Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
02-06-2023 09:38
Static task
static1
Behavioral task
behavioral1
Sample
c79629afcc688c5aacc77c3ac8936b1d541ad2516c1b4e492ffd5cb291e8be7d.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
c79629afcc688c5aacc77c3ac8936b1d541ad2516c1b4e492ffd5cb291e8be7d.exe
Resource
win10v2004-20230220-en
General
-
Target
c79629afcc688c5aacc77c3ac8936b1d541ad2516c1b4e492ffd5cb291e8be7d.exe
-
Size
1.1MB
-
MD5
07b3f0a6e96cdaf151d93b498f80a657
-
SHA1
292f54a95a841f9320d79005e40a6eb06a407f84
-
SHA256
c79629afcc688c5aacc77c3ac8936b1d541ad2516c1b4e492ffd5cb291e8be7d
-
SHA512
c79d470ead238f2a211796645f545d123db4eb8ba9c3bdcb0e2c26cff4896553fe3432855fec5153da8e7e1ebb787754326dc1d8032617dc3cf4c4e674992364
-
SSDEEP
24576:7bW+w2dCjdOQvaT2r+rJAjjYjWx4i6dwPyAmDyuuN59FoOCqDW:7StgQvaSrrKWV6dwKAmDun9FdCH
Malware Config
Signatures
-
Generic Chinese Botnet
A botnet originating from China which is currently unnamed publicly.
-
Chinese Botnet payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/576-4827-0x0000000000400000-0x000000000056B000-memory.dmp unk_chinese_botnet -
Suspicious use of NtSetInformationThreadHideFromDebugger 64 IoCs
Processes:
c79629afcc688c5aacc77c3ac8936b1d541ad2516c1b4e492ffd5cb291e8be7d.exepid process 576 c79629afcc688c5aacc77c3ac8936b1d541ad2516c1b4e492ffd5cb291e8be7d.exe 576 c79629afcc688c5aacc77c3ac8936b1d541ad2516c1b4e492ffd5cb291e8be7d.exe 576 c79629afcc688c5aacc77c3ac8936b1d541ad2516c1b4e492ffd5cb291e8be7d.exe 576 c79629afcc688c5aacc77c3ac8936b1d541ad2516c1b4e492ffd5cb291e8be7d.exe 576 c79629afcc688c5aacc77c3ac8936b1d541ad2516c1b4e492ffd5cb291e8be7d.exe 576 c79629afcc688c5aacc77c3ac8936b1d541ad2516c1b4e492ffd5cb291e8be7d.exe 576 c79629afcc688c5aacc77c3ac8936b1d541ad2516c1b4e492ffd5cb291e8be7d.exe 576 c79629afcc688c5aacc77c3ac8936b1d541ad2516c1b4e492ffd5cb291e8be7d.exe 576 c79629afcc688c5aacc77c3ac8936b1d541ad2516c1b4e492ffd5cb291e8be7d.exe 576 c79629afcc688c5aacc77c3ac8936b1d541ad2516c1b4e492ffd5cb291e8be7d.exe 576 c79629afcc688c5aacc77c3ac8936b1d541ad2516c1b4e492ffd5cb291e8be7d.exe 576 c79629afcc688c5aacc77c3ac8936b1d541ad2516c1b4e492ffd5cb291e8be7d.exe 576 c79629afcc688c5aacc77c3ac8936b1d541ad2516c1b4e492ffd5cb291e8be7d.exe 576 c79629afcc688c5aacc77c3ac8936b1d541ad2516c1b4e492ffd5cb291e8be7d.exe 576 c79629afcc688c5aacc77c3ac8936b1d541ad2516c1b4e492ffd5cb291e8be7d.exe 576 c79629afcc688c5aacc77c3ac8936b1d541ad2516c1b4e492ffd5cb291e8be7d.exe 576 c79629afcc688c5aacc77c3ac8936b1d541ad2516c1b4e492ffd5cb291e8be7d.exe 576 c79629afcc688c5aacc77c3ac8936b1d541ad2516c1b4e492ffd5cb291e8be7d.exe 576 c79629afcc688c5aacc77c3ac8936b1d541ad2516c1b4e492ffd5cb291e8be7d.exe 576 c79629afcc688c5aacc77c3ac8936b1d541ad2516c1b4e492ffd5cb291e8be7d.exe 576 c79629afcc688c5aacc77c3ac8936b1d541ad2516c1b4e492ffd5cb291e8be7d.exe 576 c79629afcc688c5aacc77c3ac8936b1d541ad2516c1b4e492ffd5cb291e8be7d.exe 576 c79629afcc688c5aacc77c3ac8936b1d541ad2516c1b4e492ffd5cb291e8be7d.exe 576 c79629afcc688c5aacc77c3ac8936b1d541ad2516c1b4e492ffd5cb291e8be7d.exe 576 c79629afcc688c5aacc77c3ac8936b1d541ad2516c1b4e492ffd5cb291e8be7d.exe 576 c79629afcc688c5aacc77c3ac8936b1d541ad2516c1b4e492ffd5cb291e8be7d.exe 576 c79629afcc688c5aacc77c3ac8936b1d541ad2516c1b4e492ffd5cb291e8be7d.exe 