Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
31-01-2023 19:20
Static task
static1
Behavioral task
behavioral1
Sample
eb7e288f1289acec3df23db595831e23c8488c8f3fcad61411098bd046a1fc19.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
eb7e288f1289acec3df23db595831e23c8488c8f3fcad61411098bd046a1fc19.exe
Resource
win10v2004-20221111-en
General
-
Target
eb7e288f1289acec3df23db595831e23c8488c8f3fcad61411098bd046a1fc19.exe
-
Size
2.7MB
-
MD5
1c5db3ef3cac4c9a894c5a1255476b94
-
SHA1
5c091d5020d23f0a3a3c3f923cfbe9c3f9afc1ff
-
SHA256
eb7e288f1289acec3df23db595831e23c8488c8f3fcad61411098bd046a1fc19
-
SHA512
c2e05803fbf225e95a3ee5fb0d8b8d76b704a124bfbd9a6ac90cf300047817ea25e432d9b97ffc9904e88eb41c4d28687ccdc49872cb170c0508cd9d02cd41e7
-
SSDEEP
49152:PoF2MMuR+S/SJeyo7144XYM/pf2G8wK/FtoxkEta+s8KuqGaX0ToIBAUZLYp8:Q9Mu1SzUm4XHb8vFtYkQJJBAUZLE
Malware Config
Signatures
-
Generic Chinese Botnet
A botnet originating from China which is currently unnamed publicly.
-
Chinese Botnet payload 2 IoCs
resource yara_rule behavioral1/memory/1448-5668-0x0000000000400000-0x000000000051F000-memory.dmp unk_chinese_botnet behavioral1/memory/1992-9637-0x0000000000400000-0x000000000051F000-memory.dmp unk_chinese_botnet -
Executes dropped EXE 2 IoCs
pid Process 1448 GameLoadep.exe 1992 Terms.exe -
resource yara_rule behavioral1/memory/1392-55-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1392-57-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1392-56-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1392-59-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1392-61-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1392-65-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1392-67-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1392-69-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1392-73-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1392-75-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1392-77-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1392-79-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1392-83-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1392-85-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1392-87-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1392-89-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1392-93-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1392-95-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1392-91-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1392-81-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1392-71-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1392-63-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1392-97-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1392-101-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: GameLoadep.exe File opened (read-only) \??\M: GameLoadep.exe File opened (read-only) \??\T: GameLoadep.exe File opened (read-only) \??\V: GameLoadep.exe File opened (read-only) \??\W: GameLoadep.exe File opened (read-only) \??\F: GameLoadep.exe File opened (read-only) \??\J: GameLoadep.exe File opened (read-only) \??\P: GameLoadep.exe File opened (read-only) \??\R: GameLoadep.exe File opened (read-only) \??\Z: GameLoadep.exe File opened (read-only) \??\U: GameLoadep.exe File opened (read-only) \??\Y: GameLoadep.exe File opened (read-only) \??\G: GameLoadep.exe File opened (read-only) \??\H: GameLoadep.exe File opened (read-only) \??\I: GameLoadep.exe File opened (read-only) \??\N: GameLoadep.exe File opened (read-only) \??\O: GameLoadep.exe File opened (read-only) \??\X: GameLoadep.exe File opened (read-only) \??\B: GameLoadep.exe File opened (read-only) \??\K: GameLoadep.exe File opened (read-only) \??\L: GameLoadep.exe File opened (read-only) \??\Q: GameLoadep.exe File opened (read-only) \??\S: GameLoadep.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat Terms.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 64 IoCs
pid Process 1448 GameLoadep.exe 1448 GameLoadep.exe 1448 GameLoadep.exe 1448 GameLoadep.exe 1448 GameLoadep.exe 1448 GameLoadep.exe 1448 GameLoadep.exe 1448 GameLoadep.exe 1448 GameLoadep.exe 1448 GameLoadep.exe 1448 GameLoadep.exe 1448 GameLoadep.exe 1448 GameLoadep.exe 1448 GameLoadep.exe 1448 GameLoadep.exe 1448 GameLoadep.exe 1448 GameLoadep.exe 1448 GameLoadep.exe 1448 GameLoadep.exe 1448 GameLoadep.exe 1448 GameLoadep.exe 1448 GameLoadep.exe 1448 GameLoadep.exe 1448 GameLoadep.exe 1448 GameLoadep.exe 1448 GameLoadep.exe 1448 GameLoadep.exe 1448 GameLoadep.exe 1448 GameLoadep.exe 1448 GameLoadep.exe 1448 GameLoadep.exe 1448 GameLoadep.exe 1448 GameLoadep.exe 1448 GameLoadep.exe 1448 GameLoadep.exe 1448 GameLoadep.exe 1448 GameLoadep.exe 1448 GameLoadep.exe 1448 GameLoadep.exe 1448 GameLoadep.exe 1448 GameLoadep.exe 1448 GameLoadep.exe 1448 GameLoadep.exe 1448 GameLoadep.exe 1448 GameLoadep.exe 1448 GameLoadep.exe 1448 GameLoadep.exe 1448 GameLoadep.exe 1448 GameLoadep.exe 1992 Terms.exe 1992 Terms.exe 1992 Terms.exe 1992 Terms.exe 1992 Terms.exe 1992 Terms.exe 1992 Terms.exe 1448 GameLoadep.exe 1448 GameLoadep.exe 1448 GameLoadep.exe 1448 GameLoadep.exe 1448 GameLoadep.exe 1448 GameLoadep.exe 1992 Terms.exe 1992 Terms.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Terms.exe GameLoadep.exe File created C:\Program Files (x86)\Terms.exe GameLoadep.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\GameLoadep.exe eb7e288f1289acec3df23db595831e23c8488c8f3fcad61411098bd046a1fc19.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 GameLoadep.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz GameLoadep.exe -
