Analysis
-
max time kernel
118s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
26-07-2023 11:16
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20230703-en
General
-
Target
tmp.exe
-
Size
376KB
-
MD5
d8b28ba74753386b6d8db50cd45c7736
-
SHA1
6ad0f38cb66ea65989d6bd5e0caaa7fe3d4e613b
-
SHA256
1b088f289981db8bb8996ac0442910b0131af925a0012aebfa71ba2eb69bfa37
-
SHA512
635ce951f9637d93339fe566214bc1001c724ec2e8139ae89a2b472c08d3123b8c8efeefe89b0880315e734ad76cbf7f28d61837bd24c6659148b802f272084e
-
SSDEEP
3072:zAAdrtcV2GenT0cTtm2LAQSXVqjzpYfJhQ/w7EMMv:xI2GenQ67wk3pyJhcw7Q
Malware Config
Signatures
-
Generic Chinese Botnet
A botnet originating from China which is currently unnamed publicly.
-
Chinese Botnet payload 1 IoCs
resource yara_rule behavioral1/memory/2400-54-0x0000000010000000-0x0000000010018000-memory.dmp unk_chinese_botnet -
Executes dropped EXE 2 IoCs
pid Process 2884 Fbthdlv.exe 3032 Fbthdlv.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\B: tmp.exe File opened (read-only) \??\K: tmp.exe File opened (read-only) \??\T: tmp.exe File opened (read-only) \??\G: tmp.exe File opened (read-only) \??\P: tmp.exe File opened (read-only) \??\R: tmp.exe File opened (read-only) \??\Y: tmp.exe File opened (read-only) \??\Z: tmp.exe File opened (read-only) \??\Q: tmp.exe File opened (read-only) \??\W: tmp.exe File opened (read-only) \??\E: tmp.exe File opened (read-only) \??\I: tmp.exe File opened (read-only) \??\L: tmp.exe File opened (read-only) \??\M: tmp.exe File opened (read-only) \??\N: tmp.exe File opened (read-only) \??\O: tmp.exe File opened (read-only) \??\H: tmp.exe File opened (read-only) \??\J: tmp.exe File opened (read-only) \??\S: tmp.exe File opened (read-only) \??\U: tmp.exe File opened (read-only) \??\V: tmp.exe File opened (read-only) \??\X: tmp.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat Fbthdlv.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat Fbthdlv.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Fbthdlv.exe tmp.exe File opened for modification C:\Program Files (x86)\Fbthdlv.exe tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 tmp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz tmp.exe -
Modifies data under HKEY_USERS 49 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" Fbthdlv.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\8a-d1-7e-8d-b6-d3\WpadDecisionReason = "1" Fbthdlv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{F133A47C-6D54-4A28-BB76-64961FAA83BB} Fbthdlv.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" Fbthdlv.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" Fbthdlv.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0028000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Fbthdlv.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\8a-d1-7e-8d-b6-d3\WpadDecisionTime = 507f69abb2bfd901 Fbthdlv.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings Fbthdlv.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{F133A47C-6D54-4A28-BB76-64961FAA83BB}\WpadNetworkName = "Network 3" Fbthdlv.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\8a-d1-7e-8d-b6-d3\WpadDecisionTime = 103dfabab2bfd901 Fbthdlv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections Fbthdlv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\8a-d1-7e-8d-b6-d3 Fbthdlv.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{F133A47C-6D54-4A28-BB76-64961FAA83BB}\WpadDecisionReason = "1" Fbthdlv.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" Fbthdlv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad Fbthdlv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{F133A47C-6D54-4A28-BB76-64961FAA83BB}\8a-d1-7e-8d-b6-d3 Fbthdlv.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings Fbthdlv.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix Fbthdlv.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" Fbthdlv.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{F133A47C-6D54-4A28-BB76-64961FAA83BB}\WpadDecision = "0" Fbthdlv.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\8a-d1-7e-8d-b6-d3\WpadDecisionReason = "1" Fbthdlv.