Analysis
-
max time kernel
120s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
15-11-2023 10:56
Static task
static1
Behavioral task
behavioral1
Sample
b4d51b0354e7508d723396fa6affd92b5108fa3cd27ecd4c86001a5ffb999cb8.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
b4d51b0354e7508d723396fa6affd92b5108fa3cd27ecd4c86001a5ffb999cb8.exe
Resource
win10v2004-20231023-en
General
-
Target
b4d51b0354e7508d723396fa6affd92b5108fa3cd27ecd4c86001a5ffb999cb8.exe
-
Size
1.8MB
-
MD5
108fde1527d48fabd718d3b25d58ce40
-
SHA1
fdd49fafb3fc40b700204f60d754143468762f4d
-
SHA256
b4d51b0354e7508d723396fa6affd92b5108fa3cd27ecd4c86001a5ffb999cb8
-
SHA512
140a12f14e3733a4a2989dccf645033e628684bcd4c56e63c7d2d22ed2893ce71e986e6c1ef04fde121125dbed128d48245d121980ac0bceb2fe7fdc809e6e04
-
SSDEEP
12288:uvTIiUxmYh90jjAblb1yHy8ZV0Lug6BtPtzFS30pS6zxgIsxITrLpyPYCSXh1M2p:ubIiCm898jGyS8RY3VSdsxIPL1/xUU
Malware Config
Signatures
-
Generic Chinese Botnet
A botnet originating from China which is currently unnamed publicly.
-
Chinese Botnet payload 1 IoCs
resource yara_rule behavioral1/memory/2928-8-0x0000000010000000-0x0000000010018000-memory.dmp unk_chinese_botnet -
Executes dropped EXE 3 IoCs
pid Process 2928 Server.exe 2664 Rotzeac.exe 2596 Rotzeac.exe -
Loads dropped DLL 2 IoCs
pid Process 2888 b4d51b0354e7508d723396fa6affd92b5108fa3cd27ecd4c86001a5ffb999cb8.exe 2888 b4d51b0354e7508d723396fa6affd92b5108fa3cd27ecd4c86001a5ffb999cb8.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\P: Server.exe File opened (read-only) \??\S: Server.exe File opened (read-only) \??\H: Server.exe File opened (read-only) \??\E: Server.exe File opened (read-only) \??\G: Server.exe File opened (read-only) \??\K: Server.exe File opened (read-only) \??\L: Server.exe File opened (read-only) \??\N: Server.exe File opened (read-only) \??\Q: Server.exe File opened (read-only) \??\V: Server.exe File opened (read-only) \??\B: Server.exe File opened (read-only) \??\Y: Server.exe File opened (read-only) \??\O: Server.exe File opened (read-only) \??\U: Server.exe File opened (read-only) \??\J: Server.exe File opened (read-only) \??\M: Server.exe File opened (read-only) \??\R: Server.exe File opened (read-only) \??\T: Server.exe File opened (read-only) \??\W: Server.exe File opened (read-only) \??\X: Server.exe File opened (read-only) \??\Z: Server.exe File opened (read-only) \??\I: Server.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\Server.exe b4d51b0354e7508d723396fa6affd92b5108fa3cd27ecd4c86001a5ffb999cb8.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat Rotzeac.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat Rotzeac.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Yeqcqk\Rotzeac.exe Server.exe File created C:\Program Files (x86)\Microsoft Yeqcqk\Rotzeac.exe Server.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Server.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Server.exe -
Modifies data under HKEY_USERS 49 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings Rotzeac.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" Rotzeac.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f008a000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Rotzeac.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" Rotzeac.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3A7328BC-0A2E-424E-8E79-265383B4B5B7}\WpadDecisionTime = 80a8c381b217da01 Rotzeac.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ae-e3-38-6b-b3-07\WpadDecisionTime = 80a8c381b217da01 Rotzeac.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3A7328BC-0A2E-424E-8E79-265383B4B5B7}\WpadDecision = "0" Rotzeac.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" Rotzeac.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix Rotzeac.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000004000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f008a000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Rotzeac.