Modifies data under HKEY_USERS 24 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{963575E0-E72B-4DDF-95FB-A6BEC6F64444} Terms.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{963575E0-E72B-4DDF-95FB-A6BEC6F64444}\9a-0b-dc-94-d8-b7 Terms.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\9a-0b-dc-94-d8-b7\WpadDecisionReason = "1" Terms.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\9a-0b-dc-94-d8-b7\WpadDecisionTime = d0e9d38cb135d901 Terms.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" Terms.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad Terms.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" Terms.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix Terms.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{963575E0-E72B-4DDF-95FB-A6BEC6F64444}\WpadDecisionTime = d0e9d38cb135d901 Terms.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\9a-0b-dc-94-d8-b7\WpadDecision = "0" Terms.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections Terms.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ Terms.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" Terms.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0048000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Terms.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{963575E0-E72B-4DDF-95FB-A6BEC6F64444}\WpadDecisionReason = "1" Terms.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{963575E0-E72B-4DDF-95FB-A6BEC6F64444}\WpadNetworkName = "Network 2" Terms.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings Terms.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Terms.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Terms.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" Terms.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{963575E0-E72B-4DDF-95FB-A6BEC6F64444}\WpadDecision = "0" Terms.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\9a-0b-dc-94-d8-b7 Terms.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" Terms.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings Terms.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1448 GameLoadep.exe 1448 GameLoadep.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1392 eb7e288f1289acec3df23db595831e23c8488c8f3fcad61411098bd046a1fc19.exe 1392 eb7e288f1289acec3df23db595831e23c8488c8f3fcad61411098bd046a1fc19.exe 1392 eb7e288f1289acec3df23db595831e23c8488c8f3fcad61411098bd046a1fc19.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1392 wrote to memory of 1448 1392 eb7e288f1289acec3df23db595831e23c8488c8f3fcad61411098bd046a1fc19.exe 28 PID 1392 wrote to memory of 1448 1392 eb7e288f1289acec3df23db595831e23c8488c8f3fcad61411098bd046a1fc19.exe 28 PID 1392 wrote to memory of 1448 1392 eb7e288f1289acec3df23db595831e23c8488c8f3fcad61411098bd046a1fc19.exe 28 PID 1392 wrote to memory of 1448 1392 eb7e288f1289acec3df23db595831e23c8488c8f3fcad61411098bd046a1fc19.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\eb7e288f1289acec3df23db595831e23c8488c8f3fcad61411098bd046a1fc19.exe"C:\Users\Admin\AppData\Local\Temp\eb7e288f1289acec3df23db595831e23c8488c8f3fcad61411098bd046a1fc19.exe"1⤵
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Windows\GameLoadep.exeC:\Windows\GameLoadep.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:1448
-
-
C:\Program Files (x86)\Terms.exe"C:\Program Files (x86)\Terms.exe"1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies data under HKEY_USERS
PID:1992
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
864KB
MD5645a7e5dc4adc68141447b01cb9cec49
SHA12f83beeb3031aa238c8eba4ae04398ff38274780
SHA25676931bce0663f68f95a46414d389042181c690749eed44cb09aae325a0b9ef17
SHA512fdf56fcacc1b43c94bd2811ad3926706f7382fc1d3e20c58b050cf254019c3b6226d0ffa8d4ba6aec259d3a99cb63d06d02156dd6dabab59b91418ba462885de
-
Filesize
864KB
MD5645a7e5dc4adc68141447b01cb9cec49
SHA12f83beeb3031aa238c8eba4ae04398ff38274780
SHA25676931bce0663f68f95a46414d389042181c690749eed44cb09aae325a0b9ef17
SHA512fdf56fcacc1b43c94bd2811ad3926706f7382fc1d3e20c58b050cf254019c3b6226d0ffa8d4ba6aec259d3a99cb63d06d02156dd6dabab59b91418ba462885de
-
Filesize
864KB
MD5645a7e5dc4adc68141447b01cb9cec49
SHA12f83beeb3031aa238c8eba4ae04398ff38274780
SHA25676931bce0663f68f95a46414d389042181c690749eed44cb09aae325a0b9ef17
SHA512fdf56fcacc1b43c94bd2811ad3926706f7382fc1d3e20c58b050cf254019c3b6226d0ffa8d4ba6aec259d3a99cb63d06d02156dd6dabab59b91418ba462885de
-
Filesize
864KB
MD5645a7e5dc4adc68141447b01cb9cec49
SHA12f83beeb3031aa238c8eba4ae04398ff38274780
SHA25676931bce0663f68f95a46414d389042181c690749eed44cb09aae325a0b9ef17
SHA512fdf56fcacc1b43c94bd2811ad3926706f7382fc1d3e20c58b050cf254019c3b6226d0ffa8d4ba6aec259d3a99cb63d06d02156dd6dabab59b91418ba462885de