Analysis
-
max time kernel
150s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
31-05-2024 13:10
Static task
static1
Behavioral task
behavioral1
Sample
b6c410e2aa13dc37f1ff8c7a70bda551b72866bf31f38a7e1a93caaff71537a8.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
b6c410e2aa13dc37f1ff8c7a70bda551b72866bf31f38a7e1a93caaff71537a8.exe
Resource
win10v2004-20240426-en
General
-
Target
b6c410e2aa13dc37f1ff8c7a70bda551b72866bf31f38a7e1a93caaff71537a8.exe
-
Size
3.3MB
-
MD5
74b7a044f7d030794199d591d6de2730
-
SHA1
39f9532920fb3386c9aefcfde557162eac4b241d
-
SHA256
b6c410e2aa13dc37f1ff8c7a70bda551b72866bf31f38a7e1a93caaff71537a8
-
SHA512
e37422d6981cb8d1c6802fe8f2ceeb8e93cfb079678221dd40d080b8a42ad2dfacab65d5bb2b19a9fef0de974df2b47c8528b48f06e13b36a25a260361b4b5d8
-
SSDEEP
49152:t/7ZQgxi03zDWi26fs2cWDAbcl7jkv4+9Ry4kjCz:t/7ZDT0uDhEv4n4M
Malware Config
Signatures
-
Generic Chinese Botnet
A botnet originating from China which is currently unnamed publicly.
-
Chinese Botnet payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/2616-0-0x0000000010000000-0x000000001001F000-memory.dmp unk_chinese_botnet behavioral1/memory/2616-18-0x0000000000400000-0x000000000074F000-memory.dmp unk_chinese_botnet -
Executes dropped EXE 2 IoCs
Processes:
Uelvlmp.exeUelvlmp.exepid Process 2580 Uelvlmp.exe 2560 Uelvlmp.exe -
Drops file in Program Files directory 2 IoCs
Processes:
b6c410e2aa13dc37f1ff8c7a70bda551b72866bf31f38a7e1a93caaff71537a8.exedescription ioc Process File created C:\Program Files (x86)\Uelvlmp.exe b6c410e2aa13dc37f1ff8c7a70bda551b72866bf31f38a7e1a93caaff71537a8.exe File opened for modification C:\Program Files (x86)\Uelvlmp.exe b6c410e2aa13dc37f1ff8c7a70bda551b72866bf31f38a7e1a93caaff71537a8.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
b6c410e2aa13dc37f1ff8c7a70bda551b72866bf31f38a7e1a93caaff71537a8.exepid Process 2616 b6c410e2aa13dc37f1ff8c7a70bda551b72866bf31f38a7e1a93caaff71537a8.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
b6c410e2aa13dc37f1ff8c7a70bda551b72866bf31f38a7e1a93caaff71537a8.exeUelvlmp.exeUelvlmp.exepid Process 2616 b6c410e2aa13dc37f1ff8c7a70bda551b72866bf31f38a7e1a93caaff71537a8.exe 2580 Uelvlmp.exe 2560 Uelvlmp.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
Uelvlmp.exedescription pid Process procid_target PID 2580 wrote to memory of 2560 2580 Uelvlmp.exe 29 PID 2580 wrote to memory of 2560 2580 Uelvlmp.exe 29 PID 2580 wrote to memory of 2560 2580 Uelvlmp.exe 29 PID 2580 wrote to memory of 2560 2580 Uelvlmp.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\b6c410e2aa13dc37f1ff8c7a70bda551b72866bf31f38a7e1a93caaff71537a8.exe"C:\Users\Admin\AppData\Local\Temp\b6c410e2aa13dc37f1ff8c7a70bda551b72866bf31f38a7e1a93caaff71537a8.exe"1⤵
- Drops file in Program Files directory
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
PID:2616
-
C:\Program Files (x86)\Uelvlmp.exe"C:\Program Files (x86)\Uelvlmp.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Program Files (x86)\Uelvlmp.exe"C:\Program Files (x86)\Uelvlmp.exe" Win72⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2560
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.3MB
MD574b7a044f7d030794199d591d6de2730
SHA139f9532920fb3386c9aefcfde557162eac4b241d
SHA256b6c410e2aa13dc37f1ff8c7a70bda551b72866bf31f38a7e1a93caaff71537a8
SHA512e37422d6981cb8d1c6802fe8f2ceeb8e93cfb079678221dd40d080b8a42ad2dfacab65d5bb2b19a9fef0de974df2b47c8528b48f06e13b36a25a260361b4b5d8