Analysis

  • max time kernel
    150s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-10-2022 21:55

General

  • Target

    8ab2398b595a004529e9a2b90e7f2b3b27df587eaa4610c5447be4ce5b7f505e.exe

  • Size

    3.0MB

  • MD5

    9301f1da68cccfa053da550107f0365c

  • SHA1

    39a92e81e6669611b8e494c3ca2853283316d801

  • SHA256

    8ab2398b595a004529e9a2b90e7f2b3b27df587eaa4610c5447be4ce5b7f505e

  • SHA512

    1206145a834315b385b19d3cf58abc8d7b6cc46b9315db26e671ab598faf6eb3fa0aa5a932005f8f2f16832a84dfa9bf9593a907a256b6d9155a944753b5d494

  • SSDEEP

    49152:c2lp5nsO1lERGmC7vK9y+QXMR1UEhLdPMRG4OU09Q1IFOUCGExQPr/E+Vm5tPXXq:/p9vjHp+QAUyGG4oQ1Ib1Yxt/Xq

Malware Config

Signatures

  • Generic Chinese Botnet

    A botnet originating from China which is currently unnamed publicly.

  • Chinese Botnet payload 1 IoCs
  • Executes dropped EXE 5 IoCs
  • VMProtect packed file 4 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 31 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 10 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8ab2398b595a004529e9a2b90e7f2b3b27df587eaa4610c5447be4ce5b7f505e.exe
    "C:\Users\Admin\AppData\Local\Temp\8ab2398b595a004529e9a2b90e7f2b3b27df587eaa4610c5447be4ce5b7f505e.exe"
    1⤵
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4800
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c del 8ab2398b595a004529e9a2b90e7f2b3b27df587eaa4610c5447be4ce5b7f505e.exe
      2⤵
        PID:4344
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:1844
      • C:\Users\Public\Documents\123\rs1.exe
        "C:\Users\Public\Documents\123\rs1.exe"
        1⤵
        • Executes dropped EXE
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4560
        • C:\WINDOWS\DNomb\FTvrst.exe
          C:\WINDOWS\DNomb\FTvrst.exe
          2⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious use of SetThreadContext
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1968
          • C:\WINDOWS\DNomb\spolsvt.exe
            C:\WINDOWS\DNomb\spolsvt.exe
            3⤵
            • Executes dropped EXE
            • Enumerates connected drives
            • Checks processor information in registry
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of SetWindowsHookEx
            PID:5100
          • C:\WINDOWS\DNomb\audidog.exe
            C:\WINDOWS\DNomb\audidog.exe
            3⤵
            • Executes dropped EXE
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Drops file in Windows directory
            • Suspicious use of SetWindowsHookEx
            PID:3160
        • C:\WINDOWS\DNomb\audidog.exe
          C:\WINDOWS\DNomb\audidog.exe
          2⤵
          • Executes dropped EXE
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Drops file in Windows directory
          • Suspicious use of SetWindowsHookEx
          PID:5044

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Registry Run Keys / Startup Folder

      1
      T1060

      Defense Evasion

      Modify Registry

      1
      T1112

      Discovery

      Query Registry

      2
      T1012

      Peripheral Device Discovery

      1
      T1120

      System Information Discovery

      3
      T1082

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Public\Documents\123\rs1.exe
        Filesize

        2.2MB

        MD5

        3a9c682b077bc044b21131216bdf6304

        SHA1

        afdd419f084b56838c7eb07ff2b28ff9b960e27e

        SHA256

        8beaa45a7ca8a10127ed2e359be90f856a4ac0b87ed31e57a59aadc58ad94cc8

        SHA512

        99a2d2ce97a50791ddac4caa359bc335e404ad4f1ec3bdc5e3df6917e9c6eceba2d7c821eb0728e9d0989df1d021625db7ab962c1ebf705f8770090501d64b14

      • C:\Users\Public\Documents\123\rs1.exe
        Filesize

        2.2MB

        MD5

        3a9c682b077bc044b21131216bdf6304

        SHA1

        afdd419f084b56838c7eb07ff2b28ff9b960e27e

        SHA256

        8beaa45a7ca8a10127ed2e359be90f856a4ac0b87ed31e57a59aadc58ad94cc8

        SHA512

        99a2d2ce97a50791ddac4caa359bc335e404ad4f1ec3bdc5e3df6917e9c6eceba2d7c821eb0728e9d0989df1d021625db7ab962c1ebf705f8770090501d64b14

