit.exe vlMOSo.exe File opened for modification C:\Program Files\Mozilla Firefox\default-browser-agent.exe vlMOSo.exe File opened for modification C:\Program Files\Mozilla Firefox\pingsender.exe vlMOSo.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OIS.EXE vlMOSo.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\chrome_pwa_launcher.exe vlMOSo.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome.exe vlMOSo.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javadoc.exe vlMOSo.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe vlMOSo.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CLVIEW.EXE vlMOSo.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jcmd.exe vlMOSo.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\klist.exe vlMOSo.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\unpack200.exe vlMOSo.exe File opened for modification C:\Program Files\Java\jre7\bin\keytool.exe vlMOSo.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.71\GoogleUpdateComRegisterShell64.exe vlMOSo.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\idlj.exe vlMOSo.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\kinit.exe vlMOSo.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javaws.exe vlMOSo.exe File opened for modification C:\Program Files\Windows Mail\wab.exe vlMOSo.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE vlMOSo.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroBroker.exe vlMOSo.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.71\GoogleUpdateBroker.exe vlMOSo.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\excelcnv.exe vlMOSo.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\elevation_service.exe vlMOSo.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\pack200.exe vlMOSo.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\Solitaire.exe vlMOSo.exe File opened for modification C:\Program Files\Windows Mail\WinMail.exe vlMOSo.exe File opened for modification C:\Program Files\Windows Sidebar\sidebar.exe vlMOSo.exe File opened for modification C:\Program Files (x86)\Windows Mail\WinMail.exe vlMOSo.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\klist.exe vlMOSo.exe File opened for modification C:\Program Files\Java\jre7\bin\orbd.exe vlMOSo.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.71\GoogleCrashHandler.exe vlMOSo.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CNFNOT32.EXE vlMOSo.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javaws.exe vlMOSo.exe File opened for modification C:\Program Files\Java\jre7\bin\javacpl.exe vlMOSo.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\GROOVEMN.EXE vlMOSo.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\SETLANG.EXE vlMOSo.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jconsole.exe vlMOSo.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\rmid.exe vlMOSo.exe File opened for modification C:\Program Files\Java\jre7\bin\ssvagent.exe vlMOSo.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\SCANPST.EXE vlMOSo.exe File opened for modification C:\Program Files (x86)\Windows Mail\wab.exe vlMOSo.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jmap.exe vlMOSo.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jsadebugd.exe vlMOSo.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\FreeCell.exe vlMOSo.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jmc.exe vlMOSo.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\nbexec.exe vlMOSo.exe File opened for modification C:\Program Files\Java\jre7\bin\javaw.exe vlMOSo.exe File opened for modification C:\Program Files\Microsoft Games\Minesweeper\MineSweeper.exe vlMOSo.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Checkers\chkrzm.exe vlMOSo.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\SELFCERT.EXE vlMOSo.exe File opened for modification C:\Program Files (x86)\Windows Mail\wabmig.exe vlMOSo.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe -
Suspicious behavior: EnumeratesProcesses 39 IoCs
pid Process 1364 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe 1364 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe 1364 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe 1364 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe 1364 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe 1364 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe 1364 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe 1364 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe 1364 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe 1364 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe 1364 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe 1364 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe 1364 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe 1364 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe 1364 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe 1364 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe 1364 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe 1364 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe 1364 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe 1364 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe 1364 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe 1364 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe 1364 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe 1364 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe 1364 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe 1364 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe 1364 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe 1364 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe 1364 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe 1364 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe 1364 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe 1364 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe 1364 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe 1364 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe 1364 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe 1364 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe 1364 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe 1364 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe 1364 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1364 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1364 wrote to memory of 480 1364 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe 28 PID 1364 wrote to memory of 480 1364 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe 28 PID 1364 wrote to memory of 480 1364 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe 28 PID 1364 wrote to memory of 480 1364 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe 28 PID 480 wrote to memory of 680 480 vlMOSo.exe 32 PID 480 wrote to memory of 680 480 vlMOSo.exe 32 PID 480 wrote to memory of 680 480 vlMOSo.exe 32 PID 480 wrote to memory of 680 480 vlMOSo.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe"C:\Users\Admin\AppData\Local\Temp\7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe"1⤵
- Loads dropped DLL
- Enumerates connected drives
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Users\Admin\AppData\Local\Temp\vlMOSo.exeC:\Users\Admin\AppData\Local\Temp\vlMOSo.exe2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:480 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\0c46278b.bat" "3⤵PID:680
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
187B
MD5b340f493a350e96bcf2908e84deee539
SHA15ea614d9506906059b2dfd6dc87abcd925996ed0
SHA2561ef7fa6adbf06b56fcd56fdb19fc47f32f1d3e26a860ebd377297fbaff5d6249
SHA512c96a7bafe092ca3de3204de55e41100446552427f82cf984aa1b5974a03a5810c022618e3a7581a87dce5348d9dfe044fd29bdbde27fa8f57206717b25172ffb
-
Filesize
15KB
MD556b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e
-
Filesize
15KB
MD556b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e
-
Filesize
15KB
MD556b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e
-
Filesize
15KB
MD556b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e