Resubmissions

18-10-2024 20:35

241018-zc7q1axald 10

18-10-2024 20:24

241018-y6plvawflb 10

Analysis

  • max time kernel
    147s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    18-10-2024 20:24

General

  • Target

    SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe

  • Size

    940KB

  • MD5

    b36366f4a27987d6de47887b03f29c68

  • SHA1

    6f290bd6c132ec5c824558a29bdf75d25ced94e3

  • SHA256

    4cc1ab70e6fd0d4441c778d40212c6e3114e14d56da85717214f8498e1c1501b

  • SHA512

    a9441175872e88fc49482ef4707fad0e1f15a3ee1f4c74f3a2fafd3744968025d35ca61ed1905239a01df58511985e00708cdae7cb9acae4cca8b51032e02359

  • SSDEEP

    24576:q4bDOphvGTO5+L0Un5cOoaPaoWXqEinqg4dNMBlqD9:HD2n+H5cOoUao+vib4rMu

Malware Config

Signatures

  • Generic Chinese Botnet

    A botnet originating from China which is currently unnamed publicly.

  • Chinese Botnet payload 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 45 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe
    "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1928
  • C:\Program Files (x86)\Dhttdfv.exe
    "C:\Program Files (x86)\Dhttdfv.exe"
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    PID:1516

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Dhttdfv.exe

    Filesize

    940KB

    MD5

    b36366f4a27987d6de47887b03f29c68

    SHA1

    6f290bd6c132ec5c824558a29bdf75d25ced94e3

    SHA256

    4cc1ab70e6fd0d4441c778d40212c6e3114e14d56da85717214f8498e1c1501b

    SHA512

    a9441175872e88fc49482ef4707fad0e1f15a3ee1f4c74f3a2fafd3744968025d35ca61ed1905239a01df58511985e00708cdae7cb9acae4cca8b51032e02359

  • memory/1516-16493-0x0000000000400000-0x0000000000549000-memory.dmp

    Filesize

    1.3MB

  • memory/1516-7792-0x0000000000400000-0x0000000000549000-memory.dmp

    Filesize

    1.3MB

  • memory/1928-544-0x0000000002140000-0x0000000002251000-memory.dmp

    Filesize

    1.1MB

  • memory/1928-526-0x0000000002140000-0x0000000002251000-memory.dmp

    Filesize

    1.1MB

  • memory/1928-520-0x0000000002140000-0x0000000002251000-memory.dmp

    Filesize

    1.1MB

  • memory/1928-540-0x0000000002140000-0x0000000002251000-memory.dmp

    Filesize

    1.1MB

  • memory/1928-546-0x0000000002140000-0x0000000002251000-memory.dmp

    Filesize

    1.1MB

  • memory/1928-538-0x0000000002140000-0x0000000002251000-memory.dmp

    Filesize

    1.1MB

  • memory/1928-507-0x0000000002140000-0x0000000002251000-memory.dmp

    Filesize

    1.1MB

  • memory/1928-564-0x0000000002140000-0x0000000002251000-memory.dmp

    Filesize

    1.1MB

  • memory/1928-562-0x0000000002140000-0x0000000002251000-memory.dmp

    Filesize

    1.1MB

  • memory/1928-560-0x0000000002140000-0x0000000002251000-memory.dmp

    Filesize

    1.1MB

  • memory/1928-558-0x0000000002140000-0x0000000002251000-memory.dmp

    Filesize

    1.1MB

  • memory/1928-554-0x0000000002140000-0x0000000002251000-memory.dmp

    Filesize

    1.1MB

  • memory/1928-552-0x0000000002140000-0x0000000002251000-memory.dmp

    Filesize

    1.1MB

  • memory/1928-550-0x0000000002140000-0x0000000002251000-memory.dmp

    Filesize

    1.1MB

  • memory/1928-548-0x0000000002140000-0x0000000002251000-memory.dmp

    Filesize

    1.1MB

  • memory/1928-0-0x0000000000400000-0x0000000000549000-memory.dmp

    Filesize

    1.3MB

  • memory/1928-1-0x00000000759A0000-0x00000000759E7000-memory.dmp

    Filesize

    284KB

  • memory/1928-511-0x0000000002140000-0x0000000002251000-memory.dmp

    Filesize

    1.1MB

  • memory/1928-556-0x0000000002140000-0x0000000002251000-memory.dmp

    Filesize

    1.1MB

  • memory/1928-536-0x0000000002140000-0x0000000002251000-memory.dmp

    Filesize

    1.1MB

  • memory/1928-534-0x0000000002140000-0x0000000002251000-memory.dmp

    Filesize

    1.1MB

  • memory/1928-532-0x0000000002140000-0x0000000002251000-memory.dmp

    Filesize

    1.1MB

  • memory/1928-530-0x0000000002140000-0x0000000002251000-memory.dmp

    Filesize

    1.1MB

  • memory/1928-528-0x0000000002140000-0x0000000002251000-memory.dmp

    Filesize

    1.1MB

  • memory/1928-524-0x0000000002140000-0x0000000002251000-memory.dmp

    Filesize

    1.1MB

  • memory/1928-522-0x0000000002140000-0x0000000002251000-memory.dmp

    Filesize

    1.1MB

  • memory/1928-518-0x0000000002140000-0x0000000002251000-memory.dmp

    Filesize

    1.1MB

  • memory/1928-516-0x0000000002140000-0x0000000002251000-memory.dmp

    Filesize

    1.1MB

  • memory/1928-514-0x0000000002140000-0x0000000002251000-memory.dmp

    Filesize

    1.1MB

  • memory/1928-512-0x0000000002140000-0x0000000002251000-memory.dmp

    Filesize

    1.1MB

  • memory/1928-508-0x0000000002140000-0x0000000002251000-memory.dmp

    Filesize

    1.1MB

  • memory/1928-504-0x0000000002140000-0x0000000002251000-memory.dmp

    Filesize

    1.1MB

  • memory/1928-503-0x0000000002140000-0x0000000002251000-memory.dmp

    Filesize

    1.1MB

  • memory/1928-542-0x0000000002140000-0x0000000002251000-memory.dmp

    Filesize

    1.1MB

  • memory/1928-16494-0x0000000000400000-0x0000000000549000-memory.dmp

    Filesize

    1.3MB