Analysis

  • max time kernel
    143s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-08-2023 08:51

General

  • Target

    Script.exe

  • Size

    748KB

  • MD5

    5cdb63f3b705ea40e664394815e2bfb2

  • SHA1

    55d9409906a658531d963291d29b25b980061b3e

  • SHA256

    6644b72d27a0d5a6cc502b3903912a7ccbd292596e946a5c532e42532191fc67

  • SHA512

    b3c9057705d9bf575ca052e4cdad74acb380d2c568f71bd61238e1abf0c067b8e1e247501ce4ae46ed9a9ef96a8d4850b75bbd3c53c78929f236e6573c941a5e

  • SSDEEP

    6144:zHzIhp/8RJg8zO65HoFN6WtljaJul+pw8T:Lkkl5HoFN6WtljaElI9T

Malware Config

Signatures

  • Generic Chinese Botnet

    A botnet originating from China which is currently unnamed publicly.

  • Chinese Botnet payload 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 22 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Script.exe
    "C:\Users\Admin\AppData\Local\Temp\Script.exe"
    1⤵
    • Adds Run key to start application
    • Enumerates connected drives
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:4992

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4992-133-0x0000000010000000-0x0000000010018000-memory.dmp

    Filesize

    96KB