Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231130-en -
resource tags
arch:x64arch:x86image:win10v2004-20231130-enlocale:en-usos:windows10-2004-x64system -
submitted
10-12-2023 16:03
Static task
static1
Behavioral task
behavioral1
Sample
abeb08a6b40d1f97366da3855a75f539f7feacfa50ddb6bdebf3ae9225a86d13.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
abeb08a6b40d1f97366da3855a75f539f7feacfa50ddb6bdebf3ae9225a86d13.exe
Resource
win10v2004-20231130-en
General
-
Target
abeb08a6b40d1f97366da3855a75f539f7feacfa50ddb6bdebf3ae9225a86d13.exe
-
Size
2.1MB
-
MD5
df7bf6a71d700986afbbf0c74783f4bb
-
SHA1
b5273e244b4f5c1a6b5a4ce84b4c98aaec51f730
-
SHA256
abeb08a6b40d1f97366da3855a75f539f7feacfa50ddb6bdebf3ae9225a86d13
-
SHA512
787a8f39f78ced9e867edd639925a5537c23458dae0ce047c2be19379e142cc7678f3fc90c7335bc0423a39fec071914502dc572c5dfccfdb999377936dd5fd2
-
SSDEEP
24576:57DlIWGz4VbS6rSTRq32hnMOa7mdsxI5DqVBGteW:5A4VBSTcGCO8mKy5xQW
Malware Config
Signatures
-
Generic Chinese Botnet
A botnet originating from China which is currently unnamed publicly.
-
Chinese Botnet payload 1 IoCs
resource yara_rule behavioral2/memory/4292-4-0x0000000010000000-0x0000000010018000-memory.dmp unk_chinese_botnet -
Executes dropped EXE 1 IoCs
pid Process 4292 svchost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3936660601-1848837011-2142350499-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Qgymwes.exe = "C:\\Windows\\svchost.exe" svchost.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\svchost.exe abeb08a6b40d1f97366da3855a75f539f7feacfa50ddb6bdebf3ae9225a86d13.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3332 abeb08a6b40d1f97366da3855a75f539f7feacfa50ddb6bdebf3ae9225a86d13.exe 3332 abeb08a6b40d1f97366da3855a75f539f7feacfa50ddb6bdebf3ae9225a86d13.exe 4292 svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3332 wrote to memory of 4292 3332 abeb08a6b40d1f97366da3855a75f539f7feacfa50ddb6bdebf3ae9225a86d13.exe 86 PID 3332 wrote to memory of 4292 3332 abeb08a6b40d1f97366da3855a75f539f7feacfa50ddb6bdebf3ae9225a86d13.exe 86 PID 3332 wrote to memory of 4292 3332 abeb08a6b40d1f97366da3855a75f539f7feacfa50ddb6bdebf3ae9225a86d13.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\abeb08a6b40d1f97366da3855a75f539f7feacfa50ddb6bdebf3ae9225a86d13.exe"C:\Users\Admin\AppData\Local\Temp\abeb08a6b40d1f97366da3855a75f539f7feacfa50ddb6bdebf3ae9225a86d13.exe"1⤵
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3332 -
C:\Windows\svchost.exeC:\Windows\\svchost.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:4292
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
882KB
MD52900d0d522d53a0ce22ce798b2ea7a14
SHA1f8bc7df2e8e0f5ec809f851bd9bb58c6c84dfe87
SHA256bf4914155652c038eb53074b3e1bd2ed307c09775dfefbe3dbf7726e337e2f1f
SHA512223b50c534b50d1fa8c5acc0154d994b67b3b72bb8190bff9f3279d468629617d547d56f7815110aa29cbc19a4f2c724d8583d6731db8957798bbcb885aec8b3
-
Filesize
830KB
MD5ee389b8325c7e60a9a75b0191e9a5df2
SHA1f47f96c79a91a71446c9afbaa0014c130d896991
SHA256b98bf9fb8f4400aceefc8426fdb2453e3146eb829645593b69feddbad4c5563f
SHA5126fa9aae044867445e78fc32cad786cae9110e9c6ad87370ac7de4975d1e10715c05882ce18953b36e654cb4816af1519f1f0976c56a727df67203c52d75bfc59