Analysis

  • max time kernel
    140s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    22-07-2024 01:49

General

  • Target

    9553e9d5c162ee6bc5ebe0461a87e5d9d1c66c5be38c3293050d87cf8d048ca0.exe

  • Size

    3.3MB

  • MD5

    8ca55e334f4679e6aadc101833a19a38

  • SHA1

    1b47cf80bfa6c7cb6f72fc0a1046e7ffa91b26a3

  • SHA256

    9553e9d5c162ee6bc5ebe0461a87e5d9d1c66c5be38c3293050d87cf8d048ca0

  • SHA512

    2ebfb891c70f544e1e886d2a98478cdae213323fdc6e741c0dc4082d929ff028fa2fbabe2bcab3f6e365085267da8b55d74af8142c994cf633752624b98e7892

  • SSDEEP

    49152:m/CKxi03zDWi26fs2cWDAbcl7j1v4+9Ry4kjC+Fn05Ricx4PHzLbf:m/CKT0uDhVv4n4MbFn05Ricx4PHzLb

Malware Config

Signatures

  • Generic Chinese Botnet

    A botnet originating from China which is currently unnamed publicly.

  • Chinese Botnet payload 7 IoCs
  • ASPack v2.12-2.42 1 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 4 IoCs
  • Drops file in System32 directory 6 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies data under HKEY_USERS 24 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9553e9d5c162ee6bc5ebe0461a87e5d9d1c66c5be38c3293050d87cf8d048ca0.exe
    "C:\Users\Admin\AppData\Local\Temp\9553e9d5c162ee6bc5ebe0461a87e5d9d1c66c5be38c3293050d87cf8d048ca0.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious behavior: RenamesItself
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2360
    • C:\Users\Admin\AppData\Local\Temp\LwlvQp.exe
      C:\Users\Admin\AppData\Local\Temp\LwlvQp.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • Suspicious use of WriteProcessMemory
      PID:300
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\605d7046.bat" "
        3⤵
          PID:2756
    • C:\Program Files (x86)\Ouymfhh.exe
      "C:\Program Files (x86)\Ouymfhh.exe"
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2712
      • C:\Windows\TEMP\LwlvQp.exe
        C:\Windows\TEMP\LwlvQp.exe
        2⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Modifies data under HKEY_USERS
        • Suspicious use of WriteProcessMemory
        PID:2264
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c ""C:\Windows\TEMP\22073f4a.bat" "
          3⤵
            PID:2956
        • C:\Program Files (x86)\Ouymfhh.exe
          "C:\Program Files (x86)\Ouymfhh.exe" Win7
          2⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:2744

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\LogTransport2.exe

        Filesize

        272KB

        MD5

        b38fc77d987c098876117085327bf8eb

        SHA1

        8724838fe69daa87dcafdb758d53f69c76d814c8

        SHA256

        51bd91fcd252a9f80a951d277c666edbb8ddac8f24d0d7f729f2df8d2bf277c7

        SHA512

        74fe583f189a663f42450a67f245ca0590a1d290261c48017edb8c7dfa5d2f820806a2ed957a426ba8837f0c2352d75f4efd49242a1053bd6634702eae1dcd1f

      • C:\Program Files (x86)\Ouymfhh.exe

        Filesize

        3.3MB

        MD5

        8ca55e334f4679e6aadc101833a19a38

        SHA1

        1b47cf80bfa6c7cb6f72fc0a1046e7ffa91b26a3

        SHA256

        9553e9d5c162ee6bc5ebe0461a87e5d9d1c66c5be38c3293050d87cf8d048ca0

        SHA512

        2ebfb891c70f544e1e886d2a98478cdae213323fdc6e741c0dc4082d929ff028fa2fbabe2bcab3f6e365085267da8b55d74af8142c994cf633752624b98e7892

      • C:\Program Files\7-Zip\Uninstall.exe

        Filesize

        31KB

        MD5

        344958272e2155fa62f0c3822f4a9823

        SHA1

        e801a956657e67fa30d1adf03b13eacfd672ab65

        SHA256

        4603acd00e11d79c7748193f6c8304c0ee5b0078f7372430e84de51d4453be22

        SHA512

        f496d752e8a294bcbcc397935871d949adcb1caaba46c32f20b5236c405d39dee884e7affb51aea3f64928c54ba64fb28af5c03dd9b63d983a31e0f3d49d9283

