Analysis

  • max time kernel
    142s
  • max time network
    161s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231025-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231025-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-11-2023 01:08

General

  • Target

    NEAS.108fde1527d48fabd718d3b25d58ce40.exe

  • Size

    1.8MB

  • MD5

    108fde1527d48fabd718d3b25d58ce40

  • SHA1

    fdd49fafb3fc40b700204f60d754143468762f4d

  • SHA256

    b4d51b0354e7508d723396fa6affd92b5108fa3cd27ecd4c86001a5ffb999cb8

  • SHA512

    140a12f14e3733a4a2989dccf645033e628684bcd4c56e63c7d2d22ed2893ce71e986e6c1ef04fde121125dbed128d48245d121980ac0bceb2fe7fdc809e6e04

  • SSDEEP

    12288:uvTIiUxmYh90jjAblb1yHy8ZV0Lug6BtPtzFS30pS6zxgIsxITrLpyPYCSXh1M2p:ubIiCm898jGyS8RY3VSdsxIPL1/xUU

Malware Config

Signatures

  • Generic Chinese Botnet

    A botnet originating from China which is currently unnamed publicly.

  • Chinese Botnet payload 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 22 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.108fde1527d48fabd718d3b25d58ce40.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.108fde1527d48fabd718d3b25d58ce40.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1916
    • C:\Windows\SysWOW64\Server.exe
      C:\Windows\system32\\Server.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Enumerates connected drives
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1156

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\Server.exe

    Filesize

    1.0MB

    MD5

    b1b90cec4501087e97426d83c01bbd1f

    SHA1

    444dae63f2a182366fb40060bd91f174dd33424b

    SHA256

    6d42ce925574750c88aff2d8e3b4cb0d500ef23d520706f82ed913eba9c466fe

    SHA512

    806f1956cb05db1ab8f2d35223c961919cc5d7ce4d63aef1dad1f9d51927b3a7e6022b1df52c6f8bcbf595d3df0134ce6101f3b557c716934ad0f91dafcece81

  • C:\Windows\SysWOW64\Server.exe

    Filesize

    1.0MB

    MD5

    b1b90cec4501087e97426d83c01bbd1f

    SHA1

    444dae63f2a182366fb40060bd91f174dd33424b

    SHA256

    6d42ce925574750c88aff2d8e3b4cb0d500ef23d520706f82ed913eba9c466fe

    SHA512

    806f1956cb05db1ab8f2d35223c961919cc5d7ce4d63aef1dad1f9d51927b3a7e6022b1df52c6f8bcbf595d3df0134ce6101f3b557c716934ad0f91dafcece81

  • memory/1156-4-0x0000000010000000-0x0000000010018000-memory.dmp

    Filesize

    96KB