Analysis
-
max time kernel
36s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
19-05-2023 06:45
Static task
static1
Behavioral task
behavioral1
Sample
9159b1caffb60b67e3ca0e9d30b2dfb2.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
9159b1caffb60b67e3ca0e9d30b2dfb2.exe
Resource
win10v2004-20230221-en
General
-
Target
9159b1caffb60b67e3ca0e9d30b2dfb2.exe
-
Size
352KB
-
MD5
9159b1caffb60b67e3ca0e9d30b2dfb2
-
SHA1
ae4449ae8f24d2de121bbb3939fc5d4d43ed1e4c
-
SHA256
2ca7ee8a683a5506547320b23f4ba37ff6f91a907c9c9e06c5b68376d3711d4f
-
SHA512
894548e92608a85f211f604beebfd0c0269c2eabc1950f6b9ea84fe4f3f68412e248b10c56690a09ffe2d968c208160927ca82a9dbf8b9d12b75d6a7fc932afb
-
SSDEEP
3072:fAAdrtCSXB538PKKQplrPxqlXsPygMPG1C68x7E:VUPKKWlbo0MPKC68x
Malware Config
Signatures
-
Generic Chinese Botnet
A botnet originating from China which is currently unnamed publicly.
-
Chinese Botnet payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1344-54-0x0000000010000000-0x0000000010018000-memory.dmp unk_chinese_botnet -
Executes dropped EXE 2 IoCs
Processes:
Ueaaksu.exeUeaaksu.exepid process 756 Ueaaksu.exe 1884 Ueaaksu.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
9159b1caffb60b67e3ca0e9d30b2dfb2.exedescription ioc process File opened (read-only) \??\F: 9159b1caffb60b67e3ca0e9d30b2dfb2.exe File opened (read-only) \??\K: 9159b1caffb60b67e3ca0e9d30b2dfb2.exe File opened (read-only) \??\M: 9159b1caffb60b67e3ca0e9d30b2dfb2.exe File opened (read-only) \??\W: 9159b1caffb60b67e3ca0e9d30b2dfb2.exe File opened (read-only) \??\V: 9159b1caffb60b67e3ca0e9d30b2dfb2.exe File opened (read-only) \??\Y: 9159b1caffb60b67e3ca0e9d30b2dfb2.exe File opened (read-only) \??\J: 9159b1caffb60b67e3ca0e9d30b2dfb2.exe File opened (read-only) \??\L: 9159b1caffb60b67e3ca0e9d30b2dfb2.exe File opened (read-only) \??\O: 9159b1caffb60b67e3ca0e9d30b2dfb2.exe File opened (read-only) \??\U: 9159b1caffb60b67e3ca0e9d30b2dfb2.exe File opened (read-only) \??\P: 9159b1caffb60b67e3ca0e9d30b2dfb2.exe File opened (read-only) \??\R: 9159b1caffb60b67e3ca0e9d30b2dfb2.exe File opened (read-only) \??\T: 9159b1caffb60b67e3ca0e9d30b2dfb2.exe File opened (read-only) \??\X: 9159b1caffb60b67e3ca0e9d30b2dfb2.exe File opened (read-only) \??\E: 9159b1caffb60b67e3ca0e9d30b2dfb2.exe File opened (read-only) \??\G: 9159b1caffb60b67e3ca0e9d30b2dfb2.exe File opened (read-only) \??\I: 9159b1caffb60b67e3ca0e9d30b2dfb2.exe File opened (read-only) \??\N: 9159b1caffb60b67e3ca0e9d30b2dfb2.exe File opened (read-only) \??\Z: 9159b1caffb60b67e3ca0e9d30b2dfb2.exe File opened (read-only) \??\B: 9159b1caffb60b67e3ca0e9d30b2dfb2.exe File opened (read-only) \??\H: 9159b1caffb60b67e3ca0e9d30b2dfb2.exe File opened (read-only) \??\Q: 9159b1caffb60b67e3ca0e9d30b2dfb2.exe File opened (read-only) \??\S: 9159b1caffb60b67e3ca0e9d30b2dfb2.exe -
Drops file in System32 directory 2 IoCs
Processes:
Ueaaksu.exeUeaaksu.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat Ueaaksu.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat Ueaaksu.exe -
Drops file in Program Files directory 2 IoCs
Processes:
9159b1caffb60b67e3ca0e9d30b2dfb2.exedescription ioc process File opened for modification C:\Program Files (x86)\Ueaaksu.exe 9159b1caffb60b67e3ca0e9d30b2dfb2.exe File created C:\Program Files (x86)\Ueaaksu.exe 9159b1caffb60b67e3ca0e9d30b2dfb2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
9159b1caffb60b67e3ca0e9d30b2dfb2.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 9159b1caffb60b67e3ca0e9d30b2dfb2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz 9159b1caffb60b67e3ca0e9d30b2dfb2.exe -
Modifies data under HKEY_USERS 49 IoCs
Processes:
Ueaaksu.exeUeaaksu.exedescription ioc process Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f005a000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Ueaaksu.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{A88E47B6-F35B-4C4C-AC3A-0A196B53A4D3}\WpadDecisionReason = "1" Ueaaksu.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ca-cb-b1-71-d3-41\WpadDecisionReason = "1" Ueaaksu.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ca-cb-b1-71-d3-41 Ueaaksu.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ca-cb-b1-71-d3-41\WpadDetectedUrl Ueaaksu.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections Ueaaksu.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Ueaaksu.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings Ueaaksu.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix Ueaaksu.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad Ueaaksu.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ca-cb-b1-71-d3-41\WpadDecisionTime = 207e7c422e8ad901 Ueaaksu.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000004000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f005a000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Ueaaksu.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ca-cb-b1-71-d3-41\WpadDecisionTime = 6096df4a2e8ad901 Ueaaksu.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" Ueaaksu.