Analysis

  • max time kernel
    150s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230831-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-09-2023 07:39

General

  • Target

    tmp.exe

  • Size

    888KB

  • MD5

    a60eb6b05e9aa663aa574603aa4b7688

  • SHA1

    1bea14088e5fa1d7e46a4a1d7f3c3fa5b395c7f8

  • SHA256

    9387843ba50bc2600c26e7fe86b6d40e1dc5db5d685dbbf681cbcb50eb6cab5e

  • SHA512

    678744d6831d2736b913fe9a5c4d3f7ce077c78eb5ec1f187228541e57501ddc0ed5b5dab43a682590bb50a858503ea5936304c325fa457aef0129c82805f370

  • SSDEEP

    24576:MVjTGZQFooOuciaIB0dFkSCyOlRUJd0kSSJinrRVlr+M6l:MQGsgBAkSCEd0kSEijlr+M6l

Malware Config

Signatures

  • Generic Chinese Botnet

    A botnet originating from China which is currently unnamed publicly.

  • Chinese Botnet payload 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 22 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 33 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 5 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\tmp.exe
    "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
    1⤵
    • Adds Run key to start application
    • Enumerates connected drives
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    PID:5064
  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k netsvcs -p
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    PID:2928

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/5064-0-0x0000000000400000-0x000000000052B000-memory.dmp

    Filesize

    1.2MB

  • memory/5064-1-0x0000000076B20000-0x0000000076D35000-memory.dmp

    Filesize

    2.1MB

  • memory/5064-3881-0x0000000076DB0000-0x0000000076F50000-memory.dmp

    Filesize

    1.6MB

  • memory/5064-5890-0x00000000758E0000-0x000000007595A000-memory.dmp

    Filesize

    488KB

  • memory/5064-13075-0x0000000000400000-0x000000000052B000-memory.dmp

    Filesize

    1.2MB

  • memory/5064-13076-0x0000000000400000-0x000000000052B000-memory.dmp

    Filesize

    1.2MB

  • memory/5064-13077-0x0000000000400000-0x000000000052B000-memory.dmp

    Filesize

    1.2MB

  • memory/5064-13078-0x0000000000400000-0x000000000052B000-memory.dmp

    Filesize

    1.2MB

  • memory/5064-13080-0x0000000000400000-0x000000000052B000-memory.dmp

    Filesize

    1.2MB

  • memory/5064-13081-0x0000000000400000-0x000000000052B000-memory.dmp

    Filesize

    1.2MB

  • memory/5064-13082-0x0000000000400000-0x000000000052B000-memory.dmp

    Filesize

    1.2MB

  • memory/5064-13083-0x0000000010000000-0x0000000010018000-memory.dmp

    Filesize

    96KB

  • memory/5064-13086-0x0000000000400000-0x000000000052B000-memory.dmp

    Filesize

    1.2MB