Analysis
-
max time kernel
117s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
31-03-2024 10:01
Static task
static1
Behavioral task
behavioral1
Sample
e3e6119c5b2d1683ee93f18a796efdd13a5090f9d7146d18845c97dc92ca5476.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
e3e6119c5b2d1683ee93f18a796efdd13a5090f9d7146d18845c97dc92ca5476.exe
Resource
win10v2004-20240226-en
General
-
Target
e3e6119c5b2d1683ee93f18a796efdd13a5090f9d7146d18845c97dc92ca5476.exe
-
Size
656KB
-
MD5
5671fe7b1a6fbc02db733124cefe4c1a
-
SHA1
517ab4eee67a6ed352bcf8b2f1e68cf76334d926
-
SHA256
e3e6119c5b2d1683ee93f18a796efdd13a5090f9d7146d18845c97dc92ca5476
-
SHA512
2e4fd770b2b14160a92219fab68fb8ce1293559b99f07710d26a0b4020fb1481d25b46783b72e554c785574c20f55dc043d8dd68e0170fc2b90f59dcd3381781
-
SSDEEP
6144:wZ6ZA37ldV7aixUuxwtV0JbKTTatd/sUIdQt7Q:w37lb7aduxxs8d0FI
Malware Config
Signatures
-
Generic Chinese Botnet
A botnet originating from China which is currently unnamed publicly.
-
Chinese Botnet payload 1 IoCs
resource yara_rule behavioral1/memory/2648-0-0x0000000010000000-0x0000000010018000-memory.dmp unk_chinese_botnet -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\G: e3e6119c5b2d1683ee93f18a796efdd13a5090f9d7146d18845c97dc92ca5476.exe File opened (read-only) \??\N: e3e6119c5b2d1683ee93f18a796efdd13a5090f9d7146d18845c97dc92ca5476.exe File opened (read-only) \??\Q: e3e6119c5b2d1683ee93f18a796efdd13a5090f9d7146d18845c97dc92ca5476.exe File opened (read-only) \??\T: e3e6119c5b2d1683ee93f18a796efdd13a5090f9d7146d18845c97dc92ca5476.exe File opened (read-only) \??\E: e3e6119c5b2d1683ee93f18a796efdd13a5090f9d7146d18845c97dc92ca5476.exe File opened (read-only) \??\K: e3e6119c5b2d1683ee93f18a796efdd13a5090f9d7146d18845c97dc92ca5476.exe File opened (read-only) \??\O: e3e6119c5b2d1683ee93f18a796efdd13a5090f9d7146d18845c97dc92ca5476.exe File opened (read-only) \??\R: e3e6119c5b2d1683ee93f18a796efdd13a5090f9d7146d18845c97dc92ca5476.exe File opened (read-only) \??\B: e3e6119c5b2d1683ee93f18a796efdd13a5090f9d7146d18845c97dc92ca5476.exe File opened (read-only) \??\J: e3e6119c5b2d1683ee93f18a796efdd13a5090f9d7146d18845c97dc92ca5476.exe File opened (read-only) \??\M: e3e6119c5b2d1683ee93f18a796efdd13a5090f9d7146d18845c97dc92ca5476.exe File opened (read-only) \??\W: e3e6119c5b2d1683ee93f18a796efdd13a5090f9d7146d18845c97dc92ca5476.exe File opened (read-only) \??\Y: e3e6119c5b2d1683ee93f18a796efdd13a5090f9d7146d18845c97dc92ca5476.exe File opened (read-only) \??\I: e3e6119c5b2d1683ee93f18a796efdd13a5090f9d7146d18845c97dc92ca5476.exe File opened (read-only) \??\L: e3e6119c5b2d1683ee93f18a796efdd13a5090f9d7146d18845c97dc92ca5476.exe File opened (read-only) \??\P: e3e6119c5b2d1683ee93f18a796efdd13a5090f9d7146d18845c97dc92ca5476.exe File opened (read-only) \??\S: e3e6119c5b2d1683ee93f18a796efdd13a5090f9d7146d18845c97dc92ca5476.exe File opened (read-only) \??\U: e3e6119c5b2d1683ee93f18a796efdd13a5090f9d7146d18845c97dc92ca5476.exe File opened (read-only) \??\V: e3e6119c5b2d1683ee93f18a796efdd13a5090f9d7146d18845c97dc92ca5476.exe File opened (read-only) \??\X: e3e6119c5b2d1683ee93f18a796efdd13a5090f9d7146d18845c97dc92ca5476.exe File opened (read-only) \??\Z: e3e6119c5b2d1683ee93f18a796efdd13a5090f9d7146d18845c97dc92ca5476.exe File opened (read-only) \??\H: e3e6119c5b2d1683ee93f18a796efdd13a5090f9d7146d18845c97dc92ca5476.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 e3e6119c5b2d1683ee93f18a796efdd13a5090f9d7146d18845c97dc92ca5476.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz e3e6119c5b2d1683ee93f18a796efdd13a5090f9d7146d18845c97dc92ca5476.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2648 e3e6119c5b2d1683ee93f18a796efdd13a5090f9d7146d18845c97dc92ca5476.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2648 e3e6119c5b2d1683ee93f18a796efdd13a5090f9d7146d18845c97dc92ca5476.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e3e6119c5b2d1683ee93f18a796efdd13a5090f9d7146d18845c97dc92ca5476.exe"C:\Users\Admin\AppData\Local\Temp\e3e6119c5b2d1683ee93f18a796efdd13a5090f9d7146d18845c97dc92ca5476.exe"1⤵
- Enumerates connected drives
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2648