Analysis

  • max time kernel
    147s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    10-08-2023 04:19

General

  • Target

    60df4b2fb38fbf4225a15b143b9017b8c226136ad19ea12d91002b284f89cdad.exe

  • Size

    4.2MB

  • MD5

    e4448e2f5df5a13e04ce120a3e5707e4

  • SHA1

    906d2f49e761112d3c4946f0019b4e4a6e22c4f7

  • SHA256

    60df4b2fb38fbf4225a15b143b9017b8c226136ad19ea12d91002b284f89cdad

  • SHA512

    a2301da8b85c381844215e83d936d11a87b0cec35ae6df73482a1fe0925b88b1ea162a307032585b91a71e3a7220ff4fa28b3408760febbff660667c1921e5a1

  • SSDEEP

    98304:Q+HVb4W8QC49un+EI1VybU3pWW1Yvqr9O3t4fq98lRvIY:Q+HJ8l49O+b6F3+fm8lRAY

Malware Config

Signatures

  • Generic Chinese Botnet

    A botnet originating from China which is currently unnamed publicly.

  • Chinese Botnet payload 2 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 22 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 38 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 14 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\60df4b2fb38fbf4225a15b143b9017b8c226136ad19ea12d91002b284f89cdad.exe
    "C:\Users\Admin\AppData\Local\Temp\60df4b2fb38fbf4225a15b143b9017b8c226136ad19ea12d91002b284f89cdad.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1928
    • C:\Windows\system32\cmd.exe
      cmd.exe /c set
      2⤵
        PID:1748
      • C:\Users\Admin\AppData\Local\Temp\~5648734933319007734~\sg.tmp
        7zG_exe x "C:\Users\Admin\AppData\Local\Temp\60df4b2fb38fbf4225a15b143b9017b8c226136ad19ea12d91002b284f89cdad.exe" -y -aoa -o"C:\Users\Admin\AppData\Local\Temp\~7187534447904897272"
        2⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:2984
      • C:\Users\Admin\AppData\Local\Temp\~7187534447904897272\辅助.exe
        "C:\Users\Admin\AppData\Local\Temp\~7187534447904897272\辅助.exe"
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2996
        • C:\Users\Admin\AppData\Local\Temp\~7187534447904897272\QProtect.exe
          C:\Users\Admin\AppData\Local\Temp\~7187534447904897272\QProtect.exe
          3⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Enumerates connected drives
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          PID:1344

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\~5648734933319007734~\sg.tmp

      Filesize

      715KB

      MD5

      7c4718943bd3f66ebdb47ccca72c7b1e

      SHA1

      f9edfaa7adb8fa528b2e61b2b251f18da10a6969

      SHA256

      4cc32d00338fc7b206a7c052297acf9ac304ae7de9d61a2475a116959c1524fc

      SHA512

      e18c40d646fa4948f90f7471da55489df431f255041ebb6dcef86346f91078c9b27894e27216a4b2fe2a1c5e501c7953c77893cf696930123d28a322d49e1516

    • C:\Users\Admin\AppData\Local\Temp\~7187534447904897272\QProtect.exe

      Filesize

      2.8MB

      MD5

      212233d550805d2f51b9a9cc9139382e

      SHA1

      cc6c76aabe9cd23dc4af9f1bc6a3bb359d0eece5

      SHA256

      362d52c286f123d73c4ba39c1fb034d9fd954c185200bc5c3557c9c68e81c23d

      SHA512

      65cfef6ceaa7f5feeb0210814d19c8cc584233d86a95b17c039edd2addb3083c625b48f4f9dcabe7f8951f378a985c2f6c200a488f06d50c9fcda1dc859dd3e2

    • C:\Users\Admin\AppData\Local\Temp\~7187534447904897272\QProtect.exe

      Filesize

      2.8MB

      MD5

      212233d550805d2f51b9a9cc9139382e

      SHA1

      cc6c76aabe9cd23dc4af9f1bc6a3bb359d0eece5

      SHA256

      362d52c286f123d73c4ba39c1fb034d9fd954c185200bc5c3557c9c68e81c23d

      SHA512

      65cfef6ceaa7f5feeb0210814d19c8cc584233d86a95b17c039edd2addb3083c625b48f4f9dcabe7f8951f378a985c2f6c200a488f06d50c9fcda1dc859dd3e2

    • C:\Users\Admin\AppData\Local\Temp\~7187534447904897272\辅助.exe

      Filesize

      668KB

      MD5

      61d5400899bcb5ca8fef956a0130371e

      SHA1

      f0332f978a7308d26afa3701e1b35237133bbab0

      SHA256

      f025d093d446ed213ce12965a6d95bc721611bb6654e72a6313fafa03643223b

      SHA512

      91beb574fa3c5b9f5c3387aff7913bc166713f91be93f79a3179c846b17822106e15487fd3d55016a7f9378f805cd2f806950687889e14d6ba56764ab0919b79

