Analysis
-
max time kernel
64s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20230705-en -
resource tags
arch:x64arch:x86image:win7-20230705-enlocale:en-usos:windows7-x64system -
submitted
08-07-2023 08:33
Static task
static1
Behavioral task
behavioral1
Sample
f713e7045cc1cd661e6d6f3c72ab491e.exe
Resource
win7-20230705-en
Behavioral task
behavioral2
Sample
f713e7045cc1cd661e6d6f3c72ab491e.exe
Resource
win10v2004-20230703-en
General
-
Target
f713e7045cc1cd661e6d6f3c72ab491e.exe
-
Size
372KB
-
MD5
f713e7045cc1cd661e6d6f3c72ab491e
-
SHA1
e826ad940aa1f3e9cfd7b0a5135eb5682e14b8ba
-
SHA256
64195ca6545b2da8890b22410e2e6eacc3f1a9949c57c545938c5535e5a7c493
-
SHA512
96697b08faa3805e1124b3c585178063ffbcb6269bc3940735aa78d90c437f0c8c59e7350e0d12744efaf1ae0931f5038290679907e73e0dd5d7b0c077d4cb20
-
SSDEEP
1536:fiRtp/YdUQtQgtaj6ojA85Fk3JyQ8v1TPjl3RC0SypBXd657E6QVgs:fAAdrtvtMjA85a3JXCZky/X857E6Ls
Malware Config
Signatures
-
Generic Chinese Botnet
A botnet originating from China which is currently unnamed publicly.
-
Chinese Botnet payload 1 IoCs
resource yara_rule behavioral1/memory/2544-54-0x0000000010000000-0x0000000010018000-memory.dmp unk_chinese_botnet -
Executes dropped EXE 2 IoCs
pid Process 2972 Akgoios.exe 2848 Akgoios.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Z: f713e7045cc1cd661e6d6f3c72ab491e.exe File opened (read-only) \??\B: f713e7045cc1cd661e6d6f3c72ab491e.exe File opened (read-only) \??\G: f713e7045cc1cd661e6d6f3c72ab491e.exe File opened (read-only) \??\I: f713e7045cc1cd661e6d6f3c72ab491e.exe File opened (read-only) \??\K: f713e7045cc1cd661e6d6f3c72ab491e.exe File opened (read-only) \??\Q: f713e7045cc1cd661e6d6f3c72ab491e.exe File opened (read-only) \??\X: f713e7045cc1cd661e6d6f3c72ab491e.exe File opened (read-only) \??\E: f713e7045cc1cd661e6d6f3c72ab491e.exe File opened (read-only) \??\L: f713e7045cc1cd661e6d6f3c72ab491e.exe File opened (read-only) \??\P: f713e7045cc1cd661e6d6f3c72ab491e.exe File opened (read-only) \??\Y: f713e7045cc1cd661e6d6f3c72ab491e.exe File opened (read-only) \??\V: f713e7045cc1cd661e6d6f3c72ab491e.exe File opened (read-only) \??\W: f713e7045cc1cd661e6d6f3c72ab491e.exe File opened (read-only) \??\F: f713e7045cc1cd661e6d6f3c72ab491e.exe File opened (read-only) \??\M: f713e7045cc1cd661e6d6f3c72ab491e.exe File opened (read-only) \??\O: f713e7045cc1cd661e6d6f3c72ab491e.exe File opened (read-only) \??\R: f713e7045cc1cd661e6d6f3c72ab491e.exe File opened (read-only) \??\T: f713e7045cc1cd661e6d6f3c72ab491e.exe File opened (read-only) \??\U: f713e7045cc1cd661e6d6f3c72ab491e.exe File opened (read-only) \??\H: f713e7045cc1cd661e6d6f3c72ab491e.exe File opened (read-only) \??\J: f713e7045cc1cd661e6d6f3c72ab491e.exe File opened (read-only) \??\N: f713e7045cc1cd661e6d6f3c72ab491e.exe File opened (read-only) \??\S: f713e7045cc1cd661e6d6f3c72ab491e.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat Akgoios.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat Akgoios.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft Fyyrik\Akgoios.exe f713e7045cc1cd661e6d6f3c72ab491e.exe File opened for modification C:\Program Files (x86)\Microsoft Fyyrik\Akgoios.exe f713e7045cc1cd661e6d6f3c72ab491e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 f713e7045cc1cd661e6d6f3c72ab491e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz f713e7045cc1cd661e6d6f3c72ab491e.exe -
Modifies data under HKEY_USERS 49 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{19BDDB92-374E-49E0-8D71-DA4626B400DE}\WpadDecision = "0" Akgoios.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix Akgoios.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{19BDDB92-374E-49E0-8D71-DA4626B400DE}\96-12-d2-1a-13-7f Akgoios.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\96-12-d2-1a-13-7f\WpadDecisionTime = 90adf5e676b1d901 Akgoios.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" Akgoios.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" Akgoios.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\96-12-d2-1a-13-7f\WpadDecision = "0" Akgoios.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\96-12-d2-1a-13-7f Akgoios.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections Akgoios.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{19BDDB92-374E-49E0-8D71-DA4626B400DE} Akgoios.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" Akgoios.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\96-12-d2-1a-13-7f\WpadDecisionReason = "1" Akgoios.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\96-12-d2-1a-13-7f\WpadDecisionTime = 90b394f676b1d901 Akgoios.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ Akgoios.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" Akgoios.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{19BDDB92-374E-49E0-8D71-DA4626B400DE}\WpadDecisionReason = "1" Akgoios.