Analysis

  • max time kernel
    122s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    26-03-2024 16:00

General

  • Target

    935839b62733a6cab157fd86cf715af7567dac4fa53010ccc126868f082064ea.exe

  • Size

    3.3MB

  • MD5

    db565ea0ed62da2d7ce016fd6ce25406

  • SHA1

    9c53dcdb87ec958fb4c590069151a7e32ce3108e

  • SHA256

    935839b62733a6cab157fd86cf715af7567dac4fa53010ccc126868f082064ea

  • SHA512

    1434484cf55914cb9d85ab49ad4fe8642018a8598cd94e7f0a4acbede660448f81d1264c9bd264f3ffa80f2886a5a48122bf0dbac54dd5bb7e752be0cfffa5cf

  • SSDEEP

    49152:t/GUxi03zDWi26fs2cWDAbcl7jkv4+9Ry4kjCz:t/GUT0uDhEv4n4M

Malware Config

Signatures

  • Generic Chinese Botnet

    A botnet originating from China which is currently unnamed publicly.

  • Chinese Botnet payload 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 22 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 2 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\935839b62733a6cab157fd86cf715af7567dac4fa53010ccc126868f082064ea.exe
    "C:\Users\Admin\AppData\Local\Temp\935839b62733a6cab157fd86cf715af7567dac4fa53010ccc126868f082064ea.exe"
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of SetWindowsHookEx
    PID:2456
  • C:\Program Files (x86)\Uoiksum.exe
    "C:\Program Files (x86)\Uoiksum.exe"
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2984
    • C:\Program Files (x86)\Uoiksum.exe
      "C:\Program Files (x86)\Uoiksum.exe" Win7
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2684

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Uoiksum.exe

    Filesize

    4.4MB

    MD5

    605ed24b418993a0570bb6e585566464

    SHA1

    fb0bfce70cec4bc53774e8200108d645c61dd7e6

    SHA256

    868f948ad36042141e876363cf31d465cbce66971b33069b8f02b8dedcd09dad

    SHA512

    052b5b5483e1c85071ff38957f1f4570593ec1ea1b117f4e148739f61b443c75c28ce12e6b3c558c32939b2905ce6ce23d58b39a22446ed79d03815ef3602c64

  • C:\Program Files (x86)\Uoiksum.exe

    Filesize

    3.4MB

    MD5

    11a5b2da3259d61394909f05855640c9

    SHA1

    ec8ae13c96c9027a31229b73c27256f7d3cf926e

    SHA256

    000a3fc2c77f44af119cc606011768ed0b25077ccd28d4f93334f40346ecd46e

    SHA512

    b3cc932f5b284f2c2d183c41fc0b054f0b13c854296d6fd6400d2f148f3c5b5358ce24ded59050f4459f6f82cdcdd00470b5756d13d75bfb50a8ae232c054ba3

  • C:\Program Files (x86)\Uoiksum.exe

    Filesize

    6.8MB

    MD5

    91bd6485b7bd2959742c94b2aedcfca6

    SHA1

    be4f999304447ac2a17c88719e08b47f53140212

    SHA256

    790cc561d8ed9ec01b5020a14a4db026a9fc5a71c830de7c6c52d750d7179b40

    SHA512

    7658d983aedf6626bb059a45d49f151b0d8cf9fda574d3b66030ea3ccc7abcfecc9659d71b34af00e75dc68eed0246f49247973df2d9ab48294a9f8254c2a827

  • memory/2456-0-0x0000000010000000-0x000000001001F000-memory.dmp

    Filesize

    124KB