Analysis
-
max time kernel
175s -
max time network
209s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12-10-2023 05:14
Static task
static1
Behavioral task
behavioral1
Sample
fa0943feb5cc47c89fbbf1a30ba8f196610c6f562741cde6b8b9f0a19f8c74ac.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
fa0943feb5cc47c89fbbf1a30ba8f196610c6f562741cde6b8b9f0a19f8c74ac.exe
Resource
win10v2004-20230915-en
General
-
Target
fa0943feb5cc47c89fbbf1a30ba8f196610c6f562741cde6b8b9f0a19f8c74ac.exe
-
Size
3.3MB
-
MD5
51c2df4c151377008a867e9936101485
-
SHA1
6ce54dacd601acf26930864baed50cbe76504037
-
SHA256
fa0943feb5cc47c89fbbf1a30ba8f196610c6f562741cde6b8b9f0a19f8c74ac
-
SHA512
9f576d81e66f11db5a7e84a52016ee0fd96c8ccba088a586ffec8dd8788be4e8655df994aa0690297aa41b74237a57ee3f412630199de1dca964fee0d5302f70
-
SSDEEP
98304:N2HKwycIFgnZkcOyqxcQDFUg5CBgwjYNTtnpO:nFgEDcfg5CBgbNT/O
Malware Config
Signatures
-
Generic Chinese Botnet
A botnet originating from China which is currently unnamed publicly.
-
Chinese Botnet payload 1 IoCs
resource yara_rule behavioral2/memory/640-27325-0x0000000010000000-0x0000000010017000-memory.dmp unk_chinese_botnet -
Executes dropped EXE 5 IoCs
pid Process 3980 rs1.exe 208 FTvrst.exe 3488 audidog.exe 640 spolsvt.exe 2236 audidog.exe -
resource yara_rule behavioral2/memory/640-27325-0x0000000010000000-0x0000000010017000-memory.dmp vmprotect -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Therecontinuous = "C:\\WINDOWS\\DNomb\\FTvrst.exe" FTvrst.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 11 IoCs
pid Process 3980 rs1.exe 3980 rs1.exe 3980 rs1.exe 3980 rs1.exe 3980 rs1.exe 3980 rs1.exe 208 FTvrst.exe 3980 rs1.exe 208 FTvrst.exe 208 FTvrst.exe 208 FTvrst.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 208 set thread context of 640 208 FTvrst.exe 105 -
Drops file in Windows directory 8 IoCs
description ioc Process File created C:\WINDOWS\DNomb\audidog.exe rs1.exe File created C:\Windows\DNomb\Mpec.mbt fa0943feb5cc47c89fbbf1a30ba8f196610c6f562741cde6b8b9f0a19f8c74ac.exe File opened for modification C:\Windows\DNomb\Mpec.mbt fa0943feb5cc47c89fbbf1a30ba8f196610c6f562741cde6b8b9f0a19f8c74ac.exe File created C:\WINDOWS\Djltp.txt rs1.exe File created C:\WINDOWS\DNomb\Mpec.mbt rs1.exe File created C:\WINDOWS\DNomb\spolsvt.exe rs1.exe File created C:\WINDOWS\DNomb\FTvrst.exe rs1.exe File opened for modification C:\WINDOWS\DNomb\FTvrst.exe rs1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\Local Settings fa0943feb5cc47c89fbbf1a30ba8f196610c6f562741cde6b8b9f0a19f8c74ac.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1468 fa0943feb5cc47c89fbbf1a30ba8f196610c6f562741cde6b8b9f0a19f8c74ac.exe 1468 fa0943feb5cc47c89fbbf1a30ba8f196610c6f562741cde6b8b9f0a19f8c74ac.exe 3980 rs1.exe 3980 rs1.exe 208 FTvrst.exe 208 FTvrst.exe 640 spolsvt.exe 640 spolsvt.