Analysis

  • max time kernel
    147s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    26-07-2023 06:27

General

  • Target

    HD_._cache_HD_start_file_download.exe

  • Size

    889KB

  • MD5

    e875a237d6a68cf4f0c6becaae181756

  • SHA1

    170dde378e497e4743fa0980bfc0a7439b46c16d

  • SHA256

    c89085680b0eea443bef95035d09f57e1bbe9a5090387dd08a5dc22b8fd73162

  • SHA512

    c1ca9f876bf766ea6493282340313c22337872b375aae51c61cea02c06a317174e9f7a70c3822ada766460797ab57ed6dc98bec029bde5c6eafa1f57e1f42c2d

  • SSDEEP

    24576:SwpQ3reAjDaoQ/XWA/B0jKeaOhELnAEntX43+pAfjFH/:rEvaoQ/Xn/Gj1qnrntX4AKhH/

Malware Config

Signatures

  • Generic Chinese Botnet

    A botnet originating from China which is currently unnamed publicly.

  • Chinese Botnet payload 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates connected drives 3 TTPs 44 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 28 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 49 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\HD_._cache_HD_start_file_download.exe
    "C:\Users\Admin\AppData\Local\Temp\HD_._cache_HD_start_file_download.exe"
    1⤵
    • Loads dropped DLL
    • Enumerates connected drives
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Program Files directory
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:2316
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c md C:\windowss64
      2⤵
        PID:1224
      • C:\windowss64\computer.exe
        "C:\windowss64\computer.exe"
        2⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        PID:1140
    • C:\Program Files (x86)\Microsoft Dhbbnn\Umqygia.exe
      "C:\Program Files (x86)\Microsoft Dhbbnn\Umqygia.exe"
      1⤵
      • Executes dropped EXE
      PID:1148
    • C:\Program Files (x86)\Fbthdlv.exe
      "C:\Program Files (x86)\Fbthdlv.exe"
      1⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Modifies data under HKEY_USERS
      • Suspicious use of WriteProcessMemory
      PID:2752
      • C:\Program Files (x86)\Fbthdlv.exe
        "C:\Program Files (x86)\Fbthdlv.exe" Win7
        2⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Modifies data under HKEY_USERS
        PID:2540

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Fbthdlv.exe

      Filesize

      376KB

      MD5

      d8b28ba74753386b6d8db50cd45c7736

      SHA1

      6ad0f38cb66ea65989d6bd5e0caaa7fe3d4e613b

      SHA256

      1b088f289981db8bb8996ac0442910b0131af925a0012aebfa71ba2eb69bfa37

      SHA512

      635ce951f9637d93339fe566214bc1001c724ec2e8139ae89a2b472c08d3123b8c8efeefe89b0880315e734ad76cbf7f28d61837bd24c6659148b802f272084e

    • C:\Program Files (x86)\Fbthdlv.exe

      Filesize

      376KB

      MD5

      d8b28ba74753386b6d8db50cd45c7736

      SHA1

      6ad0f38cb66ea65989d6bd5e0caaa7fe3d4e613b

      SHA256

      1b088f289981db8bb8996ac0442910b0131af925a0012aebfa71ba2eb69bfa37

      SHA512

      635ce951f9637d93339fe566214bc1001c724ec2e8139ae89a2b472c08d3123b8c8efeefe89b0880315e734ad76cbf7f28d61837bd24c6659148b802f272084e

    • C:\Program Files (x86)\Fbthdlv.exe

      Filesize

      376KB

      MD5

      d8b28ba74753386b6d8db50cd45c7736

      SHA1

      6ad0f38cb66ea65989d6bd5e0caaa7fe3d4e613b

      SHA256

      1b088f289981db8bb8996ac0442910b0131af925a0012aebfa71ba2eb69bfa37

      SHA512

      635ce951f9637d93339fe566214bc1001c724ec2e8139ae89a2b472c08d3123b8c8efeefe89b0880315e734ad76cbf7f28d61837bd24c6659148b802f272084e

    • C:\Program Files (x86)\Microsoft Dhbbnn\Umqygia.exe

      Filesize

      889KB

      MD5

      e875a237d6a68cf4f0c6becaae181756

      SHA1

      170dde378e497e4743fa0980bfc0a7439b46c16d

      SHA256

      c89085680b0eea443bef95035d09f57e1bbe9a5090387dd08a5dc22b8fd73162

      SHA512

      c1ca9f876bf766ea6493282340313c22337872b375aae51c61cea02c06a317174e9f7a70c3822ada766460797ab57ed6dc98bec029bde5c6eafa1f57e1f42c2d

