Analysis
-
max time kernel
117s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
19-01-2024 10:37
Static task
static1
Behavioral task
behavioral1
Sample
54fb2ada01c02e922853066644b9524e4227e30e5ab15f91647556c72556a5be.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
54fb2ada01c02e922853066644b9524e4227e30e5ab15f91647556c72556a5be.exe
Resource
win10v2004-20231215-en
General
-
Target
54fb2ada01c02e922853066644b9524e4227e30e5ab15f91647556c72556a5be.exe
-
Size
541KB
-
MD5
e114495b770c0f805e56b27c87b773de
-
SHA1
eb287a589998b616b5adce1709eddd90ccf58a03
-
SHA256
54fb2ada01c02e922853066644b9524e4227e30e5ab15f91647556c72556a5be
-
SHA512
37f01779cfc97c1c8a8921588323880990eb45cef96a07e87e7d889aafa0516225d019079a6a64bb7fbcfa4b65dcbba09bac23a7934c8ffcd95207a9add25f1d
-
SSDEEP
3072:A5OsiQ79xzUcbK9LK/fzuaCrutJUDpRfmm5yqiXO+Zoy/6ESh0Jz5OdRSu:G7hoBO/fzxUpFmkgXO+T/6EJJNaS
Malware Config
Signatures
-
Generic Chinese Botnet
A botnet originating from China which is currently unnamed publicly.
-
Chinese Botnet payload 1 IoCs
resource yara_rule behavioral1/memory/2928-0-0x0000000010000000-0x0000000010018000-memory.dmp unk_chinese_botnet -
Executes dropped EXE 2 IoCs
pid Process 616 Cmnurtw.exe 2412 Cmnurtw.exe -
Loads dropped DLL 7 IoCs
pid Process 616 Cmnurtw.exe 616 Cmnurtw.exe 616 Cmnurtw.exe 616 Cmnurtw.exe 2412 Cmnurtw.exe 2412 Cmnurtw.exe 2412 Cmnurtw.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\M: 54fb2ada01c02e922853066644b9524e4227e30e5ab15f91647556c72556a5be.exe File opened (read-only) \??\Q: 54fb2ada01c02e922853066644b9524e4227e30e5ab15f91647556c72556a5be.exe File opened (read-only) \??\W: 54fb2ada01c02e922853066644b9524e4227e30e5ab15f91647556c72556a5be.exe File opened (read-only) \??\B: 54fb2ada01c02e922853066644b9524e4227e30e5ab15f91647556c72556a5be.exe File opened (read-only) \??\J: 54fb2ada01c02e922853066644b9524e4227e30e5ab15f91647556c72556a5be.exe File opened (read-only) \??\N: 54fb2ada01c02e922853066644b9524e4227e30e5ab15f91647556c72556a5be.exe File opened (read-only) \??\S: 54fb2ada01c02e922853066644b9524e4227e30e5ab15f91647556c72556a5be.exe File opened (read-only) \??\U: 54fb2ada01c02e922853066644b9524e4227e30e5ab15f91647556c72556a5be.exe File opened (read-only) \??\E: 54fb2ada01c02e922853066644b9524e4227e30e5ab15f91647556c72556a5be.exe File opened (read-only) \??\I: 54fb2ada01c02e922853066644b9524e4227e30e5ab15f91647556c72556a5be.exe File opened (read-only) \??\K: 54fb2ada01c02e922853066644b9524e4227e30e5ab15f91647556c72556a5be.exe File opened (read-only) \??\R: 54fb2ada01c02e922853066644b9524e4227e30e5ab15f91647556c72556a5be.exe File opened (read-only) \??\V: 54fb2ada01c02e922853066644b9524e4227e30e5ab15f91647556c72556a5be.exe File opened (read-only) \??\Z: 54fb2ada01c02e922853066644b9524e4227e30e5ab15f91647556c72556a5be.exe File opened (read-only) \??\G: 54fb2ada01c02e922853066644b9524e4227e30e5ab15f91647556c72556a5be.exe File opened (read-only) \??\H: 54fb2ada01c02e922853066644b9524e4227e30e5ab15f91647556c72556a5be.exe File opened (read-only) \??\L: 54fb2ada01c02e922853066644b9524e4227e30e5ab15f91647556c72556a5be.exe File opened (read-only) \??\O: 54fb2ada01c02e922853066644b9524e4227e30e5ab15f91647556c72556a5be.exe File opened (read-only) \??\P: 54fb2ada01c02e922853066644b9524e4227e30e5ab15f91647556c72556a5be.exe File opened (read-only) \??\T: 54fb2ada01c02e922853066644b9524e4227e30e5ab15f91647556c72556a5be.exe File opened (read-only) \??\X: 54fb2ada01c02e922853066644b9524e4227e30e5ab15f91647556c72556a5be.exe File opened (read-only) \??\Y: 54fb2ada01c02e922853066644b9524e4227e30e5ab15f91647556c72556a5be.