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ca-cb-b1-71-d3-41\WpadDecision = "0" Ueaaksu.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" Ueaaksu.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{A88E47B6-F35B-4C4C-AC3A-0A196B53A4D3} Ueaaksu.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ Ueaaksu.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ Ueaaksu.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{A88E47B6-F35B-4C4C-AC3A-0A196B53A4D3}\WpadDecisionTime = 207e7c422e8ad901 Ueaaksu.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{A88E47B6-F35B-4C4C-AC3A-0A196B53A4D3}\WpadNetworkName = "Network 3" Ueaaksu.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{A88E47B6-F35B-4C4C-AC3A-0A196B53A4D3}\ca-cb-b1-71-d3-41 Ueaaksu.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{A88E47B6-F35B-4C4C-AC3A-0A196B53A4D3}\WpadDecision = "0" Ueaaksu.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad Ueaaksu.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{A88E47B6-F35B-4C4C-AC3A-0A196B53A4D3} Ueaaksu.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings Ueaaksu.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ca-cb-b1-71-d3-41\WpadDecision = "0" Ueaaksu.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" Ueaaksu.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix Ueaaksu.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ca-cb-b1-71-d3-41\WpadDecisionReason = "1" Ueaaksu.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Ueaaksu.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" Ueaaksu.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ca-cb-b1-71-d3-41 Ueaaksu.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{A88E47B6-F35B-4C4C-AC3A-0A196B53A4D3}\ca-cb-b1-71-d3-41 Ueaaksu.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ca-cb-b1-71-d3-41\WpadDecisionTime = 207e7c422e8ad901 Ueaaksu.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{A88E47B6-F35B-4C4C-AC3A-0A196B53A4D3}\WpadDecisionReason = "1" Ueaaksu.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{A88E47B6-F35B-4C4C-AC3A-0A196B53A4D3}\WpadNetworkName = "Network 3" Ueaaksu.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" Ueaaksu.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{A88E47B6-F35B-4C4C-AC3A-0A196B53A4D3}\WpadDecision = "0" Ueaaksu.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings Ueaaksu.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" Ueaaksu.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections Ueaaksu.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" Ueaaksu.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f005a000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Ueaaksu.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" Ueaaksu.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings Ueaaksu.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" Ueaaksu.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" Ueaaksu.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{A88E47B6-F35B-4C4C-AC3A-0A196B53A4D3}\WpadDecisionTime = 6096df4a2e8ad901 Ueaaksu.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
9159b1caffb60b67e3ca0e9d30b2dfb2.exepid process 1344 9159b1caffb60b67e3ca0e9d30b2dfb2.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
Ueaaksu.exedescription pid process target process PID 756 wrote to memory of 1884 756 Ueaaksu.exe Ueaaksu.exe PID 756 wrote to memory of 1884 756 Ueaaksu.exe Ueaaksu.exe PID 756 wrote to memory of 1884 756 Ueaaksu.exe Ueaaksu.exe PID 756 wrote to memory of 1884 756 Ueaaksu.exe Ueaaksu.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9159b1caffb60b67e3ca0e9d30b2dfb2.exe"C:\Users\Admin\AppData\Local\Temp\9159b1caffb60b67e3ca0e9d30b2dfb2.exe"1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:1344
-
C:\Program Files (x86)\Ueaaksu.exe"C:\Program Files (x86)\Ueaaksu.exe"1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:756 -
C:\Program Files (x86)\Ueaaksu.exe"C:\Program Files (x86)\Ueaaksu.exe" Win72⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:1884
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
352KB
MD59159b1caffb60b67e3ca0e9d30b2dfb2
SHA1ae4449ae8f24d2de121bbb3939fc5d4d43ed1e4c
SHA2562ca7ee8a683a5506547320b23f4ba37ff6f91a907c9c9e06c5b68376d3711d4f
SHA512894548e92608a85f211f604beebfd0c0269c2eabc1950f6b9ea84fe4f3f68412e248b10c56690a09ffe2d968c208160927ca82a9dbf8b9d12b75d6a7fc932afb
-
Filesize
352KB
MD59159b1caffb60b67e3ca0e9d30b2dfb2
SHA1ae4449ae8f24d2de121bbb3939fc5d4d43ed1e4c
SHA2562ca7ee8a683a5506547320b23f4ba37ff6f91a907c9c9e06c5b68376d3711d4f
SHA512894548e92608a85f211f604beebfd0c0269c2eabc1950f6b9ea84fe4f3f68412e248b10c56690a09ffe2d968c208160927ca82a9dbf8b9d12b75d6a7fc932afb
-
Filesize
352KB
MD59159b1caffb60b67e3ca0e9d30b2dfb2
SHA1ae4449ae8f24d2de121bbb3939fc5d4d43ed1e4c
SHA2562ca7ee8a683a5506547320b23f4ba37ff6f91a907c9c9e06c5b68376d3711d4f
SHA512894548e92608a85f211f604beebfd0c0269c2eabc1950f6b9ea84fe4f3f68412e248b10c56690a09ffe2d968c208160927ca82a9dbf8b9d12b75d6a7fc932afb