Analysis

  • max time kernel
    147s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    18-10-2024 20:43

General

  • Target

    SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe

  • Size

    940KB

  • MD5

    b36366f4a27987d6de47887b03f29c68

  • SHA1

    6f290bd6c132ec5c824558a29bdf75d25ced94e3

  • SHA256

    4cc1ab70e6fd0d4441c778d40212c6e3114e14d56da85717214f8498e1c1501b

  • SHA512

    a9441175872e88fc49482ef4707fad0e1f15a3ee1f4c74f3a2fafd3744968025d35ca61ed1905239a01df58511985e00708cdae7cb9acae4cca8b51032e02359

  • SSDEEP

    24576:q4bDOphvGTO5+L0Un5cOoaPaoWXqEinqg4dNMBlqD9:HD2n+H5cOoUao+vib4rMu

Malware Config

Signatures

  • Generic Chinese Botnet

    A botnet originating from China which is currently unnamed publicly.

  • Chinese Botnet payload 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 45 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe
    "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1788
  • C:\Program Files (x86)\Dhttdfv.exe
    "C:\Program Files (x86)\Dhttdfv.exe"
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    PID:1852

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Dhttdfv.exe

    Filesize

    940KB

    MD5

    b36366f4a27987d6de47887b03f29c68

    SHA1

    6f290bd6c132ec5c824558a29bdf75d25ced94e3

    SHA256

    4cc1ab70e6fd0d4441c778d40212c6e3114e14d56da85717214f8498e1c1501b

    SHA512

    a9441175872e88fc49482ef4707fad0e1f15a3ee1f4c74f3a2fafd3744968025d35ca61ed1905239a01df58511985e00708cdae7cb9acae4cca8b51032e02359

  • memory/1788-542-0x00000000022C0000-0x00000000023D1000-memory.dmp

    Filesize

    1.1MB

  • memory/1788-516-0x00000000022C0000-0x00000000023D1000-memory.dmp

    Filesize

    1.1MB

  • memory/1788-504-0x00000000022C0000-0x00000000023D1000-memory.dmp

    Filesize

    1.1MB

  • memory/1788-512-0x00000000022C0000-0x00000000023D1000-memory.dmp

    Filesize

    1.1MB

  • memory/1788-526-0x00000000022C0000-0x00000000023D1000-memory.dmp

    Filesize

    1.1MB

  • memory/1788-536-0x00000000022C0000-0x00000000023D1000-memory.dmp

    Filesize

    1.1MB

  • memory/1788-544-0x00000000022C0000-0x00000000023D1000-memory.dmp

    Filesize

    1.1MB

  • memory/1788-560-0x00000000022C0000-0x00000000023D1000-memory.dmp

    Filesize

    1.1MB

  • memory/1788-540-0x00000000022C0000-0x00000000023D1000-memory.dmp

    Filesize

    1.1MB

  • memory/1788-562-0x00000000022C0000-0x00000000023D1000-memory.dmp

    Filesize

    1.1MB

  • memory/1788-558-0x00000000022C0000-0x00000000023D1000-memory.dmp

    Filesize

    1.1MB

  • memory/1788-556-0x00000000022C0000-0x00000000023D1000-memory.dmp

    Filesize

    1.1MB

  • memory/1788-554-0x00000000022C0000-0x00000000023D1000-memory.dmp

    Filesize

    1.1MB

  • memory/1788-552-0x00000000022C0000-0x00000000023D1000-memory.dmp

    Filesize

    1.1MB

  • memory/1788-550-0x00000000022C0000-0x00000000023D1000-memory.dmp

    Filesize

    1.1MB

  • memory/1788-548-0x00000000022C0000-0x00000000023D1000-memory.dmp

    Filesize

    1.1MB

  • memory/1788-546-0x00000000022C0000-0x00000000023D1000-memory.dmp

    Filesize

    1.1MB

  • memory/1788-0-0x0000000000400000-0x0000000000549000-memory.dmp

    Filesize

    1.3MB

  • memory/1788-564-0x00000000022C0000-0x00000000023D1000-memory.dmp

    Filesize

    1.1MB

  • memory/1788-16694-0x0000000000400000-0x0000000000549000-memory.dmp

    Filesize

    1.3MB

  • memory/1788-522-0x00000000022C0000-0x00000000023D1000-memory.dmp

    Filesize

    1.1MB

  • memory/1788-532-0x00000000022C0000-0x00000000023D1000-memory.dmp

    Filesize

    1.1MB

  • memory/1788-530-0x00000000022C0000-0x00000000023D1000-memory.dmp

    Filesize

    1.1MB

  • memory/1788-528-0x00000000022C0000-0x00000000023D1000-memory.dmp

    Filesize

    1.1MB

  • memory/1788-524-0x00000000022C0000-0x00000000023D1000-memory.dmp

    Filesize

    1.1MB

  • memory/1788-534-0x00000000022C0000-0x00000000023D1000-memory.dmp

    Filesize

    1.1MB

  • memory/1788-520-0x00000000022C0000-0x00000000023D1000-memory.dmp

    Filesize

    1.1MB

  • memory/1788-518-0x00000000022C0000-0x00000000023D1000-memory.dmp

    Filesize

    1.1MB

  • memory/1788-503-0x00000000022C0000-0x00000000023D1000-memory.dmp

    Filesize

    1.1MB

  • memory/1788-514-0x00000000022C0000-0x00000000023D1000-memory.dmp

    Filesize

    1.1MB

  • memory/1788-510-0x00000000022C0000-0x00000000023D1000-memory.dmp

    Filesize

    1.1MB

  • memory/1788-508-0x00000000022C0000-0x00000000023D1000-memory.dmp

    Filesize

    1.1MB

  • memory/1788-506-0x00000000022C0000-0x00000000023D1000-memory.dmp

    Filesize

    1.1MB

  • memory/1788-2239-0x0000000002130000-0x00000000022B1000-memory.dmp

    Filesize

    1.5MB

  • memory/1788-1-0x0000000075840000-0x0000000075887000-memory.dmp

    Filesize

    284KB

  • memory/1788-538-0x00000000022C0000-0x00000000023D1000-memory.dmp

    Filesize

    1.1MB

  • memory/1852-7992-0x0000000000400000-0x0000000000549000-memory.dmp

    Filesize

    1.3MB

  • memory/1852-16693-0x0000000000400000-0x0000000000549000-memory.dmp

    Filesize

    1.3MB