Analysis
-
max time kernel
122s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
19-01-2024 07:43
Static task
static1
Behavioral task
behavioral1
Sample
c6377afd0a9ada8f9e4389bc320b2c1563af16fa71060980d1431cebe841238b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
c6377afd0a9ada8f9e4389bc320b2c1563af16fa71060980d1431cebe841238b.exe
Resource
win10v2004-20231215-en
General
-
Target
c6377afd0a9ada8f9e4389bc320b2c1563af16fa71060980d1431cebe841238b.exe
-
Size
541KB
-
MD5
8659459ca88f89d9feb7dc2cee851b51
-
SHA1
5e4c63caeceff5f4d9deedcb38f71f4036efdded
-
SHA256
c6377afd0a9ada8f9e4389bc320b2c1563af16fa71060980d1431cebe841238b
-
SHA512
1de6f407632b56c92ae81a6336e13b7da21044af0408a2f0ca9c7e5cea56f0361fbcdebfca8f4945146f77908f5fe0b2bd2955affc0ea31302ffc746d8c0b43e
-
SSDEEP
3072:A5OsiQ79xzUcbK9LK/fzuaCrutJUDpRfmm5yqiXO+Zoy/6ESh0Jz5OdRSu:G7hoBO/fzxUpFmkgXO+T/6EJJNaS
Malware Config
Signatures
-
Generic Chinese Botnet
A botnet originating from China which is currently unnamed publicly.
-
Chinese Botnet payload 1 IoCs
resource yara_rule behavioral1/memory/1968-0-0x0000000010000000-0x0000000010018000-memory.dmp unk_chinese_botnet -
Executes dropped EXE 2 IoCs
pid Process 2364 Cmnurtw.exe 2740 Cmnurtw.exe -
Loads dropped DLL 7 IoCs
pid Process 2364 Cmnurtw.exe 2364 Cmnurtw.exe 2364 Cmnurtw.exe 2364 Cmnurtw.exe 2740 Cmnurtw.exe 2740 Cmnurtw.exe 2740 Cmnurtw.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\B: c6377afd0a9ada8f9e4389bc320b2c1563af16fa71060980d1431cebe841238b.exe File opened (read-only) \??\Q: c6377afd0a9ada8f9e4389bc320b2c1563af16fa71060980d1431cebe841238b.exe File opened (read-only) \??\R: c6377afd0a9ada8f9e4389bc320b2c1563af16fa71060980d1431cebe841238b.exe File opened (read-only) \??\U: c6377afd0a9ada8f9e4389bc320b2c1563af16fa71060980d1431cebe841238b.exe File opened (read-only) \??\W: c6377afd0a9ada8f9e4389bc320b2c1563af16fa71060980d1431cebe841238b.exe File opened (read-only) \??\S: c6377afd0a9ada8f9e4389bc320b2c1563af16fa71060980d1431cebe841238b.exe File opened (read-only) \??\T: c6377afd0a9ada8f9e4389bc320b2c1563af16fa71060980d1431cebe841238b.exe File opened (read-only) \??\V: c6377afd0a9ada8f9e4389bc320b2c1563af16fa71060980d1431cebe841238b.exe File opened (read-only) \??\K: c6377afd0a9ada8f9e4389bc320b2c1563af16fa71060980d1431cebe841238b.exe File opened (read-only) \??\M: c6377afd0a9ada8f9e4389bc320b2c1563af16fa71060980d1431cebe841238b.exe File opened (read-only) \??\N: c6377afd0a9ada8f9e4389bc320b2c1563af16fa71060980d1431cebe841238b.exe File opened (read-only) \??\O: c6377afd0a9ada8f9e4389bc320b2c1563af16fa71060980d1431cebe841238b.exe File opened (read-only) \??\P: c6377afd0a9ada8f9e4389bc320b2c1563af16fa71060980d1431cebe841238b.exe File opened (read-only) \??\X: c6377afd0a9ada8f9e4389bc320b2c1563af16fa71060980d1431cebe841238b.exe File opened (read-only) \??\I: c6377afd0a9ada8f9e4389bc320b2c1563af16fa71060980d1431cebe841238b.exe File opened (read-only) \??\J: c6377afd0a9ada8f9e4389bc320b2c1563af16fa71060980d1431cebe841238b.exe File opened (read-only) \??\L: c6377afd0a9ada8f9e4389bc320b2c1563af16fa71060980d1431cebe841238b.exe File opened (read-only) \??\Y: c6377afd0a9ada8f9e4389bc320b2c1563af16fa71060980d1431cebe841238b.exe File opened (read-only) \??\E: c6377afd0a9ada8f9e4389bc320b2c1563af16fa71060980d1431cebe841238b.exe File opened (read-only) \??\G: c6377afd0a9ada8f9e4389bc320b2c1563af16fa71060980d1431cebe841238b.exe File opened (read-only) \??\H: c6377afd0a9ada8f9e4389bc320b2c1563af16fa71060980d1431cebe841238b.exe File opened (read-only) \??\Z: c6377afd0a9ada8f9e4389bc320b2c1563af16fa71060980d1431cebe841238b.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Cmnurtw.exe c6377afd0a9ada8f9e4389bc320b2c1563af16fa71060980d1431cebe841238b.exe File created C:\Program Files (x86)\Cmnurtw.exe c6377afd0a9ada8f9e4389bc320b2c1563af16fa71060980d1431cebe841238b.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 c6377afd0a9ada8f9e4389bc320b2c1563af16fa71060980d1431cebe841238b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz c6377afd0a9ada8f9e4389bc320b2c1563af16fa71060980d1431cebe841238b.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1968 c6377afd0a9ada8f9e4389bc320b2c1563af16fa71060980d1431cebe841238b.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1968 c6377afd0a9ada8f9e4389bc320b2c1563af16fa71060980d1431cebe841238b.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1968 c6377afd0a9ada8f9e4389bc320b2c1563af16fa71060980d1431cebe841238b.exe 2364 Cmnurtw.exe 2740 Cmnurtw.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2364 wrote to memory of 2740 2364 Cmnurtw.exe 29 PID 2364 wrote to memory of 2740 2364 Cmnurtw.exe 29 PID 2364 wrote to memory of 2740 2364 Cmnurtw.exe 29 PID 2364 wrote to memory of 2740 2364 Cmnurtw.exe 29 PID 2364 wrote to memory of 2740 2364 Cmnurtw.exe 29 PID 2364 wrote to memory of 2740 2364 Cmnurtw.exe 29 PID 2364 wrote to memory of 2740 2364 Cmnurtw.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\c6377afd0a9ada8f9e4389bc320b2c1563af16fa71060980d1431cebe841238b.exe"C:\Users\Admin\AppData\Local\Temp\c6377afd0a9ada8f9e4389bc320b2c1563af16fa71060980d1431cebe841238b.exe"1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
PID:1968
-
C:\Program Files (x86)\Cmnurtw.exe"C:\Program Files (x86)\Cmnurtw.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Program Files (x86)\Cmnurtw.exe"C:\Program Files (x86)\Cmnurtw.exe" Win72⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2740
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
541KB
MD58659459ca88f89d9feb7dc2cee851b51
SHA15e4c63caeceff5f4d9deedcb38f71f4036efdded
SHA256c6377afd0a9ada8f9e4389bc320b2c1563af16fa71060980d1431cebe841238b
SHA5121de6f407632b56c92ae81a6336e13b7da21044af0408a2f0ca9c7e5cea56f0361fbcdebfca8f4945146f77908f5fe0b2bd2955affc0ea31302ffc746d8c0b43e