Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19-04-2024 03:31
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20240412-en
General
-
Target
tmp.exe
-
Size
936KB
-
MD5
f21c518bcafa5fe911f17ffb3c1797b0
-
SHA1
6ddf4338b8802ed0e698af6d78695cc12d7e55d6
-
SHA256
a64ace959b459d7f23ceb7b2ff1cbe7f9346e3aa412118d4078b940e13b087a8
-
SHA512
482a3c93ed737da332be810d543a2afd274b6c20ebcdccf4a324cca756629ffcd402c7ba5b514ad19f91bb27ecdc3de0e3baa30f65658c1f152ad1bcc9f8f25f
-
SSDEEP
24576:pyF2ZifBvlGsu6ot9vtC1FoV1pltylcVHhE9HZ:4FN5vUikV1XacrEr
Malware Config
Signatures
-
Generic Chinese Botnet
A botnet originating from China which is currently unnamed publicly.
-
Chinese Botnet payload 2 IoCs
resource yara_rule behavioral1/memory/2948-8700-0x0000000000400000-0x0000000000548000-memory.dmp unk_chinese_botnet behavioral1/memory/2884-17409-0x0000000000400000-0x0000000000548000-memory.dmp unk_chinese_botnet -
Executes dropped EXE 1 IoCs
pid Process 2884 Kvzbtbs.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat Kvzbtbs.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 38 IoCs
pid Process 2948 tmp.exe 2948 tmp.exe 2948 tmp.exe 2948 tmp.exe 2948 tmp.exe 2948 tmp.exe 2948 tmp.exe 2948 tmp.exe 2948 tmp.exe 2948 tmp.exe 2948 tmp.exe 2948 tmp.exe 2948 tmp.exe 2948 tmp.exe 2948 tmp.exe 2948 tmp.exe 2948 tmp.exe 2884 Kvzbtbs.exe 2884 Kvzbtbs.exe 2948 tmp.exe 2884 Kvzbtbs.exe 2948 tmp.exe 2884 Kvzbtbs.exe 2948 tmp.exe 2948 tmp.exe 2948 tmp.exe 2948 tmp.exe 2948 tmp.exe 2948 tmp.exe 2948 tmp.exe 2948 tmp.exe 2948 tmp.exe 2948 tmp.exe 2948 tmp.exe 2948 tmp.exe 2948 tmp.exe 2948 tmp.exe 2948 tmp.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Kvzbtbs.exe tmp.exe File opened for modification C:\Program Files (x86)\Kvzbtbs.exe tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 24 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ Kvzbtbs.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" Kvzbtbs.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\be-e9-cd-51-7f-af\WpadDecisionTime = 402df1410a92da01 Kvzbtbs.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections Kvzbtbs.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Kvzbtbs.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix Kvzbtbs.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" Kvzbtbs.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\be-e9-cd-51-7f-af\WpadDecisionReason = "1" Kvzbtbs.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" Kvzbtbs.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{870379BD-1FC7-49B6-8AED-E8ED33D29A92} Kvzbtbs.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{870379BD-1FC7-49B6-8AED-E8ED33D29A92}\WpadDecision = "0" Kvzbtbs.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\be-e9-cd-51-7f-af Kvzbtbs.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings Kvzbtbs.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Kvzbtbs.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" Kvzbtbs.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" Kvzbtbs.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad Kvzbtbs.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00e9000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Kvzbtbs.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{870379BD-1FC7-49B6-8AED-E8ED33D29A92}\WpadDecisionReason = "1" Kvzbtbs.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{870379BD-1FC7-49B6-8AED-E8ED33D29A92}\WpadDecisionTime = 402df1410a92da01 Kvzbtbs.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings Kvzbtbs.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{870379BD-1FC7-49B6-8AED-E8ED33D29A92}\be-e9-cd-51-7f-af Kvzbtbs.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\be-e9-cd-51-7f-af\WpadDecision = "0" Kvzbtbs.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{870379BD-1FC7-49B6-8AED-E8ED33D29A92}\WpadNetworkName = "Network 3" Kvzbtbs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
PID:2948
-
C:\Program Files (x86)\Kvzbtbs.exe"C:\Program Files (x86)\Kvzbtbs.exe"1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies data under HKEY_USERS
PID:2884
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
936KB
MD5f21c518bcafa5fe911f17ffb3c1797b0
SHA16ddf4338b8802ed0e698af6d78695cc12d7e55d6
SHA256a64ace959b459d7f23ceb7b2ff1cbe7f9346e3aa412118d4078b940e13b087a8
SHA512482a3c93ed737da332be810d543a2afd274b6c20ebcdccf4a324cca756629ffcd402c7ba5b514ad19f91bb27ecdc3de0e3baa30f65658c1f152ad1bcc9f8f25f