Analysis
-
max time kernel
157s -
max time network
231s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
26-10-2023 22:02
Static task
static1
Behavioral task
behavioral1
Sample
d827e8a5c9eeeb34245d584b15b00cad20a6773b0784f1f1276326e01e44c6d8.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
d827e8a5c9eeeb34245d584b15b00cad20a6773b0784f1f1276326e01e44c6d8.exe
Resource
win10v2004-20231023-en
General
-
Target
d827e8a5c9eeeb34245d584b15b00cad20a6773b0784f1f1276326e01e44c6d8.exe
-
Size
352KB
-
MD5
8af855bc6f135bf75d88a8312f5d1b7b
-
SHA1
09b29a0c771f31132f57d207deaea60b261aa03c
-
SHA256
d827e8a5c9eeeb34245d584b15b00cad20a6773b0784f1f1276326e01e44c6d8
-
SHA512
ec4785b575269018ee15d25d1a1efb9a313b57ae9a19b50c52c8f02afa53334a233cced54137f226487c3d917dd53fad0fdded012dbc124dbb180aefa06cf392
-
SSDEEP
3072:fAAdrtFV2GenT0cTtm2LAQSXVqjzpYfJhJw7E:Vx2GenQ67wk3pyJhJw
Malware Config
Signatures
-
Generic Chinese Botnet
A botnet originating from China which is currently unnamed publicly.
-
Chinese Botnet payload 1 IoCs
resource yara_rule behavioral1/memory/2920-0-0x0000000010000000-0x0000000010018000-memory.dmp unk_chinese_botnet -
Executes dropped EXE 2 IoCs
pid Process 524 Aeyiwqg.exe 2372 Aeyiwqg.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: d827e8a5c9eeeb34245d584b15b00cad20a6773b0784f1f1276326e01e44c6d8.exe File opened (read-only) \??\P: d827e8a5c9eeeb34245d584b15b00cad20a6773b0784f1f1276326e01e44c6d8.exe File opened (read-only) \??\S: d827e8a5c9eeeb34245d584b15b00cad20a6773b0784f1f1276326e01e44c6d8.exe File opened (read-only) \??\H: d827e8a5c9eeeb34245d584b15b00cad20a6773b0784f1f1276326e01e44c6d8.exe File opened (read-only) \??\K: d827e8a5c9eeeb34245d584b15b00cad20a6773b0784f1f1276326e01e44c6d8.exe File opened (read-only) \??\N: d827e8a5c9eeeb34245d584b15b00cad20a6773b0784f1f1276326e01e44c6d8.exe File opened (read-only) \??\R: d827e8a5c9eeeb34245d584b15b00cad20a6773b0784f1f1276326e01e44c6d8.exe File opened (read-only) \??\Z: d827e8a5c9eeeb34245d584b15b00cad20a6773b0784f1f1276326e01e44c6d8.exe File opened (read-only) \??\L: d827e8a5c9eeeb34245d584b15b00cad20a6773b0784f1f1276326e01e44c6d8.exe File opened (read-only) \??\T: d827e8a5c9eeeb34245d584b15b00cad20a6773b0784f1f1276326e01e44c6d8.exe File opened (read-only) \??\U: d827e8a5c9eeeb34245d584b15b00cad20a6773b0784f1f1276326e01e44c6d8.exe File opened (read-only) \??\V: d827e8a5c9eeeb34245d584b15b00cad20a6773b0784f1f1276326e01e44c6d8.exe File opened (read-only) \??\Y: d827e8a5c9eeeb34245d584b15b00cad20a6773b0784f1f1276326e01e44c6d8.exe File opened (read-only) \??\B: d827e8a5c9eeeb34245d584b15b00cad20a6773b0784f1f1276326e01e44c6d8.exe File opened (read-only) \??\G: d827e8a5c9eeeb34245d584b15b00cad20a6773b0784f1f1276326e01e44c6d8.exe File opened (read-only) \??\I: d827e8a5c9eeeb34245d584b15b00cad20a6773b0784f1f1276326e01e44c6d8.exe File opened (read-only) \??\J: d827e8a5c9eeeb34245d584b15b00cad20a6773b0784f1f1276326e01e44c6d8.exe File opened (read-only) \??\M: d827e8a5c9eeeb34245d584b15b00cad20a6773b0784f1f1276326e01e44c6d8.exe File opened (read-only) \??\O: d827e8a5c9eeeb34245d584b15b00cad20a6773b0784f1f1276326e01e44c6d8.exe File opened (read-only) \??\Q: d827e8a5c9eeeb34245d584b15b00cad20a6773b0784f1f1276326e01e44c6d8.exe File opened (read-only) \??\W: d827e8a5c9eeeb34245d584b15b00cad20a6773b0784f1f1276326e01e44c6d8.exe File opened (read-only) \??\X: d827e8a5c9eeeb34245d584b15b00cad20a6773b0784f1f1276326e01e44c6d8.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat Aeyiwqg.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat Aeyiwqg.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Aeyiwqg.exe d827e8a5c9eeeb34245d584b15b00cad20a6773b0784f1f1276326e01e44c6d8.exe File opened for modification C:\Program Files (x86)\Aeyiwqg.exe d827e8a5c9eeeb34245d584b15b00cad20a6773b0784f1f1276326e01e44c6d8.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 d827e8a5c9eeeb34245d584b15b00cad20a6773b0784f1f1276326e01e44c6d8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz d827e8a5c9eeeb34245d584b15b00cad20a6773b0784f1f1276326e01e44c6d8.exe -
Modifies data under HKEY_USERS 49 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\66-38-fa-cb-d2-0b\WpadDecisionReason = "1" Aeyiwqg.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\66-38-fa-cb-d2-0b\WpadDecisionTime = b09959935808da01 Aeyiwqg.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{78082A5F-1CF9-4CB6-9B47-99BD0BD02D98} Aeyiwqg.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{78082A5F-1CF9-4CB6-9B47-99BD0BD02D98}\66-38-fa-cb-d2-0b Aeyiwqg.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\66-38-fa-cb-d2-0b\WpadDecisionTime = b0cf98875808da01 Aeyiwqg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad Aeyiwqg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ Aeyiwqg.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{78082A5F-1CF9-4CB6-9B47-99BD0BD02D98}\66-38-fa-cb-d2-0b Aeyiwqg.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" Aeyiwqg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings Aeyiwqg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad Aeyiwqg.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\66-38-fa-cb-d2-0b Aeyiwqg.