Analysis

  • max time kernel
    146s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20-10-2024 01:39

General

  • Target

    4cc1ab70e6fd0d4441c778d40212c6e3114e14d56da85717214f8498e1c1501b.exe

  • Size

    940KB

  • MD5

    b36366f4a27987d6de47887b03f29c68

  • SHA1

    6f290bd6c132ec5c824558a29bdf75d25ced94e3

  • SHA256

    4cc1ab70e6fd0d4441c778d40212c6e3114e14d56da85717214f8498e1c1501b

  • SHA512

    a9441175872e88fc49482ef4707fad0e1f15a3ee1f4c74f3a2fafd3744968025d35ca61ed1905239a01df58511985e00708cdae7cb9acae4cca8b51032e02359

  • SSDEEP

    24576:q4bDOphvGTO5+L0Un5cOoaPaoWXqEinqg4dNMBlqD9:HD2n+H5cOoUao+vib4rMu

Malware Config

Signatures

  • Generic Chinese Botnet

    A botnet originating from China which is currently unnamed publicly.

  • Chinese Botnet payload 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 45 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4cc1ab70e6fd0d4441c778d40212c6e3114e14d56da85717214f8498e1c1501b.exe
    "C:\Users\Admin\AppData\Local\Temp\4cc1ab70e6fd0d4441c778d40212c6e3114e14d56da85717214f8498e1c1501b.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2648
  • C:\Program Files (x86)\Dhttdfv.exe
    "C:\Program Files (x86)\Dhttdfv.exe"
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    PID:6800

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Dhttdfv.exe

    Filesize

    940KB

    MD5

    b36366f4a27987d6de47887b03f29c68

    SHA1

    6f290bd6c132ec5c824558a29bdf75d25ced94e3

    SHA256

    4cc1ab70e6fd0d4441c778d40212c6e3114e14d56da85717214f8498e1c1501b

    SHA512

    a9441175872e88fc49482ef4707fad0e1f15a3ee1f4c74f3a2fafd3744968025d35ca61ed1905239a01df58511985e00708cdae7cb9acae4cca8b51032e02359

  • memory/2648-534-0x00000000021B0000-0x00000000022C1000-memory.dmp

    Filesize

    1.1MB

  • memory/2648-16493-0x0000000000400000-0x0000000000549000-memory.dmp

    Filesize

    1.3MB

  • memory/2648-503-0x00000000021B0000-0x00000000022C1000-memory.dmp

    Filesize

    1.1MB

  • memory/2648-506-0x00000000021B0000-0x00000000022C1000-memory.dmp

    Filesize

    1.1MB

  • memory/2648-508-0x00000000021B0000-0x00000000022C1000-memory.dmp

    Filesize

    1.1MB

  • memory/2648-510-0x00000000021B0000-0x00000000022C1000-memory.dmp

    Filesize

    1.1MB

  • memory/2648-512-0x00000000021B0000-0x00000000022C1000-memory.dmp

    Filesize

    1.1MB

  • memory/2648-514-0x00000000021B0000-0x00000000022C1000-memory.dmp

    Filesize

    1.1MB

  • memory/2648-536-0x00000000021B0000-0x00000000022C1000-memory.dmp

    Filesize

    1.1MB

  • memory/2648-518-0x00000000021B0000-0x00000000022C1000-memory.dmp

    Filesize

    1.1MB

  • memory/2648-520-0x00000000021B0000-0x00000000022C1000-memory.dmp

    Filesize

    1.1MB

  • memory/2648-522-0x00000000021B0000-0x00000000022C1000-memory.dmp

    Filesize

    1.1MB

  • memory/2648-524-0x00000000021B0000-0x00000000022C1000-memory.dmp

    Filesize

    1.1MB

  • memory/2648-526-0x00000000021B0000-0x00000000022C1000-memory.dmp

    Filesize

    1.1MB

  • memory/2648-528-0x00000000021B0000-0x00000000022C1000-memory.dmp

    Filesize

    1.1MB

  • memory/2648-530-0x00000000021B0000-0x00000000022C1000-memory.dmp

    Filesize

    1.1MB

  • memory/2648-532-0x00000000021B0000-0x00000000022C1000-memory.dmp

    Filesize

    1.1MB

  • memory/2648-0-0x0000000000400000-0x0000000000549000-memory.dmp

    Filesize

    1.3MB

  • memory/2648-516-0x00000000021B0000-0x00000000022C1000-memory.dmp

    Filesize

    1.1MB

  • memory/2648-504-0x00000000021B0000-0x00000000022C1000-memory.dmp

    Filesize

    1.1MB

  • memory/2648-550-0x00000000021B0000-0x00000000022C1000-memory.dmp

    Filesize

    1.1MB

  • memory/2648-542-0x00000000021B0000-0x00000000022C1000-memory.dmp

    Filesize

    1.1MB

  • memory/2648-544-0x00000000021B0000-0x00000000022C1000-memory.dmp

    Filesize

    1.1MB

  • memory/2648-546-0x00000000021B0000-0x00000000022C1000-memory.dmp

    Filesize

    1.1MB

  • memory/2648-548-0x00000000021B0000-0x00000000022C1000-memory.dmp

    Filesize

    1.1MB

  • memory/2648-540-0x00000000021B0000-0x00000000022C1000-memory.dmp

    Filesize

    1.1MB

  • memory/2648-552-0x00000000021B0000-0x00000000022C1000-memory.dmp

    Filesize

    1.1MB

  • memory/2648-554-0x00000000021B0000-0x00000000022C1000-memory.dmp

    Filesize

    1.1MB

  • memory/2648-556-0x00000000021B0000-0x00000000022C1000-memory.dmp

    Filesize

    1.1MB

  • memory/2648-558-0x00000000021B0000-0x00000000022C1000-memory.dmp

    Filesize

    1.1MB

  • memory/2648-560-0x00000000021B0000-0x00000000022C1000-memory.dmp

    Filesize

    1.1MB

  • memory/2648-562-0x00000000021B0000-0x00000000022C1000-memory.dmp

    Filesize

    1.1MB

  • memory/2648-564-0x00000000021B0000-0x00000000022C1000-memory.dmp

    Filesize

    1.1MB

  • memory/2648-2239-0x0000000001F00000-0x0000000002081000-memory.dmp

    Filesize

    1.5MB

  • memory/2648-1-0x0000000076120000-0x0000000076167000-memory.dmp

    Filesize

    284KB

  • memory/2648-538-0x00000000021B0000-0x00000000022C1000-memory.dmp

    Filesize

    1.1MB

  • memory/6800-7793-0x0000000000400000-0x0000000000549000-memory.dmp

    Filesize

    1.3MB

  • memory/6800-16495-0x0000000000400000-0x0000000000549000-memory.dmp

    Filesize

    1.3MB