Analysis

  • max time kernel
    163s
  • max time network
    167s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220310-en
  • submitted
    14-04-2022 06:52

General

  • Target

    da7a3b341caea242aa95018d0e629b2ddc823763b721aeccdb1c9884d8f9ef24.exe

  • Size

    87KB

  • MD5

    dbfa6717c7f896d0d19696866e0dba24

  • SHA1

    78426c577a9d521f96010efaa8d1038773e5f853

  • SHA256

    da7a3b341caea242aa95018d0e629b2ddc823763b721aeccdb1c9884d8f9ef24

  • SHA512

    5f4601e79e2b2348dfcd56eac79c85160545d3c279bc1027c14aa533a38f0ecd457575144eb4485fbd5d580c7a2865e9bd6aa12f2df123ab8dff888ca586a249

Malware Config

Extracted

Family

systembc

C2

advertrex20.xyz:4044

gentexman37.xyz:4044

Signatures

  • SystemBC

    SystemBC is a proxy and remote administration tool first seen in 2019.

  • suricata: ET MALWARE Observed SystemBC CnC Domain in DNS Query

    suricata: ET MALWARE Observed SystemBC CnC Domain in DNS Query

  • Executes dropped EXE 1 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Uses Tor communications 1 TTPs

    Malware can proxy its traffic through Tor for more anonymity.

  • Drops file in Windows directory 2 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\da7a3b341caea242aa95018d0e629b2ddc823763b721aeccdb1c9884d8f9ef24.exe
    "C:\Users\Admin\AppData\Local\Temp\da7a3b341caea242aa95018d0e629b2ddc823763b721aeccdb1c9884d8f9ef24.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    PID:4780
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4780 -s 948
      2⤵
      • Program crash
      PID:4300
  • C:\ProgramData\swwubw\iprs.exe
    C:\ProgramData\swwubw\iprs.exe start
    1⤵
    • Executes dropped EXE
    PID:5052
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4780 -ip 4780
    1⤵
      PID:4336

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\swwubw\iprs.exe
      Filesize

      87KB

      MD5

      dbfa6717c7f896d0d19696866e0dba24

      SHA1

      78426c577a9d521f96010efaa8d1038773e5f853

      SHA256

      da7a3b341caea242aa95018d0e629b2ddc823763b721aeccdb1c9884d8f9ef24

      SHA512

      5f4601e79e2b2348dfcd56eac79c85160545d3c279bc1027c14aa533a38f0ecd457575144eb4485fbd5d580c7a2865e9bd6aa12f2df123ab8dff888ca586a249

    • C:\ProgramData\swwubw\iprs.exe
      Filesize

      87KB

      MD5

      dbfa6717c7f896d0d19696866e0dba24

      SHA1

      78426c577a9d521f96010efaa8d1038773e5f853

      SHA256

      da7a3b341caea242aa95018d0e629b2ddc823763b721aeccdb1c9884d8f9ef24

      SHA512

      5f4601e79e2b2348dfcd56eac79c85160545d3c279bc1027c14aa533a38f0ecd457575144eb4485fbd5d580c7a2865e9bd6aa12f2df123ab8dff888ca586a249

    • memory/4780-134-0x0000000003278000-0x000000000327F000-memory.dmp
      Filesize

      28KB

    • memory/4780-135-0x0000000003278000-0x000000000327F000-memory.dmp
      Filesize

      28KB

    • memory/4780-136-0x00000000030F0000-0x00000000030F9000-memory.dmp
      Filesize

      36KB

    • memory/4780-137-0x0000000000400000-0x0000000002FA1000-memory.dmp
      Filesize

      43.6MB

    • memory/5052-140-0x0000000003103000-0x0000000003109000-memory.dmp
      Filesize

      24KB

    • memory/5052-141-0x0000000003103000-0x0000000003109000-memory.dmp
      Filesize

      24KB

    • memory/5052-142-0x0000000003860000-0x0000000003869000-memory.dmp
      Filesize

      36KB

    • memory/5052-143-0x0000000000400000-0x0000000002FA1000-memory.dmp
      Filesize

      43.6MB