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\66-38-fa-cb-d2-0b\WpadDetectedUrl Aeyiwqg.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings Aeyiwqg.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Aeyiwqg.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{78082A5F-1CF9-4CB6-9B47-99BD0BD02D98}\WpadDecision = "0" Aeyiwqg.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\66-38-fa-cb-d2-0b\WpadDecision = "0" Aeyiwqg.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{78082A5F-1CF9-4CB6-9B47-99BD0BD02D98}\WpadDecisionReason = "1" Aeyiwqg.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Aeyiwqg.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix Aeyiwqg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections Aeyiwqg.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" Aeyiwqg.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{78082A5F-1CF9-4CB6-9B47-99BD0BD02D98}\WpadDecisionReason = "1" Aeyiwqg.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" Aeyiwqg.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" Aeyiwqg.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000004000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f009c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Aeyiwqg.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f009c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Aeyiwqg.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\66-38-fa-cb-d2-0b\WpadDecision = "0" Aeyiwqg.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix Aeyiwqg.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings Aeyiwqg.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" Aeyiwqg.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{78082A5F-1CF9-4CB6-9B47-99BD0BD02D98}\WpadNetworkName = "Network 3" Aeyiwqg.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" Aeyiwqg.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" Aeyiwqg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ Aeyiwqg.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\66-38-fa-cb-d2-0b\WpadDecisionReason = "1" Aeyiwqg.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{78082A5F-1CF9-4CB6-9B47-99BD0BD02D98} Aeyiwqg.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{78082A5F-1CF9-4CB6-9B47-99BD0BD02D98}\WpadDecisionTime = b09959935808da01 Aeyiwqg.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{78082A5F-1CF9-4CB6-9B47-99BD0BD02D98}\WpadDecision = "0" Aeyiwqg.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{78082A5F-1CF9-4CB6-9B47-99BD0BD02D98}\WpadDecisionTime = b0cf98875808da01 Aeyiwqg.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" Aeyiwqg.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\66-38-fa-cb-d2-0b\WpadDecisionTime = b0cf98875808da01 Aeyiwqg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections Aeyiwqg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings Aeyiwqg.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f009c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Aeyiwqg.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{78082A5F-1CF9-4CB6-9B47-99BD0BD02D98}\WpadNetworkName = "Network 3" Aeyiwqg.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" Aeyiwqg.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" Aeyiwqg.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\66-38-fa-cb-d2-0b Aeyiwqg.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2920 d827e8a5c9eeeb34245d584b15b00cad20a6773b0784f1f1276326e01e44c6d8.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 524 wrote to memory of 2372 524 Aeyiwqg.exe 32 PID 524 wrote to memory of 2372 524 Aeyiwqg.exe 32 PID 524 wrote to memory of 2372 524 Aeyiwqg.exe 32 PID 524 wrote to memory of 2372 524 Aeyiwqg.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\d827e8a5c9eeeb34245d584b15b00cad20a6773b0784f1f1276326e01e44c6d8.exe"C:\Users\Admin\AppData\Local\Temp\d827e8a5c9eeeb34245d584b15b00cad20a6773b0784f1f1276326e01e44c6d8.exe"1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:2920
-
C:\Program Files (x86)\Aeyiwqg.exe"C:\Program Files (x86)\Aeyiwqg.exe"1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:524 -
C:\Program Files (x86)\Aeyiwqg.exe"C:\Program Files (x86)\Aeyiwqg.exe" Win72⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:2372
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
352KB
MD58af855bc6f135bf75d88a8312f5d1b7b
SHA109b29a0c771f31132f57d207deaea60b261aa03c
SHA256d827e8a5c9eeeb34245d584b15b00cad20a6773b0784f1f1276326e01e44c6d8
SHA512ec4785b575269018ee15d25d1a1efb9a313b57ae9a19b50c52c8f02afa53334a233cced54137f226487c3d917dd53fad0fdded012dbc124dbb180aefa06cf392
-
Filesize
352KB
MD58af855bc6f135bf75d88a8312f5d1b7b
SHA109b29a0c771f31132f57d207deaea60b261aa03c
SHA256d827e8a5c9eeeb34245d584b15b00cad20a6773b0784f1f1276326e01e44c6d8
SHA512ec4785b575269018ee15d25d1a1efb9a313b57ae9a19b50c52c8f02afa53334a233cced54137f226487c3d917dd53fad0fdded012dbc124dbb180aefa06cf392
-
Filesize
352KB
MD58af855bc6f135bf75d88a8312f5d1b7b
SHA109b29a0c771f31132f57d207deaea60b261aa03c
SHA256d827e8a5c9eeeb34245d584b15b00cad20a6773b0784f1f1276326e01e44c6d8
SHA512ec4785b575269018ee15d25d1a1efb9a313b57ae9a19b50c52c8f02afa53334a233cced54137f226487c3d917dd53fad0fdded012dbc124dbb180aefa06cf392