Analysis
-
max time kernel
143s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
06-01-2024 10:06
Static task
static1
Behavioral task
behavioral1
Sample
3c78823f56fd1b12869aadfcf5a928a2.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
3c78823f56fd1b12869aadfcf5a928a2.exe
Resource
win10v2004-20231215-en
General
-
Target
3c78823f56fd1b12869aadfcf5a928a2.exe
-
Size
1.5MB
-
MD5
3c78823f56fd1b12869aadfcf5a928a2
-
SHA1
3d70fc2b9c79243fe556993330b93ad678b09a85
-
SHA256
df6169b4abba5443c5a3fe2e1476408183038347f0490cad0cc39bdd71e065de
-
SHA512
eb32288187bc257c277d1f8c843f84408c539ce250098e1bdbc9c028fc7537df1007fda681b52590fc18859878ba482c40480c3d3a9e98ec2a2041d860bb4e58
-
SSDEEP
49152:lLHoFN6WtljaEy9CnA5To4PpvHC3iFdLSj2:lLHoFN6WtljaEy95nvysdLq2
Malware Config
Signatures
-
Generic Chinese Botnet
A botnet originating from China which is currently unnamed publicly.
-
Chinese Botnet payload 16 IoCs
resource yara_rule behavioral2/memory/1948-19-0x0000000010000000-0x0000000010018000-memory.dmp unk_chinese_botnet behavioral2/memory/1948-22-0x0000000000400000-0x000000000067F000-memory.dmp unk_chinese_botnet behavioral2/memory/1948-23-0x0000000000400000-0x000000000067F000-memory.dmp unk_chinese_botnet behavioral2/memory/1948-24-0x0000000000400000-0x000000000067F000-memory.dmp unk_chinese_botnet behavioral2/memory/1948-25-0x0000000000400000-0x000000000067F000-memory.dmp unk_chinese_botnet behavioral2/memory/1948-26-0x0000000000400000-0x000000000067F000-memory.dmp unk_chinese_botnet behavioral2/memory/1948-27-0x0000000000400000-0x000000000067F000-memory.dmp unk_chinese_botnet behavioral2/memory/1948-28-0x0000000000400000-0x000000000067F000-memory.dmp unk_chinese_botnet behavioral2/memory/1948-29-0x0000000000400000-0x000000000067F000-memory.dmp unk_chinese_botnet behavioral2/memory/1948-30-0x0000000000400000-0x000000000067F000-memory.dmp unk_chinese_botnet behavioral2/memory/1948-31-0x0000000000400000-0x000000000067F000-memory.dmp unk_chinese_botnet behavioral2/memory/1948-32-0x0000000000400000-0x000000000067F000-memory.dmp unk_chinese_botnet behavioral2/memory/1948-33-0x0000000000400000-0x000000000067F000-memory.dmp unk_chinese_botnet behavioral2/memory/1948-34-0x0000000000400000-0x000000000067F000-memory.dmp unk_chinese_botnet behavioral2/memory/1948-35-0x0000000000400000-0x000000000067F000-memory.dmp unk_chinese_botnet behavioral2/memory/1948-36-0x0000000000400000-0x000000000067F000-memory.dmp unk_chinese_botnet -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3c78823f56fd1b12869aadfcf5a928a2.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Software\Wine 3c78823f56fd1b12869aadfcf5a928a2.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1948 3c78823f56fd1b12869aadfcf5a928a2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1948 3c78823f56fd1b12869aadfcf5a928a2.exe 1948 3c78823f56fd1b12869aadfcf5a928a2.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1948 3c78823f56fd1b12869aadfcf5a928a2.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3c78823f56fd1b12869aadfcf5a928a2.exe"C:\Users\Admin\AppData\Local\Temp\3c78823f56fd1b12869aadfcf5a928a2.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1948