Analysis
-
max time kernel
30s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
11-01-2024 03:46
Static task
static1
Behavioral task
behavioral1
Sample
5272bd8d51e07e1ec3408724f1c626f9.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5272bd8d51e07e1ec3408724f1c626f9.exe
Resource
win10v2004-20231215-en
General
-
Target
5272bd8d51e07e1ec3408724f1c626f9.exe
-
Size
940KB
-
MD5
5272bd8d51e07e1ec3408724f1c626f9
-
SHA1
0fa552a6a2bd8f5416d89f33d98d754799829030
-
SHA256
69d50a52b45f1f7678aae6947709e872ca79f48955a67c5371151ac13e34e2ec
-
SHA512
a2ba1de254fa20e4b0c7936f459207ee0e1dda0b98f3d50f479d7b9b7c19f095a16e5d04e649dd1f41a105553c1984c5a9e7250d5c1671aab43959f53ff8bfe5
-
SSDEEP
12288:6r5veknr6jVJY0a+6C04JkO7b1KuiJXQVSSV:O5t6jHBN90Mb1z6aSS
Malware Config
Signatures
-
Generic Chinese Botnet
A botnet originating from China which is currently unnamed publicly.
-
Chinese Botnet payload 1 IoCs
resource yara_rule behavioral1/memory/2348-0-0x0000000010000000-0x0000000010018000-memory.dmp unk_chinese_botnet -
Executes dropped EXE 2 IoCs
pid Process 2876 Ioiowwu.exe 2792 Ioiowwu.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Ioiowwu.exe 5272bd8d51e07e1ec3408724f1c626f9.exe File opened for modification C:\Program Files (x86)\Ioiowwu.exe 5272bd8d51e07e1ec3408724f1c626f9.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2348 5272bd8d51e07e1ec3408724f1c626f9.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2348 5272bd8d51e07e1ec3408724f1c626f9.exe 2876 Ioiowwu.exe 2792 Ioiowwu.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2876 wrote to memory of 2792 2876 Ioiowwu.exe 29 PID 2876 wrote to memory of 2792 2876 Ioiowwu.exe 29 PID 2876 wrote to memory of 2792 2876 Ioiowwu.exe 29 PID 2876 wrote to memory of 2792 2876 Ioiowwu.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\5272bd8d51e07e1ec3408724f1c626f9.exe"C:\Users\Admin\AppData\Local\Temp\5272bd8d51e07e1ec3408724f1c626f9.exe"1⤵
- Drops file in Program Files directory
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
PID:2348
-
C:\Program Files (x86)\Ioiowwu.exe"C:\Program Files (x86)\Ioiowwu.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Program Files (x86)\Ioiowwu.exe"C:\Program Files (x86)\Ioiowwu.exe" Win72⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2792
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
940KB
MD55272bd8d51e07e1ec3408724f1c626f9
SHA10fa552a6a2bd8f5416d89f33d98d754799829030
SHA25669d50a52b45f1f7678aae6947709e872ca79f48955a67c5371151ac13e34e2ec
SHA512a2ba1de254fa20e4b0c7936f459207ee0e1dda0b98f3d50f479d7b9b7c19f095a16e5d04e649dd1f41a105553c1984c5a9e7250d5c1671aab43959f53ff8bfe5