Analysis
-
max time kernel
122s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
17-03-2024 15:01
Static task
static1
Behavioral task
behavioral1
Sample
0ee88f757efda5af4c095214219721fb61a7793072d26e1c773471805e2376a1.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0ee88f757efda5af4c095214219721fb61a7793072d26e1c773471805e2376a1.exe
Resource
win10v2004-20231215-en
General
-
Target
0ee88f757efda5af4c095214219721fb61a7793072d26e1c773471805e2376a1.exe
-
Size
3.0MB
-
MD5
aa64c28a20063d10873fdd904a647590
-
SHA1
bffb2ef160c9c81f474a7dccb98b080f93e58df8
-
SHA256
0ee88f757efda5af4c095214219721fb61a7793072d26e1c773471805e2376a1
-
SHA512
d5700a69e16a4bb7354b8381615c0c2f8f4ef236892398c2e4605cf235fffb37cbd3beb2a00b61a92892f63c01d3fb5dd7bb62b65c48e694c870f95ce6f0b30c
-
SSDEEP
49152:V/TQxi03zDWi26fs2cWDAbcl7j1v4+9Ry4kjCfJ:V/TQT0uDhVv4n4Mk
Malware Config
Signatures
-
Generic Chinese Botnet
A botnet originating from China which is currently unnamed publicly.
-
Chinese Botnet payload 1 IoCs
resource yara_rule behavioral1/memory/2856-0-0x0000000010000000-0x000000001001F000-memory.dmp unk_chinese_botnet -
Executes dropped EXE 2 IoCs
pid Process 2936 Oqwiqqi.exe 2644 Oqwiqqi.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\K: 0ee88f757efda5af4c095214219721fb61a7793072d26e1c773471805e2376a1.exe File opened (read-only) \??\P: 0ee88f757efda5af4c095214219721fb61a7793072d26e1c773471805e2376a1.exe File opened (read-only) \??\S: 0ee88f757efda5af4c095214219721fb61a7793072d26e1c773471805e2376a1.exe File opened (read-only) \??\V: 0ee88f757efda5af4c095214219721fb61a7793072d26e1c773471805e2376a1.exe File opened (read-only) \??\H: 0ee88f757efda5af4c095214219721fb61a7793072d26e1c773471805e2376a1.exe File opened (read-only) \??\M: 0ee88f757efda5af4c095214219721fb61a7793072d26e1c773471805e2376a1.exe File opened (read-only) \??\R: 0ee88f757efda5af4c095214219721fb61a7793072d26e1c773471805e2376a1.exe File opened (read-only) \??\Y: 0ee88f757efda5af4c095214219721fb61a7793072d26e1c773471805e2376a1.exe File opened (read-only) \??\L: 0ee88f757efda5af4c095214219721fb61a7793072d26e1c773471805e2376a1.exe File opened (read-only) \??\J: 0ee88f757efda5af4c095214219721fb61a7793072d26e1c773471805e2376a1.exe File opened (read-only) \??\N: 0ee88f757efda5af4c095214219721fb61a7793072d26e1c773471805e2376a1.exe File opened (read-only) \??\O: 0ee88f757efda5af4c095214219721fb61a7793072d26e1c773471805e2376a1.exe File opened (read-only) \??\Q: 0ee88f757efda5af4c095214219721fb61a7793072d26e1c773471805e2376a1.exe File opened (read-only) \??\U: 0ee88f757efda5af4c095214219721fb61a7793072d26e1c773471805e2376a1.exe File opened (read-only) \??\W: 0ee88f757efda5af4c095214219721fb61a7793072d26e1c773471805e2376a1.exe File opened (read-only) \??\X: 0ee88f757efda5af4c095214219721fb61a7793072d26e1c773471805e2376a1.exe File opened (read-only) \??\B: 0ee88f757efda5af4c095214219721fb61a7793072d26e1c773471805e2376a1.exe File opened (read-only) \??\Z: 0ee88f757efda5af4c095214219721fb61a7793072d26e1c773471805e2376a1.exe File opened (read-only) \??\G: 0ee88f757efda5af4c095214219721fb61a7793072d26e1c773471805e2376a1.exe File opened (read-only) \??\I: 0ee88f757efda5af4c095214219721fb61a7793072d26e1c773471805e2376a1.exe File opened (read-only) \??\T: 0ee88f757efda5af4c095214219721fb61a7793072d26e1c773471805e2376a1.exe File opened (read-only) \??\E: 0ee88f757efda5af4c095214219721fb61a7793072d26e1c773471805e2376a1.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Oqwiqqi.exe 0ee88f757efda5af4c095214219721fb61a7793072d26e1c773471805e2376a1.exe File opened for modification C:\Program Files (x86)\Oqwiqqi.exe 0ee88f757efda5af4c095214219721fb61a7793072d26e1c773471805e2376a1.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 0ee88f757efda5af4c095214219721fb61a7793072d26e1c773471805e2376a1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz 0ee88f757efda5af4c095214219721fb61a7793072d26e1c773471805e2376a1.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2856 0ee88f757efda5af4c095214219721fb61a7793072d26e1c773471805e2376a1.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2856 0ee88f757efda5af4c095214219721fb61a7793072d26e1c773471805e2376a1.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2856 0ee88f757efda5af4c095214219721fb61a7793072d26e1c773471805e2376a1.exe 2936 Oqwiqqi.exe 2644 Oqwiqqi.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2936 wrote to memory of 2644 2936 Oqwiqqi.exe 29 PID 2936 wrote to memory of 2644 2936 Oqwiqqi.exe 29 PID 2936 wrote to memory of 2644 2936 Oqwiqqi.exe 29 PID 2936 wrote to memory of 2644 2936 Oqwiqqi.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\0ee88f757efda5af4c095214219721fb61a7793072d26e1c773471805e2376a1.exe"C:\Users\Admin\AppData\Local\Temp\0ee88f757efda5af4c095214219721fb61a7793072d26e1c773471805e2376a1.exe"1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
PID:2856
-
C:\Program Files (x86)\Oqwiqqi.exe"C:\Program Files (x86)\Oqwiqqi.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Program Files (x86)\Oqwiqqi.exe"C:\Program Files (x86)\Oqwiqqi.exe" Win72⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2644
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.0MB
MD5aa64c28a20063d10873fdd904a647590
SHA1bffb2ef160c9c81f474a7dccb98b080f93e58df8
SHA2560ee88f757efda5af4c095214219721fb61a7793072d26e1c773471805e2376a1
SHA512d5700a69e16a4bb7354b8381615c0c2f8f4ef236892398c2e4605cf235fffb37cbd3beb2a00b61a92892f63c01d3fb5dd7bb62b65c48e694c870f95ce6f0b30c