Analysis
-
max time kernel
117s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
26-07-2023 09:24
Static task
static1
Behavioral task
behavioral1
Sample
computer.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
computer.exe
Resource
win10v2004-20230703-en
General
-
Target
computer.exe
-
Size
376KB
-
MD5
d8b28ba74753386b6d8db50cd45c7736
-
SHA1
6ad0f38cb66ea65989d6bd5e0caaa7fe3d4e613b
-
SHA256
1b088f289981db8bb8996ac0442910b0131af925a0012aebfa71ba2eb69bfa37
-
SHA512
635ce951f9637d93339fe566214bc1001c724ec2e8139ae89a2b472c08d3123b8c8efeefe89b0880315e734ad76cbf7f28d61837bd24c6659148b802f272084e
-
SSDEEP
3072:zAAdrtcV2GenT0cTtm2LAQSXVqjzpYfJhQ/w7EMMv:xI2GenQ67wk3pyJhcw7Q
Malware Config
Signatures
-
Generic Chinese Botnet
A botnet originating from China which is currently unnamed publicly.
-
Chinese Botnet payload 1 IoCs
resource yara_rule behavioral1/memory/924-54-0x0000000010000000-0x0000000010018000-memory.dmp unk_chinese_botnet -
Executes dropped EXE 2 IoCs
pid Process 1356 Fbthdlv.exe 1324 Fbthdlv.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Y: computer.exe File opened (read-only) \??\G: computer.exe File opened (read-only) \??\H: computer.exe File opened (read-only) \??\I: computer.exe File opened (read-only) \??\T: computer.exe File opened (read-only) \??\V: computer.exe File opened (read-only) \??\S: computer.exe File opened (read-only) \??\U: computer.exe File opened (read-only) \??\E: computer.exe File opened (read-only) \??\L: computer.exe File opened (read-only) \??\M: computer.exe File opened (read-only) \??\P: computer.exe File opened (read-only) \??\Q: computer.exe File opened (read-only) \??\B: computer.exe File opened (read-only) \??\J: computer.exe File opened (read-only) \??\K: computer.exe File opened (read-only) \??\N: computer.exe File opened (read-only) \??\O: computer.exe File opened (read-only) \??\R: computer.exe File opened (read-only) \??\W: computer.exe File opened (read-only) \??\X: computer.exe File opened (read-only) \??\Z: computer.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat Fbthdlv.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat Fbthdlv.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Fbthdlv.exe computer.exe File opened for modification C:\Program Files (x86)\Fbthdlv.exe computer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 computer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz computer.exe -
Modifies data under HKEY_USERS 49 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings Fbthdlv.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{517CD7B2-9E92-4CDD-B869-17BBDDED5F53}\WpadDecisionReason = "1" Fbthdlv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections Fbthdlv.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" Fbthdlv.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000004000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00b2000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Fbthdlv.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings Fbthdlv.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" Fbthdlv.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{517CD7B2-9E92-4CDD-B869-17BBDDED5F53}\WpadDecisionTime = 1014b10fa3bfd901 Fbthdlv.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{517CD7B2-9E92-4CDD-B869-17BBDDED5F53}\WpadDecision = "0" Fbthdlv.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{517CD7B2-9E92-4CDD-B869-17BBDDED5F53}\WpadNetworkName = "Network 3" Fbthdlv.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\8e-94-4a-5c-73-99\WpadDecision = "0" Fbthdlv.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" Fbthdlv.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{517CD7B2-9E92-4CDD-B869-17BBDDED5F53}\WpadDecisionTime = 702fe217a3bfd901 Fbthdlv.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\8e-94-4a-5c-73-99\WpadDecisionTime = 702fe217a3bfd901 Fbthdlv.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Fbthdlv.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" Fbthdlv.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix Fbthdlv.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{517CD7B2-9E92-4CDD-B869-17BBDDED5F53} Fbthdlv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings Fbthdlv.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix Fbthdlv.