Analysis

  • max time kernel
    164s
  • max time network
    43s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    19-04-2022 06:09

General

  • Target

    3ef8f893bfba60ce3d400e7437856b813fcf69b24a1c37848963d052ecd0d9f9.exe

  • Size

    264KB

  • MD5

    05206e5eda097f54b8b1bcf23891ad80

  • SHA1

    2325f3f2a146432526208e733718dff80a65e86e

  • SHA256

    3ef8f893bfba60ce3d400e7437856b813fcf69b24a1c37848963d052ecd0d9f9

  • SHA512

    df1a8558357d4b7aa9b812f5f078fa6dc00584c3b5413ea13087cb5d156f3b5d202d56a50925860dd00ebb7d4c6108d100384f68638b07415e5e569282e32879

Score
10/10

Malware Config

Extracted

Family

systembc

C2

172.104.63.157:4001

Signatures

  • SystemBC

    SystemBC is a proxy and remote administration tool first seen in 2019.

  • Executes dropped EXE 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3ef8f893bfba60ce3d400e7437856b813fcf69b24a1c37848963d052ecd0d9f9.exe
    "C:\Users\Admin\AppData\Local\Temp\3ef8f893bfba60ce3d400e7437856b813fcf69b24a1c37848963d052ecd0d9f9.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    PID:964
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {76699236-F41B-471E-AEE6-27221BE7FFA3} S-1-5-18:NT AUTHORITY\System:Service:
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1224
    • C:\ProgramData\bnjoqmx\cvxn.exe
      C:\ProgramData\bnjoqmx\cvxn.exe start
      2⤵
      • Executes dropped EXE
      PID:2032

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\bnjoqmx\cvxn.exe
    Filesize

    264KB

    MD5

    05206e5eda097f54b8b1bcf23891ad80

    SHA1

    2325f3f2a146432526208e733718dff80a65e86e

    SHA256

    3ef8f893bfba60ce3d400e7437856b813fcf69b24a1c37848963d052ecd0d9f9

    SHA512

    df1a8558357d4b7aa9b812f5f078fa6dc00584c3b5413ea13087cb5d156f3b5d202d56a50925860dd00ebb7d4c6108d100384f68638b07415e5e569282e32879

  • C:\ProgramData\bnjoqmx\cvxn.exe
    Filesize

    264KB

    MD5

    05206e5eda097f54b8b1bcf23891ad80

    SHA1

    2325f3f2a146432526208e733718dff80a65e86e

    SHA256

    3ef8f893bfba60ce3d400e7437856b813fcf69b24a1c37848963d052ecd0d9f9

    SHA512

    df1a8558357d4b7aa9b812f5f078fa6dc00584c3b5413ea13087cb5d156f3b5d202d56a50925860dd00ebb7d4c6108d100384f68638b07415e5e569282e32879

  • memory/964-54-0x0000000000400000-0x0000000000461000-memory.dmp
    Filesize

    388KB

  • memory/964-55-0x0000000076451000-0x0000000076453000-memory.dmp
    Filesize

    8KB

  • memory/964-57-0x0000000000400000-0x0000000000461000-memory.dmp
    Filesize

    388KB

  • memory/964-56-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB

  • memory/2032-59-0x0000000000000000-mapping.dmp