Analysis

  • max time kernel
    148s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-08-2023 05:49

General

  • Target

    tmp.exe

  • Size

    888KB

  • MD5

    a60eb6b05e9aa663aa574603aa4b7688

  • SHA1

    1bea14088e5fa1d7e46a4a1d7f3c3fa5b395c7f8

  • SHA256

    9387843ba50bc2600c26e7fe86b6d40e1dc5db5d685dbbf681cbcb50eb6cab5e

  • SHA512

    678744d6831d2736b913fe9a5c4d3f7ce077c78eb5ec1f187228541e57501ddc0ed5b5dab43a682590bb50a858503ea5936304c325fa457aef0129c82805f370

  • SSDEEP

    24576:MVjTGZQFooOuciaIB0dFkSCyOlRUJd0kSSJinrRVlr+M6l:MQGsgBAkSCEd0kSEijlr+M6l

Malware Config

Signatures

  • Generic Chinese Botnet

    A botnet originating from China which is currently unnamed publicly.

  • Chinese Botnet payload 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 22 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 35 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\tmp.exe
    "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
    1⤵
    • Adds Run key to start application
    • Enumerates connected drives
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    PID:4876

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4876-0-0x0000000000400000-0x000000000052B000-memory.dmp

    Filesize

    1.2MB

  • memory/4876-1-0x0000000077230000-0x0000000077445000-memory.dmp

    Filesize

    2.1MB

  • memory/4876-3875-0x0000000076A80000-0x0000000076C20000-memory.dmp

    Filesize

    1.6MB

  • memory/4876-5884-0x0000000077450000-0x00000000774CA000-memory.dmp

    Filesize

    488KB

  • memory/4876-13069-0x0000000000400000-0x000000000052B000-memory.dmp

    Filesize

    1.2MB

  • memory/4876-13071-0x0000000000400000-0x000000000052B000-memory.dmp

    Filesize

    1.2MB

  • memory/4876-13070-0x0000000000400000-0x000000000052B000-memory.dmp

    Filesize

    1.2MB

  • memory/4876-13072-0x0000000000400000-0x000000000052B000-memory.dmp

    Filesize

    1.2MB

  • memory/4876-13074-0x0000000000400000-0x000000000052B000-memory.dmp

    Filesize

    1.2MB

  • memory/4876-13075-0x0000000000400000-0x000000000052B000-memory.dmp

    Filesize

    1.2MB

  • memory/4876-13076-0x0000000010000000-0x0000000010018000-memory.dmp

    Filesize

    96KB

  • memory/4876-13079-0x0000000000400000-0x000000000052B000-memory.dmp

    Filesize

    1.2MB