Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-10-2024 12:20
Static task
static1
Behavioral task
behavioral1
Sample
d22901f208e3a3e64b15b38fb60cb9301b769c7aff32efc5609691545ef42dd5.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d22901f208e3a3e64b15b38fb60cb9301b769c7aff32efc5609691545ef42dd5.exe
Resource
win10v2004-20241007-en
General
-
Target
d22901f208e3a3e64b15b38fb60cb9301b769c7aff32efc5609691545ef42dd5.exe
-
Size
432KB
-
MD5
fc7364fd9f7481fd91daaa0b8ed8a01a
-
SHA1
c527b85649737658670db8593ce4ffaeba4c1433
-
SHA256
d22901f208e3a3e64b15b38fb60cb9301b769c7aff32efc5609691545ef42dd5
-
SHA512
f3b6a507774e5d438f5cbcb4b474885d7bffe9221aab657f4e975358b9fb199af870f748e0c1a47d0d828696a620062e6ffdbed2a9fa798799aa1e69b8a153cb
-
SSDEEP
3072:PIKW6p/1PHoJzpjRIphEpKp4/zmbNIDa3SgvRO7ssjjd3DW20DOiaMCBHA:AY1/u/y5IDa3S2O7LlDQDOifQHA
Malware Config
Signatures
-
Generic Chinese Botnet
A botnet originating from China which is currently unnamed publicly.
-
Chinese Botnet payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1672-0-0x0000000010000000-0x0000000010018000-memory.dmp unk_chinese_botnet -
Executes dropped EXE 2 IoCs
Processes:
Owqkkaa.exeOwqkkaa.exepid Process 1272 Owqkkaa.exe 2708 Owqkkaa.exe -
Loads dropped DLL 1 IoCs
Processes:
Owqkkaa.exepid Process 1272 Owqkkaa.exe -
Drops file in Program Files directory 2 IoCs
Processes:
d22901f208e3a3e64b15b38fb60cb9301b769c7aff32efc5609691545ef42dd5.exedescription ioc Process File created C:\Program Files (x86)\Owqkkaa.exe d22901f208e3a3e64b15b38fb60cb9301b769c7aff32efc5609691545ef42dd5.exe File opened for modification C:\Program Files (x86)\Owqkkaa.exe d22901f208e3a3e64b15b38fb60cb9301b769c7aff32efc5609691545ef42dd5.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
d22901f208e3a3e64b15b38fb60cb9301b769c7aff32efc5609691545ef42dd5.exeOwqkkaa.exeOwqkkaa.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d22901f208e3a3e64b15b38fb60cb9301b769c7aff32efc5609691545ef42dd5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Owqkkaa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Owqkkaa.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
d22901f208e3a3e64b15b38fb60cb9301b769c7aff32efc5609691545ef42dd5.exeOwqkkaa.exeOwqkkaa.exepid Process 1672 d22901f208e3a3e64b15b38fb60cb9301b769c7aff32efc5609691545ef42dd5.exe 1272 Owqkkaa.exe 2708 Owqkkaa.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
Owqkkaa.exedescription pid Process procid_target PID 1272 wrote to memory of 2708 1272 Owqkkaa.exe 29 PID 1272 wrote to memory of 2708 1272 Owqkkaa.exe 29 PID 1272 wrote to memory of 2708 1272 Owqkkaa.exe 29 PID 1272 wrote to memory of 2708 1272 Owqkkaa.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\d22901f208e3a3e64b15b38fb60cb9301b769c7aff32efc5609691545ef42dd5.exe"C:\Users\Admin\AppData\Local\Temp\d22901f208e3a3e64b15b38fb60cb9301b769c7aff32efc5609691545ef42dd5.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1672
-
C:\Program Files (x86)\Owqkkaa.exe"C:\Program Files (x86)\Owqkkaa.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Program Files (x86)\Owqkkaa.exe"C:\Program Files (x86)\Owqkkaa.exe" Win72⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2708
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
432KB
MD5fc7364fd9f7481fd91daaa0b8ed8a01a
SHA1c527b85649737658670db8593ce4ffaeba4c1433
SHA256d22901f208e3a3e64b15b38fb60cb9301b769c7aff32efc5609691545ef42dd5
SHA512f3b6a507774e5d438f5cbcb4b474885d7bffe9221aab657f4e975358b9fb199af870f748e0c1a47d0d828696a620062e6ffdbed2a9fa798799aa1e69b8a153cb