Analysis
-
max time kernel
121s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
28-10-2023 07:39
Static task
static1
Behavioral task
behavioral1
Sample
ba62dc3817b6fcd225d86a9eb2edeb10deb5ceb0e0e57c8dbfdd62b350e3009b.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
ba62dc3817b6fcd225d86a9eb2edeb10deb5ceb0e0e57c8dbfdd62b350e3009b.exe
Resource
win10v2004-20231023-en
General
-
Target
ba62dc3817b6fcd225d86a9eb2edeb10deb5ceb0e0e57c8dbfdd62b350e3009b.exe
-
Size
356KB
-
MD5
a58db08c03bff00d61fe930e4db11be1
-
SHA1
e77a4e507e26021c774d9fb9e72b9607a741e5e0
-
SHA256
ba62dc3817b6fcd225d86a9eb2edeb10deb5ceb0e0e57c8dbfdd62b350e3009b
-
SHA512
80b1c5442cfd4d4cb82479b66257673a613145453c022c77e3ee4598e996ec06d79dc00bcc3255f096a7846b8cd03cd283b0db1909725b5bbaea6f7366208cc5
-
SSDEEP
3072:jAAdrtd9KDnHCc5cnFbAgpWli74j/zmbgYDa3S1jb+7sDAZ7Eik:hCCn4/y8YDa3Sh+7GAZS
Malware Config
Signatures
-
Generic Chinese Botnet
A botnet originating from China which is currently unnamed publicly.
-
Chinese Botnet payload 1 IoCs
resource yara_rule behavioral1/memory/3060-0-0x0000000010000000-0x0000000010018000-memory.dmp unk_chinese_botnet -
Executes dropped EXE 2 IoCs
pid Process 2744 Koqqgge.exe 2616 Koqqgge.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\B: ba62dc3817b6fcd225d86a9eb2edeb10deb5ceb0e0e57c8dbfdd62b350e3009b.exe File opened (read-only) \??\E: ba62dc3817b6fcd225d86a9eb2edeb10deb5ceb0e0e57c8dbfdd62b350e3009b.exe File opened (read-only) \??\O: ba62dc3817b6fcd225d86a9eb2edeb10deb5ceb0e0e57c8dbfdd62b350e3009b.exe File opened (read-only) \??\Q: ba62dc3817b6fcd225d86a9eb2edeb10deb5ceb0e0e57c8dbfdd62b350e3009b.exe File opened (read-only) \??\X: ba62dc3817b6fcd225d86a9eb2edeb10deb5ceb0e0e57c8dbfdd62b350e3009b.exe File opened (read-only) \??\G: ba62dc3817b6fcd225d86a9eb2edeb10deb5ceb0e0e57c8dbfdd62b350e3009b.exe File opened (read-only) \??\I: ba62dc3817b6fcd225d86a9eb2edeb10deb5ceb0e0e57c8dbfdd62b350e3009b.exe File opened (read-only) \??\S: ba62dc3817b6fcd225d86a9eb2edeb10deb5ceb0e0e57c8dbfdd62b350e3009b.exe File opened (read-only) \??\Y: ba62dc3817b6fcd225d86a9eb2edeb10deb5ceb0e0e57c8dbfdd62b350e3009b.exe File opened (read-only) \??\J: ba62dc3817b6fcd225d86a9eb2edeb10deb5ceb0e0e57c8dbfdd62b350e3009b.exe File opened (read-only) \??\L: ba62dc3817b6fcd225d86a9eb2edeb10deb5ceb0e0e57c8dbfdd62b350e3009b.exe File opened (read-only) \??\N: ba62dc3817b6fcd225d86a9eb2edeb10deb5ceb0e0e57c8dbfdd62b350e3009b.exe File opened (read-only) \??\U: ba62dc3817b6fcd225d86a9eb2edeb10deb5ceb0e0e57c8dbfdd62b350e3009b.exe File opened (read-only) \??\V: ba62dc3817b6fcd225d86a9eb2edeb10deb5ceb0e0e57c8dbfdd62b350e3009b.exe File opened (read-only) \??\W: ba62dc3817b6fcd225d86a9eb2edeb10deb5ceb0e0e57c8dbfdd62b350e3009b.exe File opened (read-only) \??\Z: ba62dc3817b6fcd225d86a9eb2edeb10deb5ceb0e0e57c8dbfdd62b350e3009b.exe File opened (read-only) \??\H: ba62dc3817b6fcd225d86a9eb2edeb10deb5ceb0e0e57c8dbfdd62b350e3009b.exe File opened (read-only) \??\K: ba62dc3817b6fcd225d86a9eb2edeb10deb5ceb0e0e57c8dbfdd62b350e3009b.exe File opened (read-only) \??\M: ba62dc3817b6fcd225d86a9eb2edeb10deb5ceb0e0e57c8dbfdd62b350e3009b.exe File opened (read-only) \??\P: ba62dc3817b6fcd225d86a9eb2edeb10deb5ceb0e0e57c8dbfdd62b350e3009b.exe File opened (read-only) \??\R: ba62dc3817b6fcd225d86a9eb2edeb10deb5ceb0e0e57c8dbfdd62b350e3009b.exe File opened (read-only) \??\T: ba62dc3817b6fcd225d86a9eb2edeb10deb5ceb0e0e57c8dbfdd62b350e3009b.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat Koqqgge.