      • C:\WINDOWS\DNomb\FTvrst.exe
        Filesize

        2.2MB

        MD5

        3a9c682b077bc044b21131216bdf6304

        SHA1

        afdd419f084b56838c7eb07ff2b28ff9b960e27e

        SHA256

        8beaa45a7ca8a10127ed2e359be90f856a4ac0b87ed31e57a59aadc58ad94cc8

        SHA512

        99a2d2ce97a50791ddac4caa359bc335e404ad4f1ec3bdc5e3df6917e9c6eceba2d7c821eb0728e9d0989df1d021625db7ab962c1ebf705f8770090501d64b14

      • C:\WINDOWS\DNomb\Mpec.mbt
        Filesize

        200KB

        MD5

        9fdc722f45023b3b9b1fa429511485a9

        SHA1

        e07b0204b358e73af58ebf47e6d389ad012f78af

        SHA256

        7be719b05ada2bdf82ea3367840b6b223012350519a97e3651b5b0c836f13144

        SHA512

        18d9a054228d1b3c2e11c9474940d98f8576934cb27ccddcda5f4fb681350464012b01e463bea90baea2a77f6c3ac3b4267ace6656a08383f7ea31014474a4fb

      • C:\WINDOWS\DNomb\audidog.exe
        Filesize

        2.2MB

        MD5

        3a9c682b077bc044b21131216bdf6304

        SHA1

        afdd419f084b56838c7eb07ff2b28ff9b960e27e

        SHA256

        8beaa45a7ca8a10127ed2e359be90f856a4ac0b87ed31e57a59aadc58ad94cc8

        SHA512

        99a2d2ce97a50791ddac4caa359bc335e404ad4f1ec3bdc5e3df6917e9c6eceba2d7c821eb0728e9d0989df1d021625db7ab962c1ebf705f8770090501d64b14

      • C:\WINDOWS\DNomb\spolsvt.exe
        Filesize

        9KB

        MD5

        523d5c39f9d8d2375c3df68251fa2249

        SHA1

        d4ed365c44bec9246fc1a65a32a7791792647a10

        SHA256

        20e3dc90a3e83b6202e2a7f4603b60e5e859639cb68693426c400b13aaeabd78

        SHA512

        526e1bba30d03f1ac177c6ab7409187a730969c429cebef15da68ffcf44b3b93227781eebc827b2f7a0fa17c391e00a0e532263fd0167aeaeb0456f96cfe3ae4

      • C:\WINDOWS\Djltp.txt
        Filesize

        37B

        MD5

        4f6cae09c7fd452990e28040f1d34b27

        SHA1

        feea2cc9d7b63e57523e2031d886a5e2599561ad

        SHA256

        cfa50edb62da7487915728a8cbb0c4a55e907fb70363234abaa6a4fb31565f6e

        SHA512

        4201eabbba4d3ff8bdf7d089feb013bd587f6254f188fd7181ebdd6fc851f79f1150682211116736d568460de126da51bc013d04d69421098e71f087f1a4dd56

      • C:\Windows\DNomb\FTvrst.exe
        Filesize

        2.2MB

        MD5

        3a9c682b077bc044b21131216bdf6304

        SHA1

        afdd419f084b56838c7eb07ff2b28ff9b960e27e

        SHA256

        8beaa45a7ca8a10127ed2e359be90f856a4ac0b87ed31e57a59aadc58ad94cc8

        SHA512

        99a2d2ce97a50791ddac4caa359bc335e404ad4f1ec3bdc5e3df6917e9c6eceba2d7c821eb0728e9d0989df1d021625db7ab962c1ebf705f8770090501d64b14

      • C:\Windows\DNomb\audidog.exe
        Filesize

        2.2MB

        MD5

        3a9c682b077bc044b21131216bdf6304

        SHA1

        afdd419f084b56838c7eb07ff2b28ff9b960e27e

        SHA256

        8beaa45a7ca8a10127ed2e359be90f856a4ac0b87ed31e57a59aadc58ad94cc8

        SHA512

        99a2d2ce97a50791ddac4caa359bc335e404ad4f1ec3bdc5e3df6917e9c6eceba2d7c821eb0728e9d0989df1d021625db7ab962c1ebf705f8770090501d64b14

