Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
14-02-2024 05:35
Static task
static1
Behavioral task
behavioral1
Sample
9ae32ad159d126278d9f7fc94f96adfa.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9ae32ad159d126278d9f7fc94f96adfa.exe
Resource
win10v2004-20231215-en
General
-
Target
9ae32ad159d126278d9f7fc94f96adfa.exe
-
Size
3.3MB
-
MD5
9ae32ad159d126278d9f7fc94f96adfa
-
SHA1
59469daf99f9fbc0b83d9fc1128af4e313f89b1b
-
SHA256
87930e435af99eda9ad298493193b5ca78d4c3aeba7747158f2e983e8ee4445f
-
SHA512
f32059f93e209e5baf435388e31411efea05140668a67267eeb3354efd0d7e028f2df5aa293bfea50f2878340f4c71d8b608de35ed1c4e7be3a54760fa1a0787
-
SSDEEP
49152:2jH5mJX9IvGtO0j8DlojeoQcXiG7e26q/+M:2jH5mJywKyZLF
Malware Config
Signatures
-
Generic Chinese Botnet
A botnet originating from China which is currently unnamed publicly.
-
Chinese Botnet payload 1 IoCs
resource yara_rule behavioral1/memory/2756-0-0x0000000010000000-0x0000000010018000-memory.dmp unk_chinese_botnet -
Executes dropped EXE 2 IoCs
pid Process 2720 Ioiowwu.exe 3032 Ioiowwu.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Ioiowwu.exe 9ae32ad159d126278d9f7fc94f96adfa.exe File opened for modification C:\Program Files (x86)\Ioiowwu.exe 9ae32ad159d126278d9f7fc94f96adfa.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2756 9ae32ad159d126278d9f7fc94f96adfa.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2756 9ae32ad159d126278d9f7fc94f96adfa.exe 2720 Ioiowwu.exe 3032 Ioiowwu.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2720 wrote to memory of 3032 2720 Ioiowwu.exe 29 PID 2720 wrote to memory of 3032 2720 Ioiowwu.exe 29 PID 2720 wrote to memory of 3032 2720 Ioiowwu.exe 29 PID 2720 wrote to memory of 3032 2720 Ioiowwu.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\9ae32ad159d126278d9f7fc94f96adfa.exe"C:\Users\Admin\AppData\Local\Temp\9ae32ad159d126278d9f7fc94f96adfa.exe"1⤵
- Drops file in Program Files directory
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
PID:2756
-
C:\Program Files (x86)\Ioiowwu.exe"C:\Program Files (x86)\Ioiowwu.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Program Files (x86)\Ioiowwu.exe"C:\Program Files (x86)\Ioiowwu.exe" Win72⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3032
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.3MB
MD59ae32ad159d126278d9f7fc94f96adfa
SHA159469daf99f9fbc0b83d9fc1128af4e313f89b1b
SHA25687930e435af99eda9ad298493193b5ca78d4c3aeba7747158f2e983e8ee4445f
SHA512f32059f93e209e5baf435388e31411efea05140668a67267eeb3354efd0d7e028f2df5aa293bfea50f2878340f4c71d8b608de35ed1c4e7be3a54760fa1a0787