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Cmnurtw.exe 54fb2ada01c02e922853066644b9524e4227e30e5ab15f91647556c72556a5be.exe File opened for modification C:\Program Files (x86)\Cmnurtw.exe 54fb2ada01c02e922853066644b9524e4227e30e5ab15f91647556c72556a5be.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 54fb2ada01c02e922853066644b9524e4227e30e5ab15f91647556c72556a5be.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz 54fb2ada01c02e922853066644b9524e4227e30e5ab15f91647556c72556a5be.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2928 54fb2ada01c02e922853066644b9524e4227e30e5ab15f91647556c72556a5be.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2928 54fb2ada01c02e922853066644b9524e4227e30e5ab15f91647556c72556a5be.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2928 54fb2ada01c02e922853066644b9524e4227e30e5ab15f91647556c72556a5be.exe 616 Cmnurtw.exe 2412 Cmnurtw.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 616 wrote to memory of 2412 616 Cmnurtw.exe 29 PID 616 wrote to memory of 2412 616 Cmnurtw.exe 29 PID 616 wrote to memory of 2412 616 Cmnurtw.exe 29 PID 616 wrote to memory of 2412 616 Cmnurtw.exe 29 PID 616 wrote to memory of 2412 616 Cmnurtw.exe 29 PID 616 wrote to memory of 2412 616 Cmnurtw.exe 29 PID 616 wrote to memory of 2412 616 Cmnurtw.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\54fb2ada01c02e922853066644b9524e4227e30e5ab15f91647556c72556a5be.exe"C:\Users\Admin\AppData\Local\Temp\54fb2ada01c02e922853066644b9524e4227e30e5ab15f91647556c72556a5be.exe"1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
PID:2928
-
C:\Program Files (x86)\Cmnurtw.exe"C:\Program Files (x86)\Cmnurtw.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:616 -
C:\Program Files (x86)\Cmnurtw.exe"C:\Program Files (x86)\Cmnurtw.exe" Win72⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2412
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
142KB
MD5bd3520777f30b2b2782e032845b0224a
SHA1dadeae62c4f72f8641feb4be5cc98693a8ef6eab
SHA256d668ea6e652721644a39ad223a8ad7e495f553fac24a256fabc34449333821da
SHA512f2833534c066b292ed7e67af49e58e0cffa4db1231f339db2618bdaae45a1c51a7b564371e4562d995d138c4d8503672cc736ac8694fdb4acdb5048e841fad4f
-
Filesize
541KB
MD5e114495b770c0f805e56b27c87b773de
SHA1eb287a589998b616b5adce1709eddd90ccf58a03
SHA25654fb2ada01c02e922853066644b9524e4227e30e5ab15f91647556c72556a5be
SHA51237f01779cfc97c1c8a8921588323880990eb45cef96a07e87e7d889aafa0516225d019079a6a64bb7fbcfa4b65dcbba09bac23a7934c8ffcd95207a9add25f1d
-
Filesize
113KB
MD5c3aefd7239a93aa5f50d267e9360ceb2
SHA12860547570eca94782be09880a8a11576dd474e6
SHA2567f077b4c5f51928041d9d9e399bccc9ba30ef801a83e8312a1933385a3f412bc
SHA512d792aaaf424b42bf2e6b976477916e200c0fb7707cfee12679e8b57c6f1d2ac1cd9e914d349f216fdcc7e6d625f06676f5f57e4ab5a7e54091fdf08f2b5be80f
-
Filesize
129KB
MD587646cf1b4121f5fea2703a6c0b5fa53
SHA1a1a41a20f4a56020f503f73ff326a8a7dcb389e3
SHA256228bcf0b35bdae03754156fcb3870e30e5ad638a49d84a4be581a1cb32281225
SHA51276073d1e2431fdbf438be4d3dc550582679feeb963c98210d5a77dbfbfb71bda2464cfa792e3ae87aa5965ff52e3bc279862c0f0e7a57547f3732e9baa05edde
-
Filesize
147KB
MD50c81be09a26e52212fcb9523165c80b6
SHA1eb5c8850618cc82a549053e01be06e45f8fd2193
SHA256fe1c7db1acd053e6484395660b4c75d40198ba3de51ac87bc6438d74338cb747
SHA512cb103250811a70d78efcb82880f6c23cf765df6c1e528fa1a7fc7cebb2a4ce0ddec1cc35eb8089cd87c69df508a4b06e16861abe1bec583ac37533bd313e643e
-
Filesize
109KB
MD546c56e0603dde674717bc40e2f5e9d1c
SHA1567a352dd1bfbf183d61a26acc5b073046b62fb7
SHA256c28c704c9560c8f281ecf6a84ac89add130ffa2427363a414ddc3566e3d460a8
SHA512a6e965abc8f93bfd7a02b19deb9a9f39ba8f2b40451dc32f7c433d5c442dcce0bba5356a73f0ee5730ab901b6d2288c4bbda7075c1c2e9ee96b16b99db3a417e