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat Koqqgge.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Koqqgge.exe ba62dc3817b6fcd225d86a9eb2edeb10deb5ceb0e0e57c8dbfdd62b350e3009b.exe File opened for modification C:\Program Files (x86)\Koqqgge.exe ba62dc3817b6fcd225d86a9eb2edeb10deb5ceb0e0e57c8dbfdd62b350e3009b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 ba62dc3817b6fcd225d86a9eb2edeb10deb5ceb0e0e57c8dbfdd62b350e3009b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz ba62dc3817b6fcd225d86a9eb2edeb10deb5ceb0e0e57c8dbfdd62b350e3009b.exe -
Modifies data under HKEY_USERS 49 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" Koqqgge.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{70610224-D2DF-45A3-ADF5-26FB06587B67} Koqqgge.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{70610224-D2DF-45A3-ADF5-26FB06587B67}\WpadDecisionReason = "1" Koqqgge.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Koqqgge.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix Koqqgge.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\1e-fd-b5-75-fa-57\WpadDecisionTime = 70e119017209da01 Koqqgge.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" Koqqgge.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" Koqqgge.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings Koqqgge.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{70610224-D2DF-45A3-ADF5-26FB06587B67}\WpadNetworkName = "Network 2" Koqqgge.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings Koqqgge.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" Koqqgge.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\1e-fd-b5-75-fa-57 Koqqgge.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections Koqqgge.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" Koqqgge.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{70610224-D2DF-45A3-ADF5-26FB06587B67}\WpadDecisionTime = 70e119017209da01 Koqqgge.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\1e-fd-b5-75-fa-57\WpadDecision = "0" Koqqgge.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix Koqqgge.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\1e-fd-b5-75-fa-57\WpadDecisionTime = 50e2aaf87109da01 Koqqgge.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{70610224-D2DF-45A3-ADF5-26FB06587B67}\1e-fd-b5-75-fa-57 Koqqgge.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{70610224-D2DF-45A3-ADF5-26FB06587B67} Koqqgge.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\1e-fd-b5-75-fa-57\WpadDecisionReason = "1" Koqqgge.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{70610224-D2DF-45A3-ADF5-26FB06587B67}\WpadDecision = "0" Koqqgge.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\1e-fd-b5-75-fa-57\WpadDecision = "0" Koqqgge.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections Koqqgge.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" Koqqgge.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\1e-fd-b5-75-fa-57 Koqqgge.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{70610224-D2DF-45A3-ADF5-26FB06587B67}\1e-fd-b5-75-fa-57 Koqqgge.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" Koqqgge.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" Koqqgge.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{70610224-D2DF-45A3-ADF5-26FB06587B67}\WpadDecisionTime = 50e2aaf87109da01 Koqqgge.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\1e-fd-b5-75-fa-57\WpadDecisionReason = "1" Koqqgge.