Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231130-en -
resource tags
arch:x64arch:x86image:win10v2004-20231130-enlocale:en-usos:windows10-2004-x64system -
submitted
07-12-2023 20:00
Static task
static1
Behavioral task
behavioral1
Sample
8688fbe0d85a42a96cc8a337e882ab267fe450e847351b6866e08ecd1bfe3110.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
8688fbe0d85a42a96cc8a337e882ab267fe450e847351b6866e08ecd1bfe3110.exe
Resource
win10v2004-20231130-en
General
-
Target
8688fbe0d85a42a96cc8a337e882ab267fe450e847351b6866e08ecd1bfe3110.exe
-
Size
4.1MB
-
MD5
c862a8af9c31b5be4a50b17282630eaf
-
SHA1
d8653926e68fa30b3a7bfa382dc337f557d5c709
-
SHA256
8688fbe0d85a42a96cc8a337e882ab267fe450e847351b6866e08ecd1bfe3110
-
SHA512
70b4afb66f53c34ef364cbb2d109c33a993706a12603b3536e004081b6d4d0361f81a96e0a151e7f9fc970004e4c3c407f7e7475e4fc74a86fb2d71672debd9a
-
SSDEEP
49152:9QWqHcFt4tQGgKbDLKykKy5RyeEJzrlrx:9QWWcFt4t5gKbDLKykKy5QVJzJrx
Malware Config
Signatures
-
Generic Chinese Botnet
A botnet originating from China which is currently unnamed publicly.
-
Chinese Botnet payload 2 IoCs
resource yara_rule behavioral2/memory/4136-4-0x0000000010000000-0x0000000010018000-memory.dmp unk_chinese_botnet behavioral2/memory/3856-16-0x0000000010000000-0x0000000010018000-memory.dmp unk_chinese_botnet -
Executes dropped EXE 3 IoCs
pid Process 4136 svchost.exe 3232 js.exe 3856 svichost.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ÎÒµÄÆô¶¯Ïî = "C:\\Windows\\System32\\svichost.exe" js.exe Set value (str) \REGISTRY\USER\S-1-5-21-423100829-2271632622-1028104103-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Qgymwes.exe = "C:\\Windows\\svchost.exe" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-423100829-2271632622-1028104103-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Gouarlv.exe = "C:\\Windows\\SysWOW64\\svichost.exe" svichost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\svichost.exe js.exe File opened for modification C:\Windows\SysWOW64\svichost.exe js.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\svchost.exe 8688fbe0d85a42a96cc8a337e882ab267fe450e847351b6866e08ecd1bfe3110.exe File created C:\Windows\js.exe 8688fbe0d85a42a96cc8a337e882ab267fe450e847351b6866e08ecd1bfe3110.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3232 js.exe 3232 js.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2148 8688fbe0d85a42a96cc8a337e882ab267fe450e847351b6866e08ecd1bfe3110.exe 2148 8688fbe0d85a42a96cc8a337e882ab267fe450e847351b6866e08ecd1bfe3110.exe 4136 svchost.exe 3232 js.exe 3232 js.exe 3856 svichost.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2148 wrote to memory of 4136 2148 8688fbe0d85a42a96cc8a337e882ab267fe450e847351b6866e08ecd1bfe3110.exe 88 PID 2148 wrote to memory of 4136 2148 8688fbe0d85a42a96cc8a337e882ab267fe450e847351b6866e08ecd1bfe3110.exe 88 PID 2148 wrote to memory of 4136 2148 8688fbe0d85a42a96cc8a337e882ab267fe450e847351b6866e08ecd1bfe3110.exe 88 PID 2148 wrote to memory of 3232 2148 8688fbe0d85a42a96cc8a337e882ab267fe450e847351b6866e08ecd1bfe3110.exe 90 PID 2148 wrote to memory of 3232 2148 8688fbe0d85a42a96cc8a337e882ab267fe450e847351b6866e08ecd1bfe3110.exe 90 PID 2148 wrote to memory of 3232 2148 8688fbe0d85a42a96cc8a337e882ab267fe450e847351b6866e08ecd1bfe3110.exe 90 PID 3232 wrote to memory of 3856 3232 js.exe 91 PID 3232 wrote to memory of 3856 3232 js.exe 91 PID 3232 wrote to memory of 3856 3232 js.