Analysis
-
max time kernel
146s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
18-02-2023 19:35
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20221111-en
General
-
Target
tmp.exe
-
Size
872KB
-
MD5
d156b1ffd7d387927ee88491a26ccae6
-
SHA1
15764f67963a0e70f2b310510b95021d7e4aa27d
-
SHA256
18459ea969be44966cb9bdd8d65d93d91dc2635d952f02aee69d6e2eaec2c679
-
SHA512
0c213b94f86e49dfad8aed263ef11f5c24b9597591ae7f37b6451f513c1451f603c27676e547809976f636c86d2650fe12c988cdf2cea5ee6843612583ade283
-
SSDEEP
24576:8gC7+maMAjAERQqMHwfVh7OrvgE+FarjUyHWuXki:UihMHwfVhagE3RWuXki
Malware Config
Signatures
-
Generic Chinese Botnet
A botnet originating from China which is currently unnamed publicly.
-
Chinese Botnet payload 2 IoCs
resource yara_rule behavioral1/memory/1428-4299-0x0000000000400000-0x0000000000527000-memory.dmp unk_chinese_botnet behavioral1/memory/1004-8928-0x0000000000400000-0x0000000000527000-memory.dmp unk_chinese_botnet -
Executes dropped EXE 1 IoCs
pid Process 1004 Msemswe.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\J: tmp.exe File opened (read-only) \??\N: tmp.exe File opened (read-only) \??\S: tmp.exe File opened (read-only) \??\T: tmp.exe File opened (read-only) \??\U: tmp.exe File opened (read-only) \??\B: tmp.exe File opened (read-only) \??\H: tmp.exe File opened (read-only) \??\P: tmp.exe File opened (read-only) \??\X: tmp.exe File opened (read-only) \??\Z: tmp.exe File opened (read-only) \??\E: tmp.exe File opened (read-only) \??\G: tmp.exe File opened (read-only) \??\O: tmp.exe File opened (read-only) \??\Q: tmp.exe File opened (read-only) \??\R: tmp.exe File opened (read-only) \??\K: tmp.exe File opened (read-only) \??\M: tmp.exe File opened (read-only) \??\L: tmp.exe File opened (read-only) \??\V: tmp.exe File opened (read-only) \??\W: tmp.exe File opened (read-only) \??\Y: tmp.exe File opened (read-only) \??\F: tmp.exe File opened (read-only) \??\I: tmp.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat Msemswe.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 31 IoCs
pid Process 1428 tmp.exe 1428 tmp.exe 1428 tmp.exe 1428 tmp.exe 1428 tmp.exe 1428 tmp.exe 1428 tmp.exe 1428 tmp.exe 1428 tmp.exe 1004 Msemswe.exe 1004 Msemswe.exe 1428 tmp.exe 1004 Msemswe.exe 1428 tmp.exe 1428 tmp.exe 1428 tmp.exe 1428 tmp.exe 1428 tmp.exe 1428 tmp.exe 1428 tmp.exe 1428 tmp.exe 1428 tmp.exe 1428 tmp.exe 1428 tmp.exe 1428 tmp.exe 1428 tmp.exe 1428 tmp.exe 1428 tmp.exe 1428 tmp.exe 1428 tmp.exe 1428 tmp.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Msemswe.exe tmp.exe File opened for modification C:\Program Files (x86)\Msemswe.exe tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 tmp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz tmp.exe -
Modifies data under HKEY_USERS 24 IoCs
description ioc Process Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Msemswe.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" Msemswe.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings Msemswe.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix Msemswe.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad Msemswe.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings Msemswe.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections Msemswe.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{328E7D97-0EBE-4C40-B176-738AAA60FA7F}\WpadDecisionTime = 70e24fc0d843d901 Msemswe.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\56-df-e0-71-ee-43\WpadDecisionReason = "1" Msemswe.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\56-df-e0-71-ee-43\WpadDecisionTime = 70e24fc0d843d901 Msemswe.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{328E7D97-0EBE-4C40-B176-738AAA60FA7F}\WpadDecision = "0" Msemswe.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ Msemswe.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" Msemswe.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Msemswe.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" Msemswe.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0043000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Msemswe.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{328E7D97-0EBE-4C40-B176-738AAA60FA7F} Msemswe.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{328E7D97-0EBE-4C40-B176-738AAA60FA7F}\WpadDecisionReason = "1" Msemswe.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{328E7D97-0EBE-4C40-B176-738AAA60FA7F}\WpadNetworkName = "Network 2" Msemswe.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{328E7D97-0EBE-4C40-B176-738AAA60FA7F}\56-df-e0-71-ee-43 Msemswe.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\56-df-e0-71-ee-43\WpadDecision = "0" Msemswe.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" Msemswe.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" Msemswe.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\56-df-e0-71-ee-43 Msemswe.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1428 tmp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Enumerates connected drives
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:1428
-
C:\Program Files (x86)\Msemswe.exe"C:\Program Files (x86)\Msemswe.exe"1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies data under HKEY_USERS
PID:1004
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
872KB
MD5d156b1ffd7d387927ee88491a26ccae6
SHA115764f67963a0e70f2b310510b95021d7e4aa27d
SHA25618459ea969be44966cb9bdd8d65d93d91dc2635d952f02aee69d6e2eaec2c679
SHA5120c213b94f86e49dfad8aed263ef11f5c24b9597591ae7f37b6451f513c1451f603c27676e547809976f636c86d2650fe12c988cdf2cea5ee6843612583ade283
-
Filesize
872KB
MD5d156b1ffd7d387927ee88491a26ccae6
SHA115764f67963a0e70f2b310510b95021d7e4aa27d
SHA25618459ea969be44966cb9bdd8d65d93d91dc2635d952f02aee69d6e2eaec2c679
SHA5120c213b94f86e49dfad8aed263ef11f5c24b9597591ae7f37b6451f513c1451f603c27676e547809976f636c86d2650fe12c988cdf2cea5ee6843612583ade283