Analysis
-
max time kernel
294s -
max time network
294s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28-04-2024 18:09
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20240419-en
General
-
Target
tmp.exe
-
Size
3.3MB
-
MD5
d6c0cf36d24f9c78d3e9c62c1ab10d7a
-
SHA1
40aef92c854049c716038a8ab79758d9d579b90d
-
SHA256
cc13d8ef2716a7653e04f1ee11a9be519897982cd83ae95559cb08513ed21c7e
-
SHA512
16b6b134417c3e9f067c2a1e8205067a2a9fac2b4d6342e2da7c8a90d8dcf4fff07ad39ade8e8b007a6a019419a58a733bb722463a472677f472380cf1b8a2bd
-
SSDEEP
98304:e4uTo0ZdxryDXakEfkslniBGT93rAS1Up0:e4eNeGTfksliBc933G+
Malware Config
Signatures
-
Generic Chinese Botnet
A botnet originating from China which is currently unnamed publicly.
-
Chinese Botnet payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1944-16523-0x0000000000400000-0x0000000000548000-memory.dmp unk_chinese_botnet behavioral1/memory/616-16530-0x0000000000400000-0x0000000000548000-memory.dmp unk_chinese_botnet -
Executes dropped EXE 3 IoCs
Processes:
QQ.exesvchost.exeKvzbtbs.exepid process 1944 QQ.exe 2812 svchost.exe 616 Kvzbtbs.exe -
Loads dropped DLL 3 IoCs
Processes:
tmp.exepid process 1652 tmp.exe 1652 tmp.exe 1652 tmp.exe -
Drops file in System32 directory 1 IoCs
Processes:
Kvzbtbs.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat Kvzbtbs.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 64 IoCs
Processes:
svchost.exeQQ.exeKvzbtbs.exepid process 2812 svchost.exe 1944 QQ.exe 2812 svchost.exe 1944 QQ.exe 2812 svchost.exe 1944 QQ.exe 2812 svchost.exe 1944 QQ.exe 2812 svchost.exe 1944 QQ.exe 2812 svchost.exe 1944 QQ.exe 2812 svchost.exe 1944 QQ.exe 2812 svchost.exe 1944 QQ.exe 2812 svchost.exe 1944 QQ.exe 2812 svchost.exe 1944 QQ.exe 2812 svchost.exe 1944 QQ.exe 2812 svchost.exe 1944 QQ.exe 2812 svchost.exe 616 Kvzbtbs.exe 616 Kvzbtbs.exe 1944 QQ.exe 2812 svchost.exe 616 Kvzbtbs.exe 1944 QQ.exe 2812 svchost.exe 616 Kvzbtbs.exe 1944 QQ.exe 2812 svchost.exe 616 Kvzbtbs.exe 1944 QQ.exe 2812 svchost.exe 616 Kvzbtbs.exe 1944 QQ.exe 2812 svchost.exe 616 Kvzbtbs.exe 1944 QQ.exe 2812 svchost.exe 616 Kvzbtbs.exe 1944 QQ.exe 2812 svchost.exe 616 Kvzbtbs.exe 1944 QQ.exe 2812 svchost.exe 1944 QQ.exe 2812 svchost.exe 1944 QQ.exe 2812 svchost.exe 1944 QQ.exe 2812 svchost.exe 1944 QQ.exe 2812 svchost.exe 1944 QQ.exe 2812 svchost.exe 1944 QQ.exe 2812 svchost.exe 1944 QQ.exe 2812 svchost.exe -
Drops file in Program Files directory 2 IoCs
Processes:
QQ.exedescription ioc process File created C:\Program Files (x86)\Kvzbtbs.exe QQ.exe File opened for modification C:\Program Files (x86)\Kvzbtbs.exe QQ.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 24 IoCs
Processes:
Kvzbtbs.exedescription ioc process Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{E38402DF-3D1C-46FF-9F71-7B7F06D441B3}\WpadDecision = "0" Kvzbtbs.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ Kvzbtbs.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" Kvzbtbs.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" Kvzbtbs.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" Kvzbtbs.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix Kvzbtbs.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" Kvzbtbs.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{E38402DF-3D1C-46FF-9F71-7B7F06D441B3} Kvzbtbs.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\b6-eb-7e-51-d1-c6\WpadDecisionTime = d01d78699799da01 Kvzbtbs.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings Kvzbtbs.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad Kvzbtbs.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0117000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Kvzbtbs.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Kvzbtbs.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Kvzbtbs.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{E38402DF-3D1C-46FF-9F71-7B7F06D441B3}\WpadDecisionTime = d01d78699799da01 Kvzbtbs.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{E38402DF-3D1C-46FF-9F71-7B7F06D441B3}\b6-eb-7e-51-d1-c6 Kvzbtbs.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\b6-eb-7e-51-d1-c6\WpadDecisionReason = "1" Kvzbtbs.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings Kvzbtbs.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections Kvzbtbs.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" Kvzbtbs.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{E38402DF-3D1C-46FF-9F71-7B7F06D441B3}\WpadDecisionReason = "1" Kvzbtbs.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{E38402DF-3D1C-46FF-9F71-7B7F06D441B3}\WpadNetworkName = "Network 3" Kvzbtbs.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\b6-eb-7e-51-d1-c6 Kvzbtbs.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\b6-eb-7e-51-d1-c6\WpadDecision = "0" Kvzbtbs.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
svchost.exepid process 2812 svchost.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
tmp.exesvchost.exepid process 1652 tmp.exe 1652 tmp.exe 2812 svchost.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
tmp.exedescription pid process target process PID 1652 wrote to memory of 1944 1652 tmp.exe QQ.exe PID 1652 wrote to memory of 1944 1652 tmp.exe QQ.exe PID 1652 wrote to memory of 1944 1652 tmp.exe QQ.exe PID 1652 wrote to memory of 1944 1652 tmp.exe QQ.exe PID 1652 wrote to memory of 2812 1652 tmp.exe svchost.exe PID 1652 wrote to memory of 2812 1652 tmp.exe svchost.exe PID 1652 wrote to memory of 2812 1652 tmp.exe svchost.exe PID 1652 wrote to memory of 2812 1652 tmp.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Users\Admin\AppData\Roaming\QQ.exe"C:\Users\Admin\AppData\Roaming\QQ.exe"2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
PID:1944
-
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2812
-
-
C:\Program Files (x86)\Kvzbtbs.exe"C:\Program Files (x86)\Kvzbtbs.exe"1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies data under HKEY_USERS
PID:616
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
936KB
MD5f21c518bcafa5fe911f17ffb3c1797b0
SHA16ddf4338b8802ed0e698af6d78695cc12d7e55d6
SHA256a64ace959b459d7f23ceb7b2ff1cbe7f9346e3aa412118d4078b940e13b087a8
SHA512482a3c93ed737da332be810d543a2afd274b6c20ebcdccf4a324cca756629ffcd402c7ba5b514ad19f91bb27ecdc3de0e3baa30f65658c1f152ad1bcc9f8f25f
-
Filesize
1.6MB
MD5e10f2fe129e169b2ac1ce9eeb179c15f
SHA1bf6b5ac1c98b04b2b881522b10277efa4acb72b5
SHA2561419f75027c186e8024396999a6841e6bbbcec531d134f8f26491a0fca9715a0
SHA512590e3c4ddb764ae2764b74f9f6283c7b3635c1dfaf42e3c80b90a2bf71b66b2cff2d5f1519c28965dcbf07152766f28fc827f140cedf3547a5985e4d755cac83