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3A7328BC-0A2E-424E-8E79-265383B4B5B7}\WpadNetworkName = "Network 3" Rotzeac.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3A7328BC-0A2E-424E-8E79-265383B4B5B7}\WpadDecisionReason = "1" Rotzeac.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3A7328BC-0A2E-424E-8E79-265383B4B5B7}\ae-e3-38-6b-b3-07 Rotzeac.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ae-e3-38-6b-b3-07\WpadDecision = "0" Rotzeac.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" Rotzeac.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ae-e3-38-6b-b3-07 Rotzeac.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ Rotzeac.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad Rotzeac.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" Rotzeac.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ae-e3-38-6b-b3-07\WpadDecisionReason = "1" Rotzeac.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f008a000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Rotzeac.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings Rotzeac.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Rotzeac.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix Rotzeac.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ae-e3-38-6b-b3-07\WpadDecisionTime = 2066c57cb217da01 Rotzeac.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ae-e3-38-6b-b3-07\WpadDetectedUrl Rotzeac.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Rotzeac.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" Rotzeac.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" Rotzeac.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3A7328BC-0A2E-424E-8E79-265383B4B5B7}\ae-e3-38-6b-b3-07 Rotzeac.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ae-e3-38-6b-b3-07\WpadDecision = "0" Rotzeac.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3A7328BC-0A2E-424E-8E79-265383B4B5B7}\WpadDecisionReason = "1" Rotzeac.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections Rotzeac.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3A7328BC-0A2E-424E-8E79-265383B4B5B7}\WpadNetworkName = "Network 3" Rotzeac.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ae-e3-38-6b-b3-07\WpadDecisionTime = 2066c57cb217da01 Rotzeac.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3A7328BC-0A2E-424E-8E79-265383B4B5B7} Rotzeac.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ae-e3-38-6b-b3-07\WpadDecisionReason = "1" Rotzeac.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3A7328BC-0A2E-424E-8E79-265383B4B5B7}\WpadDecision = "0" Rotzeac.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" Rotzeac.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3A7328BC-0A2E-424E-8E79-265383B4B5B7} Rotzeac.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ae-e3-38-6b-b3-07 Rotzeac.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings Rotzeac.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" Rotzeac.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ Rotzeac.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" Rotzeac.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3A7328BC-0A2E-424E-8E79-265383B4B5B7}\WpadDecisionTime = 2066c57cb217da01 Rotzeac.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections Rotzeac.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad Rotzeac.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings Rotzeac.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2928 Server.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2888 b4d51b0354e7508d723396fa6affd92b5108fa3cd27ecd4c86001a5ffb999cb8.exe 2888 b4d51b0354e7508d723396fa6affd92b5108fa3cd27ecd4c86001a5ffb999cb8.exe 2928 Server.exe 2664 Rotzeac.exe 2596 Rotzeac.