Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19-04-2024 16:19
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20240412-en
General
-
Target
tmp.exe
-
Size
936KB
-
MD5
f21c518bcafa5fe911f17ffb3c1797b0
-
SHA1
6ddf4338b8802ed0e698af6d78695cc12d7e55d6
-
SHA256
a64ace959b459d7f23ceb7b2ff1cbe7f9346e3aa412118d4078b940e13b087a8
-
SHA512
482a3c93ed737da332be810d543a2afd274b6c20ebcdccf4a324cca756629ffcd402c7ba5b514ad19f91bb27ecdc3de0e3baa30f65658c1f152ad1bcc9f8f25f
-
SSDEEP
24576:pyF2ZifBvlGsu6ot9vtC1FoV1pltylcVHhE9HZ:4FN5vUikV1XacrEr
Malware Config
Signatures
-
Generic Chinese Botnet
A botnet originating from China which is currently unnamed publicly.
-
Chinese Botnet payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2872-8699-0x0000000000400000-0x0000000000548000-memory.dmp unk_chinese_botnet -
Executes dropped EXE 1 IoCs
Processes:
Kvzbtbs.exepid Process 2592 Kvzbtbs.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 26 IoCs
Processes:
tmp.exepid Process 2872 tmp.exe 2872 tmp.exe 2872 tmp.exe 2872 tmp.exe 2872 tmp.exe 2872 tmp.exe 2872 tmp.exe 2872 tmp.exe 2872 tmp.exe 2872 tmp.exe 2872 tmp.exe 2872 tmp.exe 2872 tmp.exe 2872 tmp.exe 2872 tmp.exe 2872 tmp.exe 2872 tmp.exe 2872 tmp.exe 2872 tmp.exe 2872 tmp.exe 2872 tmp.exe 2872 tmp.exe 2872 tmp.exe 2872 tmp.exe 2872 tmp.exe 2872 tmp.exe -
Drops file in Program Files directory 2 IoCs
Processes:
tmp.exedescription ioc Process File created C:\Program Files (x86)\Kvzbtbs.exe tmp.exe File opened for modification C:\Program Files (x86)\Kvzbtbs.exe tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
PID:2872
-
C:\Program Files (x86)\Kvzbtbs.exe"C:\Program Files (x86)\Kvzbtbs.exe"1⤵
- Executes dropped EXE
PID:2592
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
936KB
MD5f21c518bcafa5fe911f17ffb3c1797b0
SHA16ddf4338b8802ed0e698af6d78695cc12d7e55d6
SHA256a64ace959b459d7f23ceb7b2ff1cbe7f9346e3aa412118d4078b940e13b087a8
SHA512482a3c93ed737da332be810d543a2afd274b6c20ebcdccf4a324cca756629ffcd402c7ba5b514ad19f91bb27ecdc3de0e3baa30f65658c1f152ad1bcc9f8f25f