Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230831-en -
resource tags
arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system -
submitted
10-09-2023 11:42
Static task
static1
Behavioral task
behavioral1
Sample
5cc5e79e1540e89c28966395444f25bf717ac4c700847a59cd59e8f27941e20e.dll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
5cc5e79e1540e89c28966395444f25bf717ac4c700847a59cd59e8f27941e20e.dll
Resource
win10v2004-20230831-en
General
-
Target
5cc5e79e1540e89c28966395444f25bf717ac4c700847a59cd59e8f27941e20e.dll
-
Size
94KB
-
MD5
ca4e9a08ccebf3dbe5973f92bd17f0b7
-
SHA1
1e74be71c0522b6cf4b74d81492279fa0cf9095a
-
SHA256
5cc5e79e1540e89c28966395444f25bf717ac4c700847a59cd59e8f27941e20e
-
SHA512
3c659b4170380c85ad1aec1ec5f944a98516d3fcdf99e17adeeebec5d9ec5dc4a50609fc73848aab7900a1523e6e8032a41b276e5e695c25f58e5c88dec15559
-
SSDEEP
1536:NqGCeONIWGmVDp92/731b5cRxq3bOFsr+ecMRsWjcd3KA2jVjE4wJ:N+WpmD+7lbZp+YeaA2jVjEtJ
Malware Config
Signatures
-
Generic Chinese Botnet
A botnet originating from China which is currently unnamed publicly.
-
Chinese Botnet payload 2 IoCs
resource yara_rule behavioral2/memory/4068-0-0x0000000000D90000-0x0000000000DB6000-memory.dmp unk_chinese_botnet behavioral2/memory/4068-1-0x0000000010000000-0x0000000010027000-memory.dmp unk_chinese_botnet -
Blocklisted process makes network request 35 IoCs
flow pid Process 37 4068 rundll32.exe 47 4068 rundll32.exe 49 4068 rundll32.exe 52 4068 rundll32.exe 53 4068 rundll32.exe 56 4068 rundll32.exe 68 4068 rundll32.exe 69 4068 rundll32.exe 70 4068 rundll32.exe 71 4068 rundll32.exe 72 4068 rundll32.exe 73 4068 rundll32.exe 74 4068 rundll32.exe 75 4068 rundll32.exe 76 4068 rundll32.exe 77 4068 rundll32.exe 78 4068 rundll32.exe 79 4068 rundll32.exe 80 4068 rundll32.exe 81 4068 rundll32.exe 82 4068 rundll32.exe 83 4068 rundll32.exe 84 4068 rundll32.exe 85 4068 rundll32.exe 86 4068 rundll32.exe 87 4068 rundll32.exe 88 4068 rundll32.exe 89 4068 rundll32.exe 90 4068 rundll32.exe 93 4068 rundll32.exe 95 4068 rundll32.exe 96 4068 rundll32.exe 97 4068 rundll32.exe 98 4068 rundll32.exe 122 4068 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1859779917-101786662-3680946609-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\webwallpaper32.exe = "C:\\Windows\\SysWOW64\\rundll32.exe" rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2512 wrote to memory of 4068 2512 rundll32.exe 85 PID 2512 wrote to memory of 4068 2512 rundll32.exe 85 PID 2512 wrote to memory of 4068 2512 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5cc5e79e1540e89c28966395444f25bf717ac4c700847a59cd59e8f27941e20e.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5cc5e79e1540e89c28966395444f25bf717ac4c700847a59cd59e8f27941e20e.dll,#12⤵
- Blocklisted process makes network request
- Adds Run key to start application
PID:4068
-