Analysis
-
max time kernel
269s -
max time network
364s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
12-02-2023 10:04
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20220812-en
General
-
Target
tmp.exe
-
Size
1.3MB
-
MD5
70fc8ed66dcbf35718325bd94f7dd1e7
-
SHA1
cd36fdf88632fa7676d5d5f649d44f2ac4f2342f
-
SHA256
c03c9d22c013990be03bf7bfc65cb34db47beb0381856b992c340dfd5b6406b2
-
SHA512
eff121acdc3eeb38cb8826e8507b8458daacd51cd058dec600b747a94a05e07088ded4eb912973bcfc846dee6e0001109cf914a26335c0bd430c12a703aa5dea
-
SSDEEP
24576:c7YKIYHC9+TrolcVDql1BdPYJ5jJtf4ShbWolOHoFN6WtljaEyEg:cUKI3gAeDqvbOtrhZ8HoFN6WtljaEyE
Malware Config
Signatures
-
Generic Chinese Botnet
A botnet originating from China which is currently unnamed publicly.
-
Chinese Botnet payload 1 IoCs
resource yara_rule behavioral1/memory/772-4624-0x0000000000400000-0x000000000072F000-memory.dmp unk_chinese_botnet -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\ = "C:\\Windows\\Terms.exe" tmp.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\I: tmp.exe File opened (read-only) \??\L: tmp.exe File opened (read-only) \??\M: tmp.exe File opened (read-only) \??\N: tmp.exe File opened (read-only) \??\Q: tmp.exe File opened (read-only) \??\R: tmp.exe File opened (read-only) \??\T: tmp.exe File opened (read-only) \??\V: tmp.exe File opened (read-only) \??\B: tmp.exe File opened (read-only) \??\H: tmp.exe File opened (read-only) \??\X: tmp.exe File opened (read-only) \??\Y: tmp.exe File opened (read-only) \??\O: tmp.exe File opened (read-only) \??\P: tmp.exe File opened (read-only) \??\S: tmp.exe File opened (read-only) \??\W: tmp.exe File opened (read-only) \??\G: tmp.exe File opened (read-only) \??\J: tmp.exe File opened (read-only) \??\K: tmp.exe File opened (read-only) \??\U: tmp.exe File opened (read-only) \??\Z: tmp.exe File opened (read-only) \??\E: tmp.exe File opened (read-only) \??\F: tmp.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 64 IoCs
pid Process 772 tmp.exe 772 tmp.exe 772 tmp.exe 772 tmp.exe 772 tmp.exe 772 tmp.exe 772 tmp.exe 772 tmp.exe 772 tmp.exe 772 tmp.exe 772 tmp.exe 772 tmp.exe 772 tmp.exe 772 tmp.exe 772 tmp.exe 772 tmp.exe 772 tmp.exe 772 tmp.exe 772 tmp.exe 772 tmp.exe 772 tmp.exe 772 tmp.exe 772 tmp.exe 772 tmp.exe 772 tmp.exe 772 tmp.exe 772 tmp.exe 772 tmp.exe 772 tmp.exe 772 tmp.exe 772 tmp.exe 772 tmp.exe 772 tmp.exe 772 tmp.exe 772 tmp.exe 772 tmp.exe 772 tmp.exe 772 tmp.exe 772 tmp.exe 772 tmp.exe 772 tmp.exe 772 tmp.exe 772 tmp.exe 772 tmp.exe 772 tmp.exe 772 tmp.exe 772 tmp.exe 772 tmp.exe 772 tmp.exe 772 tmp.exe 772 tmp.exe 772 tmp.exe 772 tmp.exe 772 tmp.exe 772 tmp.exe 772 tmp.exe 772 tmp.exe 772 tmp.exe 772 tmp.exe 772 tmp.exe 772 tmp.exe 772 tmp.exe 772 tmp.exe 772 tmp.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Terms.exe tmp.exe File opened for modification C:\Windows\Terms.exe tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 tmp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz tmp.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 772 tmp.exe 772 tmp.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 772 tmp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Adds Run key to start application
- Enumerates connected drives
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:772