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{19BDDB92-374E-49E0-8D71-DA4626B400DE}\96-12-d2-1a-13-7f Akgoios.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\96-12-d2-1a-13-7f\WpadDecisionReason = "1" Akgoios.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings Akgoios.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" Akgoios.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{19BDDB92-374E-49E0-8D71-DA4626B400DE} Akgoios.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Akgoios.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Akgoios.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ Akgoios.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad Akgoios.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\96-12-d2-1a-13-7f\WpadDecision = "0" Akgoios.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{19BDDB92-374E-49E0-8D71-DA4626B400DE}\WpadDecisionReason = "1" Akgoios.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad Akgoios.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\96-12-d2-1a-13-7f Akgoios.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections Akgoios.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\96-12-d2-1a-13-7f\WpadDetectedUrl Akgoios.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{19BDDB92-374E-49E0-8D71-DA4626B400DE}\WpadDecisionTime = 90b394f676b1d901 Akgoios.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" Akgoios.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0056000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Akgoios.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{19BDDB92-374E-49E0-8D71-DA4626B400DE}\WpadDecisionTime = 90adf5e676b1d901 Akgoios.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{19BDDB92-374E-49E0-8D71-DA4626B400DE}\WpadNetworkName = "Network 3" Akgoios.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" Akgoios.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" Akgoios.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{19BDDB92-374E-49E0-8D71-DA4626B400DE}\WpadNetworkName = "Network 3" Akgoios.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings Akgoios.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings Akgoios.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix Akgoios.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" Akgoios.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\96-12-d2-1a-13-7f\WpadDecisionTime = 90adf5e676b1d901 Akgoios.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings Akgoios.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" Akgoios.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0056000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Akgoios.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000004000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0056000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Akgoios.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{19BDDB92-374E-49E0-8D71-DA4626B400DE}\WpadDecision = "0" Akgoios.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2544 f713e7045cc1cd661e6d6f3c72ab491e.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2972 wrote to memory of 2848 2972 Akgoios.exe 29 PID 2972 wrote to memory of 2848 2972 Akgoios.exe 29 PID 2972 wrote to memory of 2848 2972 Akgoios.exe 29 PID 2972 wrote to memory of 2848 2972 Akgoios.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\f713e7045cc1cd661e6d6f3c72ab491e.exe"C:\Users\Admin\AppData\Local\Temp\f713e7045cc1cd661e6d6f3c72ab491e.exe"1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:2544
-
C:\Program Files (x86)\Microsoft Fyyrik\Akgoios.exe"C:\Program Files (x86)\Microsoft Fyyrik\Akgoios.exe"1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Program Files (x86)\Microsoft Fyyrik\Akgoios.exe"C:\Program Files (x86)\Microsoft Fyyrik\Akgoios.exe" Win72⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:2848
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
372KB
MD5f713e7045cc1cd661e6d6f3c72ab491e
SHA1e826ad940aa1f3e9cfd7b0a5135eb5682e14b8ba
SHA25664195ca6545b2da8890b22410e2e6eacc3f1a9949c57c545938c5535e5a7c493
SHA51296697b08faa3805e1124b3c585178063ffbcb6269bc3940735aa78d90c437f0c8c59e7350e0d12744efaf1ae0931f5038290679907e73e0dd5d7b0c077d4cb20
-
Filesize
372KB
MD5f713e7045cc1cd661e6d6f3c72ab491e
SHA1e826ad940aa1f3e9cfd7b0a5135eb5682e14b8ba
SHA25664195ca6545b2da8890b22410e2e6eacc3f1a9949c57c545938c5535e5a7c493
SHA51296697b08faa3805e1124b3c585178063ffbcb6269bc3940735aa78d90c437f0c8c59e7350e0d12744efaf1ae0931f5038290679907e73e0dd5d7b0c077d4cb20
-
Filesize
372KB
MD5f713e7045cc1cd661e6d6f3c72ab491e
SHA1e826ad940aa1f3e9cfd7b0a5135eb5682e14b8ba
SHA25664195ca6545b2da8890b22410e2e6eacc3f1a9949c57c545938c5535e5a7c493
SHA51296697b08faa3805e1124b3c585178063ffbcb6269bc3940735aa78d90c437f0c8c59e7350e0d12744efaf1ae0931f5038290679907e73e0dd5d7b0c077d4cb20