Analysis

  • max time kernel
    175s
  • max time network
    209s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-10-2023 05:14

General

  • Target

    fa0943feb5cc47c89fbbf1a30ba8f196610c6f562741cde6b8b9f0a19f8c74ac.exe

  • Size

    3.3MB

  • MD5

    51c2df4c151377008a867e9936101485

  • SHA1

    6ce54dacd601acf26930864baed50cbe76504037

  • SHA256

    fa0943feb5cc47c89fbbf1a30ba8f196610c6f562741cde6b8b9f0a19f8c74ac

  • SHA512

    9f576d81e66f11db5a7e84a52016ee0fd96c8ccba088a586ffec8dd8788be4e8655df994aa0690297aa41b74237a57ee3f412630199de1dca964fee0d5302f70

  • SSDEEP

    98304:N2HKwycIFgnZkcOyqxcQDFUg5CBgwjYNTtnpO:nFgEDcfg5CBgbNT/O

Malware Config

Signatures

  • Generic Chinese Botnet

    A botnet originating from China which is currently unnamed publicly.

  • Chinese Botnet payload 1 IoCs
  • Executes dropped EXE 5 IoCs
  • VMProtect packed file 1 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 11 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fa0943feb5cc47c89fbbf1a30ba8f196610c6f562741cde6b8b9f0a19f8c74ac.exe
    "C:\Users\Admin\AppData\Local\Temp\fa0943feb5cc47c89fbbf1a30ba8f196610c6f562741cde6b8b9f0a19f8c74ac.exe"
    1⤵
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1468
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c del fa0943feb5cc47c89fbbf1a30ba8f196610c6f562741cde6b8b9f0a19f8c74ac.exe
      2⤵
        PID:3868
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:4860
      • C:\Users\Public\Documents\123\rs1.exe
        "C:\Users\Public\Documents\123\rs1.exe"
        1⤵
        • Executes dropped EXE
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3980
        • C:\WINDOWS\DNomb\FTvrst.exe
          C:\WINDOWS\DNomb\FTvrst.exe
          2⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious use of SetThreadContext
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:208
          • C:\WINDOWS\DNomb\spolsvt.exe
            C:\WINDOWS\DNomb\spolsvt.exe
            3⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:640
          • C:\WINDOWS\DNomb\audidog.exe
            C:\WINDOWS\DNomb\audidog.exe
            3⤵
            • Executes dropped EXE
            PID:2236
        • C:\WINDOWS\DNomb\audidog.exe
          C:\WINDOWS\DNomb\audidog.exe
          2⤵
          • Executes dropped EXE
          PID:3488

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Public\Documents\123\rs1.exe

        Filesize

        2.2MB

        MD5

        3a9c682b077bc044b21131216bdf6304

        SHA1

        afdd419f084b56838c7eb07ff2b28ff9b960e27e

        SHA256

        8beaa45a7ca8a10127ed2e359be90f856a4ac0b87ed31e57a59aadc58ad94cc8

        SHA512

        99a2d2ce97a50791ddac4caa359bc335e404ad4f1ec3bdc5e3df6917e9c6eceba2d7c821eb0728e9d0989df1d021625db7ab962c1ebf705f8770090501d64b14

      • C:\Users\Public\Documents\123\rs1.exe

        Filesize

        2.2MB

        MD5

        3a9c682b077bc044b21131216bdf6304

        SHA1

        afdd419f084b56838c7eb07ff2b28ff9b960e27e

        SHA256

        8beaa45a7ca8a10127ed2e359be90f856a4ac0b87ed31e57a59aadc58ad94cc8

        SHA512

        99a2d2ce97a50791ddac4caa359bc335e404ad4f1ec3bdc5e3df6917e9c6eceba2d7c821eb0728e9d0989df1d021625db7ab962c1ebf705f8770090501d64b14

      • C:\WINDOWS\DNomb\FTvrst.exe

        Filesize

        2.2MB

        MD5

        3a9c682b077bc044b21131216bdf6304

        SHA1

        afdd419f084b56838c7eb07ff2b28ff9b960e27e

        SHA256

        8beaa45a7ca8a10127ed2e359be90f856a4ac0b87ed31e57a59aadc58ad94cc8

        SHA512

        99a2d2ce97a50791ddac4caa359bc335e404ad4f1ec3bdc5e3df6917e9c6eceba2d7c821eb0728e9d0989df1d021625db7ab962c1ebf705f8770090501d64b14

