Analysis
-
max time kernel
143s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
09-11-2022 13:33
Behavioral task
behavioral1
Sample
54cf35c8c1b0949422348d097c4544186753549583395108fe620c57b8033421.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
54cf35c8c1b0949422348d097c4544186753549583395108fe620c57b8033421.exe
Resource
win10v2004-20220812-en
General
-
Target
54cf35c8c1b0949422348d097c4544186753549583395108fe620c57b8033421.exe
-
Size
2.0MB
-
MD5
1e2cfbde6afd4b54fabbc9c70735123f
-
SHA1
ad19d94a6ecfe8ab38fb2f83e9129e6cfccab7cf
-
SHA256
54cf35c8c1b0949422348d097c4544186753549583395108fe620c57b8033421
-
SHA512
4415a3fd01c46c17628c7943902296da5387fdbf530060889806ce3b3ef5717a2724767fd6ee9855204455955bdc2b477581838588fd6311789aff52f997e077
-
SSDEEP
49152:Uxae01xkh8Y0E5M5Lwex5oSbWmg/f8M8WKL/0qk/H979/:5Y0GevWmoUPT0qQH979
Malware Config
Signatures
-
Generic Chinese Botnet
A botnet originating from China which is currently unnamed publicly.
-
Chinese Botnet payload 4 IoCs
resource yara_rule behavioral1/memory/1660-55-0x0000000010000000-0x000000001001F000-memory.dmp unk_chinese_botnet behavioral1/memory/1660-61-0x0000000000400000-0x00000000007A0000-memory.dmp unk_chinese_botnet behavioral1/memory/1932-71-0x0000000000400000-0x00000000007A0000-memory.dmp unk_chinese_botnet behavioral1/memory/852-76-0x0000000000400000-0x00000000007A0000-memory.dmp unk_chinese_botnet -
Executes dropped EXE 2 IoCs
pid Process 1932 Terms.exe 852 Terms.exe -
resource yara_rule behavioral1/files/0x000c0000000054a8-59.dat upx behavioral1/memory/1660-61-0x0000000000400000-0x00000000007A0000-memory.dmp upx behavioral1/memory/1932-62-0x0000000000400000-0x00000000007A0000-memory.dmp upx behavioral1/files/0x000c0000000054a8-67.dat upx behavioral1/files/0x000c0000000054a8-69.dat upx behavioral1/memory/1932-71-0x0000000000400000-0x00000000007A0000-memory.dmp upx behavioral1/memory/852-76-0x0000000000400000-0x00000000007A0000-memory.dmp upx -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Terms.exe 54cf35c8c1b0949422348d097c4544186753549583395108fe620c57b8033421.exe File opened for modification C:\Program Files (x86)\Terms.exe 54cf35c8c1b0949422348d097c4544186753549583395108fe620c57b8033421.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1660 54cf35c8c1b0949422348d097c4544186753549583395108fe620c57b8033421.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1660 54cf35c8c1b0949422348d097c4544186753549583395108fe620c57b8033421.exe 1932 Terms.exe 852 Terms.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1932 wrote to memory of 852 1932 Terms.exe 29 PID 1932 wrote to memory of 852 1932 Terms.exe 29 PID 1932 wrote to memory of 852 1932 Terms.exe 29 PID 1932 wrote to memory of 852 1932 Terms.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\54cf35c8c1b0949422348d097c4544186753549583395108fe620c57b8033421.exe"C:\Users\Admin\AppData\Local\Temp\54cf35c8c1b0949422348d097c4544186753549583395108fe620c57b8033421.exe"1⤵
- Drops file in Program Files directory
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
PID:1660
-
C:\Program Files (x86)\Terms.exe"C:\Program Files (x86)\Terms.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Program Files (x86)\Terms.exe"C:\Program Files (x86)\Terms.exe" Win72⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:852
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD51e2cfbde6afd4b54fabbc9c70735123f
SHA1ad19d94a6ecfe8ab38fb2f83e9129e6cfccab7cf
SHA25654cf35c8c1b0949422348d097c4544186753549583395108fe620c57b8033421
SHA5124415a3fd01c46c17628c7943902296da5387fdbf530060889806ce3b3ef5717a2724767fd6ee9855204455955bdc2b477581838588fd6311789aff52f997e077
-
Filesize
2.0MB
MD51e2cfbde6afd4b54fabbc9c70735123f
SHA1ad19d94a6ecfe8ab38fb2f83e9129e6cfccab7cf
SHA25654cf35c8c1b0949422348d097c4544186753549583395108fe620c57b8033421
SHA5124415a3fd01c46c17628c7943902296da5387fdbf530060889806ce3b3ef5717a2724767fd6ee9855204455955bdc2b477581838588fd6311789aff52f997e077
-
Filesize
2.0MB
MD51e2cfbde6afd4b54fabbc9c70735123f
SHA1ad19d94a6ecfe8ab38fb2f83e9129e6cfccab7cf
SHA25654cf35c8c1b0949422348d097c4544186753549583395108fe620c57b8033421
SHA5124415a3fd01c46c17628c7943902296da5387fdbf530060889806ce3b3ef5717a2724767fd6ee9855204455955bdc2b477581838588fd6311789aff52f997e077