    • C:\Users\Admin\AppData\Local\Temp\~7187534447904897272\辅助.exe

      Filesize

      668KB

      MD5

      61d5400899bcb5ca8fef956a0130371e

      SHA1

      f0332f978a7308d26afa3701e1b35237133bbab0

      SHA256

      f025d093d446ed213ce12965a6d95bc721611bb6654e72a6313fafa03643223b

      SHA512

      91beb574fa3c5b9f5c3387aff7913bc166713f91be93f79a3179c846b17822106e15487fd3d55016a7f9378f805cd2f806950687889e14d6ba56764ab0919b79

    • \Users\Admin\AppData\Local\Temp\~5648734933319007734~\sg.tmp

      Filesize

      715KB

      MD5

      7c4718943bd3f66ebdb47ccca72c7b1e

      SHA1

      f9edfaa7adb8fa528b2e61b2b251f18da10a6969

      SHA256

      4cc32d00338fc7b206a7c052297acf9ac304ae7de9d61a2475a116959c1524fc

      SHA512

      e18c40d646fa4948f90f7471da55489df431f255041ebb6dcef86346f91078c9b27894e27216a4b2fe2a1c5e501c7953c77893cf696930123d28a322d49e1516

    • \Users\Admin\AppData\Local\Temp\~7187534447904897272\QProtect.exe

      Filesize

      2.8MB

      MD5

      212233d550805d2f51b9a9cc9139382e

      SHA1

      cc6c76aabe9cd23dc4af9f1bc6a3bb359d0eece5

      SHA256

      362d52c286f123d73c4ba39c1fb034d9fd954c185200bc5c3557c9c68e81c23d

      SHA512

      65cfef6ceaa7f5feeb0210814d19c8cc584233d86a95b17c039edd2addb3083c625b48f4f9dcabe7f8951f378a985c2f6c200a488f06d50c9fcda1dc859dd3e2

    • \Users\Admin\AppData\Local\Temp\~7187534447904897272\QProtect.exe

      Filesize

      2.8MB

      MD5

      212233d550805d2f51b9a9cc9139382e

      SHA1

      cc6c76aabe9cd23dc4af9f1bc6a3bb359d0eece5

      SHA256

      362d52c286f123d73c4ba39c1fb034d9fd954c185200bc5c3557c9c68e81c23d

      SHA512

      65cfef6ceaa7f5feeb0210814d19c8cc584233d86a95b17c039edd2addb3083c625b48f4f9dcabe7f8951f378a985c2f6c200a488f06d50c9fcda1dc859dd3e2

    • \Users\Admin\AppData\Local\Temp\~7187534447904897272\辅助.exe

      Filesize

      668KB

      MD5

      61d5400899bcb5ca8fef956a0130371e

      SHA1

      f0332f978a7308d26afa3701e1b35237133bbab0

      SHA256

      f025d093d446ed213ce12965a6d95bc721611bb6654e72a6313fafa03643223b

      SHA512

      91beb574fa3c5b9f5c3387aff7913bc166713f91be93f79a3179c846b17822106e15487fd3d55016a7f9378f805cd2f806950687889e14d6ba56764ab0919b79

    • memory/1344-77-0x0000000000400000-0x00000000007E0000-memory.dmp

      Filesize

      3.9MB

    • memory/1344-79-0x0000000000400000-0x00000000007E0000-memory.dmp

      Filesize

      3.9MB

    • memory/1344-80-0x0000000000400000-0x00000000007E0000-memory.dmp

      Filesize

      3.9MB

    • memory/1344-84-0x0000000000400000-0x00000000007E0000-memory.dmp

      Filesize

      3.9MB

    • memory/1344-82-0x0000000000400000-0x00000000007E0000-memory.dmp

      Filesize

      3.9MB

    • memory/1344-81-0x0000000000400000-0x00000000007E0000-memory.dmp

      Filesize

      3.9MB

    • memory/1344-85-0x0000000000400000-0x00000000007E0000-memory.dmp

      Filesize

      3.9MB

    • memory/1344-86-0x0000000010000000-0x000000001001F000-memory.dmp

      Filesize

      124KB

    • memory/1344-91-0x0000000000400000-0x00000000007E0000-memory.dmp

      Filesize

      3.9MB

    • memory/2996-76-0x0000000002080000-0x0000000002460000-memory.dmp

      Filesize

      3.9MB

    • memory/2996-78-0x0000000002080000-0x0000000002460000-memory.dmp

      Filesize

      3.9MB

    • memory/2996-100-0x0000000002080000-0x0000000002460000-memory.dmp

      Filesize

      3.9MB