Analysis

  • max time kernel
    152s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 19:40

General

  • Target

    e2de578cc207a0866c80c889c53aa94358a7bb07418b9731c3f94a564eb7d914.exe

  • Size

    754KB

  • MD5

    b75f4b6f92fde130c694f264d4c8d403

  • SHA1

    c0dd0dbcf20f3e85a7a00c4376b624f90ded9361

  • SHA256

    e2de578cc207a0866c80c889c53aa94358a7bb07418b9731c3f94a564eb7d914

  • SHA512

    d4711f7dcfecd1cfd67a4a35c7ab6b7a6fe19d921257d0722f25f535dd7693164ab33db9d9693b3c4ab7e747d6c2dad95f61fe702ab669e170968743d3c94ef2

  • SSDEEP

    12288:iplHTKI+LJ6knFQ8LckSl4PDVMfpoLqLWvItSesv6+G:YBaJ6G/LckSl4PDKf3LCW86+G

Malware Config

Signatures

  • Generic Chinese Botnet

    A botnet originating from China which is currently unnamed publicly.

  • Chinese Botnet payload 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 5 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • VMProtect packed file 1 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 25 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 10 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e2de578cc207a0866c80c889c53aa94358a7bb07418b9731c3f94a564eb7d914.exe
    "C:\Users\Admin\AppData\Local\Temp\e2de578cc207a0866c80c889c53aa94358a7bb07418b9731c3f94a564eb7d914.exe"
    1⤵
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3496
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c del e2de578cc207a0866c80c889c53aa94358a7bb07418b9731c3f94a564eb7d914.exe
      2⤵
        PID:1868
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:1184
      • C:\Users\Public\Documents\123\RS1.exe
        "C:\Users\Public\Documents\123\RS1.exe"
        1⤵
        • Executes dropped EXE
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4316
        • C:\WINDOWS\DNomb\FTvrst.exe
          C:\WINDOWS\DNomb\FTvrst.exe
          2⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious use of SetThreadContext
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1464
          • C:\WINDOWS\DNomb\spolsvt.exe
            C:\WINDOWS\DNomb\spolsvt.exe
            3⤵
            • Executes dropped EXE
            • Enumerates connected drives
            • Checks processor information in registry
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of SetWindowsHookEx
            PID:4952
          • C:\WINDOWS\DNomb\audidog.exe
            C:\WINDOWS\DNomb\audidog.exe
            3⤵
            • Executes dropped EXE
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Drops file in Windows directory
            • Suspicious use of SetWindowsHookEx
            PID:1412
        • C:\WINDOWS\DNomb\audidog.exe
          C:\WINDOWS\DNomb\audidog.exe
          2⤵
          • Executes dropped EXE
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Drops file in Windows directory
          • Suspicious use of SetWindowsHookEx
          PID:228

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Public\Documents\123\RS1.exe

        Filesize

        2.2MB

        MD5

        3a9c682b077bc044b21131216bdf6304

        SHA1

        afdd419f084b56838c7eb07ff2b28ff9b960e27e

        SHA256

        8beaa45a7ca8a10127ed2e359be90f856a4ac0b87ed31e57a59aadc58ad94cc8

        SHA512

        99a2d2ce97a50791ddac4caa359bc335e404ad4f1ec3bdc5e3df6917e9c6eceba2d7c821eb0728e9d0989df1d021625db7ab962c1ebf705f8770090501d64b14

      • C:\Users\Public\Documents\123\RS1.exe

        Filesize

        2.2MB

        MD5

        3a9c682b077bc044b21131216bdf6304

        SHA1

        afdd419f084b56838c7eb07ff2b28ff9b960e27e

        SHA256

        8beaa45a7ca8a10127ed2e359be90f856a4ac0b87ed31e57a59aadc58ad94cc8

        SHA512

        99a2d2ce97a50791ddac4caa359bc335e404ad4f1ec3bdc5e3df6917e9c6eceba2d7c821eb0728e9d0989df1d021625db7ab962c1ebf705f8770090501d64b14

