Analysis
-
max time kernel
149s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
18-01-2024 18:42
Static task
static1
Behavioral task
behavioral1
Sample
65c186715b992037707e2677b3443b47.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
65c186715b992037707e2677b3443b47.exe
Resource
win10v2004-20231215-en
General
-
Target
65c186715b992037707e2677b3443b47.exe
-
Size
628KB
-
MD5
65c186715b992037707e2677b3443b47
-
SHA1
7bf1c15b8b3b62ae9ee1031dc5787c25501a357b
-
SHA256
8beb704111bc39a1d34cc1544ceff030e91ee79826f2a5b68807bcd24f81f930
-
SHA512
d9da1608462c5f45c0088f8e430a072ca75d32591c3ab5439e72340cc272b8f49f50ce8ae1dd2851d73da4f0a4b1f1020fa9d3bd5a0bae3f8dbd21c9fc06717e
-
SSDEEP
12288:ahK81TkbpqOPoay5nxsVsSC5TDc98CufFB1CY3ea3SdSGAwSg:T81r5nOsHVDc0N3iSzwP
Malware Config
Signatures
-
Generic Chinese Botnet
A botnet originating from China which is currently unnamed publicly.
-
Chinese Botnet payload 1 IoCs
resource yara_rule behavioral2/memory/2152-0-0x0000000010000000-0x0000000010018000-memory.dmp unk_chinese_botnet -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Terms.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\65c186715b992037707e2677b3443b47.exe" 65c186715b992037707e2677b3443b47.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2152 wrote to memory of 4784 2152 65c186715b992037707e2677b3443b47.exe 87 PID 2152 wrote to memory of 4784 2152 65c186715b992037707e2677b3443b47.exe 87 PID 2152 wrote to memory of 4784 2152 65c186715b992037707e2677b3443b47.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\65c186715b992037707e2677b3443b47.exe"C:\Users\Admin\AppData\Local\Temp\65c186715b992037707e2677b3443b47.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c md C:\windowssafe2⤵PID:4784
-