Analysis

  • max time kernel
    117s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    31-03-2024 10:01

General

  • Target

    e3e6119c5b2d1683ee93f18a796efdd13a5090f9d7146d18845c97dc92ca5476.exe

  • Size

    656KB

  • MD5

    5671fe7b1a6fbc02db733124cefe4c1a

  • SHA1

    517ab4eee67a6ed352bcf8b2f1e68cf76334d926

  • SHA256

    e3e6119c5b2d1683ee93f18a796efdd13a5090f9d7146d18845c97dc92ca5476

  • SHA512

    2e4fd770b2b14160a92219fab68fb8ce1293559b99f07710d26a0b4020fb1481d25b46783b72e554c785574c20f55dc043d8dd68e0170fc2b90f59dcd3381781

  • SSDEEP

    6144:wZ6ZA37ldV7aixUuxwtV0JbKTTatd/sUIdQt7Q:w37lb7aduxxs8d0FI

Malware Config

Signatures

  • Generic Chinese Botnet

    A botnet originating from China which is currently unnamed publicly.

  • Chinese Botnet payload 1 IoCs
  • Enumerates connected drives 3 TTPs 22 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e3e6119c5b2d1683ee93f18a796efdd13a5090f9d7146d18845c97dc92ca5476.exe
    "C:\Users\Admin\AppData\Local\Temp\e3e6119c5b2d1683ee93f18a796efdd13a5090f9d7146d18845c97dc92ca5476.exe"
    1⤵
    • Enumerates connected drives
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:2648

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2648-0-0x0000000010000000-0x0000000010018000-memory.dmp

    Filesize

    96KB