Analysis

  • max time kernel
    170s
  • max time network
    177s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/10/2023, 02:03

General

  • Target

    f4a8b76c1fd70abbf8f4d9197317feb964891c1f656cb28ed6c8f6fe79fb650b_JC.exe

  • Size

    1.4MB

  • MD5

    ea04e601cbced54cf7ebe9a0c52813a6

  • SHA1

    cf41f1ae7522e65f128a48ba6c1a1b5d49a98f25

  • SHA256

    f4a8b76c1fd70abbf8f4d9197317feb964891c1f656cb28ed6c8f6fe79fb650b

  • SHA512

    5e3796b24c8a06216e642afed1b19b18a732b2dbc7d7b420fff152f1d91ad20fedd71a14d5bc304e8a2cfa9c99767b1cba8c9e23ae50b7db4b4363d55e14fce7

  • SSDEEP

    24576:iYfuzMVr9WZNNw/G2l8nRIe0IY0mwFKivSeYYdwDuoEd+Hv18ovh9F+28FA:NVxWZEus8BH4ReYYdwBEdMt8IhnKA

Malware Config

Extracted

Family

originbotnet

C2

https://grdhfour.shop/gate

Attributes
  • add_startup

    false

  • download_folder_name

    4tmn4xe4.gde

  • hide_file_startup

    false

  • startup_directory_name

    rOUfBC

  • startup_environment_name

    appdata

  • startup_installation_name

    rOUfBC.exe

  • startup_registry_name

    rOUfBC

  • user_agent

    Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0

Signatures

  • OriginBotnet

    OriginBotnet is a remote access trojan written in C#.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f4a8b76c1fd70abbf8f4d9197317feb964891c1f656cb28ed6c8f6fe79fb650b_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\f4a8b76c1fd70abbf8f4d9197317feb964891c1f656cb28ed6c8f6fe79fb650b_JC.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:744
    • C:\Users\Admin\AppData\Local\Temp\wewgsd.exe
      "C:\Users\Admin\AppData\Local\Temp\wewgsd.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:208
      • C:\Users\Admin\AppData\Local\Temp\wewgsd.exe
        C:\Users\Admin\AppData\Local\Temp\wewgsd.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious use of AdjustPrivilegeToken
        PID:564
    • C:\Users\Admin\AppData\Local\Temp\f4a8b76c1fd70abbf8f4d9197317feb964891c1f656cb28ed6c8f6fe79fb650b_JC.exe
      C:\Users\Admin\AppData\Local\Temp\f4a8b76c1fd70abbf8f4d9197317feb964891c1f656cb28ed6c8f6fe79fb650b_JC.exe
      2⤵
        PID:4840
      • C:\Users\Admin\AppData\Local\Temp\f4a8b76c1fd70abbf8f4d9197317feb964891c1f656cb28ed6c8f6fe79fb650b_JC.exe
        C:\Users\Admin\AppData\Local\Temp\f4a8b76c1fd70abbf8f4d9197317feb964891c1f656cb28ed6c8f6fe79fb650b_JC.exe
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2824

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\f4a8b76c1fd70abbf8f4d9197317feb964891c1f656cb28ed6c8f6fe79fb650b_JC.exe.log

      Filesize

      927B

      MD5

      4a911455784f74e368a4c2c7876d76f4

      SHA1

      a1700a0849ffb4f26671eb76da2489946b821c34

      SHA256

      264098e15b5b33d425f3b76e45b7976b58f917048125041135f7e60d8151108c

      SHA512

      4617591400409e1930195795a55e20d5f063042bb3e9fd1955099066e507b6ac8a1e3ae54cc42418e2639149b31bf7e58cd5743670d9030a15e29f14d813815d

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\wewgsd.exe.log

      Filesize

      927B

      MD5

      4a911455784f74e368a4c2c7876d76f4

      SHA1

      a1700a0849ffb4f26671eb76da2489946b821c34

      SHA256

      264098e15b5b33d425f3b76e45b7976b58f917048125041135f7e60d8151108c

      SHA512

      4617591400409e1930195795a55e20d5f063042bb3e9fd1955099066e507b6ac8a1e3ae54cc42418e2639149b31bf7e58cd5743670d9030a15e29f14d813815d

    • C:\Users\Admin\AppData\Local\Temp\wewgsd.exe

      Filesize

      1.1MB

      MD5

      9726c09ff16b630f15e0d5bf3d90fa42

      SHA1

      7f1291c4bd75da326e95d33d7f31720dc5ee9440

      SHA256

      7be3067e6a2f601a0715d9eaa1316d1c92a3d8d370a27678fb53d83fcea4fe83

      SHA512

      df19abd0225bb83ac4ad5c4fc200e4cc8b3d282c1b3b476e24fb8149beb54a90bcdae7aab7bca18d334cede921c272757fd771bd3d4d94a0d6de5a4081e146be