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\8a-d1-7e-8d-b6-d3\WpadDetectedUrl Fbthdlv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings Fbthdlv.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" Fbthdlv.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{F133A47C-6D54-4A28-BB76-64961FAA83BB}\WpadNetworkName = "Network 3" Fbthdlv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{F133A47C-6D54-4A28-BB76-64961FAA83BB}\8a-d1-7e-8d-b6-d3 Fbthdlv.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" Fbthdlv.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" Fbthdlv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ Fbthdlv.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{F133A47C-6D54-4A28-BB76-64961FAA83BB}\WpadDecision = "0" Fbthdlv.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Fbthdlv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad Fbthdlv.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{F133A47C-6D54-4A28-BB76-64961FAA83BB}\WpadDecisionTime = 507f69abb2bfd901 Fbthdlv.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" Fbthdlv.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000004000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0028000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Fbthdlv.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Fbthdlv.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{F133A47C-6D54-4A28-BB76-64961FAA83BB}\WpadDecisionReason = "1" Fbthdlv.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\8a-d1-7e-8d-b6-d3\WpadDecision = "0" Fbthdlv.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" Fbthdlv.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\8a-d1-7e-8d-b6-d3\WpadDecision = "0" Fbthdlv.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0028000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Fbthdlv.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix Fbthdlv.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\8a-d1-7e-8d-b6-d3\WpadDecisionTime = 507f69abb2bfd901 Fbthdlv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections Fbthdlv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ Fbthdlv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{F133A47C-6D54-4A28-BB76-64961FAA83BB} Fbthdlv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\8a-d1-7e-8d-b6-d3 Fbthdlv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings Fbthdlv.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{F133A47C-6D54-4A28-BB76-64961FAA83BB}\WpadDecisionTime = 103dfabab2bfd901 Fbthdlv.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2400 tmp.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2884 wrote to memory of 3032 2884 Fbthdlv.exe 32 PID 2884 wrote to memory of 3032 2884 Fbthdlv.exe 32 PID 2884 wrote to memory of 3032 2884 Fbthdlv.exe 32 PID 2884 wrote to memory of 3032 2884 Fbthdlv.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:2400
-
C:\Program Files (x86)\Fbthdlv.exe"C:\Program Files (x86)\Fbthdlv.exe"1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Program Files (x86)\Fbthdlv.exe"C:\Program Files (x86)\Fbthdlv.exe" Win72⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:3032
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
376KB
MD5d8b28ba74753386b6d8db50cd45c7736
SHA16ad0f38cb66ea65989d6bd5e0caaa7fe3d4e613b
SHA2561b088f289981db8bb8996ac0442910b0131af925a0012aebfa71ba2eb69bfa37
SHA512635ce951f9637d93339fe566214bc1001c724ec2e8139ae89a2b472c08d3123b8c8efeefe89b0880315e734ad76cbf7f28d61837bd24c6659148b802f272084e
-
Filesize
376KB
MD5d8b28ba74753386b6d8db50cd45c7736
SHA16ad0f38cb66ea65989d6bd5e0caaa7fe3d4e613b
SHA2561b088f289981db8bb8996ac0442910b0131af925a0012aebfa71ba2eb69bfa37
SHA512635ce951f9637d93339fe566214bc1001c724ec2e8139ae89a2b472c08d3123b8c8efeefe89b0880315e734ad76cbf7f28d61837bd24c6659148b802f272084e
-
Filesize
376KB
MD5d8b28ba74753386b6d8db50cd45c7736
SHA16ad0f38cb66ea65989d6bd5e0caaa7fe3d4e613b
SHA2561b088f289981db8bb8996ac0442910b0131af925a0012aebfa71ba2eb69bfa37
SHA512635ce951f9637d93339fe566214bc1001c724ec2e8139ae89a2b472c08d3123b8c8efeefe89b0880315e734ad76cbf7f28d61837bd24c6659148b802f272084e