Analysis

  • max time kernel
    119s
  • max time network
    132s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220310-en
  • submitted
    27-03-2022 17:15

General

  • Target

    477079b5846088b1e126ae08735d36c1.exe

  • Size

    227KB

  • MD5

    477079b5846088b1e126ae08735d36c1

  • SHA1

    8f26d9582fa44498f7a6abb17e45554ca115ab79

  • SHA256

    4d62a012bd9a4700b2a0bc7143151eeaf12d1eb88bb8b02701902168cd42ce24

  • SHA512

    2520257f0a333821d0f39f4db811b422c8cb1d48869a237c39d40fbcd3c49822e17d48d9c854daee807bae2b9b0c2487576e93ccdbff947e82d9cd537c3f58c7

Malware Config

Extracted

Family

systembc

C2

31.44.185.6:4001

31.44.185.11:4001

Signatures

  • SystemBC

    SystemBC is a proxy and remote administration tool first seen in 2019.

  • suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)

    suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)

  • suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

    suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

  • suricata: ET MALWARE Win32/SystemBC CnC Checkin

    suricata: ET MALWARE Win32/SystemBC CnC Checkin

  • Executes dropped EXE 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies data under HKEY_USERS 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\477079b5846088b1e126ae08735d36c1.exe
    "C:\Users\Admin\AppData\Local\Temp\477079b5846088b1e126ae08735d36c1.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    PID:3104
  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
    1⤵
    • Modifies data under HKEY_USERS
    PID:640
  • C:\ProgramData\blnq\vjadn.exe
    C:\ProgramData\blnq\vjadn.exe start
    1⤵
    • Executes dropped EXE
    PID:3272

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\blnq\vjadn.exe
    Filesize

    227KB

    MD5

    477079b5846088b1e126ae08735d36c1

    SHA1

    8f26d9582fa44498f7a6abb17e45554ca115ab79

    SHA256

    4d62a012bd9a4700b2a0bc7143151eeaf12d1eb88bb8b02701902168cd42ce24

    SHA512

    2520257f0a333821d0f39f4db811b422c8cb1d48869a237c39d40fbcd3c49822e17d48d9c854daee807bae2b9b0c2487576e93ccdbff947e82d9cd537c3f58c7

  • C:\ProgramData\blnq\vjadn.exe
    Filesize

    227KB

    MD5

    477079b5846088b1e126ae08735d36c1

    SHA1

    8f26d9582fa44498f7a6abb17e45554ca115ab79

    SHA256

    4d62a012bd9a4700b2a0bc7143151eeaf12d1eb88bb8b02701902168cd42ce24

    SHA512

    2520257f0a333821d0f39f4db811b422c8cb1d48869a237c39d40fbcd3c49822e17d48d9c854daee807bae2b9b0c2487576e93ccdbff947e82d9cd537c3f58c7

  • memory/3104-134-0x000000000077C000-0x0000000000785000-memory.dmp
    Filesize

    36KB

  • memory/3104-135-0x000000000077C000-0x0000000000785000-memory.dmp
    Filesize

    36KB

  • memory/3104-136-0x00000000006D0000-0x00000000006D9000-memory.dmp
    Filesize

    36KB

  • memory/3104-137-0x0000000000400000-0x000000000047B000-memory.dmp
    Filesize

    492KB

  • memory/3272-140-0x0000000000759000-0x0000000000761000-memory.dmp
    Filesize

    32KB

  • memory/3272-141-0x0000000000759000-0x0000000000761000-memory.dmp
    Filesize

    32KB

  • memory/3272-142-0x00000000005D0000-0x00000000005D9000-memory.dmp
    Filesize

    36KB

  • memory/3272-143-0x0000000000400000-0x000000000047B000-memory.dmp
    Filesize

    492KB