Analysis
-
max time kernel
159s -
max time network
168s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
01-01-2024 09:14
Static task
static1
Behavioral task
behavioral1
Sample
3c78823f56fd1b12869aadfcf5a928a2.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3c78823f56fd1b12869aadfcf5a928a2.exe
Resource
win10v2004-20231215-en
General
-
Target
3c78823f56fd1b12869aadfcf5a928a2.exe
-
Size
1.5MB
-
MD5
3c78823f56fd1b12869aadfcf5a928a2
-
SHA1
3d70fc2b9c79243fe556993330b93ad678b09a85
-
SHA256
df6169b4abba5443c5a3fe2e1476408183038347f0490cad0cc39bdd71e065de
-
SHA512
eb32288187bc257c277d1f8c843f84408c539ce250098e1bdbc9c028fc7537df1007fda681b52590fc18859878ba482c40480c3d3a9e98ec2a2041d860bb4e58
-
SSDEEP
49152:lLHoFN6WtljaEy9CnA5To4PpvHC3iFdLSj2:lLHoFN6WtljaEy95nvysdLq2
Malware Config
Signatures
-
Generic Chinese Botnet
A botnet originating from China which is currently unnamed publicly.
-
Chinese Botnet payload 16 IoCs
resource yara_rule behavioral2/memory/3504-20-0x0000000000400000-0x000000000067F000-memory.dmp unk_chinese_botnet behavioral2/memory/3504-21-0x0000000010000000-0x0000000010018000-memory.dmp unk_chinese_botnet behavioral2/memory/3504-24-0x0000000000400000-0x000000000067F000-memory.dmp unk_chinese_botnet behavioral2/memory/3504-25-0x0000000000400000-0x000000000067F000-memory.dmp unk_chinese_botnet behavioral2/memory/3504-26-0x0000000000400000-0x000000000067F000-memory.dmp unk_chinese_botnet behavioral2/memory/3504-27-0x0000000000400000-0x000000000067F000-memory.dmp unk_chinese_botnet behavioral2/memory/3504-28-0x0000000000400000-0x000000000067F000-memory.dmp unk_chinese_botnet behavioral2/memory/3504-29-0x0000000000400000-0x000000000067F000-memory.dmp unk_chinese_botnet behavioral2/memory/3504-30-0x0000000000400000-0x000000000067F000-memory.dmp unk_chinese_botnet behavioral2/memory/3504-31-0x0000000000400000-0x000000000067F000-memory.dmp unk_chinese_botnet behavioral2/memory/3504-32-0x0000000000400000-0x000000000067F000-memory.dmp unk_chinese_botnet behavioral2/memory/3504-33-0x0000000000400000-0x000000000067F000-memory.dmp unk_chinese_botnet behavioral2/memory/3504-34-0x0000000000400000-0x000000000067F000-memory.dmp unk_chinese_botnet behavioral2/memory/3504-35-0x0000000000400000-0x000000000067F000-memory.dmp unk_chinese_botnet behavioral2/memory/3504-36-0x0000000000400000-0x000000000067F000-memory.dmp unk_chinese_botnet behavioral2/memory/3504-37-0x0000000000400000-0x000000000067F000-memory.dmp unk_chinese_botnet -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3c78823f56fd1b12869aadfcf5a928a2.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Software\Wine 3c78823f56fd1b12869aadfcf5a928a2.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 3504 3c78823f56fd1b12869aadfcf5a928a2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3504 3c78823f56fd1b12869aadfcf5a928a2.exe 3504 3c78823f56fd1b12869aadfcf5a928a2.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3504 3c78823f56fd1b12869aadfcf5a928a2.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3c78823f56fd1b12869aadfcf5a928a2.exe"C:\Users\Admin\AppData\Local\Temp\3c78823f56fd1b12869aadfcf5a928a2.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3504