Analysis
-
max time kernel
142s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
21-03-2024 08:51
Static task
static1
Behavioral task
behavioral1
Sample
db3634519c2d504f67f0ac5518d4c208.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
db3634519c2d504f67f0ac5518d4c208.exe
Resource
win10v2004-20240226-en
General
-
Target
db3634519c2d504f67f0ac5518d4c208.exe
-
Size
312KB
-
MD5
db3634519c2d504f67f0ac5518d4c208
-
SHA1
752eaa1a95d1179ac825119d27c006ddeda41d6b
-
SHA256
69d7973f1002d543c7e1935b95a4493ec29d0c21d3dc5e50d2f477868a914f70
-
SHA512
3cca550e3fc9360f97b04c64172daface1e2a5f2b6508fc141f15214bf9e668a88e81ed487b40d926a944e0c71d35f2f97fb2066a66dfb4dab2f264410b6d751
-
SSDEEP
6144:JEeHlmxEW0qLFWfs/ZnGWvAljyyqI7rRgdixjTwa/RxJg:JTgTZWk/oWvARy9oRxHY
Malware Config
Signatures
-
Generic Chinese Botnet
A botnet originating from China which is currently unnamed publicly.
-
Chinese Botnet payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/2204-4-0x0000000010000000-0x0000000010018000-memory.dmp unk_chinese_botnet behavioral1/memory/2204-7-0x0000000000400000-0x0000000002C84000-memory.dmp unk_chinese_botnet behavioral1/memory/2460-23-0x0000000000400000-0x0000000002C84000-memory.dmp unk_chinese_botnet -
Executes dropped EXE 1 IoCs
Processes:
Sxazswv.exepid process 2460 Sxazswv.exe -
Drops file in System32 directory 1 IoCs
Processes:
Sxazswv.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat Sxazswv.exe -
Drops file in Program Files directory 2 IoCs
Processes:
db3634519c2d504f67f0ac5518d4c208.exedescription ioc process File created C:\Program Files (x86)\Microsoft Qkiuak\Sxazswv.exe db3634519c2d504f67f0ac5518d4c208.exe File opened for modification C:\Program Files (x86)\Microsoft Qkiuak\Sxazswv.exe db3634519c2d504f67f0ac5518d4c208.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 24 IoCs
Processes:
Sxazswv.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix Sxazswv.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{0B5DEEC5-0FD5-4419-86C2-4339D59D2C08}\WpadDecisionReason = "1" Sxazswv.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{0B5DEEC5-0FD5-4419-86C2-4339D59D2C08}\WpadDecision = "0" Sxazswv.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0e-37-05-af-96-7d Sxazswv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings Sxazswv.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Sxazswv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad Sxazswv.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0061000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Sxazswv.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0e-37-05-af-96-7d\WpadDecisionTime = 201aa4166d7bda01 Sxazswv.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0e-37-05-af-96-7d\WpadDecision = "0" Sxazswv.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" Sxazswv.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" Sxazswv.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" Sxazswv.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{0B5DEEC5-0FD5-4419-86C2-4339D59D2C08} Sxazswv.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0e-37-05-af-96-7d\WpadDecisionReason = "1" Sxazswv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ Sxazswv.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" Sxazswv.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Sxazswv.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" Sxazswv.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{0B5DEEC5-0FD5-4419-86C2-4339D59D2C08}\WpadDecisionTime = 201aa4166d7bda01 Sxazswv.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{0B5DEEC5-0FD5-4419-86C2-4339D59D2C08}\WpadNetworkName = "Network 3" Sxazswv.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{0B5DEEC5-0FD5-4419-86C2-4339D59D2C08}\0e-37-05-af-96-7d Sxazswv.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings Sxazswv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections Sxazswv.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
db3634519c2d504f67f0ac5518d4c208.exeSxazswv.exepid process 2204 db3634519c2d504f67f0ac5518d4c208.exe 2460 Sxazswv.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\db3634519c2d504f67f0ac5518d4c208.exe"C:\Users\Admin\AppData\Local\Temp\db3634519c2d504f67f0ac5518d4c208.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:2204
-
C:\Program Files (x86)\Microsoft Qkiuak\Sxazswv.exe"C:\Program Files (x86)\Microsoft Qkiuak\Sxazswv.exe"1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:2460
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD59d7b66aa1c485455c10b29b08ee97168
SHA18970a12998b3dcb561e50c25bd8be17e3a179e4c
SHA256cec3a39269f08cb4f4925132cadf99631cb9f36f4a8aee5c5ab8c22ca2643ee0
SHA5126ec22c0ef6e8d031f34f83fb4aa05b544c42dc627716bff5fcb4f2471ca055c40fee1e4270fd4f253bf200ed2acdbd5409045abbf0836e90d1563968b8b514cb