Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08-04-2024 11:02
Static task
static1
Behavioral task
behavioral1
Sample
db3b230ddbd5007522d98ae405cd2de6261c99f8841a1080e4f2d5313e59b270.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
db3b230ddbd5007522d98ae405cd2de6261c99f8841a1080e4f2d5313e59b270.exe
Resource
win10v2004-20240226-en
General
-
Target
db3b230ddbd5007522d98ae405cd2de6261c99f8841a1080e4f2d5313e59b270.exe
-
Size
685KB
-
MD5
418223af64b82fbada4a0a32294e5570
-
SHA1
a449a5abb579528b04af1bda91e4dffa871129db
-
SHA256
db3b230ddbd5007522d98ae405cd2de6261c99f8841a1080e4f2d5313e59b270
-
SHA512
d2b9bd95e588fbf470680853cc6cadde3c1ca2e734a955912da929c502f806a296c550817fc85905a53e246baaf6b8176fef55109d5275470968a87a4a67799c
-
SSDEEP
6144:vZ6ZA37ldV7aixUuxwtV0JbqCR3Gfz+8L0pi/8++:L37lb7aduxxmCun/+
Malware Config
Signatures
-
Generic Chinese Botnet
A botnet originating from China which is currently unnamed publicly.
-
Chinese Botnet payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/980-0-0x0000000010000000-0x0000000010018000-memory.dmp unk_chinese_botnet -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
db3b230ddbd5007522d98ae405cd2de6261c99f8841a1080e4f2d5313e59b270.exedescription ioc process File opened (read-only) \??\K: db3b230ddbd5007522d98ae405cd2de6261c99f8841a1080e4f2d5313e59b270.exe File opened (read-only) \??\P: db3b230ddbd5007522d98ae405cd2de6261c99f8841a1080e4f2d5313e59b270.exe File opened (read-only) \??\T: db3b230ddbd5007522d98ae405cd2de6261c99f8841a1080e4f2d5313e59b270.exe File opened (read-only) \??\V: db3b230ddbd5007522d98ae405cd2de6261c99f8841a1080e4f2d5313e59b270.exe File opened (read-only) \??\W: db3b230ddbd5007522d98ae405cd2de6261c99f8841a1080e4f2d5313e59b270.exe File opened (read-only) \??\B: db3b230ddbd5007522d98ae405cd2de6261c99f8841a1080e4f2d5313e59b270.exe File opened (read-only) \??\R: db3b230ddbd5007522d98ae405cd2de6261c99f8841a1080e4f2d5313e59b270.exe File opened (read-only) \??\X: db3b230ddbd5007522d98ae405cd2de6261c99f8841a1080e4f2d5313e59b270.exe File opened (read-only) \??\J: db3b230ddbd5007522d98ae405cd2de6261c99f8841a1080e4f2d5313e59b270.exe File opened (read-only) \??\L: db3b230ddbd5007522d98ae405cd2de6261c99f8841a1080e4f2d5313e59b270.exe File opened (read-only) \??\N: db3b230ddbd5007522d98ae405cd2de6261c99f8841a1080e4f2d5313e59b270.exe File opened (read-only) \??\Q: db3b230ddbd5007522d98ae405cd2de6261c99f8841a1080e4f2d5313e59b270.exe File opened (read-only) \??\S: db3b230ddbd5007522d98ae405cd2de6261c99f8841a1080e4f2d5313e59b270.exe File opened (read-only) \??\U: db3b230ddbd5007522d98ae405cd2de6261c99f8841a1080e4f2d5313e59b270.exe File opened (read-only) \??\G: db3b230ddbd5007522d98ae405cd2de6261c99f8841a1080e4f2d5313e59b270.exe File opened (read-only) \??\H: db3b230ddbd5007522d98ae405cd2de6261c99f8841a1080e4f2d5313e59b270.exe File opened (read-only) \??\I: db3b230ddbd5007522d98ae405cd2de6261c99f8841a1080e4f2d5313e59b270.exe File opened (read-only) \??\M: db3b230ddbd5007522d98ae405cd2de6261c99f8841a1080e4f2d5313e59b270.exe File opened (read-only) \??\O: db3b230ddbd5007522d98ae405cd2de6261c99f8841a1080e4f2d5313e59b270.exe File opened (read-only) \??\Y: db3b230ddbd5007522d98ae405cd2de6261c99f8841a1080e4f2d5313e59b270.exe File opened (read-only) \??\Z: db3b230ddbd5007522d98ae405cd2de6261c99f8841a1080e4f2d5313e59b270.exe File opened (read-only) \??\E: db3b230ddbd5007522d98ae405cd2de6261c99f8841a1080e4f2d5313e59b270.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
db3b230ddbd5007522d98ae405cd2de6261c99f8841a1080e4f2d5313e59b270.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 db3b230ddbd5007522d98ae405cd2de6261c99f8841a1080e4f2d5313e59b270.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz db3b230ddbd5007522d98ae405cd2de6261c99f8841a1080e4f2d5313e59b270.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
db3b230ddbd5007522d98ae405cd2de6261c99f8841a1080e4f2d5313e59b270.exepid process 980 db3b230ddbd5007522d98ae405cd2de6261c99f8841a1080e4f2d5313e59b270.exe 980 db3b230ddbd5007522d98ae405cd2de6261c99f8841a1080e4f2d5313e59b270.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
db3b230ddbd5007522d98ae405cd2de6261c99f8841a1080e4f2d5313e59b270.exepid process 980 db3b230ddbd5007522d98ae405cd2de6261c99f8841a1080e4f2d5313e59b270.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\db3b230ddbd5007522d98ae405cd2de6261c99f8841a1080e4f2d5313e59b270.exe"C:\Users\Admin\AppData\Local\Temp\db3b230ddbd5007522d98ae405cd2de6261c99f8841a1080e4f2d5313e59b270.exe"1⤵
- Enumerates connected drives
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:980