Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
20-04-2024 17:52
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20240412-en
General
-
Target
tmp.exe
-
Size
3.3MB
-
MD5
d6c0cf36d24f9c78d3e9c62c1ab10d7a
-
SHA1
40aef92c854049c716038a8ab79758d9d579b90d
-
SHA256
cc13d8ef2716a7653e04f1ee11a9be519897982cd83ae95559cb08513ed21c7e
-
SHA512
16b6b134417c3e9f067c2a1e8205067a2a9fac2b4d6342e2da7c8a90d8dcf4fff07ad39ade8e8b007a6a019419a58a733bb722463a472677f472380cf1b8a2bd
-
SSDEEP
98304:e4uTo0ZdxryDXakEfkslniBGT93rAS1Up0:e4eNeGTfksliBc933G+
Malware Config
Signatures
-
Generic Chinese Botnet
A botnet originating from China which is currently unnamed publicly.
-
Chinese Botnet payload 2 IoCs
resource yara_rule behavioral2/memory/5072-13103-0x0000000010000000-0x0000000010018000-memory.dmp unk_chinese_botnet behavioral2/memory/5072-13106-0x0000000000400000-0x0000000000548000-memory.dmp unk_chinese_botnet -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\International\Geo\Nation tmp.exe -
Executes dropped EXE 2 IoCs
pid Process 5072 QQ.exe 5052 svchost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Kvzbtbs.exe = "C:\\Users\\Admin\\AppData\\Roaming\\QQ.exe" QQ.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 64 IoCs
pid Process 5052 svchost.exe 5052 svchost.exe 5052 svchost.exe 5072 QQ.exe 5072 QQ.exe 5052 svchost.exe 5072 QQ.exe 5052 svchost.exe 5072 QQ.exe 5052 svchost.exe 5072 QQ.exe 5052 svchost.exe 5072 QQ.exe 5052 svchost.exe 5072 QQ.exe 5052 svchost.exe 5072 QQ.exe 5052 svchost.exe 5072 QQ.exe 5052 svchost.exe 5072 QQ.exe 5052 svchost.exe 5072 QQ.exe 5052 svchost.exe 5072 QQ.exe 5052 svchost.exe 5072 QQ.exe 5052 svchost.exe 5072 QQ.exe 5052 svchost.exe 5072 QQ.exe 5052 svchost.exe 5072 QQ.exe 5052 svchost.exe 5072 QQ.exe 5052 svchost.exe 5072 QQ.exe 5052 svchost.exe 5072 QQ.exe 5052 svchost.exe 5072 QQ.exe 5052 svchost.exe 5072 QQ.exe 5052 svchost.exe 5072 QQ.exe 5052 svchost.exe 5072 QQ.exe 5052 svchost.exe 5072 QQ.exe 5052 svchost.exe 5072 QQ.exe 5052 svchost.exe 5072 QQ.exe 5052 svchost.exe 5072 QQ.exe 5052 svchost.exe 5072 QQ.exe 5052 svchost.exe 5072 QQ.exe 5052 svchost.exe 5072 QQ.exe 5052 svchost.exe 5072 QQ.exe 5052 svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 5052 svchost.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4940 tmp.exe 4940 tmp.exe 5052 svchost.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4940 wrote to memory of 5072 4940 tmp.exe 89 PID 4940 wrote to memory of 5072 4940 tmp.exe 89 PID 4940 wrote to memory of 5072 4940 tmp.exe 89 PID 4940 wrote to memory of 5052 4940 tmp.exe 90 PID 4940 wrote to memory of 5052 4940 tmp.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Users\Admin\AppData\Roaming\QQ.exe"C:\Users\Admin\AppData\Roaming\QQ.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5072
-
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:5052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
936KB
MD5f21c518bcafa5fe911f17ffb3c1797b0
SHA16ddf4338b8802ed0e698af6d78695cc12d7e55d6
SHA256a64ace959b459d7f23ceb7b2ff1cbe7f9346e3aa412118d4078b940e13b087a8
SHA512482a3c93ed737da332be810d543a2afd274b6c20ebcdccf4a324cca756629ffcd402c7ba5b514ad19f91bb27ecdc3de0e3baa30f65658c1f152ad1bcc9f8f25f
-
Filesize
1.6MB
MD5e10f2fe129e169b2ac1ce9eeb179c15f
SHA1bf6b5ac1c98b04b2b881522b10277efa4acb72b5
SHA2561419f75027c186e8024396999a6841e6bbbcec531d134f8f26491a0fca9715a0
SHA512590e3c4ddb764ae2764b74f9f6283c7b3635c1dfaf42e3c80b90a2bf71b66b2cff2d5f1519c28965dcbf07152766f28fc827f140cedf3547a5985e4d755cac83