Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
29/01/2023, 21:24
Static task
static1
Behavioral task
behavioral1
Sample
6499dfc9cd9d9da4bd0ee1f23f4b4014f7d525924da56c93b8e75562c12f6cb2.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
6499dfc9cd9d9da4bd0ee1f23f4b4014f7d525924da56c93b8e75562c12f6cb2.exe
Resource
win10v2004-20221111-en
General
-
Target
6499dfc9cd9d9da4bd0ee1f23f4b4014f7d525924da56c93b8e75562c12f6cb2.exe
-
Size
664KB
-
MD5
6ee2603f88b3ab82e4089bf12f633a00
-
SHA1
0c076e2c795c1c875384c3e9c5ade382648b2a6a
-
SHA256
6499dfc9cd9d9da4bd0ee1f23f4b4014f7d525924da56c93b8e75562c12f6cb2
-
SHA512
d3998094531579e0941945ef0801fa855191c15b3711286ab772b078d9c94e037c22bfddb52ac148fc30def4938c15b4b9c5a2653f6eaee6e01039b15d100e38
-
SSDEEP
3072:upH0jrEzxbJpF+ax8oSZylh76xFwZvMZYgUamncbwTrnwTTatvywC6/sUVdQKgZW:+zFJKYjh+xFwLbwTTatd/sUVdQUIa
Malware Config
Signatures
-
Generic Chinese Botnet
A botnet originating from China which is currently unnamed publicly.
-
Chinese Botnet payload 1 IoCs
resource yara_rule behavioral2/memory/5012-133-0x0000000010000000-0x0000000010018000-memory.dmp unk_chinese_botnet -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Kqakiwq.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\6499dfc9cd9d9da4bd0ee1f23f4b4014f7d525924da56c93b8e75562c12f6cb2.exe" 6499dfc9cd9d9da4bd0ee1f23f4b4014f7d525924da56c93b8e75562c12f6cb2.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5012 6499dfc9cd9d9da4bd0ee1f23f4b4014f7d525924da56c93b8e75562c12f6cb2.exe