Analysis

  • max time kernel
    147s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    27-10-2023 11:46

General

  • Target

    bf1b236aecfa2335a1cfcf0f8eb0fac6dffcd3a38af5cab0ad915fd892e3173c.exe

  • Size

    1.1MB

  • MD5

    85d068b9520b8b201825d0323e12efb0

  • SHA1

    7b38e0b0513718631025b2461446a6684270d509

  • SHA256

    bf1b236aecfa2335a1cfcf0f8eb0fac6dffcd3a38af5cab0ad915fd892e3173c

  • SHA512

    185f0ec0c89a0fb848c3dbc7589e3ba7b17da676002f391f36ecb5352a9b25c3a232f719aa0078b689374fd2d28b3393fd1754e174c2adfb20357b59b8b08aee

  • SSDEEP

    12288:3MBAGXnfaIWI8tUsSgmfS4ReK6iM/mt7BmbKZit0gxqIfNOwFx/khlZhT7FIF:8BRaIcUvjfxeK6ib7/ZU00qIf3yhT7FC

Malware Config

Signatures

  • Generic Chinese Botnet

    A botnet originating from China which is currently unnamed publicly.

  • Chinese Botnet payload 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 22 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 25 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bf1b236aecfa2335a1cfcf0f8eb0fac6dffcd3a38af5cab0ad915fd892e3173c.exe
    "C:\Users\Admin\AppData\Local\Temp\bf1b236aecfa2335a1cfcf0f8eb0fac6dffcd3a38af5cab0ad915fd892e3173c.exe"
    1⤵
    • Adds Run key to start application
    • Enumerates connected drives
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    PID:2396

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2396-0-0x0000000000400000-0x000000000051F000-memory.dmp

    Filesize

    1.1MB

  • memory/2396-1-0x00000000759D0000-0x0000000075A17000-memory.dmp

    Filesize

    284KB

  • memory/2396-811-0x0000000002270000-0x0000000002381000-memory.dmp

    Filesize

    1.1MB

  • memory/2396-812-0x0000000002270000-0x0000000002381000-memory.dmp

    Filesize

    1.1MB

  • memory/2396-814-0x0000000002270000-0x0000000002381000-memory.dmp

    Filesize

    1.1MB

  • memory/2396-816-0x0000000002270000-0x0000000002381000-memory.dmp

    Filesize

    1.1MB

  • memory/2396-818-0x0000000002270000-0x0000000002381000-memory.dmp

    Filesize

    1.1MB

  • memory/2396-820-0x0000000002270000-0x0000000002381000-memory.dmp

    Filesize

    1.1MB

  • memory/2396-822-0x0000000002270000-0x0000000002381000-memory.dmp

    Filesize

    1.1MB

  • memory/2396-824-0x0000000002270000-0x0000000002381000-memory.dmp

    Filesize

    1.1MB

  • memory/2396-826-0x0000000002270000-0x0000000002381000-memory.dmp

    Filesize

    1.1MB

  • memory/2396-828-0x0000000002270000-0x0000000002381000-memory.dmp

    Filesize

    1.1MB

  • memory/2396-830-0x0000000002270000-0x0000000002381000-memory.dmp

    Filesize

    1.1MB

  • memory/2396-832-0x0000000002270000-0x0000000002381000-memory.dmp

    Filesize

    1.1MB

  • memory/2396-834-0x0000000002270000-0x0000000002381000-memory.dmp

    Filesize

    1.1MB

  • memory/2396-836-0x0000000002270000-0x0000000002381000-memory.dmp

    Filesize

    1.1MB

  • memory/2396-838-0x0000000002270000-0x0000000002381000-memory.dmp

    Filesize

    1.1MB

  • memory/2396-840-0x0000000002270000-0x0000000002381000-memory.dmp

    Filesize

    1.1MB

  • memory/2396-842-0x0000000002270000-0x0000000002381000-memory.dmp

    Filesize

    1.1MB

  • memory/2396-844-0x0000000002270000-0x0000000002381000-memory.dmp

    Filesize

    1.1MB

  • memory/2396-846-0x0000000002270000-0x0000000002381000-memory.dmp

    Filesize

    1.1MB

  • memory/2396-848-0x0000000002270000-0x0000000002381000-memory.dmp

    Filesize

    1.1MB

  • memory/2396-850-0x0000000002270000-0x0000000002381000-memory.dmp

    Filesize

    1.1MB

  • memory/2396-852-0x0000000002270000-0x0000000002381000-memory.dmp

    Filesize

    1.1MB

  • memory/2396-854-0x0000000002270000-0x0000000002381000-memory.dmp

    Filesize

    1.1MB

  • memory/2396-856-0x0000000002270000-0x0000000002381000-memory.dmp

    Filesize

    1.1MB

  • memory/2396-858-0x0000000002270000-0x0000000002381000-memory.dmp

    Filesize

    1.1MB

  • memory/2396-860-0x0000000002270000-0x0000000002381000-memory.dmp

    Filesize

    1.1MB

  • memory/2396-864-0x0000000002270000-0x0000000002381000-memory.dmp

    Filesize

    1.1MB

  • memory/2396-862-0x0000000002270000-0x0000000002381000-memory.dmp

    Filesize

    1.1MB

  • memory/2396-866-0x0000000002270000-0x0000000002381000-memory.dmp

    Filesize

    1.1MB

  • memory/2396-868-0x0000000002270000-0x0000000002381000-memory.dmp

    Filesize

    1.1MB

  • memory/2396-870-0x0000000002270000-0x0000000002381000-memory.dmp

    Filesize

    1.1MB

  • memory/2396-872-0x0000000002270000-0x0000000002381000-memory.dmp

    Filesize

    1.1MB

  • memory/2396-2547-0x00000000020E0000-0x0000000002261000-memory.dmp

    Filesize

    1.5MB

  • memory/2396-8686-0x0000000002270000-0x0000000002381000-memory.dmp

    Filesize

    1.1MB

  • memory/2396-8694-0x0000000000400000-0x000000000051F000-memory.dmp

    Filesize

    1.1MB