      • C:\Windows\DNomb\audidog.exe
        Filesize

        2.2MB

        MD5

        3a9c682b077bc044b21131216bdf6304

        SHA1

        afdd419f084b56838c7eb07ff2b28ff9b960e27e

        SHA256

        8beaa45a7ca8a10127ed2e359be90f856a4ac0b87ed31e57a59aadc58ad94cc8

        SHA512

        99a2d2ce97a50791ddac4caa359bc335e404ad4f1ec3bdc5e3df6917e9c6eceba2d7c821eb0728e9d0989df1d021625db7ab962c1ebf705f8770090501d64b14

      • C:\Windows\DNomb\spolsvt.exe
        Filesize

        9KB

        MD5

        523d5c39f9d8d2375c3df68251fa2249

        SHA1

        d4ed365c44bec9246fc1a65a32a7791792647a10

        SHA256

        20e3dc90a3e83b6202e2a7f4603b60e5e859639cb68693426c400b13aaeabd78

        SHA512

        526e1bba30d03f1ac177c6ab7409187a730969c429cebef15da68ffcf44b3b93227781eebc827b2f7a0fa17c391e00a0e532263fd0167aeaeb0456f96cfe3ae4

      • memory/1968-3829-0x0000000000400000-0x0000000000C64000-memory.dmp
        Filesize

        8.4MB

      • memory/1968-4077-0x0000000000400000-0x0000000000C64000-memory.dmp
        Filesize

        8.4MB

      • memory/1968-3832-0x0000000000400000-0x0000000000C64000-memory.dmp
        Filesize

        8.4MB

      • memory/1968-3846-0x0000000000400000-0x0000000000C64000-memory.dmp
        Filesize

        8.4MB

      • memory/1968-3826-0x0000000000400000-0x0000000000C64000-memory.dmp
        Filesize

        8.4MB

      • memory/1968-1492-0x0000000000000000-mapping.dmp
      • memory/1968-3824-0x0000000000400000-0x0000000000C64000-memory.dmp
        Filesize

        8.4MB

      • memory/1968-2345-0x0000000000400000-0x0000000000C64000-memory.dmp
        Filesize

        8.4MB

      • memory/1968-1495-0x0000000077500000-0x00000000776A3000-memory.dmp
        Filesize

        1.6MB

      • memory/1968-1496-0x0000000075C20000-0x0000000075E35000-memory.dmp
        Filesize

        2.1MB

      • memory/1968-1498-0x00000000762F0000-0x0000000076490000-memory.dmp
        Filesize

        1.6MB

      • memory/1968-1499-0x0000000075A00000-0x0000000075A7A000-memory.dmp
        Filesize

        488KB

      • memory/1968-3849-0x0000000002C10000-0x0000000002D10000-memory.dmp
        Filesize

        1024KB

      • memory/3160-3891-0x0000000075A00000-0x0000000075A7A000-memory.dmp
        Filesize

        488KB

      • memory/3160-5579-0x0000000000400000-0x0000000000C64000-memory.dmp
        Filesize

        8.4MB

      • memory/3160-5581-0x0000000000400000-0x0000000000C64000-memory.dmp
        Filesize

        8.4MB

      • memory/3160-5582-0x0000000000400000-0x0000000000C64000-memory.dmp
        Filesize

        8.4MB

      • memory/3160-5580-0x0000000000400000-0x0000000000C64000-memory.dmp
        Filesize

        8.4MB

      • memory/3160-5578-0x0000000000400000-0x0000000000C64000-memory.dmp
        Filesize

        8.4MB

      • memory/3160-4324-0x0000000000400000-0x0000000000C64000-memory.dmp
        Filesize

        8.4MB

      • memory/3160-5577-0x0000000000400000-0x0000000000C64000-memory.dmp
        Filesize

        8.4MB

      • memory/3160-3877-0x0000000077500000-0x00000000776A3000-memory.dmp
        Filesize

        1.6MB

      • memory/3160-3861-0x0000000000000000-mapping.dmp
      • memory/3160-3887-0x00000000762F0000-0x0000000076490000-memory.dmp
        Filesize

        1.6MB

      • memory/3160-3881-0x0000000075C20000-0x0000000075E35000-memory.dmp
        Filesize

        2.1MB

      • memory/3160-3875-0x0000000000400000-0x0000000000C64000-memory.dmp
        Filesize

        8.4MB

      • memory/4344-137-0x0000000000000000-mapping.dmp
      • memory/4560-1911-0x0000000000400000-0x0000000000C64000-memory.dmp
        Filesize

