Analysis
-
max time kernel
202s -
max time network
242s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
22-10-2023 02:32
Static task
static1
Behavioral task
behavioral1
Sample
c64df79676a42e5ef7d5e3c7747c8e76705689078f60f667cc8ad96826123753.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
c64df79676a42e5ef7d5e3c7747c8e76705689078f60f667cc8ad96826123753.exe
Resource
win10v2004-20231020-en
General
-
Target
c64df79676a42e5ef7d5e3c7747c8e76705689078f60f667cc8ad96826123753.exe
-
Size
352KB
-
MD5
f0cfa59143200438388da257440d379a
-
SHA1
c3e0802f6800c74471751454065003ba3dd84430
-
SHA256
c64df79676a42e5ef7d5e3c7747c8e76705689078f60f667cc8ad96826123753
-
SHA512
61c2e41399097edcc18d6c25aba72d9f45b0bbcfd6b84d71fe61ecba6da02443c74ab329594b24bce8b16de44aae9af3523b4d562d78dfafa207ae20b6e7145a
-
SSDEEP
3072:fAAdrtd9KDnHCc5cnFbAgpWli74j/zmbgYDa3S6jb+7sDAZ7E:VCCn4/y8YDa3Sq+7GAZ
Malware Config
Signatures
-
Generic Chinese Botnet
A botnet originating from China which is currently unnamed publicly.
-
Chinese Botnet payload 1 IoCs
resource yara_rule behavioral1/memory/2752-0-0x0000000010000000-0x0000000010018000-memory.dmp unk_chinese_botnet -
Executes dropped EXE 2 IoCs
pid Process 2088 Kcuqyok.exe 2972 Kcuqyok.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat Kcuqyok.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat Kcuqyok.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Kcuqyok.exe c64df79676a42e5ef7d5e3c7747c8e76705689078f60f667cc8ad96826123753.exe File opened for modification C:\Program Files (x86)\Kcuqyok.exe c64df79676a42e5ef7d5e3c7747c8e76705689078f60f667cc8ad96826123753.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 49 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\fa-a1-28-59-1c-d7\WpadDecisionReason = "1" Kcuqyok.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad Kcuqyok.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{5FE21073-2C68-41D9-86D3-D7567167DDE8} Kcuqyok.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{5FE21073-2C68-41D9-86D3-D7567167DDE8}\WpadDecision = "0" Kcuqyok.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings Kcuqyok.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\fa-a1-28-59-1c-d7 Kcuqyok.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{5FE21073-2C68-41D9-86D3-D7567167DDE8}\WpadDecisionReason = "1" Kcuqyok.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad Kcuqyok.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{5FE21073-2C68-41D9-86D3-D7567167DDE8}\WpadDecisionTime = 200c937f9004da01 Kcuqyok.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\fa-a1-28-59-1c-d7\WpadDecision = "0" Kcuqyok.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings Kcuqyok.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{5FE21073-2C68-41D9-86D3-D7567167DDE8}\fa-a1-28-59-1c-d7 Kcuqyok.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{5FE21073-2C68-41D9-86D3-D7567167DDE8}\WpadDecision = "0" Kcuqyok.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix Kcuqyok.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{5FE21073-2C68-41D9-86D3-D7567167DDE8}\fa-a1-28-59-1c-d7 Kcuqyok.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\fa-a1-28-59-1c-d7\WpadDecisionTime = 200c937f9004da01 Kcuqyok.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" Kcuqyok.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0048000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Kcuqyok.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" Kcuqyok.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" Kcuqyok.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\fa-a1-28-59-1c-d7\WpadDecisionTime = 200c937f9004da01 Kcuqyok.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings Kcuqyok.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix Kcuqyok.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" Kcuqyok.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\fa-a1-28-59-1c-d7\WpadDecisionReason = "1" Kcuqyok.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000004000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0048000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Kcuqyok.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" Kcuqyok.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ Kcuqyok.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" Kcuqyok.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{5FE21073-2C68-41D9-86D3-D7567167DDE8}\WpadDecisionTime = 6060d48b9004da01 Kcuqyok.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{5FE21073-2C68-41D9-86D3-D7567167DDE8} Kcuqyok.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0048000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Kcuqyok.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{5FE21073-2C68-41D9-86D3-D7567167DDE8}\WpadNetworkName = "Network 2" Kcuqyok.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" Kcuqyok.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" Kcuqyok.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" Kcuqyok.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" Kcuqyok.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\fa-a1-28-59-1c-d7\WpadDecision = "0" Kcuqyok.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings Kcuqyok.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections Kcuqyok.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections Kcuqyok.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ Kcuqyok.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Kcuqyok.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{5FE21073-2C68-41D9-86D3-D7567167DDE8}\WpadDecisionReason = "1" Kcuqyok.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\fa-a1-28-59-1c-d7 Kcuqyok.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Kcuqyok.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{5FE21073-2C68-41D9-86D3-D7567167DDE8}\WpadNetworkName = "Network 2" Kcuqyok.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\fa-a1-28-59-1c-d7\WpadDetectedUrl Kcuqyok.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\fa-a1-28-59-1c-d7\WpadDecisionTime = 6060d48b9004da01 Kcuqyok.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2752 c64df79676a42e5ef7d5e3c7747c8e76705689078f60f667cc8ad96826123753.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2088 wrote to memory of 2972 2088 Kcuqyok.exe 32 PID 2088 wrote to memory of 2972 2088 Kcuqyok.exe 32 PID 2088 wrote to memory of 2972 2088 Kcuqyok.exe 32 PID 2088 wrote to memory of 2972 2088 Kcuqyok.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\c64df79676a42e5ef7d5e3c7747c8e76705689078f60f667cc8ad96826123753.exe"C:\Users\Admin\AppData\Local\Temp\c64df79676a42e5ef7d5e3c7747c8e76705689078f60f667cc8ad96826123753.exe"1⤵
- Drops file in Program Files directory
- Suspicious behavior: RenamesItself
PID:2752
-
C:\Program Files (x86)\Kcuqyok.exe"C:\Program Files (x86)\Kcuqyok.exe"1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Program Files (x86)\Kcuqyok.exe"C:\Program Files (x86)\Kcuqyok.exe" Win72⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:2972
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
352KB
MD5f0cfa59143200438388da257440d379a
SHA1c3e0802f6800c74471751454065003ba3dd84430
SHA256c64df79676a42e5ef7d5e3c7747c8e76705689078f60f667cc8ad96826123753
SHA51261c2e41399097edcc18d6c25aba72d9f45b0bbcfd6b84d71fe61ecba6da02443c74ab329594b24bce8b16de44aae9af3523b4d562d78dfafa207ae20b6e7145a
-
Filesize
352KB
MD5f0cfa59143200438388da257440d379a
SHA1c3e0802f6800c74471751454065003ba3dd84430
SHA256c64df79676a42e5ef7d5e3c7747c8e76705689078f60f667cc8ad96826123753
SHA51261c2e41399097edcc18d6c25aba72d9f45b0bbcfd6b84d71fe61ecba6da02443c74ab329594b24bce8b16de44aae9af3523b4d562d78dfafa207ae20b6e7145a
-
Filesize
352KB
MD5f0cfa59143200438388da257440d379a
SHA1c3e0802f6800c74471751454065003ba3dd84430
SHA256c64df79676a42e5ef7d5e3c7747c8e76705689078f60f667cc8ad96826123753
SHA51261c2e41399097edcc18d6c25aba72d9f45b0bbcfd6b84d71fe61ecba6da02443c74ab329594b24bce8b16de44aae9af3523b4d562d78dfafa207ae20b6e7145a