Analysis
-
max time kernel
147s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-01-2025 06:18
Behavioral task
behavioral1
Sample
宇宙至尊白蛋[盾].exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
宇宙至尊白蛋[盾].exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
cmd.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
cmd.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
[].exe
Resource
win7-20241010-en
General
-
Target
cmd.exe
-
Size
944KB
-
MD5
a76c226baaef6352380bbcf17442f554
-
SHA1
163d718deec12af5a5764941377c8a59ffb93e84
-
SHA256
2418a667c78233cbd6cf0899cafe5aade8298e5ebde9cb2977da68258aa83125
-
SHA512
d6ee88480aeef06af49cfae8b9a6b7359979f59a155870ba80618238c240b797a7a183dadffb68d8ae78d08a8f1c97762847212605ab15368ff5df35c6b6996d
-
SSDEEP
24576:QjV3kOrOYJLMJ4MzwKCAyRrPCUeQo6py5yG93RdiyH:sV3kuOY9bu0Ay1PaxZlRdXH
Malware Config
Signatures
-
Chinese_generic_botnet family
-
Generic Chinese Botnet
A botnet originating from China which is currently unnamed publicly.
-
Chinese Botnet payload 1 IoCs
resource yara_rule behavioral3/memory/1644-7792-0x0000000000400000-0x000000000053C000-memory.dmp unk_chinese_botnet -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\ = "C:\\Windows\\Gkgqgko.exe" cmd.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 37 IoCs
pid Process 1644 cmd.exe 1644 cmd.exe 1644 cmd.exe 1644 cmd.exe 1644 cmd.exe 1644 cmd.exe 1644 cmd.exe 1644 cmd.exe 1644 cmd.exe 1644 cmd.exe 1644 cmd.exe 1644 cmd.exe 1644 cmd.exe 1644 cmd.exe 1644 cmd.exe 1644 cmd.exe 1644 cmd.exe 1644 cmd.exe 1644 cmd.exe 1644 cmd.exe 1644 cmd.exe 1644 cmd.exe 1644 cmd.exe 1644 cmd.exe 1644 cmd.exe 1644 cmd.exe 1644 cmd.exe 1644 cmd.exe 1644 cmd.exe 1644 cmd.exe 1644 cmd.exe 1644 cmd.exe 1644 cmd.exe 1644 cmd.exe 1644 cmd.exe 1644 cmd.exe 1644 cmd.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Gkgqgko.exe cmd.exe File opened for modification C:\Windows\Gkgqgko.exe cmd.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1644 cmd.exe 1644 cmd.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1644 cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cmd.exe"C:\Users\Admin\AppData\Local\Temp\cmd.exe"1⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1644