Analysis
-
max time kernel
121s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
19-01-2024 07:34
Static task
static1
Behavioral task
behavioral1
Sample
c18d1615f31033b778fa906ee49fbdf4e5ce74ca5229a7f1d8844a52ae6a0b8a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
c18d1615f31033b778fa906ee49fbdf4e5ce74ca5229a7f1d8844a52ae6a0b8a.exe
Resource
win10v2004-20231215-en
General
-
Target
c18d1615f31033b778fa906ee49fbdf4e5ce74ca5229a7f1d8844a52ae6a0b8a.exe
-
Size
540KB
-
MD5
21a3275904b3c7d160f42263fb32a80b
-
SHA1
419e01c3d6d6b90ca81d7a627a5719e32901e8f9
-
SHA256
c18d1615f31033b778fa906ee49fbdf4e5ce74ca5229a7f1d8844a52ae6a0b8a
-
SHA512
952cbb2a2a04ef6732fae271c75649cd664f12ccd0c7d1eda3bd45bc12080f8fe2aa56b6836901d8bcecd99a70df23b08aeaef8a26b0b116bda9436074a75be5
-
SSDEEP
3072:A5OsiQ79xzUcbK9LK/fzuaCrutJUDpRfmm5yqiXO+Zoy/6ESh0Jz5OdRSu:G7hoBO/fzxUpFmkgXO+T/6EJJNaS
Malware Config
Signatures
-
Generic Chinese Botnet
A botnet originating from China which is currently unnamed publicly.
-
Chinese Botnet payload 1 IoCs
resource yara_rule behavioral1/memory/2672-0-0x0000000010000000-0x0000000010018000-memory.dmp unk_chinese_botnet -
Executes dropped EXE 2 IoCs
pid Process 2332 Cmnurtw.exe 2804 Cmnurtw.exe -
Loads dropped DLL 7 IoCs
pid Process 2332 Cmnurtw.exe 2332 Cmnurtw.exe 2332 Cmnurtw.exe 2332 Cmnurtw.exe 2804 Cmnurtw.exe 2804 Cmnurtw.exe 2804 Cmnurtw.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Y: c18d1615f31033b778fa906ee49fbdf4e5ce74ca5229a7f1d8844a52ae6a0b8a.exe File opened (read-only) \??\B: c18d1615f31033b778fa906ee49fbdf4e5ce74ca5229a7f1d8844a52ae6a0b8a.exe File opened (read-only) \??\H: c18d1615f31033b778fa906ee49fbdf4e5ce74ca5229a7f1d8844a52ae6a0b8a.exe File opened (read-only) \??\I: c18d1615f31033b778fa906ee49fbdf4e5ce74ca5229a7f1d8844a52ae6a0b8a.exe File opened (read-only) \??\N: c18d1615f31033b778fa906ee49fbdf4e5ce74ca5229a7f1d8844a52ae6a0b8a.exe File opened (read-only) \??\Q: c18d1615f31033b778fa906ee49fbdf4e5ce74ca5229a7f1d8844a52ae6a0b8a.exe File opened (read-only) \??\R: c18d1615f31033b778fa906ee49fbdf4e5ce74ca5229a7f1d8844a52ae6a0b8a.exe File opened (read-only) \??\S: c18d1615f31033b778fa906ee49fbdf4e5ce74ca5229a7f1d8844a52ae6a0b8a.exe File opened (read-only) \??\Z: c18d1615f31033b778fa906ee49fbdf4e5ce74ca5229a7f1d8844a52ae6a0b8a.exe File opened (read-only) \??\G: c18d1615f31033b778fa906ee49fbdf4e5ce74ca5229a7f1d8844a52ae6a0b8a.exe File opened (read-only) \??\U: c18d1615f31033b778fa906ee49fbdf4e5ce74ca5229a7f1d8844a52ae6a0b8a.exe File opened (read-only) \??\V: c18d1615f31033b778fa906ee49fbdf4e5ce74ca5229a7f1d8844a52ae6a0b8a.exe File opened (read-only) \??\E: c18d1615f31033b778fa906ee49fbdf4e5ce74ca5229a7f1d8844a52ae6a0b8a.exe File opened (read-only) \??\K: c18d1615f31033b778fa906ee49fbdf4e5ce74ca5229a7f1d8844a52ae6a0b8a.exe File opened (read-only) \??\L: c18d1615f31033b778fa906ee49fbdf4e5ce74ca5229a7f1d8844a52ae6a0b8a.exe File opened (read-only) \??