Analysis

  • max time kernel
    150s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    26-09-2023 23:38

General

  • Target

    140b06b8cf54f9542282146bbdf66dd20e4f37a20baca378bc69dfd48db32792.exe

  • Size

    3.1MB

  • MD5

    400fe1bf9c38fde2eeeabdd3a64f84b8

  • SHA1

    388d67c3b424a3fd233350777fd87331b0390ebe

  • SHA256

    140b06b8cf54f9542282146bbdf66dd20e4f37a20baca378bc69dfd48db32792

  • SHA512

    c393b2115d601677adaf5734bae5678143aa667d9ab0ee41df1c923e91a910a1ae86ec1da7baff5eb3a1336b1a88cd612b76ce47c3d13c6e7c5b170e1575fd03

  • SSDEEP

    98304:hO01bIv+7IGM4oT57VJNcKRrcJS8jJrV4znx:hO01F8GM4MJN1RrcJzrV6x

Malware Config

Signatures

  • Generic Chinese Botnet

    A botnet originating from China which is currently unnamed publicly.

  • Chinese Botnet payload 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Enumerates connected drives 3 TTPs 22 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 29 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\140b06b8cf54f9542282146bbdf66dd20e4f37a20baca378bc69dfd48db32792.exe
    "C:\Users\Admin\AppData\Local\Temp\140b06b8cf54f9542282146bbdf66dd20e4f37a20baca378bc69dfd48db32792.exe"
    1⤵
    • Enumerates connected drives
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Program Files directory
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of SetWindowsHookEx
    PID:2816
  • C:\Program Files (x86)\Kwawawi.exe
    "C:\Program Files (x86)\Kwawawi.exe"
    1⤵
    • Executes dropped EXE
    PID:1876

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Kwawawi.exe

    Filesize

    3.1MB

    MD5

    400fe1bf9c38fde2eeeabdd3a64f84b8

    SHA1

    388d67c3b424a3fd233350777fd87331b0390ebe

    SHA256

    140b06b8cf54f9542282146bbdf66dd20e4f37a20baca378bc69dfd48db32792

    SHA512

    c393b2115d601677adaf5734bae5678143aa667d9ab0ee41df1c923e91a910a1ae86ec1da7baff5eb3a1336b1a88cd612b76ce47c3d13c6e7c5b170e1575fd03

  • memory/1876-15576-0x0000000000400000-0x000000000087F000-memory.dmp

    Filesize

    4.5MB

  • memory/1876-11251-0x0000000002690000-0x0000000002811000-memory.dmp

    Filesize

    1.5MB

  • memory/1876-8702-0x0000000000400000-0x000000000087F000-memory.dmp

    Filesize

    4.5MB

  • memory/2816-846-0x0000000002560000-0x0000000002671000-memory.dmp

    Filesize

    1.1MB

  • memory/2816-811-0x0000000002560000-0x0000000002671000-memory.dmp

    Filesize

    1.1MB

  • memory/2816-818-0x0000000002560000-0x0000000002671000-memory.dmp

    Filesize

    1.1MB

  • memory/2816-820-0x0000000002560000-0x0000000002671000-memory.dmp

    Filesize

    1.1MB

  • memory/2816-822-0x0000000002560000-0x0000000002671000-memory.dmp

    Filesize

    1.1MB

  • memory/2816-824-0x0000000002560000-0x0000000002671000-memory.dmp

    Filesize

    1.1MB

  • memory/2816-826-0x0000000002560000-0x0000000002671000-memory.dmp

    Filesize

    1.1MB

  • memory/2816-828-0x0000000002560000-0x0000000002671000-memory.dmp

    Filesize

    1.1MB

  • memory/2816-850-0x0000000002560000-0x0000000002671000-memory.dmp

    Filesize

    1.1MB

  • memory/2816-832-0x0000000002560000-0x0000000002671000-memory.dmp

    Filesize

    1.1MB

  • memory/2816-834-0x0000000002560000-0x0000000002671000-memory.dmp

    Filesize

    1.1MB

  • memory/2816-836-0x0000000002560000-0x0000000002671000-memory.dmp

    Filesize

    1.1MB

  • memory/2816-838-0x0000000002560000-0x0000000002671000-memory.dmp

    Filesize

    1.1MB

  • memory/2816-840-0x0000000002560000-0x0000000002671000-memory.dmp

    Filesize

    1.1MB

  • memory/2816-842-0x0000000002560000-0x0000000002671000-memory.dmp

    Filesize

    1.1MB

  • memory/2816-844-0x0000000002560000-0x0000000002671000-memory.dmp

    Filesize

    1.1MB

  • memory/2816-0-0x0000000000400000-0x000000000087F000-memory.dmp

    Filesize

    4.5MB

  • memory/2816-848-0x0000000002560000-0x0000000002671000-memory.dmp

    Filesize

    1.1MB

  • memory/2816-830-0x0000000002560000-0x0000000002671000-memory.dmp

    Filesize

    1.1MB

  • memory/2816-816-0x0000000002560000-0x0000000002671000-memory.dmp

    Filesize

    1.1MB

  • memory/2816-864-0x0000000002560000-0x0000000002671000-memory.dmp

    Filesize

    1.1MB

  • memory/2816-856-0x0000000002560000-0x0000000002671000-memory.dmp

    Filesize

    1.1MB

  • memory/2816-858-0x0000000002560000-0x0000000002671000-memory.dmp

    Filesize

    1.1MB

  • memory/2816-860-0x0000000002560000-0x0000000002671000-memory.dmp

    Filesize

    1.1MB

  • memory/2816-862-0x0000000002560000-0x0000000002671000-memory.dmp

    Filesize

    1.1MB

  • memory/2816-854-0x0000000002560000-0x0000000002671000-memory.dmp

    Filesize

    1.1MB

  • memory/2816-866-0x0000000002560000-0x0000000002671000-memory.dmp

    Filesize

    1.1MB

  • memory/2816-868-0x0000000002560000-0x0000000002671000-memory.dmp

    Filesize

    1.1MB

  • memory/2816-870-0x0000000002560000-0x0000000002671000-memory.dmp

    Filesize

    1.1MB

  • memory/2816-872-0x0000000002560000-0x0000000002671000-memory.dmp

    Filesize

    1.1MB

  • memory/2816-2547-0x00000000022B0000-0x0000000002431000-memory.dmp

    Filesize

    1.5MB

  • memory/2816-8686-0x0000000002560000-0x0000000002671000-memory.dmp

    Filesize

    1.1MB

  • memory/2816-8693-0x0000000000400000-0x000000000087F000-memory.dmp

    Filesize

    4.5MB

  • memory/2816-814-0x0000000002560000-0x0000000002671000-memory.dmp

    Filesize

    1.1MB

  • memory/2816-812-0x0000000002560000-0x0000000002671000-memory.dmp

    Filesize

    1.1MB

  • memory/2816-10821-0x0000000000400000-0x000000000087F000-memory.dmp

    Filesize

    4.5MB

  • memory/2816-852-0x0000000002560000-0x0000000002671000-memory.dmp

    Filesize

    1.1MB

  • memory/2816-1-0x0000000074EF0000-0x0000000074F37000-memory.dmp

    Filesize

    284KB