Analysis

  • max time kernel
    46s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-03-2024 16:01

General

  • Target

    a63c167748663147e6cd4121290365a5f157c71f5860140b0660c593c09cae05.exe

  • Size

    468KB

  • MD5

    a34d6327f5e271b2a9160d95c31c3079

  • SHA1

    dfb679c8136695f374c31901df459e1ff04b611f

  • SHA256

    a63c167748663147e6cd4121290365a5f157c71f5860140b0660c593c09cae05

  • SHA512

    644dce5494a540ae55fd71f6d39e628b69bc4f9248c1e1bf4be7051dae9de62207ca4fff93abf20129f9e1546e94cb430c8b1a1b514f732cfec481cb1c5bcfd9

  • SSDEEP

    3072:GyfZbD3v5+6eRod1kPgGZmKa95wVo06OmRqIzEke+O:JfZ3vEaLWpmr95wS1OIFA

Malware Config

Signatures

  • Generic Chinese Botnet

    A botnet originating from China which is currently unnamed publicly.

  • Chinese Botnet payload 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a63c167748663147e6cd4121290365a5f157c71f5860140b0660c593c09cae05.exe
    "C:\Users\Admin\AppData\Local\Temp\a63c167748663147e6cd4121290365a5f157c71f5860140b0660c593c09cae05.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetWindowsHookEx
    PID:1324

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1324-0-0x0000000000400000-0x0000000000493000-memory.dmp

    Filesize

    588KB

  • memory/1324-1-0x0000000000400000-0x0000000000493000-memory.dmp

    Filesize

    588KB

  • memory/1324-2-0x0000000010000000-0x0000000010018000-memory.dmp

    Filesize

    96KB

  • memory/1324-7-0x0000000000400000-0x0000000000493000-memory.dmp

    Filesize

    588KB