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1468 wrote to memory of 3868 1468 fa0943feb5cc47c89fbbf1a30ba8f196610c6f562741cde6b8b9f0a19f8c74ac.exe 93 PID 1468 wrote to memory of 3868 1468 fa0943feb5cc47c89fbbf1a30ba8f196610c6f562741cde6b8b9f0a19f8c74ac.exe 93 PID 1468 wrote to memory of 3868 1468 fa0943feb5cc47c89fbbf1a30ba8f196610c6f562741cde6b8b9f0a19f8c74ac.exe 93 PID 3980 wrote to memory of 208 3980 rs1.exe 103 PID 3980 wrote to memory of 208 3980 rs1.exe 103 PID 3980 wrote to memory of 208 3980 rs1.exe 103 PID 3980 wrote to memory of 3488 3980 rs1.exe 104 PID 3980 wrote to memory of 3488 3980 rs1.exe 104 PID 3980 wrote to memory of 3488 3980 rs1.exe 104 PID 208 wrote to memory of 640 208 FTvrst.exe 105 PID 208 wrote to memory of 640 208 FTvrst.exe 105 PID 208 wrote to memory of 640 208 FTvrst.exe 105 PID 208 wrote to memory of 640 208 FTvrst.exe 105 PID 208 wrote to memory of 640 208 FTvrst.exe 105 PID 208 wrote to memory of 640 208 FTvrst.exe 105 PID 208 wrote to memory of 640 208 FTvrst.exe 105 PID 208 wrote to memory of 640 208 FTvrst.exe 105 PID 208 wrote to memory of 640 208 FTvrst.exe 105 PID 208 wrote to memory of 2236 208 FTvrst.exe 106 PID 208 wrote to memory of 2236 208 FTvrst.exe 106 PID 208 wrote to memory of 2236 208 FTvrst.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\fa0943feb5cc47c89fbbf1a30ba8f196610c6f562741cde6b8b9f0a19f8c74ac.exe"C:\Users\Admin\AppData\Local\Temp\fa0943feb5cc47c89fbbf1a30ba8f196610c6f562741cde6b8b9f0a19f8c74ac.exe"1⤵
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Windows\SysWOW64\cmd.execmd.exe /c del fa0943feb5cc47c89fbbf1a30ba8f196610c6f562741cde6b8b9f0a19f8c74ac.exe2⤵PID:3868
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4860
-
C:\Users\Public\Documents\123\rs1.exe"C:\Users\Public\Documents\123\rs1.exe"1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3980 -
C:\WINDOWS\DNomb\FTvrst.exeC:\WINDOWS\DNomb\FTvrst.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:208 -
C:\WINDOWS\DNomb\spolsvt.exeC:\WINDOWS\DNomb\spolsvt.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:640
-
-
C:\WINDOWS\DNomb\audidog.exeC:\WINDOWS\DNomb\audidog.exe3⤵
- Executes dropped EXE
PID:2236
-
-
-
C:\WINDOWS\DNomb\audidog.exeC:\WINDOWS\DNomb\audidog.exe2⤵
- Executes dropped EXE
PID:3488
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.2MB
MD53a9c682b077bc044b21131216bdf6304
SHA1afdd419f084b56838c7eb07ff2b28ff9b960e27e
SHA2568beaa45a7ca8a10127ed2e359be90f856a4ac0b87ed31e57a59aadc58ad94cc8
SHA51299a2d2ce97a50791ddac4caa359bc335e404ad4f1ec3bdc5e3df6917e9c6eceba2d7c821eb0728e9d0989df1d021625db7ab962c1ebf705f8770090501d64b14
-
Filesize
2.2MB
MD53a9c682b077bc044b21131216bdf6304
SHA1afdd419f084b56838c7eb07ff2b28ff9b960e27e
SHA2568beaa45a7ca8a10127ed2e359be90f856a4ac0b87ed31e57a59aadc58ad94cc8
SHA51299a2d2ce97a50791ddac4caa359bc335e404ad4f1ec3bdc5e3df6917e9c6eceba2d7c821eb0728e9d0989df1d021625db7ab962c1ebf705f8770090501d64b14
-
Filesize
2.2MB
MD53a9c682b077bc044b21131216bdf6304
SHA1afdd419f084b56838c7eb07ff2b28ff9b960e27e