      • C:\WINDOWS\DNomb\FTvrst.exe

        Filesize

        2.2MB

        MD5

        3a9c682b077bc044b21131216bdf6304

        SHA1

        afdd419f084b56838c7eb07ff2b28ff9b960e27e

        SHA256

        8beaa45a7ca8a10127ed2e359be90f856a4ac0b87ed31e57a59aadc58ad94cc8

        SHA512

        99a2d2ce97a50791ddac4caa359bc335e404ad4f1ec3bdc5e3df6917e9c6eceba2d7c821eb0728e9d0989df1d021625db7ab962c1ebf705f8770090501d64b14

      • C:\WINDOWS\DNomb\Mpec.mbt

        Filesize

        200KB

        MD5

        2963935187c906295e4e2b57f54a98a0

        SHA1

        1c937479f3bfadab7511ff09d05ee144abf35141

        SHA256

        36680ac3f5f39680af0468ba79c464a6682c5a4ef91c1eeaec54899c50102040

        SHA512

        d73ee4298fa21913f0a41df506c69ceb3c6ec2b8106f8b48cd47b5dac93e1c6d5e0b944c7be81364d77261a0c5ecbe86b71797574e789bf810036598687988a1

      • C:\WINDOWS\DNomb\audidog.exe

        Filesize

        2.2MB

        MD5

        3a9c682b077bc044b21131216bdf6304

        SHA1

        afdd419f084b56838c7eb07ff2b28ff9b960e27e

        SHA256

        8beaa45a7ca8a10127ed2e359be90f856a4ac0b87ed31e57a59aadc58ad94cc8

        SHA512

        99a2d2ce97a50791ddac4caa359bc335e404ad4f1ec3bdc5e3df6917e9c6eceba2d7c821eb0728e9d0989df1d021625db7ab962c1ebf705f8770090501d64b14

      • C:\WINDOWS\DNomb\spolsvt.exe

        Filesize

        9KB

        MD5

        523d5c39f9d8d2375c3df68251fa2249

        SHA1

        d4ed365c44bec9246fc1a65a32a7791792647a10

        SHA256

        20e3dc90a3e83b6202e2a7f4603b60e5e859639cb68693426c400b13aaeabd78

        SHA512

        526e1bba30d03f1ac177c6ab7409187a730969c429cebef15da68ffcf44b3b93227781eebc827b2f7a0fa17c391e00a0e532263fd0167aeaeb0456f96cfe3ae4

      • C:\WINDOWS\Djltp.txt

        Filesize

        37B

        MD5

        a0b29945fcd24c2cb36cddf34e227242

        SHA1

        a2eb70a5447a608a327d6a927d015ba2b7713c97

        SHA256

        81b237e3455d1777c780138adc00b275fd1c4df44ab4322c5a1c053879a4178b

        SHA512

        5ee06267f56b2ce3f59d79075683e682b2ad532c22fd703c342a66f2904d756dfeace605cf9d10c794d4a10e9cffd824aa7c77caaba8cc483aa6e99013bedd69

      • C:\Windows\DNomb\FTvrst.exe

        Filesize

        2.2MB

        MD5

        3a9c682b077bc044b21131216bdf6304

        SHA1

        afdd419f084b56838c7eb07ff2b28ff9b960e27e

        SHA256

        8beaa45a7ca8a10127ed2e359be90f856a4ac0b87ed31e57a59aadc58ad94cc8

        SHA512

        99a2d2ce97a50791ddac4caa359bc335e404ad4f1ec3bdc5e3df6917e9c6eceba2d7c821eb0728e9d0989df1d021625db7ab962c1ebf705f8770090501d64b14

      • C:\Windows\DNomb\audidog.exe

        Filesize

        2.2MB

        MD5

        3a9c682b077bc044b21131216bdf6304

        SHA1

        afdd419f084b56838c7eb07ff2b28ff9b960e27e

        SHA256

        8beaa45a7ca8a10127ed2e359be90f856a4ac0b87ed31e57a59aadc58ad94cc8

        SHA512

        99a2d2ce97a50791ddac4caa359bc335e404ad4f1ec3bdc5e3df6917e9c6eceba2d7c821eb0728e9d0989df1d021625db7ab962c1ebf705f8770090501d64b14

