Analysis
-
max time kernel
148s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
31-08-2023 05:49
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20230703-en
General
-
Target
tmp.exe
-
Size
888KB
-
MD5
a60eb6b05e9aa663aa574603aa4b7688
-
SHA1
1bea14088e5fa1d7e46a4a1d7f3c3fa5b395c7f8
-
SHA256
9387843ba50bc2600c26e7fe86b6d40e1dc5db5d685dbbf681cbcb50eb6cab5e
-
SHA512
678744d6831d2736b913fe9a5c4d3f7ce077c78eb5ec1f187228541e57501ddc0ed5b5dab43a682590bb50a858503ea5936304c325fa457aef0129c82805f370
-
SSDEEP
24576:MVjTGZQFooOuciaIB0dFkSCyOlRUJd0kSSJinrRVlr+M6l:MQGsgBAkSCEd0kSEijlr+M6l
Malware Config
Signatures
-
Generic Chinese Botnet
A botnet originating from China which is currently unnamed publicly.
-
Chinese Botnet payload 2 IoCs
resource yara_rule behavioral2/memory/4876-13076-0x0000000010000000-0x0000000010018000-memory.dmp unk_chinese_botnet behavioral2/memory/4876-13079-0x0000000000400000-0x000000000052B000-memory.dmp unk_chinese_botnet -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Suaeweq.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmp.exe" tmp.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\I: tmp.exe File opened (read-only) \??\K: tmp.exe File opened (read-only) \??\L: tmp.exe File opened (read-only) \??\T: tmp.exe File opened (read-only) \??\W: tmp.exe File opened (read-only) \??\B: tmp.exe File opened (read-only) \??\E: tmp.exe File opened (read-only) \??\R: tmp.exe File opened (read-only) \??\V: tmp.exe File opened (read-only) \??\J: tmp.exe File opened (read-only) \??\M: tmp.exe File opened (read-only) \??\N: tmp.exe File opened (read-only) \??\Q: tmp.exe File opened (read-only) \??\S: tmp.exe File opened (read-only) \??\Y: tmp.exe File opened (read-only) \??\G: tmp.exe File opened (read-only) \??\H: tmp.exe File opened (read-only) \??\U: tmp.exe File opened (read-only) \??\X: tmp.exe File opened (read-only) \??\Z: tmp.exe File opened (read-only) \??\O: tmp.exe File opened (read-only) \??\P: tmp.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 35 IoCs
pid Process 4876 tmp.exe 4876 tmp.exe 4876 tmp.exe 4876 tmp.exe 4876 tmp.exe 4876 tmp.exe 4876 tmp.exe 4876 tmp.exe 4876 tmp.exe 4876 tmp.exe 4876 tmp.exe 4876 tmp.exe 4876 tmp.exe 4876 tmp.exe 4876 tmp.exe 4876 tmp.exe 4876 tmp.exe 4876 tmp.exe 4876 tmp.exe 4876 tmp.exe 4876 tmp.exe 4876 tmp.exe 4876 tmp.exe 4876 tmp.exe 4876 tmp.exe 4876 tmp.exe 4876 tmp.exe 4876 tmp.exe 4876 tmp.exe 4876 tmp.exe 4876 tmp.exe 4876 tmp.exe 4876 tmp.exe 4876 tmp.exe 4876 tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 tmp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz tmp.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4876 tmp.exe 4876 tmp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Adds Run key to start application
- Enumerates connected drives
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:4876