Analysis
-
max time kernel
140s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13-07-2024 06:36
Static task
static1
Behavioral task
behavioral1
Sample
f22b785b33c40c33339c6aca991d641eed3242d26d3aeab1dcb09b2d98989ce9.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f22b785b33c40c33339c6aca991d641eed3242d26d3aeab1dcb09b2d98989ce9.exe
Resource
win10v2004-20240709-en
General
-
Target
f22b785b33c40c33339c6aca991d641eed3242d26d3aeab1dcb09b2d98989ce9.exe
-
Size
3.3MB
-
MD5
0d3bbd53d76c3b625da39c50fb00ea30
-
SHA1
2c919e370cf9166b91f3d586a1618df24a349d7c
-
SHA256
f22b785b33c40c33339c6aca991d641eed3242d26d3aeab1dcb09b2d98989ce9
-
SHA512
bd919245623db347895af691c8d7705740aa39e9c44a634aa9c8f9918125de46c955cc69397a9caf84203a033750d4443552f08e64bc74305111bed339b07168
-
SSDEEP
49152:t/3Uxi03zDWi26fs2cWDAbcl7jkv4+9Ry4kjCz:t/ET0uDhEv4n4M
Malware Config
Signatures
-
Generic Chinese Botnet
A botnet originating from China which is currently unnamed publicly.
-
Chinese Botnet payload 2 IoCs
resource yara_rule behavioral1/memory/2360-0-0x0000000010000000-0x000000001001F000-memory.dmp unk_chinese_botnet behavioral1/memory/2360-19-0x0000000000400000-0x000000000074F000-memory.dmp unk_chinese_botnet -
Executes dropped EXE 2 IoCs
pid Process 1364 Bkcphfl.exe 2696 Bkcphfl.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\O: f22b785b33c40c33339c6aca991d641eed3242d26d3aeab1dcb09b2d98989ce9.exe File opened (read-only) \??\S: f22b785b33c40c33339c6aca991d641eed3242d26d3aeab1dcb09b2d98989ce9.exe File opened (read-only) \??\Z: f22b785b33c40c33339c6aca991d641eed3242d26d3aeab1dcb09b2d98989ce9.exe File opened (read-only) \??\G: f22b785b33c40c33339c6aca991d641eed3242d26d3aeab1dcb09b2d98989ce9.exe File opened (read-only) \??\I: f22b785b33c40c33339c6aca991d641eed3242d26d3aeab1dcb09b2d98989ce9.exe File opened (read-only) \??\N: f22b785b33c40c33339c6aca991d641eed3242d26d3aeab1dcb09b2d98989ce9.exe File opened (read-only) \??\B: f22b785b33c40c33339c6aca991d641eed3242d26d3aeab1dcb09b2d98989ce9.exe File opened (read-only) \??\U: f22b785b33c40c33339c6aca991d641eed3242d26d3aeab1dcb09b2d98989ce9.exe File opened (read-only) \??\X: f22b785b33c40c33339c6aca991d641eed3242d26d3aeab1dcb09b2d98989ce9.exe File opened (read-only) \??\M: f22b785b33c40c33339c6aca991d641eed3242d26d3aeab1dcb09b2d98989ce9.exe File opened (read-only) \??\V: f22b785b33c40c33339c6aca991d641eed3242d26d3aeab1dcb09b2d98989ce9.exe File opened (read-only) \??\W: f22b785b33c40c33339c6aca991d641eed3242d26d3aeab1dcb09b2d98989ce9.exe File opened (read-only) \??\Y: f22b785b33c40c33339c6aca991d641eed3242d26d3aeab1dcb09b2d98989ce9.exe File opened (read-only) \??\E: f22b785b33c40c33339c6aca991d641eed3242d26d3aeab1dcb09b2d98989ce9.exe File opened (read-only) \??\J: f22b785b33c40c33339c6aca991d641eed3242d26d3aeab1dcb09b2d98989ce9.exe File opened (read-only) \??\K: f22b785b33c40c33339c6aca991d641eed3242d26d3aeab1dcb09b2d98989ce9.exe File opened (read-only) \??\Q: f22b785b33c40c33339c6aca991d641eed3242d26d3aeab1dcb09b2d98989ce9.exe File opened (read-only) \??\R: f22b785b33c40c33339c6aca991d641eed3242d26d3aeab1dcb09b2d98989ce9.exe File opened (read-only) \??\T: f22b785b33c40c33339c6aca991d641eed3242d26d3aeab1dcb09b2d98989ce9.exe File opened (read-only) \??\H: f22b785b33c40c33339c6aca991d641eed3242d26d3aeab1dcb09b2d98989ce9.exe File opened (read-only) \??\L: f22b785b33c40c33339c6aca991d641eed3242d26d3aeab1dcb09b2d98989ce9.exe File opened (read-only) \??\P: f22b785b33c40c33339c6aca991d641eed3242d26d3aeab1dcb09b2d98989ce9.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Windows NT\Bkcphfl.exe f22b785b33c40c33339c6aca991d641eed3242d26d3aeab1dcb09b2d98989ce9.exe File opened for modification C:\Program Files (x86)\Windows NT\Bkcphfl.exe f22b785b33c40c33339c6aca991d641eed3242d26d3aeab1dcb09b2d98989ce9.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 f22b785b33c40c33339c6aca991d641eed3242d26d3aeab1dcb09b2d98989ce9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz f22b785b33c40c33339c6aca991d641eed3242d26d3aeab1dcb09b2d98989ce9.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2360 f22b785b33c40c33339c6aca991d641eed3242d26d3aeab1dcb09b2d98989ce9.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2360 f22b785b33c40c33339c6aca991d641eed3242d26d3aeab1dcb09b2d98989ce9.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2360 f22b785b33c40c33339c6aca991d641eed3242d26d3aeab1dcb09b2d98989ce9.exe 1364 Bkcphfl.exe 2696 Bkcphfl.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1364 wrote to memory of 2696 1364 Bkcphfl.exe 32 PID 1364 wrote to memory of 2696 1364 Bkcphfl.exe 32 PID 1364 wrote to memory of 2696 1364 Bkcphfl.exe 32 PID 1364 wrote to memory of 2696 1364 Bkcphfl.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\f22b785b33c40c33339c6aca991d641eed3242d26d3aeab1dcb09b2d98989ce9.exe"C:\Users\Admin\AppData\Local\Temp\f22b785b33c40c33339c6aca991d641eed3242d26d3aeab1dcb09b2d98989ce9.exe"1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
PID:2360
-
C:\Program Files (x86)\Windows NT\Bkcphfl.exe"C:\Program Files (x86)\Windows NT\Bkcphfl.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Program Files (x86)\Windows NT\Bkcphfl.exe"C:\Program Files (x86)\Windows NT\Bkcphfl.exe" Win72⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2696
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.3MB
MD50d3bbd53d76c3b625da39c50fb00ea30
SHA12c919e370cf9166b91f3d586a1618df24a349d7c
SHA256f22b785b33c40c33339c6aca991d641eed3242d26d3aeab1dcb09b2d98989ce9
SHA512bd919245623db347895af691c8d7705740aa39e9c44a634aa9c8f9918125de46c955cc69397a9caf84203a033750d4443552f08e64bc74305111bed339b07168