Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
11-07-2024 13:05
Behavioral task
behavioral1
Sample
7bc28d02456cd0c3b4a952ba9cea849da6884848df86a071031efa362d96fc5c.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
7bc28d02456cd0c3b4a952ba9cea849da6884848df86a071031efa362d96fc5c.exe
Resource
win10v2004-20240709-en
General
-
Target
7bc28d02456cd0c3b4a952ba9cea849da6884848df86a071031efa362d96fc5c.exe
-
Size
3.0MB
-
MD5
1b1b95966906e1e7252f1ccb5d1a7d48
-
SHA1
9a4e7915ebdd487421c8fb0d5d777151dbdf120d
-
SHA256
7bc28d02456cd0c3b4a952ba9cea849da6884848df86a071031efa362d96fc5c
-
SHA512
19267b670d83bb3746ee5b9ae13efeabb4d0a68377456894e0ee1821b8bb37859c83da9991b8807d0c5b1ca89dc5da4a36ae3a15010a088ef4a4ccb9cf58fe0d
-
SSDEEP
49152:V/CAxi03zDWi26fs2cWDAbcl7j1v4+9Ry4kjCfJ:V/CAT0uDhVv4n4Mk
Malware Config
Signatures
-
Generic Chinese Botnet
A botnet originating from China which is currently unnamed publicly.
-
Chinese Botnet payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/1644-0-0x0000000010000000-0x000000001001F000-memory.dmp unk_chinese_botnet behavioral1/files/0x000700000001211a-7.dat unk_chinese_botnet behavioral1/memory/1644-18-0x0000000000400000-0x000000000070C000-memory.dmp unk_chinese_botnet -
Executes dropped EXE 2 IoCs
Processes:
Hwzbjye.scrHwzbjye.scrpid Process 2052 Hwzbjye.scr 1860 Hwzbjye.scr -
Drops file in Program Files directory 2 IoCs
Processes:
7bc28d02456cd0c3b4a952ba9cea849da6884848df86a071031efa362d96fc5c.exedescription ioc Process File created C:\Program Files (x86)\Hwzbjye.scr 7bc28d02456cd0c3b4a952ba9cea849da6884848df86a071031efa362d96fc5c.exe File opened for modification C:\Program Files (x86)\Hwzbjye.scr 7bc28d02456cd0c3b4a952ba9cea849da6884848df86a071031efa362d96fc5c.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
7bc28d02456cd0c3b4a952ba9cea849da6884848df86a071031efa362d96fc5c.exepid Process 1644 7bc28d02456cd0c3b4a952ba9cea849da6884848df86a071031efa362d96fc5c.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
7bc28d02456cd0c3b4a952ba9cea849da6884848df86a071031efa362d96fc5c.exeHwzbjye.scrHwzbjye.scrpid Process 1644 7bc28d02456cd0c3b4a952ba9cea849da6884848df86a071031efa362d96fc5c.exe 2052 Hwzbjye.scr 1860 Hwzbjye.scr -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
Hwzbjye.scrdescription pid Process procid_target PID 2052 wrote to memory of 1860 2052 Hwzbjye.scr 31 PID 2052 wrote to memory of 1860 2052 Hwzbjye.scr 31 PID 2052 wrote to memory of 1860 2052 Hwzbjye.scr 31 PID 2052 wrote to memory of 1860 2052 Hwzbjye.scr 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\7bc28d02456cd0c3b4a952ba9cea849da6884848df86a071031efa362d96fc5c.exe"C:\Users\Admin\AppData\Local\Temp\7bc28d02456cd0c3b4a952ba9cea849da6884848df86a071031efa362d96fc5c.exe"1⤵
- Drops file in Program Files directory
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
PID:1644
-
C:\Program Files (x86)\Hwzbjye.scr"C:\Program Files (x86)\Hwzbjye.scr"1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Program Files (x86)\Hwzbjye.scr"C:\Program Files (x86)\Hwzbjye.scr" Win72⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1860
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.0MB
MD51b1b95966906e1e7252f1ccb5d1a7d48
SHA19a4e7915ebdd487421c8fb0d5d777151dbdf120d
SHA2567bc28d02456cd0c3b4a952ba9cea849da6884848df86a071031efa362d96fc5c
SHA51219267b670d83bb3746ee5b9ae13efeabb4d0a68377456894e0ee1821b8bb37859c83da9991b8807d0c5b1ca89dc5da4a36ae3a15010a088ef4a4ccb9cf58fe0d