\M: c18d1615f31033b778fa906ee49fbdf4e5ce74ca5229a7f1d8844a52ae6a0b8a.exe File opened (read-only) \??\T: c18d1615f31033b778fa906ee49fbdf4e5ce74ca5229a7f1d8844a52ae6a0b8a.exe File opened (read-only) \??\X: c18d1615f31033b778fa906ee49fbdf4e5ce74ca5229a7f1d8844a52ae6a0b8a.exe File opened (read-only) \??\J: c18d1615f31033b778fa906ee49fbdf4e5ce74ca5229a7f1d8844a52ae6a0b8a.exe File opened (read-only) \??\O: c18d1615f31033b778fa906ee49fbdf4e5ce74ca5229a7f1d8844a52ae6a0b8a.exe File opened (read-only) \??\P: c18d1615f31033b778fa906ee49fbdf4e5ce74ca5229a7f1d8844a52ae6a0b8a.exe File opened (read-only) \??\W: c18d1615f31033b778fa906ee49fbdf4e5ce74ca5229a7f1d8844a52ae6a0b8a.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Cmnurtw.exe c18d1615f31033b778fa906ee49fbdf4e5ce74ca5229a7f1d8844a52ae6a0b8a.exe File opened for modification C:\Program Files (x86)\Cmnurtw.exe c18d1615f31033b778fa906ee49fbdf4e5ce74ca5229a7f1d8844a52ae6a0b8a.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 c18d1615f31033b778fa906ee49fbdf4e5ce74ca5229a7f1d8844a52ae6a0b8a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz c18d1615f31033b778fa906ee49fbdf4e5ce74ca5229a7f1d8844a52ae6a0b8a.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2672 c18d1615f31033b778fa906ee49fbdf4e5ce74ca5229a7f1d8844a52ae6a0b8a.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2672 c18d1615f31033b778fa906ee49fbdf4e5ce74ca5229a7f1d8844a52ae6a0b8a.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2672 c18d1615f31033b778fa906ee49fbdf4e5ce74ca5229a7f1d8844a52ae6a0b8a.exe 2332 Cmnurtw.exe 2804 Cmnurtw.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2332 wrote to memory of 2804 2332 Cmnurtw.exe 29 PID 2332 wrote to memory of 2804 2332 Cmnurtw.exe 29 PID 2332 wrote to memory of 2804 2332 Cmnurtw.exe 29 PID 2332 wrote to memory of 2804 2332 Cmnurtw.exe 29 PID 2332 wrote to memory of 2804 2332 Cmnurtw.exe 29 PID 2332 wrote to memory of 2804 2332 Cmnurtw.exe 29 PID 2332 wrote to memory of 2804 2332 Cmnurtw.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\c18d1615f31033b778fa906ee49fbdf4e5ce74ca5229a7f1d8844a52ae6a0b8a.exe"C:\Users\Admin\AppData\Local\Temp\c18d1615f31033b778fa906ee49fbdf4e5ce74ca5229a7f1d8844a52ae6a0b8a.exe"1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
PID:2672
-
C:\Program Files (x86)\Cmnurtw.exe"C:\Program Files (x86)\Cmnurtw.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Program Files (x86)\Cmnurtw.exe"C:\Program Files (x86)\Cmnurtw.exe" Win72⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2804
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
540KB
MD521a3275904b3c7d160f42263fb32a80b
SHA1419e01c3d6d6b90ca81d7a627a5719e32901e8f9
SHA256c18d1615f31033b778fa906ee49fbdf4e5ce74ca5229a7f1d8844a52ae6a0b8a
SHA512952cbb2a2a04ef6732fae271c75649cd664f12ccd0c7d1eda3bd45bc12080f8fe2aa56b6836901d8bcecd99a70df23b08aeaef8a26b0b116bda9436074a75be5