Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
18-01-2024 18:42
Static task
static1
Behavioral task
behavioral1
Sample
65c186715b992037707e2677b3443b47.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
65c186715b992037707e2677b3443b47.exe
Resource
win10v2004-20231215-en
General
-
Target
65c186715b992037707e2677b3443b47.exe
-
Size
628KB
-
MD5
65c186715b992037707e2677b3443b47
-
SHA1
7bf1c15b8b3b62ae9ee1031dc5787c25501a357b
-
SHA256
8beb704111bc39a1d34cc1544ceff030e91ee79826f2a5b68807bcd24f81f930
-
SHA512
d9da1608462c5f45c0088f8e430a072ca75d32591c3ab5439e72340cc272b8f49f50ce8ae1dd2851d73da4f0a4b1f1020fa9d3bd5a0bae3f8dbd21c9fc06717e
-
SSDEEP
12288:ahK81TkbpqOPoay5nxsVsSC5TDc98CufFB1CY3ea3SdSGAwSg:T81r5nOsHVDc0N3iSzwP
Malware Config
Signatures
-
Generic Chinese Botnet
A botnet originating from China which is currently unnamed publicly.
-
Chinese Botnet payload 1 IoCs
resource yara_rule behavioral1/memory/2524-0-0x0000000010000000-0x0000000010018000-memory.dmp unk_chinese_botnet -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\ = "C:\\Windows\\Terms.exe" 65c186715b992037707e2677b3443b47.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Terms.exe 65c186715b992037707e2677b3443b47.exe File opened for modification C:\Windows\Terms.exe 65c186715b992037707e2677b3443b47.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2524 65c186715b992037707e2677b3443b47.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2524 wrote to memory of 2176 2524 65c186715b992037707e2677b3443b47.exe 16 PID 2524 wrote to memory of 2176 2524 65c186715b992037707e2677b3443b47.exe 16 PID 2524 wrote to memory of 2176 2524 65c186715b992037707e2677b3443b47.exe 16 PID 2524 wrote to memory of 2176 2524 65c186715b992037707e2677b3443b47.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\65c186715b992037707e2677b3443b47.exe"C:\Users\Admin\AppData\Local\Temp\65c186715b992037707e2677b3443b47.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c md C:\windowssafe2⤵PID:2176
-