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2888 wrote to memory of 2928 2888 b4d51b0354e7508d723396fa6affd92b5108fa3cd27ecd4c86001a5ffb999cb8.exe 28 PID 2888 wrote to memory of 2928 2888 b4d51b0354e7508d723396fa6affd92b5108fa3cd27ecd4c86001a5ffb999cb8.exe 28 PID 2888 wrote to memory of 2928 2888 b4d51b0354e7508d723396fa6affd92b5108fa3cd27ecd4c86001a5ffb999cb8.exe 28 PID 2888 wrote to memory of 2928 2888 b4d51b0354e7508d723396fa6affd92b5108fa3cd27ecd4c86001a5ffb999cb8.exe 28 PID 2664 wrote to memory of 2596 2664 Rotzeac.exe 31 PID 2664 wrote to memory of 2596 2664 Rotzeac.exe 31 PID 2664 wrote to memory of 2596 2664 Rotzeac.exe 31 PID 2664 wrote to memory of 2596 2664 Rotzeac.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\b4d51b0354e7508d723396fa6affd92b5108fa3cd27ecd4c86001a5ffb999cb8.exe"C:\Users\Admin\AppData\Local\Temp\b4d51b0354e7508d723396fa6affd92b5108fa3cd27ecd4c86001a5ffb999cb8.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Windows\SysWOW64\Server.exeC:\Windows\system32\\Server.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2928
-
-
C:\Program Files (x86)\Microsoft Yeqcqk\Rotzeac.exe"C:\Program Files (x86)\Microsoft Yeqcqk\Rotzeac.exe"1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Program Files (x86)\Microsoft Yeqcqk\Rotzeac.exe"C:\Program Files (x86)\Microsoft Yeqcqk\Rotzeac.exe" Win72⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:2596
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD5b1b90cec4501087e97426d83c01bbd1f
SHA1444dae63f2a182366fb40060bd91f174dd33424b
SHA2566d42ce925574750c88aff2d8e3b4cb0d500ef23d520706f82ed913eba9c466fe
SHA512806f1956cb05db1ab8f2d35223c961919cc5d7ce4d63aef1dad1f9d51927b3a7e6022b1df52c6f8bcbf595d3df0134ce6101f3b557c716934ad0f91dafcece81
-
Filesize
1.0MB
MD5b1b90cec4501087e97426d83c01bbd1f
SHA1444dae63f2a182366fb40060bd91f174dd33424b
SHA2566d42ce925574750c88aff2d8e3b4cb0d500ef23d520706f82ed913eba9c466fe
SHA512806f1956cb05db1ab8f2d35223c961919cc5d7ce4d63aef1dad1f9d51927b3a7e6022b1df52c6f8bcbf595d3df0134ce6101f3b557c716934ad0f91dafcece81
-
Filesize
1.0MB
MD5b1b90cec4501087e97426d83c01bbd1f
SHA1444dae63f2a182366fb40060bd91f174dd33424b
SHA2566d42ce925574750c88aff2d8e3b4cb0d500ef23d520706f82ed913eba9c466fe
SHA512806f1956cb05db1ab8f2d35223c961919cc5d7ce4d63aef1dad1f9d51927b3a7e6022b1df52c6f8bcbf595d3df0134ce6101f3b557c716934ad0f91dafcece81
-
Filesize
1.0MB
MD5b1b90cec4501087e97426d83c01bbd1f
SHA1444dae63f2a182366fb40060bd91f174dd33424b
SHA2566d42ce925574750c88aff2d8e3b4cb0d500ef23d520706f82ed913eba9c466fe
SHA512806f1956cb05db1ab8f2d35223c961919cc5d7ce4d63aef1dad1f9d51927b3a7e6022b1df52c6f8bcbf595d3df0134ce6101f3b557c716934ad0f91dafcece81
-
Filesize
1.0MB
MD5b1b90cec4501087e97426d83c01bbd1f
SHA1444dae63f2a182366fb40060bd91f174dd33424b
SHA2566d42ce925574750c88aff2d8e3b4cb0d500ef23d520706f82ed913eba9c466fe
SHA512806f1956cb05db1ab8f2d35223c961919cc5d7ce4d63aef1dad1f9d51927b3a7e6022b1df52c6f8bcbf595d3df0134ce6101f3b557c716934ad0f91dafcece81
-
Filesize
1.0MB
MD5b1b90cec4501087e97426d83c01bbd1f
SHA1444dae63f2a182366fb40060bd91f174dd33424b
SHA2566d42ce925574750c88aff2d8e3b4cb0d500ef23d520706f82ed913eba9c466fe
SHA512806f1956cb05db1ab8f2d35223c961919cc5d7ce4d63aef1dad1f9d51927b3a7e6022b1df52c6f8bcbf595d3df0134ce6101f3b557c716934ad0f91dafcece81
-
Filesize
1.0MB
MD5b1b90cec4501087e97426d83c01bbd1f
SHA1444dae63f2a182366fb40060bd91f174dd33424b
SHA2566d42ce925574750c88aff2d8e3b4cb0d500ef23d520706f82ed913eba9c466fe
SHA512806f1956cb05db1ab8f2d35223c961919cc5d7ce4d63aef1dad1f9d51927b3a7e6022b1df52c6f8bcbf595d3df0134ce6101f3b557c716934ad0f91dafcece81
-
Filesize
1.0MB
MD5b1b90cec4501087e97426d83c01bbd1f
SHA1444dae63f2a182366fb40060bd91f174dd33424b
SHA2566d42ce925574750c88aff2d8e3b4cb0d500ef23d520706f82ed913eba9c466fe
SHA512806f1956cb05db1ab8f2d35223c961919cc5d7ce4d63aef1dad1f9d51927b3a7e6022b1df52c6f8bcbf595d3df0134ce6101f3b557c716934ad0f91dafcece81