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad Koqqgge.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{70610224-D2DF-45A3-ADF5-26FB06587B67}\WpadDecisionReason = "1" Koqqgge.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings Koqqgge.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" Koqqgge.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f006d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Koqqgge.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000004000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f006d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Koqqgge.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad Koqqgge.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{70610224-D2DF-45A3-ADF5-26FB06587B67}\WpadNetworkName = "Network 2" Koqqgge.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ Koqqgge.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings Koqqgge.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f006d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Koqqgge.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" Koqqgge.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\1e-fd-b5-75-fa-57\WpadDetectedUrl Koqqgge.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ Koqqgge.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Koqqgge.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{70610224-D2DF-45A3-ADF5-26FB06587B67}\WpadDecision = "0" Koqqgge.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\1e-fd-b5-75-fa-57\WpadDecisionTime = 50e2aaf87109da01 Koqqgge.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3060 ba62dc3817b6fcd225d86a9eb2edeb10deb5ceb0e0e57c8dbfdd62b350e3009b.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2744 wrote to memory of 2616 2744 Koqqgge.exe 30 PID 2744 wrote to memory of 2616 2744 Koqqgge.exe 30 PID 2744 wrote to memory of 2616 2744 Koqqgge.exe 30 PID 2744 wrote to memory of 2616 2744 Koqqgge.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\ba62dc3817b6fcd225d86a9eb2edeb10deb5ceb0e0e57c8dbfdd62b350e3009b.exe"C:\Users\Admin\AppData\Local\Temp\ba62dc3817b6fcd225d86a9eb2edeb10deb5ceb0e0e57c8dbfdd62b350e3009b.exe"1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:3060
-
C:\Program Files (x86)\Koqqgge.exe"C:\Program Files (x86)\Koqqgge.exe"1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Program Files (x86)\Koqqgge.exe"C:\Program Files (x86)\Koqqgge.exe" Win72⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:2616
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
356KB
MD5a58db08c03bff00d61fe930e4db11be1
SHA1e77a4e507e26021c774d9fb9e72b9607a741e5e0
SHA256ba62dc3817b6fcd225d86a9eb2edeb10deb5ceb0e0e57c8dbfdd62b350e3009b
SHA51280b1c5442cfd4d4cb82479b66257673a613145453c022c77e3ee4598e996ec06d79dc00bcc3255f096a7846b8cd03cd283b0db1909725b5bbaea6f7366208cc5
-
Filesize
356KB
MD5a58db08c03bff00d61fe930e4db11be1
SHA1e77a4e507e26021c774d9fb9e72b9607a741e5e0
SHA256ba62dc3817b6fcd225d86a9eb2edeb10deb5ceb0e0e57c8dbfdd62b350e3009b
SHA51280b1c5442cfd4d4cb82479b66257673a613145453c022c77e3ee4598e996ec06d79dc00bcc3255f096a7846b8cd03cd283b0db1909725b5bbaea6f7366208cc5
-
Filesize
356KB
MD5a58db08c03bff00d61fe930e4db11be1
SHA1e77a4e507e26021c774d9fb9e72b9607a741e5e0
SHA256ba62dc3817b6fcd225d86a9eb2edeb10deb5ceb0e0e57c8dbfdd62b350e3009b
SHA51280b1c5442cfd4d4cb82479b66257673a613145453c022c77e3ee4598e996ec06d79dc00bcc3255f096a7846b8cd03cd283b0db1909725b5bbaea6f7366208cc5