    • C:\Users\Admin\AppData\Local\Temp\wewgsd.exe

      Filesize

      1.1MB

      MD5

      9726c09ff16b630f15e0d5bf3d90fa42

      SHA1

      7f1291c4bd75da326e95d33d7f31720dc5ee9440

      SHA256

      7be3067e6a2f601a0715d9eaa1316d1c92a3d8d370a27678fb53d83fcea4fe83

      SHA512

      df19abd0225bb83ac4ad5c4fc200e4cc8b3d282c1b3b476e24fb8149beb54a90bcdae7aab7bca18d334cede921c272757fd771bd3d4d94a0d6de5a4081e146be

    • C:\Users\Admin\AppData\Local\Temp\wewgsd.exe

      Filesize

      1.1MB

      MD5

      9726c09ff16b630f15e0d5bf3d90fa42

      SHA1

      7f1291c4bd75da326e95d33d7f31720dc5ee9440

      SHA256

      7be3067e6a2f601a0715d9eaa1316d1c92a3d8d370a27678fb53d83fcea4fe83

      SHA512

      df19abd0225bb83ac4ad5c4fc200e4cc8b3d282c1b3b476e24fb8149beb54a90bcdae7aab7bca18d334cede921c272757fd771bd3d4d94a0d6de5a4081e146be

    • C:\Users\Admin\AppData\Local\Temp\wewgsd.exe

      Filesize

      1.1MB

      MD5

      9726c09ff16b630f15e0d5bf3d90fa42

      SHA1

      7f1291c4bd75da326e95d33d7f31720dc5ee9440

      SHA256

      7be3067e6a2f601a0715d9eaa1316d1c92a3d8d370a27678fb53d83fcea4fe83

      SHA512

      df19abd0225bb83ac4ad5c4fc200e4cc8b3d282c1b3b476e24fb8149beb54a90bcdae7aab7bca18d334cede921c272757fd771bd3d4d94a0d6de5a4081e146be

