Analysis

  • max time kernel
    122s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    21-10-2023 08:29

General

  • Target

    ae176bef894bea7ba45b12036f2c015b360c3d3abb85150ce6e9448154ff13f4.exe

  • Size

    500KB

  • MD5

    874e3a6e8fe2a608df7582000f03539b

  • SHA1

    f4ee78934e8ede611046dc3a1c553d3b76dab7f8

  • SHA256

    ae176bef894bea7ba45b12036f2c015b360c3d3abb85150ce6e9448154ff13f4

  • SHA512

    26a80313929bcd4286ba9c9a5a4b3d645e3389630bf7657123f27d4f2c6de05efaae5d27bb0bfb45451850bed49700fa77454a10bee3f7eacbcc20b2b82f1c33

  • SSDEEP

    3072:d5OsiQ79xzUcbK9LK/fzuaCrutJUy6yQ9ie6kgR2voGXQ9jf4o7Qr7y1P+g:L7hoBO/fzxb26kR8fPkny12

Malware Config

Signatures

  • Generic Chinese Botnet

    A botnet originating from China which is currently unnamed publicly.

  • Chinese Botnet payload 1 IoCs
  • Enumerates connected drives 3 TTPs 22 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ae176bef894bea7ba45b12036f2c015b360c3d3abb85150ce6e9448154ff13f4.exe
    "C:\Users\Admin\AppData\Local\Temp\ae176bef894bea7ba45b12036f2c015b360c3d3abb85150ce6e9448154ff13f4.exe"
    1⤵
    • Enumerates connected drives
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of SetWindowsHookEx
    PID:2316

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2316-0-0x0000000010000000-0x0000000010018000-memory.dmp

    Filesize

    96KB