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\69P6875H\k2[1].rar

        Filesize

        4B

        MD5

        d3b07384d113edec49eaa6238ad5ff00

        SHA1

        f1d2d2f924e986ac86fdf7b36c94bcdf32beec15

        SHA256

        b5bb9d8014a0f9b1d61e21e796d78dccdf1352f23cd32812f4850b878ae4944c

        SHA512

        0cf9180a764aba863a67b6d72f0918bc131c6772642cb2dce5a34f0a702f9470ddc2bf125c12198b1995c233c34b4afd346c54a2334c350a948a51b6e8b4e6b6

      • C:\Users\Admin\AppData\Local\Temp\605d7046.bat

        Filesize

        187B

        MD5

        895603d943e81406facb370c895d17b2

        SHA1

        b4b9967f3ccdf42e0c4d970c80460f38507953c2

        SHA256

        22cf29fcd795460b2a95b338730333d4dff1d793f9e0c4a04199ef914ce97ce4

        SHA512

        bcaa59ca3a98ec713f088ffa5e3fd607d9e19bd2cca8991e60ed5766a4494400ac12935c80ff84af6ca6b80e5fa5fcf823a690f14656e9ee885cc64b31cda75e

      • C:\Users\Admin\AppData\Local\Temp\797F2382.exe

        Filesize

        4B

        MD5

        20879c987e2f9a916e578386d499f629

        SHA1

        c7b33ddcc42361fdb847036fc07e880b81935d5d

        SHA256

        9f2981a7cc4d40a2a409dc895de64253acd819d7c0011c8e80b86fe899464e31

        SHA512

        bcdde1625364dd6dd143b45bdcec8d59cf8982aff33790d390b839f3869e0e815684568b14b555a596d616252aeeaa98dac2e6e551c9095ea11a575ff25ff84f

      • C:\Users\Admin\AppData\Local\Temp\LwlvQp.exe

        Filesize

        15KB

        MD5

        56b2c3810dba2e939a8bb9fa36d3cf96

        SHA1

        99ee31cd4b0d6a4b62779da36e0eeecdd80589fc

        SHA256

        4354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07

        SHA512

        27812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e

      • C:\Windows\Temp\22073f4a.bat

        Filesize

        133B

        MD5

        9b2cb5dd40e495d959fede955b39604b

        SHA1

        96f6cb32f25987f3574e3971ad1256d8b2dbe3c1

        SHA256

        832ea70bc15dc668f0b444a9209e5b917613ae6dae798492e46c07429ca4fd17

        SHA512

        6d2cbb76843cd112dcea3a9bfded6ad73fcc715c66ac3cc662151fa5c79981626b0e6d1c4560b3b64f1fa1f2e5b2cbbce7869a7cbb70bb45be6148010dba5b0c

      • memory/300-11-0x0000000000ED0000-0x0000000000ED9000-memory.dmp

        Filesize

        36KB

      • memory/300-108-0x0000000000ED0000-0x0000000000ED9000-memory.dmp

        Filesize

        36KB

      • memory/2264-33-0x0000000000A60000-0x0000000000A69000-memory.dmp

        Filesize

        36KB

      • memory/2264-125-0x0000000000A60000-0x0000000000A69000-memory.dmp

        Filesize

        36KB

      • memory/2360-7-0x0000000000400000-0x0000000000754000-memory.dmp

        Filesize

        3.3MB

      • memory/2360-9-0x0000000000250000-0x0000000000259000-memory.dmp

        Filesize

        36KB

      • memory/2360-127-0x0000000000400000-0x0000000000754000-memory.dmp

        Filesize

        3.3MB

      • memory/2360-8-0x0000000000250000-0x0000000000259000-memory.dmp

        Filesize

        36KB

      • memory/2360-15-0x0000000010000000-0x000000001001F000-memory.dmp

        Filesize

        124KB

      • memory/2712-30-0x0000000000260000-0x0000000000269000-memory.dmp

        Filesize

        36KB

      • memory/2712-44-0x0000000000400000-0x0000000000754000-memory.dmp

        Filesize

        3.3MB

      • memory/2712-43-0x0000000000260000-0x0000000000269000-memory.dmp

        Filesize

        36KB

      • memory/2712-31-0x0000000000260000-0x0000000000269000-memory.dmp

        Filesize

        36KB

      • memory/2744-80-0x0000000000400000-0x0000000000754000-memory.dmp

        Filesize

        3.3MB

      • memory/2744-45-0x0000000000400000-0x0000000000754000-memory.dmp

        Filesize

        3.3MB