Analysis
-
max time kernel
129s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
03-01-2024 13:59
Static task
static1
Behavioral task
behavioral1
Sample
a9fb5137754333ef0be6bf6aa0255fdc7fe5386efc7ae7ca2e04bf4cbbddf047.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
a9fb5137754333ef0be6bf6aa0255fdc7fe5386efc7ae7ca2e04bf4cbbddf047.exe
Resource
win10v2004-20231215-en
General
-
Target
a9fb5137754333ef0be6bf6aa0255fdc7fe5386efc7ae7ca2e04bf4cbbddf047.exe
-
Size
3.3MB
-
MD5
1773b10d2a197c6ee4dad9a37cc8be3f
-
SHA1
7ea4eb251459f083a57842780fee1c88065150ec
-
SHA256
a9fb5137754333ef0be6bf6aa0255fdc7fe5386efc7ae7ca2e04bf4cbbddf047
-
SHA512
a248a453c17a80b5aadc7718a4db6be23bbf14b3de2c405d8a672eae8efc1e6495392e73e7e69273b08391efce206535b01f9d17876aa855880d638e222d939e
-
SSDEEP
49152:t/nk7xd03zDWi26fs2cWDAbcl7jkv4+9Ry4kjCz:t/k7i0uDhEv4n4M
Malware Config
Signatures
-
Generic Chinese Botnet
A botnet originating from China which is currently unnamed publicly.
-
Chinese Botnet payload 1 IoCs
resource yara_rule behavioral1/memory/2652-0-0x0000000010000000-0x000000001001F000-memory.dmp unk_chinese_botnet -
Executes dropped EXE 2 IoCs
pid Process 3004 Nnvnnrv.exe 3068 Nnvnnrv.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Nnvnnrv.exe a9fb5137754333ef0be6bf6aa0255fdc7fe5386efc7ae7ca2e04bf4cbbddf047.exe File opened for modification C:\Program Files (x86)\Nnvnnrv.exe a9fb5137754333ef0be6bf6aa0255fdc7fe5386efc7ae7ca2e04bf4cbbddf047.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2652 a9fb5137754333ef0be6bf6aa0255fdc7fe5386efc7ae7ca2e04bf4cbbddf047.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2652 a9fb5137754333ef0be6bf6aa0255fdc7fe5386efc7ae7ca2e04bf4cbbddf047.exe 3004 Nnvnnrv.exe 3068 Nnvnnrv.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3004 wrote to memory of 3068 3004 Nnvnnrv.exe 29 PID 3004 wrote to memory of 3068 3004 Nnvnnrv.exe 29 PID 3004 wrote to memory of 3068 3004 Nnvnnrv.exe 29 PID 3004 wrote to memory of 3068 3004 Nnvnnrv.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\a9fb5137754333ef0be6bf6aa0255fdc7fe5386efc7ae7ca2e04bf4cbbddf047.exe"C:\Users\Admin\AppData\Local\Temp\a9fb5137754333ef0be6bf6aa0255fdc7fe5386efc7ae7ca2e04bf4cbbddf047.exe"1⤵
- Drops file in Program Files directory
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
PID:2652
-
C:\Program Files (x86)\Nnvnnrv.exe"C:\Program Files (x86)\Nnvnnrv.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Program Files (x86)\Nnvnnrv.exe"C:\Program Files (x86)\Nnvnnrv.exe" Win72⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3068
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD5fe88ee6e188fb2979a56c4365a8b9d11
SHA1d0f61fa44b412e164a2ce48c399671c411f58075
SHA2567fd2ea59ae23e57fa3899d65932fd21a5fc62cdf2bb9427912340c109a5222fb
SHA5129752aa0540ee58c6224eb7d2c8099cf2951d97649b44ba2eecc5094c67265f82bf7fe0f9268aeba50b26c389e4e2a6de401e2a8aa598a6b15ba58fe68a3efe18
-
Filesize
2.0MB
MD5fb10ee11c90efb44d0a73249ba20fb25
SHA16815db3457313c3a16086590f81f8a0f548f31f2
SHA256fa952f8b309f605f698f918b2ff03281131531772ef84d689bdae2e0d0caf33f
SHA5121ee841ef6c8ef507c6ea4cfa2d53201d2154a4692b40e8b05015a65bdf6daafef86794e7178c2d9b55480aa028f9f9317be3d3716c4e827368d1c7606cc05ede
-
Filesize
1.9MB
MD55203a455a8103e1001dc970b7afdc588
SHA1a8f5276df969c05541059b922e7d3b34d4493824
SHA25613dd0daef1055fee5abe0bb63932bbd4e6384990dfcbe9f3bd8da7e6df0a7566
SHA512476766cadf5de1966f6af373f3c0b31c31091b828e53b52cec1b5060e84f61033898e9b61fe9124a7a8a30384e9ce85f8d6ed390ff422d60b4ae56450f1a2cba