Analysis

  • max time kernel
    31s
  • max time network
    43s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-08-2024 16:13

Errors

Reason
Machine shutdown

General

  • Target

    f36911ffd69559381d8e0eac23c1d050N.exe

  • Size

    540KB

  • MD5

    f36911ffd69559381d8e0eac23c1d050

  • SHA1

    9db83c5a8a04b77005a2a69e639e53a0c938a0db

  • SHA256

    b6896b391ffd66abb4cbf1cfaf4384b00802626ee5e2b1fd61917b31ba71b5c5

  • SHA512

    e72cf53977900daef9ea7d66910b7fc66700bea9252ad97ebc2076c5f5416a288f7ccf188ff52dc0ec82f917d36ffb9ce7106e10ad8a9147586b35868df013b3

  • SSDEEP

    3072:A5OsiQ79xzUcbK9LK/fzuaCrutJUDpRfmm5yqiXO+Zoy/6ESh0Jz5OdRSu:G7hoBO/fzxUpFmkgXO+T/6EJJNaS

Malware Config

Signatures

  • Generic Chinese Botnet

    A botnet originating from China which is currently unnamed publicly.

  • Chinese Botnet payload 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f36911ffd69559381d8e0eac23c1d050N.exe
    "C:\Users\Admin\AppData\Local\Temp\f36911ffd69559381d8e0eac23c1d050N.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:4088

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4088-0-0x0000000010000000-0x0000000010018000-memory.dmp

    Filesize

    96KB