Analysis
-
max time kernel
119s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
24-03-2024 10:01
Static task
static1
Behavioral task
behavioral1
Sample
9bf82f9aca633a2abf6f4a32c9167b8e673008fac45791cf0818554d61db2822.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
9bf82f9aca633a2abf6f4a32c9167b8e673008fac45791cf0818554d61db2822.exe
Resource
win10v2004-20240226-en
General
-
Target
9bf82f9aca633a2abf6f4a32c9167b8e673008fac45791cf0818554d61db2822.exe
-
Size
542KB
-
MD5
d23b1d1384a80398213687314fdf4c8d
-
SHA1
c8acb6532ea07f31f95715f1980d0b2e7ed78acf
-
SHA256
9bf82f9aca633a2abf6f4a32c9167b8e673008fac45791cf0818554d61db2822
-
SHA512
f5d48875ae5cc3fee3bffa3fd579e8927623eff9b02bffc01ec3d6b87cf9e4dea17e4d3b718849f774826659819bfebc6e0aab74cccd9697bd111b5b5b3ccd01
-
SSDEEP
3072:A5OsiQ79xzUcbK9LK/fzuaCrutJUDpRfmm5yqiXO+Zoy/6ESh0Jz5OdRSud:G7hoBO/fzxUpFmkgXO+T/6EJJNaSQ
Malware Config
Signatures
-
Generic Chinese Botnet
A botnet originating from China which is currently unnamed publicly.
-
Chinese Botnet payload 1 IoCs
resource yara_rule behavioral1/memory/1864-0-0x0000000010000000-0x0000000010018000-memory.dmp unk_chinese_botnet -
Executes dropped EXE 2 IoCs
pid Process 3044 Cmnurtw.exe 2060 Cmnurtw.exe -
Loads dropped DLL 7 IoCs
pid Process 3044 Cmnurtw.exe 3044 Cmnurtw.exe 3044 Cmnurtw.exe 3044 Cmnurtw.exe 2060 Cmnurtw.exe 2060 Cmnurtw.exe 2060 Cmnurtw.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\R: 9bf82f9aca633a2abf6f4a32c9167b8e673008fac45791cf0818554d61db2822.exe File opened (read-only) \??\W: 9bf82f9aca633a2abf6f4a32c9167b8e673008fac45791cf0818554d61db2822.exe File opened (read-only) \??\X: 9bf82f9aca633a2abf6f4a32c9167b8e673008fac45791cf0818554d61db2822.exe File opened (read-only) \??\Y: 9bf82f9aca633a2abf6f4a32c9167b8e673008fac45791cf0818554d61db2822.exe File opened (read-only) \??\J: 9bf82f9aca633a2abf6f4a32c9167b8e673008fac45791cf0818554d61db2822.exe File opened (read-only) \??\K: 9bf82f9aca633a2abf6f4a32c9167b8e673008fac45791cf0818554d61db2822.exe File opened (read-only) \??\M: 9bf82f9aca633a2abf6f4a32c9167b8e673008fac45791cf0818554d61db2822.exe File opened (read-only) \??\N: 9bf82f9aca633a2abf6f4a32c9167b8e673008fac45791cf0818554d61db2822.exe File opened (read-only) \??\Z: 9bf82f9aca633a2abf6f4a32c9167b8e673008fac45791cf0818554d61db2822.exe File opened (read-only) \??\G: 9bf82f9aca633a2abf6f4a32c9167b8e673008fac45791cf0818554d61db2822.exe File opened (read-only) \??\S: 9bf82f9aca633a2abf6f4a32c9167b8e673008fac45791cf0818554d61db2822.exe File opened (read-only) \??\O: 9bf82f9aca633a2abf6f4a32c9167b8e673008fac45791cf0818554d61db2822.exe File opened (read-only) \??\B: 9bf82f9aca633a2abf6f4a32c9167b8e673008fac45791cf0818554d61db2822.exe File opened (read-only) \??\E: 9bf82f9aca633a2abf6f4a32c9167b8e673008fac45791cf0818554d61db2822.exe File opened (read-only) \??\H: 9bf82f9aca633a2abf6f4a32c9167b8e673008fac45791cf0818554d61db2822.exe File opened (read-only) \??