      • C:\WINDOWS\DNomb\Mpec.mbt

        Filesize

        200KB

        MD5

        1b2c492b5437c5c618dff6ae1626aa88

        SHA1

        00183c5a3920495ef6e0e5aa524c218cf2cac93b

        SHA256

        531c2f831b6b1e452ad21c46dcfefe9ed5e768d60c1de87f536d443a6b4c5ab5

        SHA512

        3cd1fe8762e15e678f716464e10a32e6f32a2926af54c8839f2aba6cb8cd4b176c7f5f369d71292c6adc1ba62ae102239d0c54f1bc1f76bfe10fcb54be97ad09

      • C:\WINDOWS\DNomb\audidog.exe

        Filesize

        2.2MB

        MD5

        3a9c682b077bc044b21131216bdf6304

        SHA1

        afdd419f084b56838c7eb07ff2b28ff9b960e27e

        SHA256

        8beaa45a7ca8a10127ed2e359be90f856a4ac0b87ed31e57a59aadc58ad94cc8

        SHA512

        99a2d2ce97a50791ddac4caa359bc335e404ad4f1ec3bdc5e3df6917e9c6eceba2d7c821eb0728e9d0989df1d021625db7ab962c1ebf705f8770090501d64b14

      • C:\WINDOWS\DNomb\spolsvt.exe

        Filesize

        9KB

        MD5

        523d5c39f9d8d2375c3df68251fa2249

        SHA1

        d4ed365c44bec9246fc1a65a32a7791792647a10

        SHA256

        20e3dc90a3e83b6202e2a7f4603b60e5e859639cb68693426c400b13aaeabd78

        SHA512

        526e1bba30d03f1ac177c6ab7409187a730969c429cebef15da68ffcf44b3b93227781eebc827b2f7a0fa17c391e00a0e532263fd0167aeaeb0456f96cfe3ae4

      • C:\WINDOWS\Djltp.txt

        Filesize

        37B

        MD5

        4f6cae09c7fd452990e28040f1d34b27

        SHA1

        feea2cc9d7b63e57523e2031d886a5e2599561ad

        SHA256

        cfa50edb62da7487915728a8cbb0c4a55e907fb70363234abaa6a4fb31565f6e

        SHA512

        4201eabbba4d3ff8bdf7d089feb013bd587f6254f188fd7181ebdd6fc851f79f1150682211116736d568460de126da51bc013d04d69421098e71f087f1a4dd56

      • C:\Windows\DNomb\FTvrst.exe

        Filesize

        2.2MB

        MD5

        3a9c682b077bc044b21131216bdf6304

        SHA1

        afdd419f084b56838c7eb07ff2b28ff9b960e27e

        SHA256

        8beaa45a7ca8a10127ed2e359be90f856a4ac0b87ed31e57a59aadc58ad94cc8

        SHA512

        99a2d2ce97a50791ddac4caa359bc335e404ad4f1ec3bdc5e3df6917e9c6eceba2d7c821eb0728e9d0989df1d021625db7ab962c1ebf705f8770090501d64b14

      • C:\Windows\DNomb\audidog.exe

        Filesize

        2.2MB

        MD5

        3a9c682b077bc044b21131216bdf6304

        SHA1

        afdd419f084b56838c7eb07ff2b28ff9b960e27e

        SHA256

        8beaa45a7ca8a10127ed2e359be90f856a4ac0b87ed31e57a59aadc58ad94cc8

        SHA512

        99a2d2ce97a50791ddac4caa359bc335e404ad4f1ec3bdc5e3df6917e9c6eceba2d7c821eb0728e9d0989df1d021625db7ab962c1ebf705f8770090501d64b14

      • C:\Windows\DNomb\audidog.exe

        Filesize

        2.2MB

        MD5

        3a9c682b077bc044b21131216bdf6304

        SHA1

        afdd419f084b56838c7eb07ff2b28ff9b960e27e

        SHA256

        8beaa45a7ca8a10127ed2e359be90f856a4ac0b87ed31e57a59aadc58ad94cc8

        SHA512

        99a2d2ce97a50791ddac4caa359bc335e404ad4f1ec3bdc5e3df6917e9c6eceba2d7c821eb0728e9d0989df1d021625db7ab962c1ebf705f8770090501d64b14

      • C:\Windows\DNomb\audidog.exe

        Filesize

        2.2MB

        MD5

        3a9c682b077bc044b21131216bdf6304

        SHA1

        afdd419f084b56838c7eb07ff2b28ff9b960e27e

        SHA256

        8beaa45a7ca8a10127ed2e359be90f856a4ac0b87ed31e57a59aadc58ad94cc8

        SHA512

        99a2d2ce97a50791ddac4caa359bc335e404ad4f1ec3bdc5e3df6917e9c6eceba2d7c821eb0728e9d0989df1d021625db7ab962c1ebf705f8770090501d64b14

