Analysis

  • max time kernel
    151s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220310-en
  • submitted
    14-03-2022 03:10

General

  • Target

    f8f47008cedcad207b82e37c86c9fb6656942374eb5a7636caf301ac425bc9f8.exe

  • Size

    232KB

  • MD5

    89545aa0c4f25bf6505a6b16de5721c4

  • SHA1

    f1dc7554e9776d7c724ad22b3251fd552d46e098

  • SHA256

    f8f47008cedcad207b82e37c86c9fb6656942374eb5a7636caf301ac425bc9f8

  • SHA512

    f7cae7089a54a1600c2bcb4a929a13f8a2f81af1845ab24943361511dc941252bd7aa954617063a1ec1ac99a83293b20773e69b3cb8cd9722e84a9b5728a599b

Score
10/10

Malware Config

Extracted

Family

systembc

C2

31.44.185.6:4001

31.44.185.11:4001

Signatures

  • SystemBC

    SystemBC is a proxy and remote administration tool first seen in 2019.

  • Downloads MZ/PE file
  • Executes dropped EXE 3 IoCs
  • Drops file in Windows directory 5 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f8f47008cedcad207b82e37c86c9fb6656942374eb5a7636caf301ac425bc9f8.exe
    "C:\Users\Admin\AppData\Local\Temp\f8f47008cedcad207b82e37c86c9fb6656942374eb5a7636caf301ac425bc9f8.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    PID:4696
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4696 -s 488
      2⤵
      • Program crash
      PID:3620
  • C:\ProgramData\jcag\qbllv.exe
    C:\ProgramData\jcag\qbllv.exe start
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    PID:2060
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4696 -ip 4696
    1⤵
      PID:4856
    • C:\Windows\TEMP\rpna.exe
      C:\Windows\TEMP\rpna.exe
      1⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      PID:1672
    • C:\ProgramData\bonvej\buouca.exe
      C:\ProgramData\bonvej\buouca.exe start
      1⤵
      • Executes dropped EXE
      PID:4584

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\bonvej\buouca.exe
      MD5

      89545aa0c4f25bf6505a6b16de5721c4

      SHA1

      f1dc7554e9776d7c724ad22b3251fd552d46e098

      SHA256

      f8f47008cedcad207b82e37c86c9fb6656942374eb5a7636caf301ac425bc9f8

      SHA512

      f7cae7089a54a1600c2bcb4a929a13f8a2f81af1845ab24943361511dc941252bd7aa954617063a1ec1ac99a83293b20773e69b3cb8cd9722e84a9b5728a599b

    • C:\ProgramData\bonvej\buouca.exe
      MD5

      89545aa0c4f25bf6505a6b16de5721c4

      SHA1

      f1dc7554e9776d7c724ad22b3251fd552d46e098

      SHA256

      f8f47008cedcad207b82e37c86c9fb6656942374eb5a7636caf301ac425bc9f8

      SHA512

      f7cae7089a54a1600c2bcb4a929a13f8a2f81af1845ab24943361511dc941252bd7aa954617063a1ec1ac99a83293b20773e69b3cb8cd9722e84a9b5728a599b

    • C:\ProgramData\jcag\qbllv.exe
      MD5

      89545aa0c4f25bf6505a6b16de5721c4

      SHA1

      f1dc7554e9776d7c724ad22b3251fd552d46e098

      SHA256

      f8f47008cedcad207b82e37c86c9fb6656942374eb5a7636caf301ac425bc9f8

      SHA512

      f7cae7089a54a1600c2bcb4a929a13f8a2f81af1845ab24943361511dc941252bd7aa954617063a1ec1ac99a83293b20773e69b3cb8cd9722e84a9b5728a599b

    • C:\ProgramData\jcag\qbllv.exe
      MD5

      89545aa0c4f25bf6505a6b16de5721c4

      SHA1

      f1dc7554e9776d7c724ad22b3251fd552d46e098

      SHA256

      f8f47008cedcad207b82e37c86c9fb6656942374eb5a7636caf301ac425bc9f8

      SHA512

      f7cae7089a54a1600c2bcb4a929a13f8a2f81af1845ab24943361511dc941252bd7aa954617063a1ec1ac99a83293b20773e69b3cb8cd9722e84a9b5728a599b

    • C:\Windows\TEMP\rpna.exe
      MD5

      89545aa0c4f25bf6505a6b16de5721c4

      SHA1

      f1dc7554e9776d7c724ad22b3251fd552d46e098

      SHA256

      f8f47008cedcad207b82e37c86c9fb6656942374eb5a7636caf301ac425bc9f8

      SHA512

      f7cae7089a54a1600c2bcb4a929a13f8a2f81af1845ab24943361511dc941252bd7aa954617063a1ec1ac99a83293b20773e69b3cb8cd9722e84a9b5728a599b

    • C:\Windows\Tasks\qbllv.job
      MD5

      1454a6c37731bc21edf538c528b6474b

      SHA1

      3623a3f33747ece1b55738d8d6c1a9c60b79728c

      SHA256

      dce089653118f2f80be54b390e674fa18016c6338bdb2a74e0a63497b9935b49

      SHA512

      7fc76b01dbf4e435c8b0c7fbbfc1034d2de0a75f9dc32cfd1980fc1053e919c9af9f40b6710b6f9eb3311b16386156ee050b62372043459d6f98810341b6c775

    • C:\Windows\Temp\rpna.exe
      MD5

      89545aa0c4f25bf6505a6b16de5721c4

      SHA1

      f1dc7554e9776d7c724ad22b3251fd552d46e098

      SHA256

      f8f47008cedcad207b82e37c86c9fb6656942374eb5a7636caf301ac425bc9f8

      SHA512

      f7cae7089a54a1600c2bcb4a929a13f8a2f81af1845ab24943361511dc941252bd7aa954617063a1ec1ac99a83293b20773e69b3cb8cd9722e84a9b5728a599b

    • memory/1672-148-0x0000000000400000-0x000000000046B000-memory.dmp
      Filesize

      428KB

    • memory/1672-147-0x00000000006AD000-0x00000000006B6000-memory.dmp
      Filesize

      36KB

    • memory/1672-145-0x00000000006AD000-0x00000000006B6000-memory.dmp
      Filesize

      36KB

    • memory/2060-142-0x0000000000400000-0x000000000046B000-memory.dmp
      Filesize

      428KB

    • memory/2060-141-0x00000000004AD000-0x00000000004B6000-memory.dmp
      Filesize

      36KB

    • memory/2060-140-0x00000000004AD000-0x00000000004B6000-memory.dmp
      Filesize

      36KB

    • memory/4584-151-0x000000000084D000-0x0000000000856000-memory.dmp
      Filesize

      36KB

    • memory/4584-152-0x000000000084D000-0x0000000000856000-memory.dmp
      Filesize

      36KB

    • memory/4584-153-0x0000000000400000-0x000000000046B000-memory.dmp
      Filesize

      428KB

    • memory/4696-137-0x0000000000400000-0x000000000046B000-memory.dmp
      Filesize

      428KB

    • memory/4696-134-0x0000000000671000-0x000000000067A000-memory.dmp
      Filesize

      36KB

    • memory/4696-136-0x0000000000600000-0x0000000000609000-memory.dmp
      Filesize

      36KB

    • memory/4696-135-0x0000000000671000-0x000000000067A000-memory.dmp
      Filesize

      36KB