Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    02-10-2023 10:57

General

  • Target

    e4f58ce9777bdc2aede3ec7e2d03540417a9e145929aa94d042e5ec4e441c19f.exe

  • Size

    636KB

  • MD5

    97d7cd02edcf10c9080bd2284a46fc1b

  • SHA1

    e179694627f7a194e492461ed58fa875e0b2f127

  • SHA256

    e4f58ce9777bdc2aede3ec7e2d03540417a9e145929aa94d042e5ec4e441c19f

  • SHA512

    b272f7abde944e24695f33ec141deb35e3e6c641151d70f76234f218794be4d15817f9baa537051b22613f188116960e533c3f4d5b9e489ba98f1e34d5fd03d9

  • SSDEEP

    6144:ZWMjNEqWNAML6edtpVYSDvEocoBMPAC6aRMJHaCVJw+0:Zvuq2RL3ddLEc9C6aOJ6t

Malware Config

Signatures

  • Generic Chinese Botnet

    A botnet originating from China which is currently unnamed publicly.

  • Chinese Botnet payload 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies data under HKEY_USERS 24 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e4f58ce9777bdc2aede3ec7e2d03540417a9e145929aa94d042e5ec4e441c19f.exe
    "C:\Users\Admin\AppData\Local\Temp\e4f58ce9777bdc2aede3ec7e2d03540417a9e145929aa94d042e5ec4e441c19f.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:2064
  • C:\Program Files (x86)\Java Protection Program.exe
    "C:\Program Files (x86)\Java Protection Program.exe"
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    • Suspicious use of SetWindowsHookEx
    PID:2512

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Java Protection Program.exe

    Filesize

    636KB

    MD5

    97d7cd02edcf10c9080bd2284a46fc1b

    SHA1

    e179694627f7a194e492461ed58fa875e0b2f127

    SHA256

    e4f58ce9777bdc2aede3ec7e2d03540417a9e145929aa94d042e5ec4e441c19f

    SHA512

    b272f7abde944e24695f33ec141deb35e3e6c641151d70f76234f218794be4d15817f9baa537051b22613f188116960e533c3f4d5b9e489ba98f1e34d5fd03d9

  • memory/2064-0-0x0000000010000000-0x0000000010018000-memory.dmp

    Filesize

    96KB