576 c79629afcc688c5aacc77c3ac8936b1d541ad2516c1b4e492ffd5cb291e8be7d.exe 576 c79629afcc688c5aacc77c3ac8936b1d541ad2516c1b4e492ffd5cb291e8be7d.exe 576 c79629afcc688c5aacc77c3ac8936b1d541ad2516c1b4e492ffd5cb291e8be7d.exe 576 c79629afcc688c5aacc77c3ac8936b1d541ad2516c1b4e492ffd5cb291e8be7d.exe 576 c79629afcc688c5aacc77c3ac8936b1d541ad2516c1b4e492ffd5cb291e8be7d.exe 576 c79629afcc688c5aacc77c3ac8936b1d541ad2516c1b4e492ffd5cb291e8be7d.exe 576 c79629afcc688c5aacc77c3ac8936b1d541ad2516c1b4e492ffd5cb291e8be7d.exe 576 c79629afcc688c5aacc77c3ac8936b1d541ad2516c1b4e492ffd5cb291e8be7d.exe 576 c79629afcc688c5aacc77c3ac8936b1d541ad2516c1b4e492ffd5cb291e8be7d.exe 576 c79629afcc688c5aacc77c3ac8936b1d541ad2516c1b4e492ffd5cb291e8be7d.exe 576 c79629afcc688c5aacc77c3ac8936b1d541ad2516c1b4e492ffd5cb291e8be7d.exe 576 c79629afcc688c5aacc77c3ac8936b1d541ad2516c1b4e492ffd5cb291e8be7d.exe 576 c79629afcc688c5aacc77c3ac8936b1d541ad2516c1b4e492ffd5cb291e8be7d.exe 576 c79629afcc688c5aacc77c3ac8936b1d541ad2516c1b4e492ffd5cb291e8be7d.exe 576 c79629afcc688c5aacc77c3ac8936b1d541ad2516c1b4e492ffd5cb291e8be7d.exe 576 c79629afcc688c5aacc77c3ac8936b1d541ad2516c1b4e492ffd5cb291e8be7d.exe 576 c79629afcc688c5aacc77c3ac8936b1d541ad2516c1b4e492ffd5cb291e8be7d.exe 576 c79629afcc688c5aacc77c3ac8936b1d541ad2516c1b4e492ffd5cb291e8be7d.exe 576 c79629afcc688c5aacc77c3ac8936b1d541ad2516c1b4e492ffd5cb291e8be7d.exe 576 c79629afcc688c5aacc77c3ac8936b1d541ad2516c1b4e492ffd5cb291e8be7d.exe 576 c79629afcc688c5aacc77c3ac8936b1d541ad2516c1b4e492ffd5cb291e8be7d.exe 576 c79629afcc688c5aacc77c3ac8936b1d541ad2516c1b4e492ffd5cb291e8be7d.exe 576 c79629afcc688c5aacc77c3ac8936b1d541ad2516c1b4e492ffd5cb291e8be7d.exe 576 c79629afcc688c5aacc77c3ac8936b1d541ad2516c1b4e492ffd5cb291e8be7d.exe 576 c79629afcc688c5aacc77c3ac8936b1d541ad2516c1b4e492ffd5cb291e8be7d.exe 576 c79629afcc688c5aacc77c3ac8936b1d541ad2516c1b4e492ffd5cb291e8be7d.exe 576 c79629afcc688c5aacc77c3ac8936b1d541ad2516c1b4e492ffd5cb291e8be7d.exe 576 c79629afcc688c5aacc77c3ac8936b1d541ad2516c1b4e492ffd5cb291e8be7d.exe 576 c79629afcc688c5aacc77c3ac8936b1d541ad2516c1b4e492ffd5cb291e8be7d.exe 576 c79629afcc688c5aacc77c3ac8936b1d541ad2516c1b4e492ffd5cb291e8be7d.exe 576 c79629afcc688c5aacc77c3ac8936b1d541ad2516c1b4e492ffd5cb291e8be7d.exe 576 c79629afcc688c5aacc77c3ac8936b1d541ad2516c1b4e492ffd5cb291e8be7d.exe 576 c79629afcc688c5aacc77c3ac8936b1d541ad2516c1b4e492ffd5cb291e8be7d.exe 576 c79629afcc688c5aacc77c3ac8936b1d541ad2516c1b4e492ffd5cb291e8be7d.exe 576 c79629afcc688c5aacc77c3ac8936b1d541ad2516c1b4e492ffd5cb291e8be7d.exe 576 c79629afcc688c5aacc77c3ac8936b1d541ad2516c1b4e492ffd5cb291e8be7d.exe 576 c79629afcc688c5aacc77c3ac8936b1d541ad2516c1b4e492ffd5cb291e8be7d.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
c79629afcc688c5aacc77c3ac8936b1d541ad2516c1b4e492ffd5cb291e8be7d.exepid process 576 c79629afcc688c5aacc77c3ac8936b1d541ad2516c1b4e492ffd5cb291e8be7d.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c79629afcc688c5aacc77c3ac8936b1d541ad2516c1b4e492ffd5cb291e8be7d.exe"C:\Users\Admin\AppData\Local\Temp\c79629afcc688c5aacc77c3ac8936b1d541ad2516c1b4e492ffd5cb291e8be7d.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:576