Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
01-09-2023 07:39
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20230831-en
General
-
Target
tmp.exe
-
Size
888KB
-
MD5
a60eb6b05e9aa663aa574603aa4b7688
-
SHA1
1bea14088e5fa1d7e46a4a1d7f3c3fa5b395c7f8
-
SHA256
9387843ba50bc2600c26e7fe86b6d40e1dc5db5d685dbbf681cbcb50eb6cab5e
-
SHA512
678744d6831d2736b913fe9a5c4d3f7ce077c78eb5ec1f187228541e57501ddc0ed5b5dab43a682590bb50a858503ea5936304c325fa457aef0129c82805f370
-
SSDEEP
24576:MVjTGZQFooOuciaIB0dFkSCyOlRUJd0kSSJinrRVlr+M6l:MQGsgBAkSCEd0kSEijlr+M6l
Malware Config
Signatures
-
Generic Chinese Botnet
A botnet originating from China which is currently unnamed publicly.
-
Chinese Botnet payload 1 IoCs
resource yara_rule behavioral1/memory/2236-9807-0x0000000000400000-0x000000000052B000-memory.dmp unk_chinese_botnet -
Executes dropped EXE 1 IoCs
pid Process 2364 Suaeweq.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\W: tmp.exe File opened (read-only) \??\L: tmp.exe File opened (read-only) \??\O: tmp.exe File opened (read-only) \??\R: tmp.exe File opened (read-only) \??\S: tmp.exe File opened (read-only) \??\U: tmp.exe File opened (read-only) \??\G: tmp.exe File opened (read-only) \??\H: tmp.exe File opened (read-only) \??\K: tmp.exe File opened (read-only) \??\Y: tmp.exe File opened (read-only) \??\Z: tmp.exe File opened (read-only) \??\V: tmp.exe File opened (read-only) \??\J: tmp.exe File opened (read-only) \??\N: tmp.exe File opened (read-only) \??\P: tmp.exe File opened (read-only) \??\M: tmp.exe File opened (read-only) \??\Q: tmp.exe File opened (read-only) \??\T: tmp.exe File opened (read-only) \??\X: tmp.exe File opened (read-only) \??\B: tmp.exe File opened (read-only) \??\E: tmp.exe File opened (read-only) \??\I: tmp.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 27 IoCs
pid Process 2236 tmp.exe 2236 tmp.exe 2236 tmp.exe 2236 tmp.exe 2236 tmp.exe 2236 tmp.exe 2236 tmp.exe 2236 tmp.exe 2236 tmp.exe 2236 tmp.exe 2236 tmp.exe 2236 tmp.exe 2236 tmp.exe 2236 tmp.exe 2236 tmp.exe 2236 tmp.exe 2236 tmp.exe 2236 tmp.exe 2236 tmp.exe 2236 tmp.exe 2236 tmp.exe 2236 tmp.exe 2236 tmp.exe 2236 tmp.exe 2236 tmp.exe 2236 tmp.exe 2236 tmp.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Suaeweq.exe tmp.exe File opened for modification C:\Program Files (x86)\Suaeweq.exe tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 tmp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz tmp.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2236 tmp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Enumerates connected drives
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:2236
-
C:\Program Files (x86)\Suaeweq.exe"C:\Program Files (x86)\Suaeweq.exe"1⤵
- Executes dropped EXE
PID:2364
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
888KB
MD5a60eb6b05e9aa663aa574603aa4b7688
SHA11bea14088e5fa1d7e46a4a1d7f3c3fa5b395c7f8
SHA2569387843ba50bc2600c26e7fe86b6d40e1dc5db5d685dbbf681cbcb50eb6cab5e
SHA512678744d6831d2736b913fe9a5c4d3f7ce077c78eb5ec1f187228541e57501ddc0ed5b5dab43a682590bb50a858503ea5936304c325fa457aef0129c82805f370