      • C:\Windows\DNomb\audidog.exe

        Filesize

        2.2MB

        MD5

        3a9c682b077bc044b21131216bdf6304

        SHA1

        afdd419f084b56838c7eb07ff2b28ff9b960e27e

        SHA256

        8beaa45a7ca8a10127ed2e359be90f856a4ac0b87ed31e57a59aadc58ad94cc8

        SHA512

        99a2d2ce97a50791ddac4caa359bc335e404ad4f1ec3bdc5e3df6917e9c6eceba2d7c821eb0728e9d0989df1d021625db7ab962c1ebf705f8770090501d64b14

      • C:\Windows\DNomb\spolsvt.exe

        Filesize

        9KB

        MD5

        523d5c39f9d8d2375c3df68251fa2249

        SHA1

        d4ed365c44bec9246fc1a65a32a7791792647a10

        SHA256

        20e3dc90a3e83b6202e2a7f4603b60e5e859639cb68693426c400b13aaeabd78

        SHA512

        526e1bba30d03f1ac177c6ab7409187a730969c429cebef15da68ffcf44b3b93227781eebc827b2f7a0fa17c391e00a0e532263fd0167aeaeb0456f96cfe3ae4

      • memory/228-1683-0x0000000075A30000-0x0000000075C45000-memory.dmp

        Filesize

        2.1MB

      • memory/228-4572-0x0000000002DA0000-0x0000000002EA0000-memory.dmp

        Filesize

        1024KB

      • memory/228-4373-0x0000000000400000-0x0000000000C64000-memory.dmp

        Filesize

        8.4MB

      • memory/228-4356-0x0000000000400000-0x0000000000C64000-memory.dmp

        Filesize

        8.4MB

      • memory/228-4351-0x0000000000400000-0x0000000000C64000-memory.dmp

        Filesize

        8.4MB

      • memory/228-4349-0x0000000000400000-0x0000000000C64000-memory.dmp

        Filesize

        8.4MB

      • memory/228-5582-0x0000000002DA0000-0x0000000002EA0000-memory.dmp

        Filesize

        1024KB

      • memory/228-1677-0x0000000077440000-0x00000000775E3000-memory.dmp

        Filesize

        1.6MB

      • memory/228-4346-0x0000000000400000-0x0000000000C64000-memory.dmp

        Filesize

        8.4MB

      • memory/228-5581-0x0000000000400000-0x0000000000C64000-memory.dmp

        Filesize

        8.4MB

      • memory/228-2261-0x0000000000400000-0x0000000000C64000-memory.dmp

        Filesize

        8.4MB

      • memory/228-1697-0x0000000075370000-0x00000000753EA000-memory.dmp

        Filesize

        488KB

      • memory/228-1694-0x0000000076800000-0x00000000769A0000-memory.dmp

        Filesize

        1.6MB

      • memory/228-1690-0x0000000000400000-0x0000000000C64000-memory.dmp

        Filesize

        8.4MB

      • memory/1412-5575-0x0000000000400000-0x0000000000C64000-memory.dmp

        Filesize

        8.4MB

      • memory/1412-5580-0x0000000000400000-0x0000000000C64000-memory.dmp

        Filesize

        8.4MB

      • memory/1412-4108-0x0000000075A30000-0x0000000075C45000-memory.dmp

        Filesize

        2.1MB

      • memory/1412-5578-0x0000000000400000-0x0000000000C64000-memory.dmp

        Filesize

        8.4MB

      • memory/1412-5577-0x0000000000400000-0x0000000000C64000-memory.dmp

        Filesize

        8.4MB

      • memory/1412-4115-0x0000000076800000-0x00000000769A0000-memory.dmp

        Filesize

        1.6MB

      • memory/1412-4106-0x0000000000400000-0x0000000000C64000-memory.dmp

        Filesize

        8.4MB

      • memory/1412-4103-0x0000000077440000-0x00000000775E3000-memory.dmp

        Filesize

        1.6MB

      • memory/1412-4117-0x0000000075370000-0x00000000753EA000-memory.dmp

        Filesize

        488KB

      • memory/1412-5579-0x0000000000400000-0x0000000000C64000-memory.dmp

        Filesize

        8.4MB

      • memory/1412-5576-0x0000000000400000-0x0000000000C64000-memory.dmp

        Filesize

        8.4MB

      • memory/1412-4975-0x0000000000400000-0x0000000000C64000-memory.dmp

        Filesize

        8.4MB

