Analysis

  • max time kernel
    147s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-04-2024 12:19

General

  • Target

    a9ff0dd4a5ee46d64169a605a859d69f39b135df8bcc8a20b5a2c693aae65666.exe

  • Size

    584KB

  • MD5

    25b1052f544cdf4c57ae8b90d83df1ac

  • SHA1

    2b1d50060504fd8ec7cbeea25ac4774128ca014e

  • SHA256

    a9ff0dd4a5ee46d64169a605a859d69f39b135df8bcc8a20b5a2c693aae65666

  • SHA512

    bc438cdcf7d7a8a74f57265f9bdc625373a6c0eb11ff9eac431ccf86abab4b6f18ee268108e1ef2053ca367c79385a159da80c7fa837cdf580e945c2e82cb584

  • SSDEEP

    6144:V8+i1XKDBMZkRhJEHEkVsWqTWVHXJTuEeJhtqJPdk8hZZx:+9KDBnRhiEAqKV30d0Pdk8n

Malware Config

Signatures

  • Generic Chinese Botnet

    A botnet originating from China which is currently unnamed publicly.

  • Chinese Botnet payload 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a9ff0dd4a5ee46d64169a605a859d69f39b135df8bcc8a20b5a2c693aae65666.exe
    "C:\Users\Admin\AppData\Local\Temp\a9ff0dd4a5ee46d64169a605a859d69f39b135df8bcc8a20b5a2c693aae65666.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetWindowsHookEx
    PID:2204

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2204-0-0x0000000010000000-0x0000000010017000-memory.dmp

    Filesize

    92KB