Analysis

  • max time kernel
    146s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-10-2023 04:57

General

  • Target

    6d7fbe4c7d13e5a09a3b9b8b51c98fd509da6af01a38f83b46a90c1f60dfd498.exe

  • Size

    1.0MB

  • MD5

    8bd26f3a4fe96dcb7db9199a6d67803d

  • SHA1

    9b10d6a17c957c2ae5cfc348b8cf37cad6f6be73

  • SHA256

    6d7fbe4c7d13e5a09a3b9b8b51c98fd509da6af01a38f83b46a90c1f60dfd498

  • SHA512

    aac888093b27442490b25a7b8909fe4d7804cb4f092116aa072012b30631d9a14c07beaeb17c0e9587873f968ca77a009905292519da8d29add1539a8ec04d97

  • SSDEEP

    12288:XDHe+z1hzyfPMf75jmEEF1YvPcvzQ+4YHEHoFN6WtljaElI9TC:XDHe+zPf9j6+PR+4bHoFN6WtljaEy9T

Malware Config

Signatures

  • Generic Chinese Botnet

    A botnet originating from China which is currently unnamed publicly.

  • Chinese Botnet payload 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6d7fbe4c7d13e5a09a3b9b8b51c98fd509da6af01a38f83b46a90c1f60dfd498.exe
    "C:\Users\Admin\AppData\Local\Temp\6d7fbe4c7d13e5a09a3b9b8b51c98fd509da6af01a38f83b46a90c1f60dfd498.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:5036

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/5036-0-0x0000000010000000-0x000000001001F000-memory.dmp

    Filesize

    124KB