Analysis

  • max time kernel
    140s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    01-08-2024 00:58

General

  • Target

    b6896b391ffd66abb4cbf1cfaf4384b00802626ee5e2b1fd61917b31ba71b5c5.exe

  • Size

    540KB

  • MD5

    f36911ffd69559381d8e0eac23c1d050

  • SHA1

    9db83c5a8a04b77005a2a69e639e53a0c938a0db

  • SHA256

    b6896b391ffd66abb4cbf1cfaf4384b00802626ee5e2b1fd61917b31ba71b5c5

  • SHA512

    e72cf53977900daef9ea7d66910b7fc66700bea9252ad97ebc2076c5f5416a288f7ccf188ff52dc0ec82f917d36ffb9ce7106e10ad8a9147586b35868df013b3

  • SSDEEP

    3072:A5OsiQ79xzUcbK9LK/fzuaCrutJUDpRfmm5yqiXO+Zoy/6ESh0Jz5OdRSu:G7hoBO/fzxUpFmkgXO+T/6EJJNaS

Malware Config

Signatures

  • Generic Chinese Botnet

    A botnet originating from China which is currently unnamed publicly.

  • Chinese Botnet payload 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 7 IoCs
  • Drops file in Program Files directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b6896b391ffd66abb4cbf1cfaf4384b00802626ee5e2b1fd61917b31ba71b5c5.exe
    "C:\Users\Admin\AppData\Local\Temp\b6896b391ffd66abb4cbf1cfaf4384b00802626ee5e2b1fd61917b31ba71b5c5.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: RenamesItself
    • Suspicious use of SetWindowsHookEx
    PID:1964
  • C:\Program Files (x86)\Cmnurtw.exe
    "C:\Program Files (x86)\Cmnurtw.exe"
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2220
    • C:\Program Files (x86)\Cmnurtw.exe
      "C:\Program Files (x86)\Cmnurtw.exe" Win7
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:936

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Cmnurtw.exe

    Filesize

    540KB

    MD5

    f36911ffd69559381d8e0eac23c1d050

    SHA1

    9db83c5a8a04b77005a2a69e639e53a0c938a0db

    SHA256

    b6896b391ffd66abb4cbf1cfaf4384b00802626ee5e2b1fd61917b31ba71b5c5

    SHA512

    e72cf53977900daef9ea7d66910b7fc66700bea9252ad97ebc2076c5f5416a288f7ccf188ff52dc0ec82f917d36ffb9ce7106e10ad8a9147586b35868df013b3

  • memory/1964-0-0x0000000010000000-0x0000000010018000-memory.dmp

    Filesize

    96KB

  • memory/1964-22-0x0000000000400000-0x000000000048A000-memory.dmp

    Filesize

    552KB