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\8688fbe0d85a42a96cc8a337e882ab267fe450e847351b6866e08ecd1bfe3110.exe"C:\Users\Admin\AppData\Local\Temp\8688fbe0d85a42a96cc8a337e882ab267fe450e847351b6866e08ecd1bfe3110.exe"1⤵
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Windows\svchost.exeC:\Windows\\svchost.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:4136
-
-
C:\Windows\js.exeC:\Windows\\js.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3232 -
C:\Windows\SysWOW64\svichost.exeC:\Windows\System32\svichost.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:3856
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD55e0bd14c0976831e38f6674892ed9ac6
SHA12d345b6ce9fb5c3f70353530f392c70b5776e95a
SHA25635f667c4f1cdd84b6eeb17d17047d0943a6fe72ea61a37295ef41d1b3fdd6302
SHA5124a36d2c59d911517b27d0ac60db6c6a9c3e1e2a26c49aee3a7cc4985658bc881135fbb1ec7f2667147c7b9db015a9dfb7a7e57838180027dfe9e8f197c0cf437
-
Filesize
1.0MB
MD55e0bd14c0976831e38f6674892ed9ac6
SHA12d345b6ce9fb5c3f70353530f392c70b5776e95a
SHA25635f667c4f1cdd84b6eeb17d17047d0943a6fe72ea61a37295ef41d1b3fdd6302
SHA5124a36d2c59d911517b27d0ac60db6c6a9c3e1e2a26c49aee3a7cc4985658bc881135fbb1ec7f2667147c7b9db015a9dfb7a7e57838180027dfe9e8f197c0cf437
-
Filesize
1.0MB
MD55e0bd14c0976831e38f6674892ed9ac6
SHA12d345b6ce9fb5c3f70353530f392c70b5776e95a
SHA25635f667c4f1cdd84b6eeb17d17047d0943a6fe72ea61a37295ef41d1b3fdd6302
SHA5124a36d2c59d911517b27d0ac60db6c6a9c3e1e2a26c49aee3a7cc4985658bc881135fbb1ec7f2667147c7b9db015a9dfb7a7e57838180027dfe9e8f197c0cf437
-
Filesize
1.8MB
MD5448a820e0d6b1125b7917fd16e87d905
SHA1413c6f4a342772812ef2d27b550669b2ec0aefff
SHA2560240fd72362dd0be296618dc46dd8c1ce2f3f5cd4132556454cf88f6e3393e36
SHA512c73a4c53e723d971dc9beb0aa1816d68a86e61cb4b6925ad8d6fdc29b370a02b9b1b81a99590f29cdc2c02cdbd78ae4ccbca7d09db2c7b7d0cddb2f0946f937e
-
Filesize
1.8MB
MD5448a820e0d6b1125b7917fd16e87d905
SHA1413c6f4a342772812ef2d27b550669b2ec0aefff
SHA2560240fd72362dd0be296618dc46dd8c1ce2f3f5cd4132556454cf88f6e3393e36
SHA512c73a4c53e723d971dc9beb0aa1816d68a86e61cb4b6925ad8d6fdc29b370a02b9b1b81a99590f29cdc2c02cdbd78ae4ccbca7d09db2c7b7d0cddb2f0946f937e
-
Filesize
1.0MB
MD598664a6bca78eab5cddd244e6762bae6
SHA181013aa881b4e45a76739a088d81ba4def2eed8d
SHA2560acb639b41b26eea6d94fa0334b056bb8c6037c84ae15b3678356cf6697ef116
SHA5128773e3da356b4dd6c464b8d4c38a43f425e89e1ba2968c92a9b9ac6650441d895419b16061b99c66fa89643760d6d4e898498fd4e69116c915f8831e1193bae8
-
Filesize
1.0MB
MD598664a6bca78eab5cddd244e6762bae6
SHA181013aa881b4e45a76739a088d81ba4def2eed8d
SHA2560acb639b41b26eea6d94fa0334b056bb8c6037c84ae15b3678356cf6697ef116
SHA5128773e3da356b4dd6c464b8d4c38a43f425e89e1ba2968c92a9b9ac6650441d895419b16061b99c66fa89643760d6d4e898498fd4e69116c915f8831e1193bae8