Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231130-en -
resource tags
arch:x64arch:x86image:win7-20231130-enlocale:en-usos:windows7-x64system -
submitted
11-12-2023 10:56
Static task
static1
Behavioral task
behavioral1
Sample
4b7282953ad7e563143d8cc8c3dd1473216553d4ce5d7a4f8910af46db1298be.exe
Resource
win7-20231130-en
Behavioral task
behavioral2
Sample
4b7282953ad7e563143d8cc8c3dd1473216553d4ce5d7a4f8910af46db1298be.exe
Resource
win10v2004-20231127-en
General
-
Target
4b7282953ad7e563143d8cc8c3dd1473216553d4ce5d7a4f8910af46db1298be.exe
-
Size
3.4MB
-
MD5
bdc7134d3e51b4aa6c90d02ab73e1e33
-
SHA1
780e8d4c1fd6da9db9355af1245aa0bb0443ea5f
-
SHA256
4b7282953ad7e563143d8cc8c3dd1473216553d4ce5d7a4f8910af46db1298be
-
SHA512
6665d22a8014e85dff430eaba65890e65ec3c240c21dca153a109049ca6633efb845fd95182b212420645271e6d0b28065145333d0dbc18e3aafabbf9e55bc4b
-
SSDEEP
49152:x/s8xxi03zDWi26fs2cWDAbcl7j1v4+9Ry4kjC8X9:x/s8xT0uDhVv4n4M1
Malware Config
Signatures
-
Generic Chinese Botnet
A botnet originating from China which is currently unnamed publicly.
-
Chinese Botnet payload 1 IoCs
resource yara_rule behavioral1/memory/2004-0-0x0000000010000000-0x000000001001F000-memory.dmp unk_chinese_botnet -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2185821622-4133679102-1697169727-1000\Software\Microsoft\Windows\CurrentVersion\Run\ = "C:\\Windows\\Wuqmocs.exe" 4b7282953ad7e563143d8cc8c3dd1473216553d4ce5d7a4f8910af46db1298be.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Wuqmocs.exe 4b7282953ad7e563143d8cc8c3dd1473216553d4ce5d7a4f8910af46db1298be.exe File opened for modification C:\Windows\Wuqmocs.exe 4b7282953ad7e563143d8cc8c3dd1473216553d4ce5d7a4f8910af46db1298be.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2004 4b7282953ad7e563143d8cc8c3dd1473216553d4ce5d7a4f8910af46db1298be.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2004 4b7282953ad7e563143d8cc8c3dd1473216553d4ce5d7a4f8910af46db1298be.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4b7282953ad7e563143d8cc8c3dd1473216553d4ce5d7a4f8910af46db1298be.exe"C:\Users\Admin\AppData\Local\Temp\4b7282953ad7e563143d8cc8c3dd1473216553d4ce5d7a4f8910af46db1298be.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2004