Analysis
-
max time kernel
120s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
20-10-2023 22:52
Static task
static1
Behavioral task
behavioral1
Sample
221bf67d04e8c694d4a0eb3ac949d38266d026b5261b61177a801d6cc5bde13d.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
221bf67d04e8c694d4a0eb3ac949d38266d026b5261b61177a801d6cc5bde13d.exe
Resource
win10v2004-20231020-en
General
-
Target
221bf67d04e8c694d4a0eb3ac949d38266d026b5261b61177a801d6cc5bde13d.exe
-
Size
352KB
-
MD5
fcb92e352d482d702dcf3a47579b12f2
-
SHA1
29401566b727ee7960b69ba9ca98fc88992b8f8a
-
SHA256
221bf67d04e8c694d4a0eb3ac949d38266d026b5261b61177a801d6cc5bde13d
-
SHA512
d87c6c2b6802c9a3a4e11a6cd12dc36af49040b416f9fe7cf70a64509060aeca9e0bd3a964d845456d65cc49fe27caafc63f5d0c4fc2e2db2b0824ae528d26c2
-
SSDEEP
1536:fiRtp/YdUQtxreuTGm2imb3W/zPhh1TxYoVAUytu3t7q3H+4poS7E:fAAdrt9euimwWzPhrW/A3t7q137E
Malware Config
Signatures
-
Generic Chinese Botnet
A botnet originating from China which is currently unnamed publicly.
-
Chinese Botnet payload 1 IoCs
resource yara_rule behavioral1/memory/2196-0-0x0000000010000000-0x0000000010018000-memory.dmp unk_chinese_botnet -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Z: 221bf67d04e8c694d4a0eb3ac949d38266d026b5261b61177a801d6cc5bde13d.exe File opened (read-only) \??\B: 221bf67d04e8c694d4a0eb3ac949d38266d026b5261b61177a801d6cc5bde13d.exe File opened (read-only) \??\O: 221bf67d04e8c694d4a0eb3ac949d38266d026b5261b61177a801d6cc5bde13d.exe File opened (read-only) \??\P: 221bf67d04e8c694d4a0eb3ac949d38266d026b5261b61177a801d6cc5bde13d.exe File opened (read-only) \??\R: 221bf67d04e8c694d4a0eb3ac949d38266d026b5261b61177a801d6cc5bde13d.exe File opened (read-only) \??\Y: 221bf67d04e8c694d4a0eb3ac949d38266d026b5261b61177a801d6cc5bde13d.exe File opened (read-only) \??\J: 221bf67d04e8c694d4a0eb3ac949d38266d026b5261b61177a801d6cc5bde13d.exe File opened (read-only) \??\K: 221bf67d04e8c694d4a0eb3ac949d38266d026b5261b61177a801d6cc5bde13d.exe File opened (read-only) \??\Q: 221bf67d04e8c694d4a0eb3ac949d38266d026b5261b61177a801d6cc5bde13d.exe File opened (read-only) \??\S: 221bf67d04e8c694d4a0eb3ac949d38266d026b5261b61177a801d6cc5bde13d.exe File opened (read-only) \??\T: 221bf67d04e8c694d4a0eb3ac949d38266d026b5261b61177a801d6cc5bde13d.exe File opened (read-only) \??\U: 221bf67d04e8c694d4a0eb3ac949d38266d026b5261b61177a801d6cc5bde13d.exe File opened (read-only) \??\V: 221bf67d04e8c694d4a0eb3ac949d38266d026b5261b61177a801d6cc5bde13d.exe File opened (read-only) \??\W: 221bf67d04e8c694d4a0eb3ac949d38266d026b5261b61177a801d6cc5bde13d.exe File opened (read-only) \??\G: 221bf67d04e8c694d4a0eb3ac949d38266d026b5261b61177a801d6cc5bde13d.exe File opened (read-only) \??\M: 221bf67d04e8c694d4a0eb3ac949d38266d026b5261b61177a801d6cc5bde13d.exe File opened (read-only) \??\N: 221bf67d04e8c694d4a0eb3ac949d38266d026b5261b61177a801d6cc5bde13d.exe File opened (read-only) \??\X: 221bf67d04e8c694d4a0eb3ac949d38266d026b5261b61177a801d6cc5bde13d.exe File opened (read-only) \??\L: 221bf67d04e8c694d4a0eb3ac949d38266d026b5261b61177a801d6cc5bde13d.exe File opened (read-only) \??\E: 221bf67d04e8c694d4a0eb3ac949d38266d026b5261b61177a801d6cc5bde13d.exe File opened (read-only) \??\H: 221bf67d04e8c694d4a0eb3ac949d38266d026b5261b61177a801d6cc5bde13d.exe File opened (read-only) \??\I: 221bf67d04e8c694d4a0eb3ac949d38266d026b5261b61177a801d6cc5bde13d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 221bf67d04e8c694d4a0eb3ac949d38266d026b5261b61177a801d6cc5bde13d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz 221bf67d04e8c694d4a0eb3ac949d38266d026b5261b61177a801d6cc5bde13d.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2196 221bf67d04e8c694d4a0eb3ac949d38266d026b5261b61177a801d6cc5bde13d.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2196 221bf67d04e8c694d4a0eb3ac949d38266d026b5261b61177a801d6cc5bde13d.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\221bf67d04e8c694d4a0eb3ac949d38266d026b5261b61177a801d6cc5bde13d.exe"C:\Users\Admin\AppData\Local\Temp\221bf67d04e8c694d4a0eb3ac949d38266d026b5261b61177a801d6cc5bde13d.exe"1⤵
- Enumerates connected drives
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:2196