Analysis
-
max time kernel
121s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
25-05-2024 18:03
Static task
static1
Behavioral task
behavioral1
Sample
e81298914a405a0888ead732f9f826669ebcc8035eb0f8a8b1aee6cf06a5a21e.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
e81298914a405a0888ead732f9f826669ebcc8035eb0f8a8b1aee6cf06a5a21e.exe
Resource
win10v2004-20240426-en
General
-
Target
e81298914a405a0888ead732f9f826669ebcc8035eb0f8a8b1aee6cf06a5a21e.exe
-
Size
1.2MB
-
MD5
93c44bca98635844985c4f846d9b3042
-
SHA1
3573fac096b4cd5e381f313f6b022c73317f0295
-
SHA256
e81298914a405a0888ead732f9f826669ebcc8035eb0f8a8b1aee6cf06a5a21e
-
SHA512
593efe5ccac7dfea58682c9c7ef0dceb7bda60ad5d6cf323ec5e7bf07f084aa8edf9c3e166f6b724fd73b95909e1ee335d6d4d29a9a4a4a9aca327a9ef8ab84b
-
SSDEEP
24576:q37Z7Xxs8GVnLEiUuv6txhTCgoxT6v1Hl6a/:y9C8hiUuv6EmHl
Malware Config
Signatures
-
Generic Chinese Botnet
A botnet originating from China which is currently unnamed publicly.
-
Chinese Botnet payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2136-0-0x0000000010000000-0x0000000010018000-memory.dmp unk_chinese_botnet -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
e81298914a405a0888ead732f9f826669ebcc8035eb0f8a8b1aee6cf06a5a21e.exedescription ioc process File opened (read-only) \??\V: e81298914a405a0888ead732f9f826669ebcc8035eb0f8a8b1aee6cf06a5a21e.exe File opened (read-only) \??\I: e81298914a405a0888ead732f9f826669ebcc8035eb0f8a8b1aee6cf06a5a21e.exe File opened (read-only) \??\J: e81298914a405a0888ead732f9f826669ebcc8035eb0f8a8b1aee6cf06a5a21e.exe File opened (read-only) \??\L: e81298914a405a0888ead732f9f826669ebcc8035eb0f8a8b1aee6cf06a5a21e.exe File opened (read-only) \??\O: e81298914a405a0888ead732f9f826669ebcc8035eb0f8a8b1aee6cf06a5a21e.exe File opened (read-only) \??\P: e81298914a405a0888ead732f9f826669ebcc8035eb0f8a8b1aee6cf06a5a21e.exe File opened (read-only) \??\Q: e81298914a405a0888ead732f9f826669ebcc8035eb0f8a8b1aee6cf06a5a21e.exe File opened (read-only) \??\S: e81298914a405a0888ead732f9f826669ebcc8035eb0f8a8b1aee6cf06a5a21e.exe File opened (read-only) \??\Z: e81298914a405a0888ead732f9f826669ebcc8035eb0f8a8b1aee6cf06a5a21e.exe File opened (read-only) \??\K: e81298914a405a0888ead732f9f826669ebcc8035eb0f8a8b1aee6cf06a5a21e.exe File opened (read-only) \??\N: e81298914a405a0888ead732f9f826669ebcc8035eb0f8a8b1aee6cf06a5a21e.exe File opened (read-only) \??\T: e81298914a405a0888ead732f9f826669ebcc8035eb0f8a8b1aee6cf06a5a21e.exe File opened (read-only) \??\B: e81298914a405a0888ead732f9f826669ebcc8035eb0f8a8b1aee6cf06a5a21e.exe File opened (read-only) \??\G: e81298914a405a0888ead732f9f826669ebcc8035eb0f8a8b1aee6cf06a5a21e.exe File opened (read-only) \??\H: e81298914a405a0888ead732f9f826669ebcc8035eb0f8a8b1aee6cf06a5a21e.exe File opened (read-only) \??\M: e81298914a405a0888ead732f9f826669ebcc8035eb0f8a8b1aee6cf06a5a21e.exe File opened (read-only) \??\Y: e81298914a405a0888ead732f9f826669ebcc8035eb0f8a8b1aee6cf06a5a21e.exe File opened (read-only) \??\E: e81298914a405a0888ead732f9f826669ebcc8035eb0f8a8b1aee6cf06a5a21e.exe File opened (read-only) \??\R: e81298914a405a0888ead732f9f826669ebcc8035eb0f8a8b1aee6cf06a5a21e.exe File opened (read-only) \??\U: e81298914a405a0888ead732f9f826669ebcc8035eb0f8a8b1aee6cf06a5a21e.exe File opened (read-only) \??\W: e81298914a405a0888ead732f9f826669ebcc8035eb0f8a8b1aee6cf06a5a21e.exe File opened (read-only) \??\X: e81298914a405a0888ead732f9f826669ebcc8035eb0f8a8b1aee6cf06a5a21e.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
e81298914a405a0888ead732f9f826669ebcc8035eb0f8a8b1aee6cf06a5a21e.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz e81298914a405a0888ead732f9f826669ebcc8035eb0f8a8b1aee6cf06a5a21e.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 e81298914a405a0888ead732f9f826669ebcc8035eb0f8a8b1aee6cf06a5a21e.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
e81298914a405a0888ead732f9f826669ebcc8035eb0f8a8b1aee6cf06a5a21e.exepid process 2136 e81298914a405a0888ead732f9f826669ebcc8035eb0f8a8b1aee6cf06a5a21e.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
e81298914a405a0888ead732f9f826669ebcc8035eb0f8a8b1aee6cf06a5a21e.exepid process 2136 e81298914a405a0888ead732f9f826669ebcc8035eb0f8a8b1aee6cf06a5a21e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e81298914a405a0888ead732f9f826669ebcc8035eb0f8a8b1aee6cf06a5a21e.exe"C:\Users\Admin\AppData\Local\Temp\e81298914a405a0888ead732f9f826669ebcc8035eb0f8a8b1aee6cf06a5a21e.exe"1⤵
- Enumerates connected drives
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2136