SHA2568beaa45a7ca8a10127ed2e359be90f856a4ac0b87ed31e57a59aadc58ad94cc8
SHA51299a2d2ce97a50791ddac4caa359bc335e404ad4f1ec3bdc5e3df6917e9c6eceba2d7c821eb0728e9d0989df1d021625db7ab962c1ebf705f8770090501d64b14
-
Filesize
200KB
MD51b2c492b5437c5c618dff6ae1626aa88
SHA100183c5a3920495ef6e0e5aa524c218cf2cac93b
SHA256531c2f831b6b1e452ad21c46dcfefe9ed5e768d60c1de87f536d443a6b4c5ab5
SHA5123cd1fe8762e15e678f716464e10a32e6f32a2926af54c8839f2aba6cb8cd4b176c7f5f369d71292c6adc1ba62ae102239d0c54f1bc1f76bfe10fcb54be97ad09
-
Filesize
2.2MB
MD53a9c682b077bc044b21131216bdf6304
SHA1afdd419f084b56838c7eb07ff2b28ff9b960e27e
SHA2568beaa45a7ca8a10127ed2e359be90f856a4ac0b87ed31e57a59aadc58ad94cc8
SHA51299a2d2ce97a50791ddac4caa359bc335e404ad4f1ec3bdc5e3df6917e9c6eceba2d7c821eb0728e9d0989df1d021625db7ab962c1ebf705f8770090501d64b14
-
Filesize
9KB
MD5523d5c39f9d8d2375c3df68251fa2249
SHA1d4ed365c44bec9246fc1a65a32a7791792647a10
SHA25620e3dc90a3e83b6202e2a7f4603b60e5e859639cb68693426c400b13aaeabd78
SHA512526e1bba30d03f1ac177c6ab7409187a730969c429cebef15da68ffcf44b3b93227781eebc827b2f7a0fa17c391e00a0e532263fd0167aeaeb0456f96cfe3ae4
-
Filesize
37B
MD54f6cae09c7fd452990e28040f1d34b27
SHA1feea2cc9d7b63e57523e2031d886a5e2599561ad
SHA256cfa50edb62da7487915728a8cbb0c4a55e907fb70363234abaa6a4fb31565f6e
SHA5124201eabbba4d3ff8bdf7d089feb013bd587f6254f188fd7181ebdd6fc851f79f1150682211116736d568460de126da51bc013d04d69421098e71f087f1a4dd56
-
Filesize
2.2MB
MD53a9c682b077bc044b21131216bdf6304
SHA1afdd419f084b56838c7eb07ff2b28ff9b960e27e
SHA2568beaa45a7ca8a10127ed2e359be90f856a4ac0b87ed31e57a59aadc58ad94cc8
SHA51299a2d2ce97a50791ddac4caa359bc335e404ad4f1ec3bdc5e3df6917e9c6eceba2d7c821eb0728e9d0989df1d021625db7ab962c1ebf705f8770090501d64b14
-
Filesize
2.2MB
MD53a9c682b077bc044b21131216bdf6304
SHA1afdd419f084b56838c7eb07ff2b28ff9b960e27e
SHA2568beaa45a7ca8a10127ed2e359be90f856a4ac0b87ed31e57a59aadc58ad94cc8
SHA51299a2d2ce97a50791ddac4caa359bc335e404ad4f1ec3bdc5e3df6917e9c6eceba2d7c821eb0728e9d0989df1d021625db7ab962c1ebf705f8770090501d64b14
-
Filesize
2.2MB
MD53a9c682b077bc044b21131216bdf6304
SHA1afdd419f084b56838c7eb07ff2b28ff9b960e27e
SHA2568beaa45a7ca8a10127ed2e359be90f856a4ac0b87ed31e57a59aadc58ad94cc8
SHA51299a2d2ce97a50791ddac4caa359bc335e404ad4f1ec3bdc5e3df6917e9c6eceba2d7c821eb0728e9d0989df1d021625db7ab962c1ebf705f8770090501d64b14
-
Filesize
2.2MB
MD53a9c682b077bc044b21131216bdf6304
SHA1afdd419f084b56838c7eb07ff2b28ff9b960e27e
SHA2568beaa45a7ca8a10127ed2e359be90f856a4ac0b87ed31e57a59aadc58ad94cc8
SHA51299a2d2ce97a50791ddac4caa359bc335e404ad4f1ec3bdc5e3df6917e9c6eceba2d7c821eb0728e9d0989df1d021625db7ab962c1ebf705f8770090501d64b14
-
Filesize
9KB
MD5523d5c39f9d8d2375c3df68251fa2249
SHA1d4ed365c44bec9246fc1a65a32a7791792647a10
SHA25620e3dc90a3e83b6202e2a7f4603b60e5e859639cb68693426c400b13aaeabd78
SHA512526e1bba30d03f1ac177c6ab7409187a730969c429cebef15da68ffcf44b3b93227781eebc827b2f7a0fa17c391e00a0e532263fd0167aeaeb0456f96cfe3ae4