Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    11-09-2024 22:01

General

  • Target

    4cc1ab70e6fd0d4441c778d40212c6e3114e14d56da85717214f8498e1c1501b.exe

  • Size

    940KB

  • MD5

    b36366f4a27987d6de47887b03f29c68

  • SHA1

    6f290bd6c132ec5c824558a29bdf75d25ced94e3

  • SHA256

    4cc1ab70e6fd0d4441c778d40212c6e3114e14d56da85717214f8498e1c1501b

  • SHA512

    a9441175872e88fc49482ef4707fad0e1f15a3ee1f4c74f3a2fafd3744968025d35ca61ed1905239a01df58511985e00708cdae7cb9acae4cca8b51032e02359

  • SSDEEP

    24576:q4bDOphvGTO5+L0Un5cOoaPaoWXqEinqg4dNMBlqD9:HD2n+H5cOoUao+vib4rMu

Malware Config

Signatures

  • Generic Chinese Botnet

    A botnet originating from China which is currently unnamed publicly.

  • Chinese Botnet payload 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 44 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4cc1ab70e6fd0d4441c778d40212c6e3114e14d56da85717214f8498e1c1501b.exe
    "C:\Users\Admin\AppData\Local\Temp\4cc1ab70e6fd0d4441c778d40212c6e3114e14d56da85717214f8498e1c1501b.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2864
  • C:\Program Files (x86)\Dhttdfv.exe
    "C:\Program Files (x86)\Dhttdfv.exe"
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    PID:5480

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Dhttdfv.exe

    Filesize

    940KB

    MD5

    b36366f4a27987d6de47887b03f29c68

    SHA1

    6f290bd6c132ec5c824558a29bdf75d25ced94e3

    SHA256

    4cc1ab70e6fd0d4441c778d40212c6e3114e14d56da85717214f8498e1c1501b

    SHA512

    a9441175872e88fc49482ef4707fad0e1f15a3ee1f4c74f3a2fafd3744968025d35ca61ed1905239a01df58511985e00708cdae7cb9acae4cca8b51032e02359

  • memory/2864-534-0x0000000002250000-0x0000000002361000-memory.dmp

    Filesize

    1.1MB

  • memory/2864-16609-0x0000000000400000-0x0000000000549000-memory.dmp

    Filesize

    1.3MB

  • memory/2864-504-0x0000000002250000-0x0000000002361000-memory.dmp

    Filesize

    1.1MB

  • memory/2864-548-0x0000000002250000-0x0000000002361000-memory.dmp

    Filesize

    1.1MB

  • memory/2864-508-0x0000000002250000-0x0000000002361000-memory.dmp

    Filesize

    1.1MB

  • memory/2864-510-0x0000000002250000-0x0000000002361000-memory.dmp

    Filesize

    1.1MB

  • memory/2864-512-0x0000000002250000-0x0000000002361000-memory.dmp

    Filesize

    1.1MB

  • memory/2864-514-0x0000000002250000-0x0000000002361000-memory.dmp

    Filesize

    1.1MB

  • memory/2864-518-0x0000000002250000-0x0000000002361000-memory.dmp

    Filesize

    1.1MB

  • memory/2864-522-0x0000000002250000-0x0000000002361000-memory.dmp

    Filesize

    1.1MB

  • memory/2864-520-0x0000000002250000-0x0000000002361000-memory.dmp

    Filesize

    1.1MB

  • memory/2864-516-0x0000000002250000-0x0000000002361000-memory.dmp

    Filesize

    1.1MB

  • memory/2864-524-0x0000000002250000-0x0000000002361000-memory.dmp

    Filesize

    1.1MB

  • memory/2864-526-0x0000000002250000-0x0000000002361000-memory.dmp

    Filesize

    1.1MB

  • memory/2864-528-0x0000000002250000-0x0000000002361000-memory.dmp

    Filesize

    1.1MB

  • memory/2864-530-0x0000000002250000-0x0000000002361000-memory.dmp

    Filesize

    1.1MB

  • memory/2864-532-0x0000000002250000-0x0000000002361000-memory.dmp

    Filesize

    1.1MB

  • memory/2864-0-0x0000000000400000-0x0000000000549000-memory.dmp

    Filesize

    1.3MB

  • memory/2864-506-0x0000000002250000-0x0000000002361000-memory.dmp

    Filesize

    1.1MB

  • memory/2864-503-0x0000000002250000-0x0000000002361000-memory.dmp

    Filesize

    1.1MB

  • memory/2864-562-0x0000000002250000-0x0000000002361000-memory.dmp

    Filesize

    1.1MB

  • memory/2864-564-0x0000000002250000-0x0000000002361000-memory.dmp

    Filesize

    1.1MB

  • memory/2864-560-0x0000000002250000-0x0000000002361000-memory.dmp

    Filesize

    1.1MB

  • memory/2864-558-0x0000000002250000-0x0000000002361000-memory.dmp

    Filesize

    1.1MB

  • memory/2864-556-0x0000000002250000-0x0000000002361000-memory.dmp

    Filesize

    1.1MB

  • memory/2864-554-0x0000000002250000-0x0000000002361000-memory.dmp

    Filesize

    1.1MB

  • memory/2864-552-0x0000000002250000-0x0000000002361000-memory.dmp

    Filesize

    1.1MB

  • memory/2864-550-0x0000000002250000-0x0000000002361000-memory.dmp

    Filesize

    1.1MB

  • memory/2864-546-0x0000000002250000-0x0000000002361000-memory.dmp

    Filesize

    1.1MB

  • memory/2864-544-0x0000000002250000-0x0000000002361000-memory.dmp

    Filesize

    1.1MB

  • memory/2864-542-0x0000000002250000-0x0000000002361000-memory.dmp

    Filesize

    1.1MB

  • memory/2864-540-0x0000000002250000-0x0000000002361000-memory.dmp

    Filesize

    1.1MB

  • memory/2864-538-0x0000000002250000-0x0000000002361000-memory.dmp

    Filesize

    1.1MB

  • memory/2864-1-0x0000000076700000-0x0000000076747000-memory.dmp

    Filesize

    284KB

  • memory/2864-536-0x0000000002250000-0x0000000002361000-memory.dmp

    Filesize

    1.1MB

  • memory/5480-7910-0x0000000000400000-0x0000000000549000-memory.dmp

    Filesize

    1.3MB

  • memory/5480-16612-0x0000000000400000-0x0000000000549000-memory.dmp

    Filesize

    1.3MB