    • C:\windowss64\computer.exe

      Filesize

      376KB

      MD5

      d8b28ba74753386b6d8db50cd45c7736

      SHA1

      6ad0f38cb66ea65989d6bd5e0caaa7fe3d4e613b

      SHA256

      1b088f289981db8bb8996ac0442910b0131af925a0012aebfa71ba2eb69bfa37

      SHA512

      635ce951f9637d93339fe566214bc1001c724ec2e8139ae89a2b472c08d3123b8c8efeefe89b0880315e734ad76cbf7f28d61837bd24c6659148b802f272084e

    • C:\windowss64\computer.exe

      Filesize

      376KB

      MD5

      d8b28ba74753386b6d8db50cd45c7736

      SHA1

      6ad0f38cb66ea65989d6bd5e0caaa7fe3d4e613b

      SHA256

      1b088f289981db8bb8996ac0442910b0131af925a0012aebfa71ba2eb69bfa37

      SHA512

      635ce951f9637d93339fe566214bc1001c724ec2e8139ae89a2b472c08d3123b8c8efeefe89b0880315e734ad76cbf7f28d61837bd24c6659148b802f272084e

    • C:\windowss64\computer.exe

      Filesize

      376KB

      MD5

      d8b28ba74753386b6d8db50cd45c7736

      SHA1

      6ad0f38cb66ea65989d6bd5e0caaa7fe3d4e613b

      SHA256

      1b088f289981db8bb8996ac0442910b0131af925a0012aebfa71ba2eb69bfa37

      SHA512

      635ce951f9637d93339fe566214bc1001c724ec2e8139ae89a2b472c08d3123b8c8efeefe89b0880315e734ad76cbf7f28d61837bd24c6659148b802f272084e

    • \windowss64\computer.exe

      Filesize

      376KB

      MD5

      d8b28ba74753386b6d8db50cd45c7736

      SHA1

      6ad0f38cb66ea65989d6bd5e0caaa7fe3d4e613b

      SHA256

      1b088f289981db8bb8996ac0442910b0131af925a0012aebfa71ba2eb69bfa37

      SHA512

      635ce951f9637d93339fe566214bc1001c724ec2e8139ae89a2b472c08d3123b8c8efeefe89b0880315e734ad76cbf7f28d61837bd24c6659148b802f272084e

    • \windowss64\computer.exe

      Filesize

      376KB

      MD5

      d8b28ba74753386b6d8db50cd45c7736

      SHA1

      6ad0f38cb66ea65989d6bd5e0caaa7fe3d4e613b

      SHA256

      1b088f289981db8bb8996ac0442910b0131af925a0012aebfa71ba2eb69bfa37

      SHA512

      635ce951f9637d93339fe566214bc1001c724ec2e8139ae89a2b472c08d3123b8c8efeefe89b0880315e734ad76cbf7f28d61837bd24c6659148b802f272084e

