Analysis
-
max time kernel
151s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
29-05-2023 11:54
Static task
static1
Behavioral task
behavioral1
Sample
fc35c92c7990c972e2e54428788ae4e60eed5e27d09074429349e76784bd7dfc.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
fc35c92c7990c972e2e54428788ae4e60eed5e27d09074429349e76784bd7dfc.exe
Resource
win10v2004-20230220-en
General
-
Target
fc35c92c7990c972e2e54428788ae4e60eed5e27d09074429349e76784bd7dfc.exe
-
Size
5.8MB
-
MD5
2776724a45ac3cb2b8f86dd29a40374e
-
SHA1
8c199252cc0c6e4123cb9b506685da98ddb1a212
-
SHA256
fc35c92c7990c972e2e54428788ae4e60eed5e27d09074429349e76784bd7dfc
-
SHA512
48ee3572affd1cc2a70d756a3b1afe9a9608cec1654b88c9c0b10e9acb5bd66dad38630dd085e4ae529ece12681d6063ebed86740ca948685aab66b46a248aab
-
SSDEEP
98304:egEI4LQQ/QUm4XHb8vFtYkQYrSz9rAmLJHORm6UJamI3LeojzZARZpkAdcc6IjWF:LqPjX7oD5rSpru+W3KMZkvdagNXhJs0I
Malware Config
Signatures
-
Generic Chinese Botnet
A botnet originating from China which is currently unnamed publicly.
-
Chinese Botnet payload 1 IoCs
resource yara_rule behavioral1/memory/1304-5120-0x0000000000400000-0x000000000051F000-memory.dmp unk_chinese_botnet -
Executes dropped EXE 2 IoCs
pid Process 1304 GameLoadep.exe 936 Terms.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\G: GameLoadep.exe File opened (read-only) \??\M: GameLoadep.exe File opened (read-only) \??\S: GameLoadep.exe File opened (read-only) \??\F: GameLoadep.exe File opened (read-only) \??\K: GameLoadep.exe File opened (read-only) \??\Q: GameLoadep.exe File opened (read-only) \??\R: GameLoadep.exe File opened (read-only) \??\T: GameLoadep.exe File opened (read-only) \??\X: GameLoadep.exe File opened (read-only) \??\Z: GameLoadep.exe File opened (read-only) \??\E: GameLoadep.exe File opened (read-only) \??\I: GameLoadep.exe File opened (read-only) \??\N: GameLoadep.exe File opened (read-only) \??\O: GameLoadep.exe File opened (read-only) \??\V: GameLoadep.exe File opened (read-only) \??\Y: GameLoadep.exe File opened (read-only) \??\B: GameLoadep.exe File opened (read-only) \??\H: GameLoadep.exe File opened (read-only) \??\J: GameLoadep.exe File opened (read-only) \??\L: GameLoadep.exe File opened (read-only) \??\P: GameLoadep.exe File opened (read-only) \??\U: GameLoadep.exe File opened (read-only) \??\W: GameLoadep.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 64 IoCs
pid Process 1304 GameLoadep.exe 1304 GameLoadep.exe 1304 GameLoadep.exe 1304 GameLoadep.exe 1304 GameLoadep.exe 1304 GameLoadep.exe 1304 GameLoadep.exe 1304 GameLoadep.exe 1304 GameLoadep.exe 1304 GameLoadep.exe 1304 GameLoadep.exe 1304 GameLoadep.exe 1304 GameLoadep.exe 1304 GameLoadep.exe 1304 GameLoadep.exe 1304 GameLoadep.exe 1304 GameLoadep.exe 1304 GameLoadep.exe 1304 GameLoadep.exe 1304 GameLoadep.exe 1304 GameLoadep.exe 1304 GameLoadep.exe 1304 GameLoadep.exe 1304 GameLoadep.exe 1304 GameLoadep.exe 1304 GameLoadep.exe 1304 GameLoadep.exe 1304 GameLoadep.exe 1304 GameLoadep.exe 1304 GameLoadep.exe 1304 GameLoadep.exe 1304 GameLoadep.exe 1304 GameLoadep.exe 1304 GameLoadep.exe 1304 GameLoadep.exe 1304 GameLoadep.exe 1304 GameLoadep.exe 1304 GameLoadep.exe 1304 GameLoadep.exe 1304 GameLoadep.exe 1304 GameLoadep.exe 1304 GameLoadep.exe 1304 GameLoadep.exe 1304 GameLoadep.exe 1304 GameLoadep.exe 1304 GameLoadep.exe 1304 GameLoadep.exe 1304 GameLoadep.exe 1304 GameLoadep.exe 1304 GameLoadep.exe 1304 GameLoadep.exe 1304 GameLoadep.exe 1304 GameLoadep.exe 1304 GameLoadep.exe 1304 GameLoadep.exe 1304 GameLoadep.exe 1304 GameLoadep.exe 1304 GameLoadep.exe 1304 GameLoadep.exe 1304 GameLoadep.exe 1304 GameLoadep.exe 1304 GameLoadep.exe 1304 GameLoadep.exe 1304 GameLoadep.