Analysis
-
max time kernel
138s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
27-01-2024 07:32
Static task
static1
Behavioral task
behavioral1
Sample
564950ab4da3317837ee968cc1780bd68d4173b84601c5cf84c6deedbb1453aa.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
564950ab4da3317837ee968cc1780bd68d4173b84601c5cf84c6deedbb1453aa.exe
Resource
win10v2004-20231215-en
General
-
Target
564950ab4da3317837ee968cc1780bd68d4173b84601c5cf84c6deedbb1453aa.exe
-
Size
380KB
-
MD5
8c0b96ed6e363fe53a7176a59f0fee43
-
SHA1
2658972cb293a35b5110684867528427def0c508
-
SHA256
564950ab4da3317837ee968cc1780bd68d4173b84601c5cf84c6deedbb1453aa
-
SHA512
0607e06407606f400fd4cf5f31635b11e3794ae4cde095911ed63b1921e636ee33d00c112342a1dc64ea2b944ed2d866b3498c5a8c5120b51a33e484cefbad73
-
SSDEEP
3072:cmgg0YcfYYOR3YtPTu+Bx77F+G9gZ6AGvQl451eB4:9ggLcfzOyTxx7B+G9gZ6AeWB4
Malware Config
Signatures
-
Generic Chinese Botnet
A botnet originating from China which is currently unnamed publicly.
-
Chinese Botnet payload 1 IoCs
resource yara_rule behavioral1/memory/3032-0-0x0000000010000000-0x0000000010018000-memory.dmp unk_chinese_botnet -
Executes dropped EXE 1 IoCs
pid Process 2868 Immswec.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat Immswec.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Immswec.exe 564950ab4da3317837ee968cc1780bd68d4173b84601c5cf84c6deedbb1453aa.exe File opened for modification C:\Program Files (x86)\Immswec.exe 564950ab4da3317837ee968cc1780bd68d4173b84601c5cf84c6deedbb1453aa.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 24 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" Immswec.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00c1000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Immswec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{0C6878FC-64E2-4D17-A702-CF6900AEBC75} Immswec.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{0C6878FC-64E2-4D17-A702-CF6900AEBC75}\WpadDecision = "0" Immswec.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\de-5e-69-13-41-89\WpadDecision = "0" Immswec.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" Immswec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings Immswec.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" Immswec.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{0C6878FC-64E2-4D17-A702-CF6900AEBC75}\WpadDecisionTime = 70235637f350da01 Immswec.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{0C6878FC-64E2-4D17-A702-CF6900AEBC75}\WpadNetworkName = "Network 3" Immswec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{0C6878FC-64E2-4D17-A702-CF6900AEBC75}\de-5e-69-13-41-89 Immswec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections Immswec.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" Immswec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad Immswec.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{0C6878FC-64E2-4D17-A702-CF6900AEBC75}\WpadDecisionReason = "1" Immswec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\de-5e-69-13-41-89 Immswec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ Immswec.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" Immswec.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Immswec.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\de-5e-69-13-41-89\WpadDecisionReason = "1" Immswec.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\de-5e-69-13-41-89\WpadDecisionTime = 70235637f350da01 Immswec.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings Immswec.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Immswec.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix Immswec.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3032 wrote to memory of 3056 3032 564950ab4da3317837ee968cc1780bd68d4173b84601c5cf84c6deedbb1453aa.exe 28 PID 3032 wrote to memory of 3056 3032 564950ab4da3317837ee968cc1780bd68d4173b84601c5cf84c6deedbb1453aa.exe 28 PID 3032 wrote to memory of 3056 3032 564950ab4da3317837ee968cc1780bd68d4173b84601c5cf84c6deedbb1453aa.exe 28 PID 3032 wrote to memory of 3056 3032 564950ab4da3317837ee968cc1780bd68d4173b84601c5cf84c6deedbb1453aa.exe 28 PID 2868 wrote to memory of 2900 2868 Immswec.exe 34 PID 2868 wrote to memory of 2900 2868 Immswec.exe 34 PID 2868 wrote to memory of 2900 2868 Immswec.exe 34 PID 2868 wrote to memory of 2900 2868 Immswec.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\564950ab4da3317837ee968cc1780bd68d4173b84601c5cf84c6deedbb1453aa.exe"C:\Users\Admin\AppData\Local\Temp\564950ab4da3317837ee968cc1780bd68d4173b84601c5cf84c6deedbb1453aa.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c md C:\windowss642⤵PID:3056
-
-
C:\Program Files (x86)\Immswec.exe"C:\Program Files (x86)\Immswec.exe"1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c md C:\windowss642⤵PID:2900
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
380KB
MD58c0b96ed6e363fe53a7176a59f0fee43
SHA12658972cb293a35b5110684867528427def0c508
SHA256564950ab4da3317837ee968cc1780bd68d4173b84601c5cf84c6deedbb1453aa
SHA5120607e06407606f400fd4cf5f31635b11e3794ae4cde095911ed63b1921e636ee33d00c112342a1dc64ea2b944ed2d866b3498c5a8c5120b51a33e484cefbad73