Analysis
-
max time kernel
152s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 19:40
Behavioral task
behavioral1
Sample
e2de578cc207a0866c80c889c53aa94358a7bb07418b9731c3f94a564eb7d914.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e2de578cc207a0866c80c889c53aa94358a7bb07418b9731c3f94a564eb7d914.exe
Resource
win10v2004-20220812-en
General
-
Target
e2de578cc207a0866c80c889c53aa94358a7bb07418b9731c3f94a564eb7d914.exe
-
Size
754KB
-
MD5
b75f4b6f92fde130c694f264d4c8d403
-
SHA1
c0dd0dbcf20f3e85a7a00c4376b624f90ded9361
-
SHA256
e2de578cc207a0866c80c889c53aa94358a7bb07418b9731c3f94a564eb7d914
-
SHA512
d4711f7dcfecd1cfd67a4a35c7ab6b7a6fe19d921257d0722f25f535dd7693164ab33db9d9693b3c4ab7e747d6c2dad95f61fe702ab669e170968743d3c94ef2
-
SSDEEP
12288:iplHTKI+LJ6knFQ8LckSl4PDVMfpoLqLWvItSesv6+G:YBaJ6G/LckSl4PDKf3LCW86+G
Malware Config
Signatures
-
Generic Chinese Botnet
A botnet originating from China which is currently unnamed publicly.
-
Chinese Botnet payload 1 IoCs
resource yara_rule behavioral2/memory/4952-4125-0x0000000010000000-0x0000000010017000-memory.dmp unk_chinese_botnet -
Downloads MZ/PE file
-
Executes dropped EXE 5 IoCs
pid Process 4316 RS1.exe 1464 FTvrst.exe 228 audidog.exe 4952 spolsvt.exe 1412 audidog.exe -
resource yara_rule behavioral2/memory/3496-132-0x0000000000400000-0x000000000059A000-memory.dmp upx behavioral2/memory/3496-133-0x0000000000400000-0x000000000059A000-memory.dmp upx behavioral2/memory/3496-135-0x0000000000400000-0x000000000059A000-memory.dmp upx -
resource yara_rule behavioral2/memory/4952-4125-0x0000000010000000-0x0000000010017000-memory.dmp vmprotect -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Therecontinuous = "C:\\WINDOWS\\DNomb\\FTvrst.exe" FTvrst.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\M: spolsvt.exe File opened (read-only) \??\P: spolsvt.exe File opened (read-only) \??\T: spolsvt.exe File opened (read-only) \??\X: spolsvt.exe File opened (read-only) \??\F: spolsvt.exe File opened (read-only) \??\G: spolsvt.exe File opened (read-only) \??\J: spolsvt.exe File opened (read-only) \??\Q: spolsvt.exe File opened (read-only) \??\S: spolsvt.exe File opened (read-only) \??\U: spolsvt.exe File opened (read-only) \??\Y: spolsvt.exe File opened (read-only) \??\E: spolsvt.exe File opened (read-only) \??\I: spolsvt.exe File opened (read-only) \??\R: spolsvt.exe File opened (read-only) \??\B: spolsvt.exe File opened (read-only) \??\N: spolsvt.exe File opened (read-only) \??\L: spolsvt.exe File opened (read-only) \??\O: spolsvt.exe File opened (read-only) \??\V: spolsvt.exe File opened (read-only) \??\W: spolsvt.exe File opened (read-only) \??\Z: spolsvt.exe File opened (read-only) \??\H: spolsvt.exe File opened (read-only) \??\K: spolsvt.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 25 IoCs
pid Process 4316 RS1.exe 4316 RS1.exe 4316 RS1.exe 1464 FTvrst.exe 1464 FTvrst.exe 1464 FTvrst.exe 1464 FTvrst.exe 228 audidog.exe 228 audidog.exe 228 audidog.exe 1412 audidog.exe 1412 audidog.exe 228 audidog.exe 228 audidog.exe 228 audidog.exe 228 audidog.exe 228 audidog.exe 228 audidog.exe 228 audidog.exe 228 audidog.exe 228 audidog.exe 228 audidog.exe 228 audidog.exe 228 audidog.exe 228 audidog.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1464 set thread context of 4952 1464 FTvrst.exe 91 -
Drops file in Windows directory 10 IoCs