\L: 9bf82f9aca633a2abf6f4a32c9167b8e673008fac45791cf0818554d61db2822.exe File opened (read-only) \??\U: 9bf82f9aca633a2abf6f4a32c9167b8e673008fac45791cf0818554d61db2822.exe File opened (read-only) \??\V: 9bf82f9aca633a2abf6f4a32c9167b8e673008fac45791cf0818554d61db2822.exe File opened (read-only) \??\I: 9bf82f9aca633a2abf6f4a32c9167b8e673008fac45791cf0818554d61db2822.exe File opened (read-only) \??\P: 9bf82f9aca633a2abf6f4a32c9167b8e673008fac45791cf0818554d61db2822.exe File opened (read-only) \??\Q: 9bf82f9aca633a2abf6f4a32c9167b8e673008fac45791cf0818554d61db2822.exe File opened (read-only) \??\T: 9bf82f9aca633a2abf6f4a32c9167b8e673008fac45791cf0818554d61db2822.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Cmnurtw.exe 9bf82f9aca633a2abf6f4a32c9167b8e673008fac45791cf0818554d61db2822.exe File opened for modification C:\Program Files (x86)\Cmnurtw.exe 9bf82f9aca633a2abf6f4a32c9167b8e673008fac45791cf0818554d61db2822.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 9bf82f9aca633a2abf6f4a32c9167b8e673008fac45791cf0818554d61db2822.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz 9bf82f9aca633a2abf6f4a32c9167b8e673008fac45791cf0818554d61db2822.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1864 9bf82f9aca633a2abf6f4a32c9167b8e673008fac45791cf0818554d61db2822.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1864 9bf82f9aca633a2abf6f4a32c9167b8e673008fac45791cf0818554d61db2822.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1864 9bf82f9aca633a2abf6f4a32c9167b8e673008fac45791cf0818554d61db2822.exe 3044 Cmnurtw.exe 2060 Cmnurtw.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3044 wrote to memory of 2060 3044 Cmnurtw.exe 29 PID 3044 wrote to memory of 2060 3044 Cmnurtw.exe 29 PID 3044 wrote to memory of 2060 3044 Cmnurtw.exe 29 PID 3044 wrote to memory of 2060 3044 Cmnurtw.exe 29 PID 3044 wrote to memory of 2060 3044 Cmnurtw.exe 29 PID 3044 wrote to memory of 2060 3044 Cmnurtw.exe 29 PID 3044 wrote to memory of 2060 3044 Cmnurtw.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\9bf82f9aca633a2abf6f4a32c9167b8e673008fac45791cf0818554d61db2822.exe"C:\Users\Admin\AppData\Local\Temp\9bf82f9aca633a2abf6f4a32c9167b8e673008fac45791cf0818554d61db2822.exe"1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
PID:1864
-
C:\Program Files (x86)\Cmnurtw.exe"C:\Program Files (x86)\Cmnurtw.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Program Files (x86)\Cmnurtw.exe"C:\Program Files (x86)\Cmnurtw.exe" Win72⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2060
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
542KB
MD5d23b1d1384a80398213687314fdf4c8d
SHA1c8acb6532ea07f31f95715f1980d0b2e7ed78acf
SHA2569bf82f9aca633a2abf6f4a32c9167b8e673008fac45791cf0818554d61db2822
SHA512f5d48875ae5cc3fee3bffa3fd579e8927623eff9b02bffc01ec3d6b87cf9e4dea17e4d3b718849f774826659819bfebc6e0aab74cccd9697bd111b5b5b3ccd01