Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
21-02-2024 01:36
Static task
static1
Behavioral task
behavioral1
Sample
57d55049a0bceaf021c28b7a7395c365e6402855b3122a8c165c381f5a7b1bd6.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
57d55049a0bceaf021c28b7a7395c365e6402855b3122a8c165c381f5a7b1bd6.exe
Resource
win10v2004-20231215-en
General
-
Target
57d55049a0bceaf021c28b7a7395c365e6402855b3122a8c165c381f5a7b1bd6.exe
-
Size
3.3MB
-
MD5
6a8e1430e7d9394ba37636e62be5e9fb
-
SHA1
f53b02f63ee7be4c5d7b0e03faab0102f4dca537
-
SHA256
57d55049a0bceaf021c28b7a7395c365e6402855b3122a8c165c381f5a7b1bd6
-
SHA512
7eb63dfbdf1b26d18768f1d99a82ee6544d635bed3f60790f7329df5c09f5e59a47a38016e20bc58a1341b17a8df524273c5b91ad7ada4342b47159d693b16d8
-
SSDEEP
49152:T0UdoogeHa+Fw0TNMC2yvOPVGpI3tzlGCGc7gTmiue7vVwtWv:PpNw0TNMC0PVsUFlGCGSgyia0
Malware Config
Signatures
-
Generic Chinese Botnet
A botnet originating from China which is currently unnamed publicly.
-
Chinese Botnet payload 4 IoCs
resource yara_rule behavioral1/memory/1936-2-0x0000000010000000-0x000000001001F000-memory.dmp unk_chinese_botnet behavioral1/memory/1936-13-0x0000000000400000-0x0000000000BBE4C0-memory.dmp unk_chinese_botnet behavioral1/memory/2064-19-0x0000000000400000-0x0000000000BBE4C0-memory.dmp unk_chinese_botnet behavioral1/memory/2668-27-0x0000000000400000-0x0000000000BBE4C0-memory.dmp unk_chinese_botnet -
Executes dropped EXE 2 IoCs
pid Process 2064 Egygekk.exe 2668 Egygekk.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Egygekk.exe 57d55049a0bceaf021c28b7a7395c365e6402855b3122a8c165c381f5a7b1bd6.exe File opened for modification C:\Program Files (x86)\Egygekk.exe 57d55049a0bceaf021c28b7a7395c365e6402855b3122a8c165c381f5a7b1bd6.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1936 57d55049a0bceaf021c28b7a7395c365e6402855b3122a8c165c381f5a7b1bd6.exe 2064 Egygekk.exe 2668 Egygekk.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2064 wrote to memory of 2668 2064 Egygekk.exe 29 PID 2064 wrote to memory of 2668 2064 Egygekk.exe 29 PID 2064 wrote to memory of 2668 2064 Egygekk.exe 29 PID 2064 wrote to memory of 2668 2064 Egygekk.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\57d55049a0bceaf021c28b7a7395c365e6402855b3122a8c165c381f5a7b1bd6.exe"C:\Users\Admin\AppData\Local\Temp\57d55049a0bceaf021c28b7a7395c365e6402855b3122a8c165c381f5a7b1bd6.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1936
-
C:\Program Files (x86)\Egygekk.exe"C:\Program Files (x86)\Egygekk.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Program Files (x86)\Egygekk.exe"C:\Program Files (x86)\Egygekk.exe" Win72⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2668
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.3MB
MD56a8e1430e7d9394ba37636e62be5e9fb
SHA1f53b02f63ee7be4c5d7b0e03faab0102f4dca537
SHA25657d55049a0bceaf021c28b7a7395c365e6402855b3122a8c165c381f5a7b1bd6
SHA5127eb63dfbdf1b26d18768f1d99a82ee6544d635bed3f60790f7329df5c09f5e59a47a38016e20bc58a1341b17a8df524273c5b91ad7ada4342b47159d693b16d8