description ioc Process File created C:\WINDOWS\DNomb\audidog.exe RS1.exe File created C:\WINDOWS\DNombaudidog.exe audidog.exe File created C:\WINDOWS\DNombaudidog.exe audidog.exe File opened for modification C:\Windows\DNomb\Mpec.mbt e2de578cc207a0866c80c889c53aa94358a7bb07418b9731c3f94a564eb7d914.exe File created C:\WINDOWS\DNomb\spolsvt.exe RS1.exe File created C:\WINDOWS\DNomb\Mpec.mbt RS1.exe File created C:\WINDOWS\DNomb\FTvrst.exe RS1.exe File opened for modification C:\WINDOWS\DNomb\FTvrst.exe RS1.exe File created C:\Windows\DNomb\Mpec.mbt e2de578cc207a0866c80c889c53aa94358a7bb07418b9731c3f94a564eb7d914.exe File created C:\WINDOWS\Djltp.txt RS1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz spolsvt.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 spolsvt.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings e2de578cc207a0866c80c889c53aa94358a7bb07418b9731c3f94a564eb7d914.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4952 spolsvt.exe 4952 spolsvt.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3496 e2de578cc207a0866c80c889c53aa94358a7bb07418b9731c3f94a564eb7d914.exe 3496 e2de578cc207a0866c80c889c53aa94358a7bb07418b9731c3f94a564eb7d914.exe 4316 RS1.exe 4316 RS1.exe 1464 FTvrst.exe 1464 FTvrst.exe 4952 spolsvt.exe 4952 spolsvt.exe 228 audidog.exe 228 audidog.exe 1412 audidog.exe 1412 audidog.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 3496 wrote to memory of 1868 3496 e2de578cc207a0866c80c889c53aa94358a7bb07418b9731c3f94a564eb7d914.exe 81 PID 3496 wrote to memory of 1868 3496 e2de578cc207a0866c80c889c53aa94358a7bb07418b9731c3f94a564eb7d914.exe 81 PID 3496 wrote to memory of 1868 3496 e2de578cc207a0866c80c889c53aa94358a7bb07418b9731c3f94a564eb7d914.exe 81 PID 4316 wrote to memory of 1464 4316 RS1.exe 87 PID 4316 wrote to memory of 1464 4316 RS1.exe 87 PID 4316 wrote to memory of 1464 4316 RS1.exe 87 PID 4316 wrote to memory of 228 4316 RS1.exe 88 PID 4316 wrote to memory of 228 4316 RS1.exe 88 PID 4316 wrote to memory of 228 4316 RS1.exe 88 PID 1464 wrote to memory of 4952 1464 FTvrst.exe 91 PID 1464 wrote to memory of 4952 1464 FTvrst.exe 91 PID 1464 wrote to memory of 4952 1464 FTvrst.exe 91 PID 1464 wrote to memory of 4952 1464 FTvrst.exe 91 PID 1464 wrote to memory of 4952 1464 FTvrst.exe 91 PID 1464 wrote to memory of 4952 1464 FTvrst.exe 91 PID 1464 wrote to memory of 4952 1464 FTvrst.exe 91 PID 1464 wrote to memory of 4952 1464 FTvrst.exe 91 PID 1464 wrote to memory of 4952 1464 FTvrst.exe 91 PID 1464 wrote to memory of 1412 1464 FTvrst.exe 92 PID 1464 wrote to memory of 1412 1464 FTvrst.exe 92 PID 1464 wrote to memory of 1412 1464 FTvrst.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\e2de578cc207a0866c80c889c53aa94358a7bb07418b9731c3f94a564eb7d914.exe"C:\Users\Admin\AppData\Local\Temp\e2de578cc207a0866c80c889c53aa94358a7bb07418b9731c3f94a564eb7d914.exe"1⤵
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3496 -
C:\Windows\SysWOW64\cmd.execmd.exe /c del e2de578cc207a0866c80c889c53aa94358a7bb07418b9731c3f94a564eb7d914.exe2⤵PID:1868
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1184
-
C:\Users\Public\Documents\123\RS1.exe"C:\Users\Public\Documents\123\RS1.exe"1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4316 -
C:\WINDOWS\DNomb\FTvrst.exeC:\WINDOWS\DNomb\FTvrst.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\WINDOWS\DNomb\spolsvt.exeC:\WINDOWS\DNomb\spolsvt.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4952
-
-
C:\WINDOWS\DNomb\audidog.exeC:\WINDOWS\DNomb\audidog.exe3⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:1412
-
-
-
