Analysis
-
max time kernel
121s -
max time network
130s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
27-01-2022 22:41
Static task
static1
Behavioral task
behavioral1
Sample
8f94de248d86fc855da27f403fca561f.exe
Resource
win7-en-20211208
General
-
Target
8f94de248d86fc855da27f403fca561f.exe
-
Size
317KB
-
MD5
8f94de248d86fc855da27f403fca561f
-
SHA1
0ebd03d681c58e8431c761f695e49682860137f5
-
SHA256
f84a10e65b8b479c09668202550f40f3f7ccc5e3343e1a8ed6173e0873aefd11
-
SHA512
ad36cb1926ba630cb4441d3539295aee2cff164731fb6cdc061a3802e69f7e446b76f1012b1c1f2d0334a98d229e7479243afa4a5dc02e166662b72b27ec43fd
Malware Config
Extracted
systembc
186.2.171.65:4001
Signatures
-
suricata: ET MALWARE Win32/SystemBC CnC Checkin
suricata: ET MALWARE Win32/SystemBC CnC Checkin
-
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
Processes:
arewpa.exelbpcdfa.exejkgolp.exepid process 864 arewpa.exe 1340 lbpcdfa.exe 1192 jkgolp.exe -
Drops file in Windows directory 5 IoCs
Processes:
8f94de248d86fc855da27f403fca561f.exearewpa.exelbpcdfa.exedescription ioc process File opened for modification C:\Windows\Tasks\arewpa.job 8f94de248d86fc855da27f403fca561f.exe File created C:\Windows\Tasks\dsrkliatvisxkuqcnat.job arewpa.exe File created C:\Windows\Tasks\jkgolp.job lbpcdfa.exe File opened for modification C:\Windows\Tasks\jkgolp.job lbpcdfa.exe File created C:\Windows\Tasks\arewpa.job 8f94de248d86fc855da27f403fca561f.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
8f94de248d86fc855da27f403fca561f.exelbpcdfa.exepid process 2768 8f94de248d86fc855da27f403fca561f.exe 2768 8f94de248d86fc855da27f403fca561f.exe 1340 lbpcdfa.exe 1340 lbpcdfa.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8f94de248d86fc855da27f403fca561f.exe"C:\Users\Admin\AppData\Local\Temp\8f94de248d86fc855da27f403fca561f.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:2768
-
C:\ProgramData\fkligm\arewpa.exeC:\ProgramData\fkligm\arewpa.exe start1⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:864
-
C:\Windows\TEMP\lbpcdfa.exeC:\Windows\TEMP\lbpcdfa.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:1340
-
C:\ProgramData\ateu\jkgolp.exeC:\ProgramData\ateu\jkgolp.exe start1⤵
- Executes dropped EXE
PID:1192
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
8f94de248d86fc855da27f403fca561f
SHA10ebd03d681c58e8431c761f695e49682860137f5
SHA256f84a10e65b8b479c09668202550f40f3f7ccc5e3343e1a8ed6173e0873aefd11
SHA512ad36cb1926ba630cb4441d3539295aee2cff164731fb6cdc061a3802e69f7e446b76f1012b1c1f2d0334a98d229e7479243afa4a5dc02e166662b72b27ec43fd
-
MD5
8f94de248d86fc855da27f403fca561f
SHA10ebd03d681c58e8431c761f695e49682860137f5
SHA256f84a10e65b8b479c09668202550f40f3f7ccc5e3343e1a8ed6173e0873aefd11
SHA512ad36cb1926ba630cb4441d3539295aee2cff164731fb6cdc061a3802e69f7e446b76f1012b1c1f2d0334a98d229e7479243afa4a5dc02e166662b72b27ec43fd
-
MD5
8f94de248d86fc855da27f403fca561f
SHA10ebd03d681c58e8431c761f695e49682860137f5
SHA256f84a10e65b8b479c09668202550f40f3f7ccc5e3343e1a8ed6173e0873aefd11
SHA512ad36cb1926ba630cb4441d3539295aee2cff164731fb6cdc061a3802e69f7e446b76f1012b1c1f2d0334a98d229e7479243afa4a5dc02e166662b72b27ec43fd
-
MD5
8f94de248d86fc855da27f403fca561f
SHA10ebd03d681c58e8431c761f695e49682860137f5
SHA256f84a10e65b8b479c09668202550f40f3f7ccc5e3343e1a8ed6173e0873aefd11
SHA512ad36cb1926ba630cb4441d3539295aee2cff164731fb6cdc061a3802e69f7e446b76f1012b1c1f2d0334a98d229e7479243afa4a5dc02e166662b72b27ec43fd
-
MD5
8f94de248d86fc855da27f403fca561f
SHA10ebd03d681c58e8431c761f695e49682860137f5
SHA256f84a10e65b8b479c09668202550f40f3f7ccc5e3343e1a8ed6173e0873aefd11
SHA512ad36cb1926ba630cb4441d3539295aee2cff164731fb6cdc061a3802e69f7e446b76f1012b1c1f2d0334a98d229e7479243afa4a5dc02e166662b72b27ec43fd
-
MD5
b68f39eee06288913e2599ccdb0c61c8
SHA1eb56bcdc25fc91be179aa9cc88e92f8c3fd9ec5b
SHA256c761a004f6676177dd38e772cc94f09f8c4049aba07bebc5d88a4ad7e60d7b9d
SHA512818af4b5acd17621835244611076545885dd747ecea291d3252d0de0c0a0403b93e67b445ef3e3fc062b318ed123b35d317df4f25a2b5729879b0eb2c857f43c
-
MD5
8f94de248d86fc855da27f403fca561f
SHA10ebd03d681c58e8431c761f695e49682860137f5
SHA256f84a10e65b8b479c09668202550f40f3f7ccc5e3343e1a8ed6173e0873aefd11
SHA512ad36cb1926ba630cb4441d3539295aee2cff164731fb6cdc061a3802e69f7e446b76f1012b1c1f2d0334a98d229e7479243afa4a5dc02e166662b72b27ec43fd