Analysis
-
max time kernel
140s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
23-06-2024 09:46
Static task
static1
Behavioral task
behavioral1
Sample
e3d105dc1dd582851c2c91cd4c0236224aca8a26670112e52750209527ef92aa.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
e3d105dc1dd582851c2c91cd4c0236224aca8a26670112e52750209527ef92aa.exe
Resource
win10v2004-20240508-en
General
-
Target
e3d105dc1dd582851c2c91cd4c0236224aca8a26670112e52750209527ef92aa.exe
-
Size
1.0MB
-
MD5
5194004ec7dc8f3b91532982e07ed868
-
SHA1
58c3ab31d2c38e28939d0ff440dd567ba97a85c6
-
SHA256
e3d105dc1dd582851c2c91cd4c0236224aca8a26670112e52750209527ef92aa
-
SHA512
bd75ba602227ef1076ccb529c88cfd1d641fe21952f9796628e7dde31c1b0323cf45c267e1e350dacefd850c565bacfd13efc75147138f474c514f61582c3ac2
-
SSDEEP
3072:r3yG5wEOTetgIGjxyr3KMLu9vJGq0wSCKY2vMY2iudSZjuZj7QDYQG4jvmat896K:Tyq9ptgIsxITrY0QMuQDYQ9jv89Ak
Malware Config
Signatures
-
Generic Chinese Botnet
A botnet originating from China which is currently unnamed publicly.
-
Chinese Botnet payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/2028-1-0x0000000010000000-0x0000000010018000-memory.dmp unk_chinese_botnet behavioral1/memory/2028-9-0x0000000000400000-0x000000000050C000-memory.dmp unk_chinese_botnet -
Executes dropped EXE 1 IoCs
Processes:
Knhxbze.exepid Process 2712 Knhxbze.exe -
Drops file in System32 directory 1 IoCs
Processes:
Knhxbze.exedescription ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat Knhxbze.exe -
Drops file in Program Files directory 2 IoCs
Processes:
e3d105dc1dd582851c2c91cd4c0236224aca8a26670112e52750209527ef92aa.exedescription ioc Process File created C:\Program Files (x86)\Microsoft Auiqyy\Knhxbze.exe e3d105dc1dd582851c2c91cd4c0236224aca8a26670112e52750209527ef92aa.exe File opened for modification C:\Program Files (x86)\Microsoft Auiqyy\Knhxbze.exe e3d105dc1dd582851c2c91cd4c0236224aca8a26670112e52750209527ef92aa.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 24 IoCs
Processes:
Knhxbze.exedescription ioc Process Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Knhxbze.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" Knhxbze.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" Knhxbze.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" Knhxbze.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" Knhxbze.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{5795B581-5DB6-4FFF-AC52-E33B4B68711D}\62-87-f1-8e-c4-b7 Knhxbze.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad Knhxbze.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0064000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Knhxbze.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{5795B581-5DB6-4FFF-AC52-E33B4B68711D} Knhxbze.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\62-87-f1-8e-c4-b7\WpadDecision = "0" Knhxbze.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{5795B581-5DB6-4FFF-AC52-E33B4B68711D}\WpadNetworkName = "Network 3" Knhxbze.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections Knhxbze.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ Knhxbze.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" Knhxbze.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix Knhxbze.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{5795B581-5DB6-4FFF-AC52-E33B4B68711D}\WpadDecisionReason = "1" Knhxbze.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{5795B581-5DB6-4FFF-AC52-E33B4B68711D}\WpadDecision = "0" Knhxbze.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\62-87-f1-8e-c4-b7\WpadDecisionTime = 60ca745352c5da01 Knhxbze.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings Knhxbze.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings Knhxbze.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Knhxbze.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{5795B581-5DB6-4FFF-AC52-E33B4B68711D}\WpadDecisionTime = 60ca745352c5da01 Knhxbze.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\62-87-f1-8e-c4-b7 Knhxbze.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\62-87-f1-8e-c4-b7\WpadDecisionReason = "1" Knhxbze.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
e3d105dc1dd582851c2c91cd4c0236224aca8a26670112e52750209527ef92aa.exepid Process 2028 e3d105dc1dd582851c2c91cd4c0236224aca8a26670112e52750209527ef92aa.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
e3d105dc1dd582851c2c91cd4c0236224aca8a26670112e52750209527ef92aa.exeKnhxbze.exepid Process 2028 e3d105dc1dd582851c2c91cd4c0236224aca8a26670112e52750209527ef92aa.exe 2712 Knhxbze.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e3d105dc1dd582851c2c91cd4c0236224aca8a26670112e52750209527ef92aa.exe"C:\Users\Admin\AppData\Local\Temp\e3d105dc1dd582851c2c91cd4c0236224aca8a26670112e52750209527ef92aa.exe"1⤵
- Drops file in Program Files directory
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
PID:2028
-
C:\Program Files (x86)\Microsoft Auiqyy\Knhxbze.exe"C:\Program Files (x86)\Microsoft Auiqyy\Knhxbze.exe"1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:2712
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD55194004ec7dc8f3b91532982e07ed868
SHA158c3ab31d2c38e28939d0ff440dd567ba97a85c6
SHA256e3d105dc1dd582851c2c91cd4c0236224aca8a26670112e52750209527ef92aa
SHA512bd75ba602227ef1076ccb529c88cfd1d641fe21952f9796628e7dde31c1b0323cf45c267e1e350dacefd850c565bacfd13efc75147138f474c514f61582c3ac2