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\8e-94-4a-5c-73-99\WpadDecisionReason = "1" Fbthdlv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ Fbthdlv.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00b2000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Fbthdlv.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{517CD7B2-9E92-4CDD-B869-17BBDDED5F53}\8e-94-4a-5c-73-99 Fbthdlv.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings Fbthdlv.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{517CD7B2-9E92-4CDD-B869-17BBDDED5F53}\WpadDecisionReason = "1" Fbthdlv.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{517CD7B2-9E92-4CDD-B869-17BBDDED5F53}\WpadNetworkName = "Network 3" Fbthdlv.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" Fbthdlv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad Fbthdlv.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" Fbthdlv.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\8e-94-4a-5c-73-99 Fbthdlv.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{517CD7B2-9E92-4CDD-B869-17BBDDED5F53}\8e-94-4a-5c-73-99 Fbthdlv.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{517CD7B2-9E92-4CDD-B869-17BBDDED5F53} Fbthdlv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections Fbthdlv.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" Fbthdlv.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{517CD7B2-9E92-4CDD-B869-17BBDDED5F53}\WpadDecision = "0" Fbthdlv.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Fbthdlv.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\8e-94-4a-5c-73-99 Fbthdlv.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\8e-94-4a-5c-73-99\WpadDecisionReason = "1" Fbthdlv.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" Fbthdlv.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00b2000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Fbthdlv.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" Fbthdlv.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\8e-94-4a-5c-73-99\WpadDecisionTime = 1014b10fa3bfd901 Fbthdlv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ Fbthdlv.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" Fbthdlv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad Fbthdlv.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\8e-94-4a-5c-73-99\WpadDecisionTime = 1014b10fa3bfd901 Fbthdlv.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\8e-94-4a-5c-73-99\WpadDecision = "0" Fbthdlv.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\8e-94-4a-5c-73-99\WpadDetectedUrl Fbthdlv.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 924 computer.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1356 wrote to memory of 1324 1356 Fbthdlv.exe 32 PID 1356 wrote to memory of 1324 1356 Fbthdlv.exe 32 PID 1356 wrote to memory of 1324 1356 Fbthdlv.exe 32 PID 1356 wrote to memory of 1324 1356 Fbthdlv.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\computer.exe"C:\Users\Admin\AppData\Local\Temp\computer.exe"1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:924
-
C:\Program Files (x86)\Fbthdlv.exe"C:\Program Files (x86)\Fbthdlv.exe"1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Program Files (x86)\Fbthdlv.exe"C:\Program Files (x86)\Fbthdlv.exe" Win72⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:1324
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
376KB
MD5d8b28ba74753386b6d8db50cd45c7736
SHA16ad0f38cb66ea65989d6bd5e0caaa7fe3d4e613b
SHA2561b088f289981db8bb8996ac0442910b0131af925a0012aebfa71ba2eb69bfa37
SHA512635ce951f9637d93339fe566214bc1001c724ec2e8139ae89a2b472c08d3123b8c8efeefe89b0880315e734ad76cbf7f28d61837bd24c6659148b802f272084e
-
Filesize
376KB
MD5d8b28ba74753386b6d8db50cd45c7736
SHA16ad0f38cb66ea65989d6bd5e0caaa7fe3d4e613b
SHA2561b088f289981db8bb8996ac0442910b0131af925a0012aebfa71ba2eb69bfa37
SHA512635ce951f9637d93339fe566214bc1001c724ec2e8139ae89a2b472c08d3123b8c8efeefe89b0880315e734ad76cbf7f28d61837bd24c6659148b802f272084e
-
Filesize
376KB
MD5d8b28ba74753386b6d8db50cd45c7736
SHA16ad0f38cb66ea65989d6bd5e0caaa7fe3d4e613b
SHA2561b088f289981db8bb8996ac0442910b0131af925a0012aebfa71ba2eb69bfa37
SHA512635ce951f9637d93339fe566214bc1001c724ec2e8139ae89a2b472c08d3123b8c8efeefe89b0880315e734ad76cbf7f28d61837bd24c6659148b802f272084e