    • memory/208-26-0x0000000005830000-0x00000000058FA000-memory.dmp

      Filesize

      808KB

    • memory/208-22-0x0000000005380000-0x000000000545A000-memory.dmp

      Filesize

      872KB

    • memory/208-38-0x0000000075350000-0x0000000075B00000-memory.dmp

      Filesize

      7.7MB

    • memory/208-18-0x0000000000AB0000-0x0000000000BCA000-memory.dmp

      Filesize

      1.1MB

    • memory/208-24-0x00000000054F0000-0x00000000055CA000-memory.dmp

      Filesize

      872KB

    • memory/208-19-0x0000000075350000-0x0000000075B00000-memory.dmp

      Filesize

      7.7MB

    • memory/208-20-0x0000000005470000-0x0000000005480000-memory.dmp

      Filesize

      64KB

    • memory/564-92-0x00000000055E0000-0x000000000569C000-memory.dmp

      Filesize

      752KB

    • memory/564-80-0x00000000055E0000-0x000000000569C000-memory.dmp

      Filesize

      752KB

    • memory/564-885-0x0000000075350000-0x0000000075B00000-memory.dmp

      Filesize

      7.7MB

    • memory/564-883-0x00000000056A0000-0x00000000056F6000-memory.dmp

      Filesize

      344KB

    • memory/564-882-0x0000000001630000-0x0000000001631000-memory.dmp

      Filesize

      4KB

    • memory/564-32-0x0000000000400000-0x00000000004A6000-memory.dmp

      Filesize

      664KB

    • memory/564-39-0x0000000075350000-0x0000000075B00000-memory.dmp

      Filesize

      7.7MB

    • memory/564-40-0x00000000055D0000-0x00000000055E0000-memory.dmp

      Filesize

      64KB

    • memory/564-58-0x00000000055E0000-0x000000000569C000-memory.dmp

      Filesize

      752KB

    • memory/564-37-0x00000000055E0000-0x00000000056A2000-memory.dmp

      Filesize

      776KB

    • memory/564-41-0x00000000055E0000-0x000000000569C000-memory.dmp

      Filesize

      752KB

    • memory/564-48-0x00000000055E0000-0x000000000569C000-memory.dmp

      Filesize

      752KB

    • memory/564-46-0x00000000055E0000-0x000000000569C000-memory.dmp

      Filesize

      752KB

    • memory/564-50-0x00000000055E0000-0x000000000569C000-memory.dmp

      Filesize

      752KB

    • memory/564-52-0x00000000055E0000-0x000000000569C000-memory.dmp

      Filesize

      752KB

    • memory/564-44-0x00000000055E0000-0x000000000569C000-memory.dmp

      Filesize

      752KB

    • memory/564-54-0x00000000055E0000-0x000000000569C000-memory.dmp

      Filesize

      752KB

    • memory/564-42-0x00000000055E0000-0x000000000569C000-memory.dmp

      Filesize

      752KB

    • memory/564-56-0x00000000055E0000-0x000000000569C000-memory.dmp

      Filesize

      752KB

    • memory/564-60-0x00000000055E0000-0x000000000569C000-memory.dmp

      Filesize

      752KB

    • memory/564-62-0x00000000055E0000-0x000000000569C000-memory.dmp

      Filesize

      752KB

    • memory/564-66-0x00000000055E0000-0x000000000569C000-memory.dmp

      Filesize

      752KB

    • memory/564-72-0x00000000055E0000-0x000000000569C000-memory.dmp

      Filesize

      752KB

    • memory/564-76-0x00000000055E0000-0x000000000569C000-memory.dmp

      Filesize

      752KB

    • memory/564-82-0x00000000055E0000-0x000000000569C000-memory.dmp

      Filesize

      752KB

    • memory/564-88-0x00000000055E0000-0x000000000569C000-memory.dmp

      Filesize

      752KB

    • memory/564-86-0x00000000055E0000-0x000000000569C000-memory.dmp

      Filesize

      752KB

    • memory/564-90-0x00000000055E0000-0x000000000569C000-memory.dmp

      Filesize

      752KB

    • memory/564-84-0x00000000055E0000-0x000000000569C000-memory.dmp

      Filesize

      752KB

    • memory/564-64-0x00000000055E0000-0x000000000569C000-memory.dmp

      Filesize

      752KB

    • memory/564-78-0x00000000055E0000-0x000000000569C000-memory.dmp

      Filesize

      752KB

    • memory/564-74-0x00000000055E0000-0x000000000569C000-memory.dmp

      Filesize

      752KB

    • memory/564-70-0x00000000055E0000-0x000000000569C000-memory.dmp

      Filesize

      752KB

    • memory/564-94-0x00000000055E0000-0x000000000569C000-memory.dmp

      Filesize

      752KB

    • memory/564-100-0x00000000055E0000-0x000000000569C000-memory.dmp

      Filesize

      752KB

    • memory/564-102-0x00000000055E0000-0x000000000569C000-memory.dmp

      Filesize

      752KB

    • memory/564-98-0x00000000055E0000-0x000000000569C000-memory.dmp

      Filesize

      752KB

    • memory/564-96-0x00000000055E0000-0x000000000569C000-memory.dmp

      Filesize

      752KB

    • memory/564-68-0x00000000055E0000-0x000000000569C000-memory.dmp

      Filesize

      752KB

    • memory/744-1-0x0000000075350000-0x0000000075B00000-memory.dmp

      Filesize

      7.7MB

    • memory/744-21-0x00000000067F0000-0x0000000006D94000-memory.dmp

      Filesize

      5.6MB

    • memory/744-4-0x0000000005400000-0x0000000005532000-memory.dmp

      Filesize

      1.2MB

    • memory/744-6-0x0000000005770000-0x00000000057BC000-memory.dmp

      Filesize

      304KB

    • memory/744-5-0x0000000005630000-0x0000000005750000-memory.dmp

      Filesize

      1.1MB

    • memory/744-3-0x0000000005190000-0x00000000052C2000-memory.dmp

      Filesize

      1.2MB

    • memory/744-2-0x0000000005180000-0x0000000005190000-memory.dmp

      Filesize

      64KB

    • memory/744-30-0x0000000075350000-0x0000000075B00000-memory.dmp

      Filesize

      7.7MB

    • memory/744-0-0x0000000000670000-0x00000000007E2000-memory.dmp

      Filesize

      1.4MB

    • memory/2824-29-0x0000000075350000-0x0000000075B00000-memory.dmp

      Filesize

      7.7MB

    • memory/2824-658-0x0000000007120000-0x00000000071B2000-memory.dmp

      Filesize

      584KB

    • memory/2824-661-0x0000000007600000-0x000000000760A000-memory.dmp

      Filesize

      40KB

    • memory/2824-881-0x0000000075350000-0x0000000075B00000-memory.dmp

      Filesize

      7.7MB

    • memory/2824-33-0x0000000005A70000-0x0000000005AD6000-memory.dmp

      Filesize

      408KB

    • memory/2824-25-0x0000000000400000-0x000000000040E000-memory.dmp

      Filesize

      56KB

    • memory/2824-31-0x00000000058F0000-0x0000000005900000-memory.dmp

      Filesize

      64KB

    • memory/2824-886-0x00000000077E0000-0x00000000079A2000-memory.dmp

      Filesize

      1.8MB

    • memory/2824-887-0x0000000007EE0000-0x000000000840C000-memory.dmp

      Filesize

      5.2MB