Analysis
-
max time kernel
122s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26-03-2024 16:00
Static task
static1
Behavioral task
behavioral1
Sample
935839b62733a6cab157fd86cf715af7567dac4fa53010ccc126868f082064ea.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
935839b62733a6cab157fd86cf715af7567dac4fa53010ccc126868f082064ea.exe
Resource
win10v2004-20231215-en
General
-
Target
935839b62733a6cab157fd86cf715af7567dac4fa53010ccc126868f082064ea.exe
-
Size
3.3MB
-
MD5
db565ea0ed62da2d7ce016fd6ce25406
-
SHA1
9c53dcdb87ec958fb4c590069151a7e32ce3108e
-
SHA256
935839b62733a6cab157fd86cf715af7567dac4fa53010ccc126868f082064ea
-
SHA512
1434484cf55914cb9d85ab49ad4fe8642018a8598cd94e7f0a4acbede660448f81d1264c9bd264f3ffa80f2886a5a48122bf0dbac54dd5bb7e752be0cfffa5cf
-
SSDEEP
49152:t/GUxi03zDWi26fs2cWDAbcl7jkv4+9Ry4kjCz:t/GUT0uDhEv4n4M
Malware Config
Signatures
-
Generic Chinese Botnet
A botnet originating from China which is currently unnamed publicly.
-
Chinese Botnet payload 1 IoCs
resource yara_rule behavioral1/memory/2456-0-0x0000000010000000-0x000000001001F000-memory.dmp unk_chinese_botnet -
Executes dropped EXE 2 IoCs
pid Process 2984 Uoiksum.exe 2684 Uoiksum.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\J: 935839b62733a6cab157fd86cf715af7567dac4fa53010ccc126868f082064ea.exe File opened (read-only) \??\L: 935839b62733a6cab157fd86cf715af7567dac4fa53010ccc126868f082064ea.exe File opened (read-only) \??\P: 935839b62733a6cab157fd86cf715af7567dac4fa53010ccc126868f082064ea.exe File opened (read-only) \??\W: 935839b62733a6cab157fd86cf715af7567dac4fa53010ccc126868f082064ea.exe File opened (read-only) \??\Y: 935839b62733a6cab157fd86cf715af7567dac4fa53010ccc126868f082064ea.exe File opened (read-only) \??\B: 935839b62733a6cab157fd86cf715af7567dac4fa53010ccc126868f082064ea.exe File opened (read-only) \??\G: 935839b62733a6cab157fd86cf715af7567dac4fa53010ccc126868f082064ea.exe File opened (read-only) \??\I: 935839b62733a6cab157fd86cf715af7567dac4fa53010ccc126868f082064ea.exe File opened (read-only) \??\Z: 935839b62733a6cab157fd86cf715af7567dac4fa53010ccc126868f082064ea.exe File opened (read-only) \??\S: 935839b62733a6cab157fd86cf715af7567dac4fa53010ccc126868f082064ea.exe File opened (read-only) \??\K: 935839b62733a6cab157fd86cf715af7567dac4fa53010ccc126868f082064ea.exe File opened (read-only) \??\N: 935839b62733a6cab157fd86cf715af7567dac4fa53010ccc126868f082064ea.exe File opened (read-only) \??\Q: 935839b62733a6cab157fd86cf715af7567dac4fa53010ccc126868f082064ea.exe File opened (read-only) \??\U: 935839b62733a6cab157fd86cf715af7567dac4fa53010ccc126868f082064ea.exe File opened (read-only) \??\V: 935839b62733a6cab157fd86cf715af7567dac4fa53010ccc126868f082064ea.exe File opened (read-only) \??\E: 935839b62733a6cab157fd86cf715af7567dac4fa53010ccc126868f082064ea.exe File opened (read-only) \??\M: 935839b62733a6cab157fd86cf715af7567dac4fa53010ccc126868f082064ea.exe File opened (read-only) \??\O: 935839b62733a6cab157fd86cf715af7567dac4fa53010ccc126868f082064ea.exe File opened (read-only) \??\X: 935839b62733a6cab157fd86cf715af7567dac4fa53010ccc126868f082064ea.exe File opened (read-only) \??\H: 935839b62733a6cab157fd86cf715af7567dac4fa53010ccc126868f082064ea.exe File opened (read-only) \??\R: 935839b62733a6cab157fd86cf715af7567dac4fa53010ccc126868f082064ea.exe File opened (read-only) \??\T: 935839b62733a6cab157fd86cf715af7567dac4fa53010ccc126868f082064ea.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Uoiksum.exe 935839b62733a6cab157fd86cf715af7567dac4fa53010ccc126868f082064ea.exe File opened for modification C:\Program Files (x86)\Uoiksum.exe 935839b62733a6cab157fd86cf715af7567dac4fa53010ccc126868f082064ea.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 935839b62733a6cab157fd86cf715af7567dac4fa53010ccc126868f082064ea.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz 935839b62733a6cab157fd86cf715af7567dac4fa53010ccc126868f082064ea.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2456 935839b62733a6cab157fd86cf715af7567dac4fa53010ccc126868f082064ea.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2456 935839b62733a6cab157fd86cf715af7567dac4fa53010ccc126868f082064ea.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2456 935839b62733a6cab157fd86cf715af7567dac4fa53010ccc126868f082064ea.exe 2984 Uoiksum.exe 2684 Uoiksum.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2984 wrote to memory of 2684 2984 Uoiksum.exe 29 PID 2984 wrote to memory of 2684 2984 Uoiksum.exe 29 PID 2984 wrote to memory of 2684 2984 Uoiksum.exe 29 PID 2984 wrote to memory of 2684 2984 Uoiksum.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\935839b62733a6cab157fd86cf715af7567dac4fa53010ccc126868f082064ea.exe"C:\Users\Admin\AppData\Local\Temp\935839b62733a6cab157fd86cf715af7567dac4fa53010ccc126868f082064ea.exe"1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
PID:2456
-
C:\Program Files (x86)\Uoiksum.exe"C:\Program Files (x86)\Uoiksum.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Program Files (x86)\Uoiksum.exe"C:\Program Files (x86)\Uoiksum.exe" Win72⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2684
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.4MB
MD5605ed24b418993a0570bb6e585566464
SHA1fb0bfce70cec4bc53774e8200108d645c61dd7e6
SHA256868f948ad36042141e876363cf31d465cbce66971b33069b8f02b8dedcd09dad
SHA512052b5b5483e1c85071ff38957f1f4570593ec1ea1b117f4e148739f61b443c75c28ce12e6b3c558c32939b2905ce6ce23d58b39a22446ed79d03815ef3602c64
-
Filesize
3.4MB
MD511a5b2da3259d61394909f05855640c9
SHA1ec8ae13c96c9027a31229b73c27256f7d3cf926e
SHA256000a3fc2c77f44af119cc606011768ed0b25077ccd28d4f93334f40346ecd46e
SHA512b3cc932f5b284f2c2d183c41fc0b054f0b13c854296d6fd6400d2f148f3c5b5358ce24ded59050f4459f6f82cdcdd00470b5756d13d75bfb50a8ae232c054ba3
-
Filesize
6.8MB
MD591bd6485b7bd2959742c94b2aedcfca6
SHA1be4f999304447ac2a17c88719e08b47f53140212
SHA256790cc561d8ed9ec01b5020a14a4db026a9fc5a71c830de7c6c52d750d7179b40
SHA5127658d983aedf6626bb059a45d49f151b0d8cf9fda574d3b66030ea3ccc7abcfecc9659d71b34af00e75dc68eed0246f49247973df2d9ab48294a9f8254c2a827