C:\WINDOWS\DNomb\audidog.exeC:\WINDOWS\DNomb\audidog.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:228
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.2MB
MD53a9c682b077bc044b21131216bdf6304
SHA1afdd419f084b56838c7eb07ff2b28ff9b960e27e
SHA2568beaa45a7ca8a10127ed2e359be90f856a4ac0b87ed31e57a59aadc58ad94cc8
SHA51299a2d2ce97a50791ddac4caa359bc335e404ad4f1ec3bdc5e3df6917e9c6eceba2d7c821eb0728e9d0989df1d021625db7ab962c1ebf705f8770090501d64b14
-
Filesize
2.2MB
MD53a9c682b077bc044b21131216bdf6304
SHA1afdd419f084b56838c7eb07ff2b28ff9b960e27e
SHA2568beaa45a7ca8a10127ed2e359be90f856a4ac0b87ed31e57a59aadc58ad94cc8
SHA51299a2d2ce97a50791ddac4caa359bc335e404ad4f1ec3bdc5e3df6917e9c6eceba2d7c821eb0728e9d0989df1d021625db7ab962c1ebf705f8770090501d64b14
-
Filesize
2.2MB
MD53a9c682b077bc044b21131216bdf6304
SHA1afdd419f084b56838c7eb07ff2b28ff9b960e27e
SHA2568beaa45a7ca8a10127ed2e359be90f856a4ac0b87ed31e57a59aadc58ad94cc8
SHA51299a2d2ce97a50791ddac4caa359bc335e404ad4f1ec3bdc5e3df6917e9c6eceba2d7c821eb0728e9d0989df1d021625db7ab962c1ebf705f8770090501d64b14
-
Filesize
200KB
MD52963935187c906295e4e2b57f54a98a0
SHA11c937479f3bfadab7511ff09d05ee144abf35141
SHA25636680ac3f5f39680af0468ba79c464a6682c5a4ef91c1eeaec54899c50102040
SHA512d73ee4298fa21913f0a41df506c69ceb3c6ec2b8106f8b48cd47b5dac93e1c6d5e0b944c7be81364d77261a0c5ecbe86b71797574e789bf810036598687988a1
-
Filesize
2.2MB
MD53a9c682b077bc044b21131216bdf6304
SHA1afdd419f084b56838c7eb07ff2b28ff9b960e27e
SHA2568beaa45a7ca8a10127ed2e359be90f856a4ac0b87ed31e57a59aadc58ad94cc8
SHA51299a2d2ce97a50791ddac4caa359bc335e404ad4f1ec3bdc5e3df6917e9c6eceba2d7c821eb0728e9d0989df1d021625db7ab962c1ebf705f8770090501d64b14
-
Filesize
9KB
MD5523d5c39f9d8d2375c3df68251fa2249
SHA1d4ed365c44bec9246fc1a65a32a7791792647a10
SHA25620e3dc90a3e83b6202e2a7f4603b60e5e859639cb68693426c400b13aaeabd78
SHA512526e1bba30d03f1ac177c6ab7409187a730969c429cebef15da68ffcf44b3b93227781eebc827b2f7a0fa17c391e00a0e532263fd0167aeaeb0456f96cfe3ae4
-
Filesize
37B
MD5a0b29945fcd24c2cb36cddf34e227242
SHA1a2eb70a5447a608a327d6a927d015ba2b7713c97
SHA25681b237e3455d1777c780138adc00b275fd1c4df44ab4322c5a1c053879a4178b
SHA5125ee06267f56b2ce3f59d79075683e682b2ad532c22fd703c342a66f2904d756dfeace605cf9d10c794d4a10e9cffd824aa7c77caaba8cc483aa6e99013bedd69
-
Filesize
2.2MB
MD53a9c682b077bc044b21131216bdf6304
SHA1afdd419f084b56838c7eb07ff2b28ff9b960e27e
SHA2568beaa45a7ca8a10127ed2e359be90f856a4ac0b87ed31e57a59aadc58ad94cc8
SHA51299a2d2ce97a50791ddac4caa359bc335e404ad4f1ec3bdc5e3df6917e9c6eceba2d7c821eb0728e9d0989df1d021625db7ab962c1ebf705f8770090501d64b14
-
Filesize
2.2MB
MD53a9c682b077bc044b21131216bdf6304
SHA1afdd419f084b56838c7eb07ff2b28ff9b960e27e
SHA2568beaa45a7ca8a10127ed2e359be90f856a4ac0b87ed31e57a59aadc58ad94cc8
SHA51299a2d2ce97a50791ddac4caa359bc335e404ad4f1ec3bdc5e3df6917e9c6eceba2d7c821eb0728e9d0989df1d021625db7ab962c1ebf705f8770090501d64b14
-
Filesize
2.2MB
MD53a9c682b077bc044b21131216bdf6304
SHA1afdd419f084b56838c7eb07ff2b28ff9b960e27e
SHA2568beaa45a7ca8a10127ed2e359be90f856a4ac0b87ed31e57a59aadc58ad94cc8
SHA51299a2d2ce97a50791ddac4caa359bc335e404ad4f1ec3bdc5e3df6917e9c6eceba2d7c821eb0728e9d0989df1d021625db7ab962c1ebf705f8770090501d64b14
-
Filesize
9KB
MD5523d5c39f9d8d2375c3df68251fa2249
SHA1d4ed365c44bec9246fc1a65a32a7791792647a10
SHA25620e3dc90a3e83b6202e2a7f4603b60e5e859639cb68693426c400b13aaeabd78
SHA512526e1bba30d03f1ac177c6ab7409187a730969c429cebef15da68ffcf44b3b93227781eebc827b2f7a0fa17c391e00a0e532263fd0167aeaeb0456f96cfe3ae4