Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
17-12-2023 16:05
Static task
static1
Behavioral task
behavioral1
Sample
d20854dd8c10f5957f51e70c07b8129d05c5c56c9cc3796b815087ef123d9eb3.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
d20854dd8c10f5957f51e70c07b8129d05c5c56c9cc3796b815087ef123d9eb3.exe
Resource
win10v2004-20231215-en
General
-
Target
d20854dd8c10f5957f51e70c07b8129d05c5c56c9cc3796b815087ef123d9eb3.exe
-
Size
3.3MB
-
MD5
19d204376965daa8293b8dad0544e792
-
SHA1
9d57f94c7c59e462bc281b0d0321ea5049a4d4b5
-
SHA256
d20854dd8c10f5957f51e70c07b8129d05c5c56c9cc3796b815087ef123d9eb3
-
SHA512
80783d97681e17f506f4f38495b34e2450144c504232cf2c65c5e3f670f2518357c6e238634ae32290f9bc3eff07edc8445253e49a179f5c869d9572e163f2c7
-
SSDEEP
49152:t/nk7xi03zDWi26fs2cWDAbcl7jkv4+9Ry4kjCz:t/k7T0uDhEv4n4M
Malware Config
Signatures
-
Generic Chinese Botnet
A botnet originating from China which is currently unnamed publicly.
-
Chinese Botnet payload 1 IoCs
resource yara_rule behavioral1/memory/1216-0-0x0000000010000000-0x000000001001F000-memory.dmp unk_chinese_botnet -
Executes dropped EXE 2 IoCs
pid Process 1996 Nnvnnrv.exe 1652 Nnvnnrv.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Nnvnnrv.exe d20854dd8c10f5957f51e70c07b8129d05c5c56c9cc3796b815087ef123d9eb3.exe File opened for modification C:\Program Files (x86)\Nnvnnrv.exe d20854dd8c10f5957f51e70c07b8129d05c5c56c9cc3796b815087ef123d9eb3.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1216 d20854dd8c10f5957f51e70c07b8129d05c5c56c9cc3796b815087ef123d9eb3.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1216 d20854dd8c10f5957f51e70c07b8129d05c5c56c9cc3796b815087ef123d9eb3.exe 1996 Nnvnnrv.exe 1652 Nnvnnrv.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1996 wrote to memory of 1652 1996 Nnvnnrv.exe 29 PID 1996 wrote to memory of 1652 1996 Nnvnnrv.exe 29 PID 1996 wrote to memory of 1652 1996 Nnvnnrv.exe 29 PID 1996 wrote to memory of 1652 1996 Nnvnnrv.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\d20854dd8c10f5957f51e70c07b8129d05c5c56c9cc3796b815087ef123d9eb3.exe"C:\Users\Admin\AppData\Local\Temp\d20854dd8c10f5957f51e70c07b8129d05c5c56c9cc3796b815087ef123d9eb3.exe"1⤵
- Drops file in Program Files directory
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
PID:1216
-
C:\Program Files (x86)\Nnvnnrv.exe"C:\Program Files (x86)\Nnvnnrv.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Program Files (x86)\Nnvnnrv.exe"C:\Program Files (x86)\Nnvnnrv.exe" Win72⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1652
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.3MB
MD519d204376965daa8293b8dad0544e792
SHA19d57f94c7c59e462bc281b0d0321ea5049a4d4b5
SHA256d20854dd8c10f5957f51e70c07b8129d05c5c56c9cc3796b815087ef123d9eb3
SHA51280783d97681e17f506f4f38495b34e2450144c504232cf2c65c5e3f670f2518357c6e238634ae32290f9bc3eff07edc8445253e49a179f5c869d9572e163f2c7