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Terms.exe GameLoadep.exe File opened for modification C:\Program Files (x86)\Terms.exe GameLoadep.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\GameLoadep.exe fc35c92c7990c972e2e54428788ae4e60eed5e27d09074429349e76784bd7dfc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 GameLoadep.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz GameLoadep.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1304 GameLoadep.exe 1304 GameLoadep.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1344 fc35c92c7990c972e2e54428788ae4e60eed5e27d09074429349e76784bd7dfc.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1344 fc35c92c7990c972e2e54428788ae4e60eed5e27d09074429349e76784bd7dfc.exe 1344 fc35c92c7990c972e2e54428788ae4e60eed5e27d09074429349e76784bd7dfc.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1344 wrote to memory of 1304 1344 fc35c92c7990c972e2e54428788ae4e60eed5e27d09074429349e76784bd7dfc.exe 27 PID 1344 wrote to memory of 1304 1344 fc35c92c7990c972e2e54428788ae4e60eed5e27d09074429349e76784bd7dfc.exe 27 PID 1344 wrote to memory of 1304 1344 fc35c92c7990c972e2e54428788ae4e60eed5e27d09074429349e76784bd7dfc.exe 27 PID 1344 wrote to memory of 1304 1344 fc35c92c7990c972e2e54428788ae4e60eed5e27d09074429349e76784bd7dfc.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\fc35c92c7990c972e2e54428788ae4e60eed5e27d09074429349e76784bd7dfc.exe"C:\Users\Admin\AppData\Local\Temp\fc35c92c7990c972e2e54428788ae4e60eed5e27d09074429349e76784bd7dfc.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Windows\GameLoadep.exeC:\Windows\GameLoadep.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:1304
-
-
C:\Program Files (x86)\Terms.exe"C:\Program Files (x86)\Terms.exe"1⤵
- Executes dropped EXE
PID:936
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
864KB
MD5645a7e5dc4adc68141447b01cb9cec49
SHA12f83beeb3031aa238c8eba4ae04398ff38274780
SHA25676931bce0663f68f95a46414d389042181c690749eed44cb09aae325a0b9ef17
SHA512fdf56fcacc1b43c94bd2811ad3926706f7382fc1d3e20c58b050cf254019c3b6226d0ffa8d4ba6aec259d3a99cb63d06d02156dd6dabab59b91418ba462885de
-
Filesize
864KB
MD5645a7e5dc4adc68141447b01cb9cec49
SHA12f83beeb3031aa238c8eba4ae04398ff38274780
SHA25676931bce0663f68f95a46414d389042181c690749eed44cb09aae325a0b9ef17
SHA512fdf56fcacc1b43c94bd2811ad3926706f7382fc1d3e20c58b050cf254019c3b6226d0ffa8d4ba6aec259d3a99cb63d06d02156dd6dabab59b91418ba462885de
-
Filesize
864KB
MD5645a7e5dc4adc68141447b01cb9cec49
SHA12f83beeb3031aa238c8eba4ae04398ff38274780
SHA25676931bce0663f68f95a46414d389042181c690749eed44cb09aae325a0b9ef17
SHA512fdf56fcacc1b43c94bd2811ad3926706f7382fc1d3e20c58b050cf254019c3b6226d0ffa8d4ba6aec259d3a99cb63d06d02156dd6dabab59b91418ba462885de
-
Filesize
864KB
MD5645a7e5dc4adc68141447b01cb9cec49
SHA12f83beeb3031aa238c8eba4ae04398ff38274780
SHA25676931bce0663f68f95a46414d389042181c690749eed44cb09aae325a0b9ef17
SHA512fdf56fcacc1b43c94bd2811ad3926706f7382fc1d3e20c58b050cf254019c3b6226d0ffa8d4ba6aec259d3a99cb63d06d02156dd6dabab59b91418ba462885de