      • memory/1464-1493-0x0000000077440000-0x00000000775E3000-memory.dmp

        Filesize

        1.6MB

      • memory/1464-4081-0x0000000000400000-0x0000000000C64000-memory.dmp

        Filesize

        8.4MB

      • memory/1464-1496-0x0000000076800000-0x00000000769A0000-memory.dmp

        Filesize

        1.6MB

      • memory/1464-1494-0x0000000075A30000-0x0000000075C45000-memory.dmp

        Filesize

        2.1MB

      • memory/1464-2148-0x0000000000400000-0x0000000000C64000-memory.dmp

        Filesize

        8.4MB

      • memory/1464-4038-0x0000000000400000-0x0000000000C64000-memory.dmp

        Filesize

        8.4MB

      • memory/1464-4035-0x0000000000400000-0x0000000000C64000-memory.dmp

        Filesize

        8.4MB

      • memory/1464-4033-0x0000000000400000-0x0000000000C64000-memory.dmp

        Filesize

        8.4MB

      • memory/1464-4030-0x0000000000400000-0x0000000000C64000-memory.dmp

        Filesize

        8.4MB

      • memory/1464-1497-0x0000000075370000-0x00000000753EA000-memory.dmp

        Filesize

        488KB

      • memory/1464-4086-0x00000000029D0000-0x0000000002AD0000-memory.dmp

        Filesize

        1024KB

      • memory/1464-4313-0x0000000000400000-0x0000000000C64000-memory.dmp

        Filesize

        8.4MB

      • memory/3496-132-0x0000000000400000-0x000000000059A000-memory.dmp

        Filesize

        1.6MB

      • memory/3496-135-0x0000000000400000-0x000000000059A000-memory.dmp

        Filesize

        1.6MB

      • memory/3496-133-0x0000000000400000-0x000000000059A000-memory.dmp

        Filesize

        1.6MB

      • memory/4316-1485-0x0000000000400000-0x0000000000C64000-memory.dmp

        Filesize

        8.4MB

      • memory/4316-142-0x0000000076800000-0x00000000769A0000-memory.dmp

        Filesize

        1.6MB

      • memory/4316-138-0x0000000000400000-0x0000000000C64000-memory.dmp

        Filesize

        8.4MB

      • memory/4316-1708-0x0000000000400000-0x0000000000C64000-memory.dmp

        Filesize

        8.4MB

      • memory/4316-139-0x0000000077440000-0x00000000775E3000-memory.dmp

        Filesize

        1.6MB

      • memory/4316-140-0x0000000075A30000-0x0000000075C45000-memory.dmp

        Filesize

        2.1MB

      • memory/4316-1685-0x0000000000400000-0x0000000000C64000-memory.dmp

        Filesize

        8.4MB

      • memory/4316-1489-0x0000000000400000-0x0000000000C64000-memory.dmp

        Filesize

        8.4MB

      • memory/4316-1488-0x0000000000400000-0x0000000000C64000-memory.dmp

        Filesize

        8.4MB

      • memory/4316-1487-0x0000000000400000-0x0000000000C64000-memory.dmp

        Filesize

        8.4MB

      • memory/4316-1486-0x0000000000400000-0x0000000000C64000-memory.dmp

        Filesize

        8.4MB

      • memory/4316-143-0x0000000075370000-0x00000000753EA000-memory.dmp

        Filesize

        488KB

      • memory/4952-4084-0x0000000000400000-0x0000000000492000-memory.dmp

        Filesize

        584KB

      • memory/4952-4079-0x0000000000400000-0x0000000000492000-memory.dmp

        Filesize

        584KB

      • memory/4952-4070-0x0000000000400000-0x0000000000492000-memory.dmp

        Filesize

        584KB

      • memory/4952-4125-0x0000000010000000-0x0000000010017000-memory.dmp

        Filesize

        92KB

      • memory/4952-4068-0x0000000000400000-0x0000000000492000-memory.dmp

        Filesize

        584KB

      • memory/4952-4065-0x0000000000400000-0x0000000000492000-memory.dmp

        Filesize

        584KB

      • memory/4952-4064-0x0000000000400000-0x0000000000492000-memory.dmp

        Filesize

        584KB