Analysis
-
max time kernel
140s -
max time network
136s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
27-01-2022 17:09
Static task
static1
Behavioral task
behavioral1
Sample
socks_crypt_update.exe
Resource
win7-en-20211208
General
-
Target
socks_crypt_update.exe
-
Size
317KB
-
MD5
8f94de248d86fc855da27f403fca561f
-
SHA1
0ebd03d681c58e8431c761f695e49682860137f5
-
SHA256
f84a10e65b8b479c09668202550f40f3f7ccc5e3343e1a8ed6173e0873aefd11
-
SHA512
ad36cb1926ba630cb4441d3539295aee2cff164731fb6cdc061a3802e69f7e446b76f1012b1c1f2d0334a98d229e7479243afa4a5dc02e166662b72b27ec43fd
Malware Config
Extracted
systembc
186.2.171.65:4001
Signatures
-
suricata: ET MALWARE Win32/SystemBC CnC Checkin
suricata: ET MALWARE Win32/SystemBC CnC Checkin
-
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
Processes:
nxdcau.exemhvudui.exehetris.exepid process 2012 nxdcau.exe 3988 mhvudui.exe 404 hetris.exe -
Drops file in Windows directory 5 IoCs
Processes:
socks_crypt_update.exenxdcau.exemhvudui.exedescription ioc process File created C:\Windows\Tasks\nxdcau.job socks_crypt_update.exe File opened for modification C:\Windows\Tasks\nxdcau.job socks_crypt_update.exe File created C:\Windows\Tasks\wjruebjrlnhfipemlsm.job nxdcau.exe File created C:\Windows\Tasks\hetris.job mhvudui.exe File opened for modification C:\Windows\Tasks\hetris.job mhvudui.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
socks_crypt_update.exemhvudui.exepid process 2328 socks_crypt_update.exe 2328 socks_crypt_update.exe 3988 mhvudui.exe 3988 mhvudui.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\socks_crypt_update.exe"C:\Users\Admin\AppData\Local\Temp\socks_crypt_update.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:2328
-
C:\ProgramData\cnun\nxdcau.exeC:\ProgramData\cnun\nxdcau.exe start1⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2012
-
C:\Windows\TEMP\mhvudui.exeC:\Windows\TEMP\mhvudui.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:3988
-
C:\ProgramData\xbrwdjt\hetris.exeC:\ProgramData\xbrwdjt\hetris.exe start1⤵
- Executes dropped EXE
PID:404
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
8f94de248d86fc855da27f403fca561f
SHA10ebd03d681c58e8431c761f695e49682860137f5
SHA256f84a10e65b8b479c09668202550f40f3f7ccc5e3343e1a8ed6173e0873aefd11
SHA512ad36cb1926ba630cb4441d3539295aee2cff164731fb6cdc061a3802e69f7e446b76f1012b1c1f2d0334a98d229e7479243afa4a5dc02e166662b72b27ec43fd
-
MD5
8f94de248d86fc855da27f403fca561f
SHA10ebd03d681c58e8431c761f695e49682860137f5
SHA256f84a10e65b8b479c09668202550f40f3f7ccc5e3343e1a8ed6173e0873aefd11
SHA512ad36cb1926ba630cb4441d3539295aee2cff164731fb6cdc061a3802e69f7e446b76f1012b1c1f2d0334a98d229e7479243afa4a5dc02e166662b72b27ec43fd
-
MD5
8f94de248d86fc855da27f403fca561f
SHA10ebd03d681c58e8431c761f695e49682860137f5
SHA256f84a10e65b8b479c09668202550f40f3f7ccc5e3343e1a8ed6173e0873aefd11
SHA512ad36cb1926ba630cb4441d3539295aee2cff164731fb6cdc061a3802e69f7e446b76f1012b1c1f2d0334a98d229e7479243afa4a5dc02e166662b72b27ec43fd
-
MD5
8f94de248d86fc855da27f403fca561f
SHA10ebd03d681c58e8431c761f695e49682860137f5
SHA256f84a10e65b8b479c09668202550f40f3f7ccc5e3343e1a8ed6173e0873aefd11
SHA512ad36cb1926ba630cb4441d3539295aee2cff164731fb6cdc061a3802e69f7e446b76f1012b1c1f2d0334a98d229e7479243afa4a5dc02e166662b72b27ec43fd
-
MD5
8f94de248d86fc855da27f403fca561f
SHA10ebd03d681c58e8431c761f695e49682860137f5
SHA256f84a10e65b8b479c09668202550f40f3f7ccc5e3343e1a8ed6173e0873aefd11
SHA512ad36cb1926ba630cb4441d3539295aee2cff164731fb6cdc061a3802e69f7e446b76f1012b1c1f2d0334a98d229e7479243afa4a5dc02e166662b72b27ec43fd
-
MD5
a65c92893c3487c5e4fcda4f49469570
SHA111eaab2487aa0b1bb5eb852a35be30a798025291
SHA2564590a41db5618498c87bb0f61c233675c93361c2abbd025c83355a2ffab7b110
SHA512ee14598edff57c4c8074a1d7570e9c6d2dd85858803629da501469746b58f67db1415503d8a4d39098c1beaf5dde245ed4cad29f302dfc1312b861ceb76cb620
-
MD5
8f94de248d86fc855da27f403fca561f
SHA10ebd03d681c58e8431c761f695e49682860137f5
SHA256f84a10e65b8b479c09668202550f40f3f7ccc5e3343e1a8ed6173e0873aefd11
SHA512ad36cb1926ba630cb4441d3539295aee2cff164731fb6cdc061a3802e69f7e446b76f1012b1c1f2d0334a98d229e7479243afa4a5dc02e166662b72b27ec43fd