      • C:\Windows\DNomb\spolsvt.exe

        Filesize

        9KB

        MD5

        523d5c39f9d8d2375c3df68251fa2249

        SHA1

        d4ed365c44bec9246fc1a65a32a7791792647a10

        SHA256

        20e3dc90a3e83b6202e2a7f4603b60e5e859639cb68693426c400b13aaeabd78

        SHA512

        526e1bba30d03f1ac177c6ab7409187a730969c429cebef15da68ffcf44b3b93227781eebc827b2f7a0fa17c391e00a0e532263fd0167aeaeb0456f96cfe3ae4

      • memory/208-26165-0x0000000000400000-0x0000000000C64000-memory.dmp

        Filesize

        8.4MB

      • memory/208-26166-0x0000000000400000-0x0000000000C64000-memory.dmp

        Filesize

        8.4MB

      • memory/208-13087-0x0000000076FB0000-0x00000000771C5000-memory.dmp

        Filesize

        2.1MB

      • memory/208-26161-0x0000000000400000-0x0000000000C64000-memory.dmp

        Filesize

        8.4MB

      • memory/208-16962-0x0000000077390000-0x0000000077530000-memory.dmp

        Filesize

        1.6MB

      • memory/208-26338-0x0000000000400000-0x0000000000C64000-memory.dmp

        Filesize

        8.4MB

      • memory/208-18972-0x0000000075B80000-0x0000000075BFA000-memory.dmp

        Filesize

        488KB

      • memory/208-23344-0x0000000000400000-0x0000000000C64000-memory.dmp

        Filesize

        8.4MB

      • memory/208-26159-0x0000000000400000-0x0000000000C64000-memory.dmp

        Filesize

        8.4MB

      • memory/208-26160-0x0000000000400000-0x0000000000C64000-memory.dmp

        Filesize

        8.4MB

      • memory/208-26470-0x0000000000400000-0x0000000000C64000-memory.dmp

        Filesize

        8.4MB

      • memory/640-26173-0x0000000000400000-0x0000000000492000-memory.dmp

        Filesize

        584KB

      • memory/640-26172-0x0000000000400000-0x0000000000492000-memory.dmp

        Filesize

        584KB

      • memory/640-27325-0x0000000010000000-0x0000000010017000-memory.dmp

        Filesize

        92KB

      • memory/640-26563-0x0000000000400000-0x0000000000492000-memory.dmp

        Filesize

        584KB

      • memory/640-26392-0x0000000000400000-0x0000000000492000-memory.dmp

        Filesize

        584KB

      • memory/640-26169-0x0000000000400000-0x0000000000492000-memory.dmp

        Filesize

        584KB

      • memory/640-26170-0x0000000000400000-0x0000000000492000-memory.dmp

        Filesize

        584KB

      • memory/2236-26755-0x0000000000400000-0x0000000000C64000-memory.dmp

        Filesize

        8.4MB

      • memory/2236-26196-0x0000000076FB0000-0x00000000771C5000-memory.dmp

        Filesize

        2.1MB

      • memory/3488-26175-0x0000000076FB0000-0x00000000771C5000-memory.dmp

        Filesize

        2.1MB

      • memory/3488-26509-0x0000000000400000-0x0000000000C64000-memory.dmp

        Filesize

        8.4MB

      • memory/3980-2567-0x0000000000400000-0x0000000000C64000-memory.dmp

        Filesize

        8.4MB

      • memory/3980-13075-0x0000000000400000-0x0000000000C64000-memory.dmp

        Filesize

        8.4MB

      • memory/3980-5890-0x0000000075B80000-0x0000000075BFA000-memory.dmp

        Filesize

        488KB

      • memory/3980-3881-0x0000000077390000-0x0000000077530000-memory.dmp

        Filesize

        1.6MB

      • memory/3980-26171-0x0000000000400000-0x0000000000C64000-memory.dmp

        Filesize

        8.4MB

      • memory/3980-13076-0x0000000000400000-0x0000000000C64000-memory.dmp

        Filesize

        8.4MB

      • memory/3980-13077-0x0000000000400000-0x0000000000C64000-memory.dmp

        Filesize

        8.4MB

      • memory/3980-6-0x0000000076FB0000-0x00000000771C5000-memory.dmp

        Filesize

        2.1MB

      • memory/3980-5-0x0000000000400000-0x0000000000C64000-memory.dmp

        Filesize

        8.4MB

      • memory/3980-17001-0x0000000000400000-0x0000000000C64000-memory.dmp

        Filesize

        8.4MB

      • memory/3980-13078-0x0000000000400000-0x0000000000C64000-memory.dmp

        Filesize

        8.4MB

      • memory/3980-13079-0x0000000000400000-0x0000000000C64000-memory.dmp

        Filesize

        8.4MB

      • memory/3980-13683-0x0000000000400000-0x0000000000C64000-memory.dmp

        Filesize

        8.4MB