Analysis
-
max time kernel
150s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
01-06-2024 10:37
Behavioral task
behavioral1
Sample
cfacda29e7f1dcb61c156b1f2e0c41ba47f82ddc4209bebe0b188659597bc9a0.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
cfacda29e7f1dcb61c156b1f2e0c41ba47f82ddc4209bebe0b188659597bc9a0.exe
Resource
win10v2004-20240508-en
General
-
Target
cfacda29e7f1dcb61c156b1f2e0c41ba47f82ddc4209bebe0b188659597bc9a0.exe
-
Size
3.3MB
-
MD5
6e2c04d216d77394044c3b05c0c31024
-
SHA1
1ccfe8ea8951484afab67349faa715fde70f4b15
-
SHA256
cfacda29e7f1dcb61c156b1f2e0c41ba47f82ddc4209bebe0b188659597bc9a0
-
SHA512
f5098d356e83f68f71589c208333d978ffaea179425c6ca267b4ac2406d1f4a0f6cc8a60029206a0df5d1c3894927633b08fbfd1752a5430af85ed7926a1d929
-
SSDEEP
49152:V/CKxi03zDWi26fs2cWDAbcl7j1v4+9Ry4kjC+Fn05Ricx4PHzLbf:V/CKT0uDhVv4n4MbFn05Ricx4PHzLb
Malware Config
Signatures
-
Generic Chinese Botnet
A botnet originating from China which is currently unnamed publicly.
-
Chinese Botnet payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/2068-0-0x0000000010000000-0x000000001001F000-memory.dmp unk_chinese_botnet C:\Program Files (x86)\Ouymfhh.exe unk_chinese_botnet behavioral1/memory/2068-18-0x0000000000400000-0x000000000074F000-memory.dmp unk_chinese_botnet -
Executes dropped EXE 2 IoCs
Processes:
Ouymfhh.exeOuymfhh.exepid process 1676 Ouymfhh.exe 2916 Ouymfhh.exe -
Drops file in Program Files directory 2 IoCs
Processes:
cfacda29e7f1dcb61c156b1f2e0c41ba47f82ddc4209bebe0b188659597bc9a0.exedescription ioc process File opened for modification C:\Program Files (x86)\Ouymfhh.exe cfacda29e7f1dcb61c156b1f2e0c41ba47f82ddc4209bebe0b188659597bc9a0.exe File created C:\Program Files (x86)\Ouymfhh.exe cfacda29e7f1dcb61c156b1f2e0c41ba47f82ddc4209bebe0b188659597bc9a0.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
cfacda29e7f1dcb61c156b1f2e0c41ba47f82ddc4209bebe0b188659597bc9a0.exepid process 2068 cfacda29e7f1dcb61c156b1f2e0c41ba47f82ddc4209bebe0b188659597bc9a0.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
cfacda29e7f1dcb61c156b1f2e0c41ba47f82ddc4209bebe0b188659597bc9a0.exeOuymfhh.exeOuymfhh.exepid process 2068 cfacda29e7f1dcb61c156b1f2e0c41ba47f82ddc4209bebe0b188659597bc9a0.exe 1676 Ouymfhh.exe 2916 Ouymfhh.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
Ouymfhh.exedescription pid process target process PID 1676 wrote to memory of 2916 1676 Ouymfhh.exe Ouymfhh.exe PID 1676 wrote to memory of 2916 1676 Ouymfhh.exe Ouymfhh.exe PID 1676 wrote to memory of 2916 1676 Ouymfhh.exe Ouymfhh.exe PID 1676 wrote to memory of 2916 1676 Ouymfhh.exe Ouymfhh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cfacda29e7f1dcb61c156b1f2e0c41ba47f82ddc4209bebe0b188659597bc9a0.exe"C:\Users\Admin\AppData\Local\Temp\cfacda29e7f1dcb61c156b1f2e0c41ba47f82ddc4209bebe0b188659597bc9a0.exe"1⤵
- Drops file in Program Files directory
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
PID:2068
-
C:\Program Files (x86)\Ouymfhh.exe"C:\Program Files (x86)\Ouymfhh.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Program Files (x86)\Ouymfhh.exe"C:\Program Files (x86)\Ouymfhh.exe" Win72⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2916
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.3MB
MD56e2c04d216d77394044c3b05c0c31024
SHA11ccfe8ea8951484afab67349faa715fde70f4b15
SHA256cfacda29e7f1dcb61c156b1f2e0c41ba47f82ddc4209bebe0b188659597bc9a0
SHA512f5098d356e83f68f71589c208333d978ffaea179425c6ca267b4ac2406d1f4a0f6cc8a60029206a0df5d1c3894927633b08fbfd1752a5430af85ed7926a1d929