Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-10-2024 01:33

General

  • Target

    4cc1ab70e6fd0d4441c778d40212c6e3114e14d56da85717214f8498e1c1501b.exe

  • Size

    940KB

  • MD5

    b36366f4a27987d6de47887b03f29c68

  • SHA1

    6f290bd6c132ec5c824558a29bdf75d25ced94e3

  • SHA256

    4cc1ab70e6fd0d4441c778d40212c6e3114e14d56da85717214f8498e1c1501b

  • SHA512

    a9441175872e88fc49482ef4707fad0e1f15a3ee1f4c74f3a2fafd3744968025d35ca61ed1905239a01df58511985e00708cdae7cb9acae4cca8b51032e02359

  • SSDEEP

    24576:q4bDOphvGTO5+L0Un5cOoaPaoWXqEinqg4dNMBlqD9:HD2n+H5cOoUao+vib4rMu

Malware Config

Signatures

  • Generic Chinese Botnet

    A botnet originating from China which is currently unnamed publicly.

  • Chinese Botnet payload 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 45 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4cc1ab70e6fd0d4441c778d40212c6e3114e14d56da85717214f8498e1c1501b.exe
    "C:\Users\Admin\AppData\Local\Temp\4cc1ab70e6fd0d4441c778d40212c6e3114e14d56da85717214f8498e1c1501b.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1800
  • C:\Program Files (x86)\Dhttdfv.exe
    "C:\Program Files (x86)\Dhttdfv.exe"
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    PID:2232

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Dhttdfv.exe

    Filesize

    940KB

    MD5

    b36366f4a27987d6de47887b03f29c68

    SHA1

    6f290bd6c132ec5c824558a29bdf75d25ced94e3

    SHA256

    4cc1ab70e6fd0d4441c778d40212c6e3114e14d56da85717214f8498e1c1501b

    SHA512

    a9441175872e88fc49482ef4707fad0e1f15a3ee1f4c74f3a2fafd3744968025d35ca61ed1905239a01df58511985e00708cdae7cb9acae4cca8b51032e02359

  • memory/1800-534-0x00000000022D0000-0x00000000023E1000-memory.dmp

    Filesize

    1.1MB

  • memory/1800-556-0x00000000022D0000-0x00000000023E1000-memory.dmp

    Filesize

    1.1MB

  • memory/1800-503-0x00000000022D0000-0x00000000023E1000-memory.dmp

    Filesize

    1.1MB

  • memory/1800-508-0x00000000022D0000-0x00000000023E1000-memory.dmp

    Filesize

    1.1MB

  • memory/1800-506-0x00000000022D0000-0x00000000023E1000-memory.dmp

    Filesize

    1.1MB

  • memory/1800-512-0x00000000022D0000-0x00000000023E1000-memory.dmp

    Filesize

    1.1MB

  • memory/1800-510-0x00000000022D0000-0x00000000023E1000-memory.dmp

    Filesize

    1.1MB

  • memory/1800-514-0x00000000022D0000-0x00000000023E1000-memory.dmp

    Filesize

    1.1MB

  • memory/1800-536-0x00000000022D0000-0x00000000023E1000-memory.dmp

    Filesize

    1.1MB

  • memory/1800-518-0x00000000022D0000-0x00000000023E1000-memory.dmp

    Filesize

    1.1MB

  • memory/1800-522-0x00000000022D0000-0x00000000023E1000-memory.dmp

    Filesize

    1.1MB

  • memory/1800-520-0x00000000022D0000-0x00000000023E1000-memory.dmp

    Filesize

    1.1MB

  • memory/1800-526-0x00000000022D0000-0x00000000023E1000-memory.dmp

    Filesize

    1.1MB

  • memory/1800-524-0x00000000022D0000-0x00000000023E1000-memory.dmp

    Filesize

    1.1MB

  • memory/1800-528-0x00000000022D0000-0x00000000023E1000-memory.dmp

    Filesize

    1.1MB

  • memory/1800-530-0x00000000022D0000-0x00000000023E1000-memory.dmp

    Filesize

    1.1MB

  • memory/1800-532-0x00000000022D0000-0x00000000023E1000-memory.dmp

    Filesize

    1.1MB

  • memory/1800-0-0x0000000000400000-0x0000000000549000-memory.dmp

    Filesize

    1.3MB

  • memory/1800-516-0x00000000022D0000-0x00000000023E1000-memory.dmp

    Filesize

    1.1MB

  • memory/1800-16495-0x0000000000400000-0x0000000000549000-memory.dmp

    Filesize

    1.3MB

  • memory/1800-550-0x00000000022D0000-0x00000000023E1000-memory.dmp

    Filesize

    1.1MB

  • memory/1800-542-0x00000000022D0000-0x00000000023E1000-memory.dmp

    Filesize

    1.1MB

  • memory/1800-544-0x00000000022D0000-0x00000000023E1000-memory.dmp

    Filesize

    1.1MB

  • memory/1800-546-0x00000000022D0000-0x00000000023E1000-memory.dmp

    Filesize

    1.1MB

  • memory/1800-548-0x00000000022D0000-0x00000000023E1000-memory.dmp

    Filesize

    1.1MB

  • memory/1800-540-0x00000000022D0000-0x00000000023E1000-memory.dmp

    Filesize

    1.1MB

  • memory/1800-552-0x00000000022D0000-0x00000000023E1000-memory.dmp

    Filesize

    1.1MB

  • memory/1800-554-0x00000000022D0000-0x00000000023E1000-memory.dmp

    Filesize

    1.1MB

  • memory/1800-504-0x00000000022D0000-0x00000000023E1000-memory.dmp

    Filesize

    1.1MB

  • memory/1800-558-0x00000000022D0000-0x00000000023E1000-memory.dmp

    Filesize

    1.1MB

  • memory/1800-560-0x00000000022D0000-0x00000000023E1000-memory.dmp

    Filesize

    1.1MB

  • memory/1800-562-0x00000000022D0000-0x00000000023E1000-memory.dmp

    Filesize

    1.1MB

  • memory/1800-564-0x00000000022D0000-0x00000000023E1000-memory.dmp

    Filesize

    1.1MB

  • memory/1800-2239-0x0000000002020000-0x00000000021A1000-memory.dmp

    Filesize

    1.5MB

  • memory/1800-1-0x0000000075F80000-0x0000000075FC7000-memory.dmp

    Filesize

    284KB

  • memory/1800-538-0x00000000022D0000-0x00000000023E1000-memory.dmp

    Filesize

    1.1MB

  • memory/2232-7793-0x0000000000400000-0x0000000000549000-memory.dmp

    Filesize

    1.3MB

  • memory/2232-16494-0x0000000000400000-0x0000000000549000-memory.dmp

    Filesize

    1.3MB