Analysis

  • max time kernel
    151s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    27-01-2022 17:09

General

  • Target

    socks_crypt_update.exe

  • Size

    317KB

  • MD5

    8f94de248d86fc855da27f403fca561f

  • SHA1

    0ebd03d681c58e8431c761f695e49682860137f5

  • SHA256

    f84a10e65b8b479c09668202550f40f3f7ccc5e3343e1a8ed6173e0873aefd11

  • SHA512

    ad36cb1926ba630cb4441d3539295aee2cff164731fb6cdc061a3802e69f7e446b76f1012b1c1f2d0334a98d229e7479243afa4a5dc02e166662b72b27ec43fd

Malware Config

Extracted

Family

systembc

C2

186.2.171.65:4001

Signatures

  • SystemBC

    SystemBC is a proxy and remote administration tool first seen in 2019.

  • suricata: ET MALWARE Win32/SystemBC CnC Checkin

    suricata: ET MALWARE Win32/SystemBC CnC Checkin

  • Downloads MZ/PE file
  • Executes dropped EXE 3 IoCs
  • Drops file in Windows directory 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\socks_crypt_update.exe
    "C:\Users\Admin\AppData\Local\Temp\socks_crypt_update.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    PID:1664
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {4806D8CF-0EDB-457F-A522-9E17F08678B7} S-1-5-18:NT AUTHORITY\System:Service:
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:520
    • C:\ProgramData\clqqiib\uitj.exe
      C:\ProgramData\clqqiib\uitj.exe start
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      PID:544
    • C:\Windows\TEMP\pcxjgbx.exe
      C:\Windows\TEMP\pcxjgbx.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      PID:1384
    • C:\ProgramData\ggtlx\mofkctp.exe
      C:\ProgramData\ggtlx\mofkctp.exe start
      2⤵
      • Executes dropped EXE
      PID:1004

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\clqqiib\uitj.exe

    MD5

    8f94de248d86fc855da27f403fca561f

    SHA1

    0ebd03d681c58e8431c761f695e49682860137f5

    SHA256

    f84a10e65b8b479c09668202550f40f3f7ccc5e3343e1a8ed6173e0873aefd11

    SHA512

    ad36cb1926ba630cb4441d3539295aee2cff164731fb6cdc061a3802e69f7e446b76f1012b1c1f2d0334a98d229e7479243afa4a5dc02e166662b72b27ec43fd

  • C:\ProgramData\clqqiib\uitj.exe

    MD5

    8f94de248d86fc855da27f403fca561f

    SHA1

    0ebd03d681c58e8431c761f695e49682860137f5

    SHA256

    f84a10e65b8b479c09668202550f40f3f7ccc5e3343e1a8ed6173e0873aefd11

    SHA512

    ad36cb1926ba630cb4441d3539295aee2cff164731fb6cdc061a3802e69f7e446b76f1012b1c1f2d0334a98d229e7479243afa4a5dc02e166662b72b27ec43fd

  • C:\ProgramData\ggtlx\mofkctp.exe

    MD5

    8f94de248d86fc855da27f403fca561f

    SHA1

    0ebd03d681c58e8431c761f695e49682860137f5

    SHA256

    f84a10e65b8b479c09668202550f40f3f7ccc5e3343e1a8ed6173e0873aefd11

    SHA512

    ad36cb1926ba630cb4441d3539295aee2cff164731fb6cdc061a3802e69f7e446b76f1012b1c1f2d0334a98d229e7479243afa4a5dc02e166662b72b27ec43fd

  • C:\ProgramData\ggtlx\mofkctp.exe

    MD5

    8f94de248d86fc855da27f403fca561f

    SHA1

    0ebd03d681c58e8431c761f695e49682860137f5

    SHA256

    f84a10e65b8b479c09668202550f40f3f7ccc5e3343e1a8ed6173e0873aefd11

    SHA512

    ad36cb1926ba630cb4441d3539295aee2cff164731fb6cdc061a3802e69f7e446b76f1012b1c1f2d0334a98d229e7479243afa4a5dc02e166662b72b27ec43fd

  • C:\Windows\TEMP\pcxjgbx.exe

    MD5

    8f94de248d86fc855da27f403fca561f

    SHA1

    0ebd03d681c58e8431c761f695e49682860137f5

    SHA256

    f84a10e65b8b479c09668202550f40f3f7ccc5e3343e1a8ed6173e0873aefd11

    SHA512

    ad36cb1926ba630cb4441d3539295aee2cff164731fb6cdc061a3802e69f7e446b76f1012b1c1f2d0334a98d229e7479243afa4a5dc02e166662b72b27ec43fd

  • C:\Windows\Tasks\uitj.job

    MD5

    0c8e5e1d534509e28ca6d53a0ab7c973

    SHA1

    9e722b0c6aaecb50b95a7c9188c397d36a4d52fa

    SHA256

    9451507e3f00782339176a5215be869b5081c06a4301021b676abeb0671e571e

    SHA512

    0ff4a33abc509becbfc949b2d56f35789dc666c2137cbbd9412635cdd9c60727b376ade69c5efd482a5f8ed0a595a050644521401f2cf2c090543c3b3961afcb

  • C:\Windows\Temp\pcxjgbx.exe

    MD5

    8f94de248d86fc855da27f403fca561f

    SHA1

    0ebd03d681c58e8431c761f695e49682860137f5

    SHA256

    f84a10e65b8b479c09668202550f40f3f7ccc5e3343e1a8ed6173e0873aefd11

    SHA512

    ad36cb1926ba630cb4441d3539295aee2cff164731fb6cdc061a3802e69f7e446b76f1012b1c1f2d0334a98d229e7479243afa4a5dc02e166662b72b27ec43fd

  • memory/544-61-0x0000000000400000-0x0000000000456000-memory.dmp

    Filesize

    344KB

  • memory/1384-66-0x0000000000400000-0x0000000000456000-memory.dmp

    Filesize

    344KB

  • memory/1664-54-0x00000000754B1000-0x00000000754B3000-memory.dmp

    Filesize

    8KB

  • memory/1664-57-0x0000000000400000-0x0000000000456000-memory.dmp

    Filesize

    344KB

  • memory/1664-56-0x00000000001E0000-0x00000000001E9000-memory.dmp

    Filesize

    36KB

  • memory/1664-55-0x00000000001D0000-0x00000000001D8000-memory.dmp

    Filesize

    32KB