Overview
overview
10Static
static
10客户端(...EY.exe
windows7-x64
9客户端(...EY.exe
windows10-2004-x64
9UDP.exe
windows7-x64
3UDP.exe
windows10-2004-x64
3a
ubuntu-24.04-amd64
8arm1
debian-9-armhf
4bj.exe
windows7-x64
10bj.exe
windows10-2004-x64
10bjyk.exe
windows7-x64
10bjyk.exe
windows10-2004-x64
10cctv.exe
windows7-x64
7cctv.exe
windows10-2004-x64
10cctv_2.exe
windows7-x64
1cctv_2.exe
windows10-2004-x64
10cn.exe
windows7-x64
7cn.exe
windows10-2004-x64
7cn1.exe
windows7-x64
7cn1.exe
windows10-2004-x64
3dhl.exe
windows7-x64
10dhl.exe
windows10-2004-x64
10java
ubuntu-18.04-amd64
4java (2)
ubuntu-24.04-amd64
1java1
ubuntu-24.04-amd64
7k5.exe
windows7-x64
8k5.exe
windows10-2004-x64
10ly1
debian-9-mips
3mh.exe
windows7-x64
10mh.exe
windows10-2004-x64
10mips
debian-12-mipsel
4pjhxx
ubuntu-24.04-amd64
1rootkit
ubuntu-24.04-amd64
8se.exe
windows7-x64
7Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02-01-2025 21:33
Behavioral task
behavioral1
Sample
客户端(Client)_KEY.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
客户端(Client)_KEY.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
UDP.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
UDP.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
a
Resource
ubuntu2404-amd64-20240523-en
Behavioral task
behavioral6
Sample
arm1
Resource
debian9-armhf-20240729-en
Behavioral task
behavioral7
Sample
bj.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
bj.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
bjyk.exe
Resource
win7-20241023-en
Behavioral task
behavioral10
Sample
bjyk.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
cctv.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
cctv.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
cctv_2.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
cctv_2.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
cn.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
cn.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
cn1.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
cn1.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
dhl.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
dhl.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
java
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral22
Sample
java (2)
Resource
ubuntu2404-amd64-20240523-en
Behavioral task
behavioral23
Sample
java1
Resource
ubuntu2404-amd64-20240523-en
Behavioral task
behavioral24
Sample
k5.exe
Resource
win7-20241010-en
Behavioral task
behavioral25
Sample
k5.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral26
Sample
ly1
Resource
debian9-mipsbe-20240729-en
Behavioral task
behavioral27
Sample
mh.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
mh.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
mips
Resource
debian12-mipsel-20240221-en
Behavioral task
behavioral30
Sample
pjhxx
Resource
ubuntu2404-amd64-20240523-en
Behavioral task
behavioral31
Sample
rootkit
Resource
ubuntu2404-amd64-20240523-en
Behavioral task
behavioral32
Sample
se.exe
Resource
win7-20240903-en
General
-
Target
cn.exe
-
Size
520KB
-
MD5
2033a6d7d02690c31fa53d8717fc7ffb
-
SHA1
5ff0fb65c1322fba3f30a325097bd140ac9f508e
-
SHA256
5b81c2781d2c953f46fa7fdd815a31eebdaf8d402ab96457814cdf87583eaf1d
-
SHA512
8ec8cd260a54d138145ce1a2591ab3768f535518f7ea75967f5e7d89a1569a8ff4cdb33c85fb2fb31497e27aaf2a661c11fd7702fee73a0fa4652ed146d136c3
-
SSDEEP
12288:H8D0Pn8yQAOWqNujygoH8qCTxQSza+bqHKNci1/9aa:H8D0/JO/ujy9yTxDza3q2i1/9f
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3268 svchost.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\system\DProtectSupport\svchost.exe.bak cn.exe File created C:\Windows\system\DProtectSupport\svchost.exe cn.exe File opened for modification C:\Windows\system\DProtectSupport\svchost.exe cn.exe File opened for modification C:\Windows\system\DProtectSupport\fake.cfg svchost.exe File created C:\Windows\system\DProtectSupport\fake.cfg svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cn.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 svchost.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\2 svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cn.exe"C:\Users\Admin\AppData\Local\Temp\cn.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1504
-
C:\Windows\system\DProtectSupport\svchost.exeC:\Windows\system\DProtectSupport\svchost.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:3268
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
281KB
MD5eb6b77778c65e43ff9b3e3d43e1b73d5
SHA181172f2a3e4b387e20e3d404a09c3487d5601f70
SHA2562afc2f49dd75c30e378fd9af09d1ff288583eb3a02b1b5efa53864fe876288df
SHA51224c511205d6a452c7068c7a1db112042441aadf05e66665cd5caf979b1267b5512588819a24aabd0f159697faa00f417713336bbd14be9b1469d4b8aad948bd2