Analysis
-
max time kernel
138s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
22-10-2023 04:34
Static task
static1
Behavioral task
behavioral1
Sample
279f49c3bcbdf7f9b765769db6791851177e061afb5648a759f7f5ba2760cc9f.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
279f49c3bcbdf7f9b765769db6791851177e061afb5648a759f7f5ba2760cc9f.exe
Resource
win10v2004-20231020-en
General
-
Target
279f49c3bcbdf7f9b765769db6791851177e061afb5648a759f7f5ba2760cc9f.exe
-
Size
352KB
-
MD5
2d8089b6a2fd4c2d64fca4b53d19e578
-
SHA1
507b05e6a11c30c16878eaeaab79d762840d26d3
-
SHA256
279f49c3bcbdf7f9b765769db6791851177e061afb5648a759f7f5ba2760cc9f
-
SHA512
9925852ab80aa6f2816582babc6a2979389ea9797b5f832f9ca2aa9ab310b7dc3a1d0387b2f61973ed8768283a5eebc0efb5422d2a96365afc4d9d3360cb23f1
-
SSDEEP
1536:fiRtp/YdUQt/Rp13IOkQNXVfhNrqjlPQbd7MnHDpsOf2AD9fKO9AZCM7E:fAAdrt/RP3DX9hNujlPQb6nrfKOE7E
Malware Config
Signatures
-
Generic Chinese Botnet
A botnet originating from China which is currently unnamed publicly.
-
Chinese Botnet payload 1 IoCs
resource yara_rule behavioral1/memory/2184-0-0x0000000010000000-0x0000000010018000-memory.dmp unk_chinese_botnet -
Executes dropped EXE 2 IoCs
pid Process 848 Symaqqk.exe 2684 Symaqqk.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat Symaqqk.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat Symaqqk.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Symaqqk.exe 279f49c3bcbdf7f9b765769db6791851177e061afb5648a759f7f5ba2760cc9f.exe File opened for modification C:\Program Files (x86)\Symaqqk.exe 279f49c3bcbdf7f9b765769db6791851177e061afb5648a759f7f5ba2760cc9f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 49 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{B5387528-F83D-40C1-A817-72811D101B82}\WpadDecisionReason = "1" Symaqqk.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings Symaqqk.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{B5387528-F83D-40C1-A817-72811D101B82}\WpadNetworkName = "Network 3" Symaqqk.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings Symaqqk.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000004000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f001c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Symaqqk.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{B5387528-F83D-40C1-A817-72811D101B82}\WpadDecisionReason = "1" Symaqqk.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ Symaqqk.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\1e-3e-ba-3e-4b-96\WpadDecisionReason = "1" Symaqqk.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\1e-3e-ba-3e-4b-96\WpadDecisionTime = b0fd9922a104da01 Symaqqk.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{B5387528-F83D-40C1-A817-72811D101B82} Symaqqk.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\1e-3e-ba-3e-4b-96\WpadDecisionTime = 70078513a104da01 Symaqqk.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{B5387528-F83D-40C1-A817-72811D101B82} Symaqqk.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{B5387528-F83D-40C1-A817-72811D101B82}\WpadNetworkName = "Network 3" Symaqqk.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{B5387528-F83D-40C1-A817-72811D101B82}\WpadDecision = "0" Symaqqk.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" Symaqqk.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{B5387528-F83D-40C1-A817-72811D101B82}\WpadDecisionTime = b0fd9922a104da01 Symaqqk.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{B5387528-F83D-40C1-A817-72811D101B82}\WpadDecisionTime = 70078513a104da01 Symaqqk.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\1e-3e-ba-3e-4b-96\WpadDecision = "0" Symaqqk.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings Symaqqk.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" Symaqqk.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections Symaqqk.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" Symaqqk.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix Symaqqk.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Symaqqk.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ Symaqqk.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix Symaqqk.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" Symaqqk.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\1e-3e-ba-3e-4b-96 Symaqqk.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" Symaqqk.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{B5387528-F83D-40C1-A817-72811D101B82}\WpadDecision = "0" Symaqqk.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" Symaqqk.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad Symaqqk.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" Symaqqk.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\1e-3e-ba-3e-4b-96\WpadDetectedUrl Symaqqk.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" Symaqqk.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\1e-3e-ba-3e-4b-96\WpadDecisionReason = "1" Symaqqk.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f001c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Symaqqk.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{B5387528-F83D-40C1-A817-72811D101B82}\1e-3e-ba-3e-4b-96 Symaqqk.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections Symaqqk.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" Symaqqk.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" Symaqqk.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad Symaqqk.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Symaqqk.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\1e-3e-ba-3e-4b-96 Symaqqk.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\1e-3e-ba-3e-4b-96\WpadDecisionTime = 70078513a104da01 Symaqqk.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\1e-3e-ba-3e-4b-96\WpadDecision = "0" Symaqqk.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f001c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Symaqqk.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{B5387528-F83D-40C1-A817-72811D101B82}\1e-3e-ba-3e-4b-96 Symaqqk.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings Symaqqk.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2184 279f49c3bcbdf7f9b765769db6791851177e061afb5648a759f7f5ba2760cc9f.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 848 wrote to memory of 2684 848 Symaqqk.exe 30 PID 848 wrote to memory of 2684 848 Symaqqk.exe 30 PID 848 wrote to memory of 2684 848 Symaqqk.exe 30 PID 848 wrote to memory of 2684 848 Symaqqk.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\279f49c3bcbdf7f9b765769db6791851177e061afb5648a759f7f5ba2760cc9f.exe"C:\Users\Admin\AppData\Local\Temp\279f49c3bcbdf7f9b765769db6791851177e061afb5648a759f7f5ba2760cc9f.exe"1⤵
- Drops file in Program Files directory
- Suspicious behavior: RenamesItself
PID:2184
-
C:\Program Files (x86)\Symaqqk.exe"C:\Program Files (x86)\Symaqqk.exe"1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Program Files (x86)\Symaqqk.exe"C:\Program Files (x86)\Symaqqk.exe" Win72⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:2684
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
352KB
MD52d8089b6a2fd4c2d64fca4b53d19e578
SHA1507b05e6a11c30c16878eaeaab79d762840d26d3
SHA256279f49c3bcbdf7f9b765769db6791851177e061afb5648a759f7f5ba2760cc9f
SHA5129925852ab80aa6f2816582babc6a2979389ea9797b5f832f9ca2aa9ab310b7dc3a1d0387b2f61973ed8768283a5eebc0efb5422d2a96365afc4d9d3360cb23f1
-
Filesize
352KB
MD52d8089b6a2fd4c2d64fca4b53d19e578
SHA1507b05e6a11c30c16878eaeaab79d762840d26d3
SHA256279f49c3bcbdf7f9b765769db6791851177e061afb5648a759f7f5ba2760cc9f
SHA5129925852ab80aa6f2816582babc6a2979389ea9797b5f832f9ca2aa9ab310b7dc3a1d0387b2f61973ed8768283a5eebc0efb5422d2a96365afc4d9d3360cb23f1
-
Filesize
352KB
MD52d8089b6a2fd4c2d64fca4b53d19e578
SHA1507b05e6a11c30c16878eaeaab79d762840d26d3
SHA256279f49c3bcbdf7f9b765769db6791851177e061afb5648a759f7f5ba2760cc9f
SHA5129925852ab80aa6f2816582babc6a2979389ea9797b5f832f9ca2aa9ab310b7dc3a1d0387b2f61973ed8768283a5eebc0efb5422d2a96365afc4d9d3360cb23f1