    • memory/1148-14827-0x0000000000400000-0x000000000052C000-memory.dmp

      Filesize

      1.2MB

    • memory/1148-12751-0x0000000001DD0000-0x0000000001ED0000-memory.dmp

      Filesize

      1024KB

    • memory/1148-11325-0x0000000001F10000-0x0000000002091000-memory.dmp

      Filesize

      1.5MB

    • memory/1148-11323-0x0000000001DD0000-0x0000000001ED0000-memory.dmp

      Filesize

      1024KB

    • memory/1148-8770-0x0000000000400000-0x000000000052C000-memory.dmp

      Filesize

      1.2MB

    • memory/2316-883-0x00000000020A0000-0x00000000021B1000-memory.dmp

      Filesize

      1.1MB

    • memory/2316-2601-0x0000000001DA0000-0x0000000001F21000-memory.dmp

      Filesize

      1.5MB

    • memory/2316-891-0x00000000020A0000-0x00000000021B1000-memory.dmp

      Filesize

      1.1MB

    • memory/2316-893-0x00000000020A0000-0x00000000021B1000-memory.dmp

      Filesize

      1.1MB

    • memory/2316-895-0x00000000020A0000-0x00000000021B1000-memory.dmp

      Filesize

      1.1MB

    • memory/2316-897-0x00000000020A0000-0x00000000021B1000-memory.dmp

      Filesize

      1.1MB

    • memory/2316-899-0x00000000020A0000-0x00000000021B1000-memory.dmp

      Filesize

      1.1MB

    • memory/2316-901-0x00000000020A0000-0x00000000021B1000-memory.dmp

      Filesize

      1.1MB

    • memory/2316-905-0x00000000020A0000-0x00000000021B1000-memory.dmp

      Filesize

      1.1MB

    • memory/2316-903-0x00000000020A0000-0x00000000021B1000-memory.dmp

      Filesize

      1.1MB

    • memory/2316-907-0x00000000020A0000-0x00000000021B1000-memory.dmp

      Filesize

      1.1MB

    • memory/2316-909-0x00000000020A0000-0x00000000021B1000-memory.dmp

      Filesize

      1.1MB

    • memory/2316-911-0x00000000020A0000-0x00000000021B1000-memory.dmp

      Filesize

      1.1MB

    • memory/2316-913-0x00000000020A0000-0x00000000021B1000-memory.dmp

      Filesize

      1.1MB

    • memory/2316-915-0x00000000020A0000-0x00000000021B1000-memory.dmp

      Filesize

      1.1MB

    • memory/2316-917-0x00000000020A0000-0x00000000021B1000-memory.dmp

      Filesize

      1.1MB

    • memory/2316-919-0x00000000020A0000-0x00000000021B1000-memory.dmp

      Filesize

      1.1MB

    • memory/2316-921-0x00000000020A0000-0x00000000021B1000-memory.dmp

      Filesize

      1.1MB

    • memory/2316-923-0x00000000020A0000-0x00000000021B1000-memory.dmp

      Filesize

      1.1MB

    • memory/2316-925-0x00000000020A0000-0x00000000021B1000-memory.dmp

      Filesize

      1.1MB

    • memory/2316-2600-0x0000000000530000-0x0000000000630000-memory.dmp

      Filesize

      1024KB

    • memory/2316-889-0x00000000020A0000-0x00000000021B1000-memory.dmp

      Filesize

      1.1MB

    • memory/2316-4748-0x0000000000530000-0x0000000000630000-memory.dmp

      Filesize

      1024KB

    • memory/2316-8741-0x00000000020A0000-0x00000000021B1000-memory.dmp

      Filesize

      1.1MB

    • memory/2316-8746-0x0000000000400000-0x000000000052C000-memory.dmp

      Filesize

      1.2MB

    • memory/2316-887-0x00000000020A0000-0x00000000021B1000-memory.dmp

      Filesize

      1.1MB

    • memory/2316-53-0x0000000000400000-0x000000000052C000-memory.dmp

      Filesize

      1.2MB

    • memory/2316-885-0x00000000020A0000-0x00000000021B1000-memory.dmp

      Filesize

      1.1MB

    • memory/2316-881-0x00000000020A0000-0x00000000021B1000-memory.dmp

      Filesize

      1.1MB

    • memory/2316-8766-0x0000000000400000-0x000000000052C000-memory.dmp

      Filesize

      1.2MB

    • memory/2316-879-0x00000000020A0000-0x00000000021B1000-memory.dmp

      Filesize

      1.1MB

    • memory/2316-877-0x00000000020A0000-0x00000000021B1000-memory.dmp

      Filesize

      1.1MB

    • memory/2316-875-0x00000000020A0000-0x00000000021B1000-memory.dmp

      Filesize

      1.1MB

    • memory/2316-873-0x00000000020A0000-0x00000000021B1000-memory.dmp

      Filesize

      1.1MB

    • memory/2316-871-0x00000000020A0000-0x00000000021B1000-memory.dmp

      Filesize

      1.1MB

    • memory/2316-12130-0x0000000000400000-0x000000000052C000-memory.dmp

      Filesize

      1.2MB

    • memory/2316-869-0x00000000020A0000-0x00000000021B1000-memory.dmp

      Filesize

      1.1MB

    • memory/2316-867-0x00000000020A0000-0x00000000021B1000-memory.dmp

      Filesize

      1.1MB

    • memory/2316-865-0x00000000020A0000-0x00000000021B1000-memory.dmp

      Filesize

      1.1MB

    • memory/2316-864-0x00000000020A0000-0x00000000021B1000-memory.dmp

      Filesize

      1.1MB

    • memory/2316-54-0x0000000076790000-0x00000000767D7000-memory.dmp

      Filesize

      284KB