Analysis

  • max time kernel
    141s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    15-04-2022 02:19

General

  • Target

    8e853d68c303ff55e85082e83b45978a13fc2821a8363a1c1ad50cc2ddb6eb41.exe

  • Size

    318KB

  • MD5

    69ab4ae7051a7962e610f4a8cc56d634

  • SHA1

    9275cfb1e28dc75e614ab1fc6b7d0783a556cce1

  • SHA256

    8e853d68c303ff55e85082e83b45978a13fc2821a8363a1c1ad50cc2ddb6eb41

  • SHA512

    521486297dc22c5f6e02dda6bca8789a13ed5d6d91bc1fed1342bcfcfabac3f0771e057d5afc1af1be8ca9552b80a0e81b93e7b5a90c81c803b2eb3485285c7f

Score
10/10

Malware Config

Extracted

Family

systembc

C2

advertrex20.xyz:4044

gentexman37.xyz:4044

Signatures

  • SystemBC

    SystemBC is a proxy and remote administration tool first seen in 2019.

  • Executes dropped EXE 1 IoCs
  • Looks up external IP address via web service 4 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Uses Tor communications 1 TTPs

    Malware can proxy its traffic through Tor for more anonymity.

  • Drops file in Windows directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8e853d68c303ff55e85082e83b45978a13fc2821a8363a1c1ad50cc2ddb6eb41.exe
    "C:\Users\Admin\AppData\Local\Temp\8e853d68c303ff55e85082e83b45978a13fc2821a8363a1c1ad50cc2ddb6eb41.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    PID:1884
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {264E0DB4-4B9F-4FE3-A9A0-E3631C650506} S-1-5-18:NT AUTHORITY\System:Service:
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1900
    • C:\ProgramData\vsixfd\xdqv.exe
      C:\ProgramData\vsixfd\xdqv.exe start
      2⤵
      • Executes dropped EXE
      PID:1764

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\vsixfd\xdqv.exe

    Filesize

    318KB

    MD5

    69ab4ae7051a7962e610f4a8cc56d634

    SHA1

    9275cfb1e28dc75e614ab1fc6b7d0783a556cce1

    SHA256

    8e853d68c303ff55e85082e83b45978a13fc2821a8363a1c1ad50cc2ddb6eb41

    SHA512

    521486297dc22c5f6e02dda6bca8789a13ed5d6d91bc1fed1342bcfcfabac3f0771e057d5afc1af1be8ca9552b80a0e81b93e7b5a90c81c803b2eb3485285c7f

  • C:\ProgramData\vsixfd\xdqv.exe

    Filesize

    318KB

    MD5

    69ab4ae7051a7962e610f4a8cc56d634

    SHA1

    9275cfb1e28dc75e614ab1fc6b7d0783a556cce1

    SHA256

    8e853d68c303ff55e85082e83b45978a13fc2821a8363a1c1ad50cc2ddb6eb41

    SHA512

    521486297dc22c5f6e02dda6bca8789a13ed5d6d91bc1fed1342bcfcfabac3f0771e057d5afc1af1be8ca9552b80a0e81b93e7b5a90c81c803b2eb3485285c7f

  • memory/1764-59-0x0000000000000000-mapping.dmp

  • memory/1764-62-0x0000000000030000-0x0000000000039000-memory.dmp

    Filesize

    36KB

  • memory/1764-63-0x0000000000400000-0x00000000004DF000-memory.dmp

    Filesize

    892KB

  • memory/1884-54-0x00000000759E1000-0x00000000759E3000-memory.dmp

    Filesize

    8KB

  • memory/1884-56-0x0000000000030000-0x0000000000039000-memory.dmp

    Filesize

    36KB

  • memory/1884-55-0x0000000000020000-0x0000000000026000-memory.dmp

    Filesize

    24KB

  • memory/1884-57-0x0000000000400000-0x00000000004DF000-memory.dmp

    Filesize

    892KB