Analysis
-
max time kernel
105s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20220310-en -
submitted
13-03-2022 16:30
Static task
static1
General
-
Target
b6be49e632cae9dc45642743c5777a99e6949ba7617cd630b040821a86133281.exe
-
Size
233KB
-
MD5
6f6604ee86de5fc9d0100988aaa497eb
-
SHA1
5cff464c38375f5abc66d4fa31cd1e2d0dcac8cb
-
SHA256
b6be49e632cae9dc45642743c5777a99e6949ba7617cd630b040821a86133281
-
SHA512
b33a0b4435e9c6714011fac7e30625bad99f3b267f59a5fa67678c455a6e069cab7c38b33b263f2b496af263e238c8dd69f55a8357898ffdca7dcd620d4c9368
Malware Config
Extracted
systembc
31.44.185.6:4001
31.44.185.11:4001
Signatures
-
suricata: ET MALWARE Win32/SystemBC CnC Checkin
suricata: ET MALWARE Win32/SystemBC CnC Checkin
-
Executes dropped EXE 1 IoCs
Processes:
uvabcbe.exepid process 4568 uvabcbe.exe -
Drops file in Windows directory 2 IoCs
Processes:
b6be49e632cae9dc45642743c5777a99e6949ba7617cd630b040821a86133281.exedescription ioc process File created C:\Windows\Tasks\uvabcbe.job b6be49e632cae9dc45642743c5777a99e6949ba7617cd630b040821a86133281.exe File opened for modification C:\Windows\Tasks\uvabcbe.job b6be49e632cae9dc45642743c5777a99e6949ba7617cd630b040821a86133281.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1240 4196 WerFault.exe b6be49e632cae9dc45642743c5777a99e6949ba7617cd630b040821a86133281.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
b6be49e632cae9dc45642743c5777a99e6949ba7617cd630b040821a86133281.exepid process 4196 b6be49e632cae9dc45642743c5777a99e6949ba7617cd630b040821a86133281.exe 4196 b6be49e632cae9dc45642743c5777a99e6949ba7617cd630b040821a86133281.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b6be49e632cae9dc45642743c5777a99e6949ba7617cd630b040821a86133281.exe"C:\Users\Admin\AppData\Local\Temp\b6be49e632cae9dc45642743c5777a99e6949ba7617cd630b040821a86133281.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:4196 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4196 -s 4882⤵
- Program crash
PID:1240
-
C:\ProgramData\ggbxbd\uvabcbe.exeC:\ProgramData\ggbxbd\uvabcbe.exe start1⤵
- Executes dropped EXE
PID:4568
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4196 -ip 41961⤵PID:3568
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\ggbxbd\uvabcbe.exeMD5
6f6604ee86de5fc9d0100988aaa497eb
SHA15cff464c38375f5abc66d4fa31cd1e2d0dcac8cb
SHA256b6be49e632cae9dc45642743c5777a99e6949ba7617cd630b040821a86133281
SHA512b33a0b4435e9c6714011fac7e30625bad99f3b267f59a5fa67678c455a6e069cab7c38b33b263f2b496af263e238c8dd69f55a8357898ffdca7dcd620d4c9368
-
C:\ProgramData\ggbxbd\uvabcbe.exeMD5
6f6604ee86de5fc9d0100988aaa497eb
SHA15cff464c38375f5abc66d4fa31cd1e2d0dcac8cb
SHA256b6be49e632cae9dc45642743c5777a99e6949ba7617cd630b040821a86133281
SHA512b33a0b4435e9c6714011fac7e30625bad99f3b267f59a5fa67678c455a6e069cab7c38b33b263f2b496af263e238c8dd69f55a8357898ffdca7dcd620d4c9368
-
memory/4196-135-0x0000000000470000-0x0000000000570000-memory.dmpFilesize
1024KB
-
memory/4196-136-0x00000000021A0000-0x00000000021A9000-memory.dmpFilesize
36KB
-
memory/4196-137-0x0000000000400000-0x000000000046B000-memory.dmpFilesize
428KB
-
memory/4568-140-0x000000000057D000-0x0000000000586000-memory.dmpFilesize
36KB
-
memory/4568-141-0x000000000057D000-0x0000000000586000-memory.dmpFilesize
36KB
-
memory/4568-142-0x00000000004E0000-0x00000000004E9000-memory.dmpFilesize
36KB
-
memory/4568-143-0x0000000000400000-0x000000000046B000-memory.dmpFilesize
428KB