        8.4MB

      • memory/4560-139-0x0000000000400000-0x0000000000C64000-memory.dmp
        Filesize

        8.4MB

      • memory/4560-1489-0x0000000000400000-0x0000000000C64000-memory.dmp
        Filesize

        8.4MB

      • memory/4560-1888-0x0000000000400000-0x0000000000C64000-memory.dmp
        Filesize

        8.4MB

      • memory/4560-1490-0x0000000000400000-0x0000000000C64000-memory.dmp
        Filesize

        8.4MB

      • memory/4560-1488-0x0000000000400000-0x0000000000C64000-memory.dmp
        Filesize

        8.4MB

      • memory/4560-141-0x0000000075C20000-0x0000000075E35000-memory.dmp
        Filesize

        2.1MB

      • memory/4560-143-0x00000000762F0000-0x0000000076490000-memory.dmp
        Filesize

        1.6MB

      • memory/4560-144-0x0000000075A00000-0x0000000075A7A000-memory.dmp
        Filesize

        488KB

      • memory/4560-1487-0x0000000000400000-0x0000000000C64000-memory.dmp
        Filesize

        8.4MB

      • memory/4560-140-0x0000000077500000-0x00000000776A3000-memory.dmp
        Filesize

        1.6MB

      • memory/4560-1491-0x0000000000400000-0x0000000000C64000-memory.dmp
        Filesize

        8.4MB

      • memory/4800-138-0x0000000000400000-0x0000000000A85000-memory.dmp
        Filesize

        6.5MB

      • memory/4800-133-0x0000000000400000-0x0000000000A85000-memory.dmp
        Filesize

        6.5MB

      • memory/4800-132-0x0000000000400000-0x0000000000A85000-memory.dmp
        Filesize

        6.5MB

      • memory/5044-1876-0x0000000075C20000-0x0000000075E35000-memory.dmp
        Filesize

        2.1MB

      • memory/5044-1885-0x0000000075A00000-0x0000000075A7A000-memory.dmp
        Filesize

        488KB

      • memory/5044-5584-0x0000000002BF0000-0x0000000002CF0000-memory.dmp
        Filesize

        1024KB

      • memory/5044-5583-0x0000000000400000-0x0000000000C64000-memory.dmp
        Filesize

        8.4MB

      • memory/5044-1859-0x0000000000000000-mapping.dmp
      • memory/5044-1873-0x0000000077500000-0x00000000776A3000-memory.dmp
        Filesize

        1.6MB

      • memory/5044-1883-0x00000000762F0000-0x0000000076490000-memory.dmp
        Filesize

        1.6MB

      • memory/5044-1895-0x0000000000400000-0x0000000000C64000-memory.dmp
        Filesize

        8.4MB

      • memory/5044-4566-0x0000000000400000-0x0000000000C64000-memory.dmp
        Filesize

        8.4MB

      • memory/5044-4567-0x0000000000400000-0x0000000000C64000-memory.dmp
        Filesize

        8.4MB

      • memory/5044-4569-0x0000000000400000-0x0000000000C64000-memory.dmp
        Filesize

        8.4MB

      • memory/5044-4573-0x0000000000400000-0x0000000000C64000-memory.dmp
        Filesize

        8.4MB

      • memory/5044-4589-0x0000000000400000-0x0000000000C64000-memory.dmp
        Filesize

        8.4MB

      • memory/5044-4601-0x0000000002BF0000-0x0000000002CF0000-memory.dmp
        Filesize

        1024KB

      • memory/5100-3845-0x0000000000000000-mapping.dmp
      • memory/5100-3848-0x0000000000400000-0x0000000000492000-memory.dmp
        Filesize

        584KB

      • memory/5100-3865-0x0000000000400000-0x0000000000492000-memory.dmp
        Filesize

        584KB

      • memory/5100-3851-0x0000000000400000-0x0000000000492000-memory.dmp
        Filesize

        584KB

      • memory/5100-3853-0x0000000000400000-0x0000000000492000-memory.dmp
        Filesize

        584KB

      • memory/5100-3855-0x0000000000400000-0x0000000000492000-memory.dmp
        Filesize

        584KB

      • memory/5100-3862-0x0000000000400000-0x0000000000492000-memory.dmp
        Filesize

        584KB

      • memory/5100-3883-0x0000000010000000-0x0000000010017000-memory.dmp
        Filesize

        92KB