Analysis

  • max time kernel
    140s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-10-2022 10:12

General

  • Target

    bbd8b41c49eaee839da5fc62c999761efb835e7eb84f73cbf531cf0dd40c608b.exe

  • Size

    8.2MB

  • MD5

    23150d8faa66ce23299e2c032b8fd62f

  • SHA1

    26c7c604d01f784931a3a95f1efeb56bfe1aec69

  • SHA256

    bbd8b41c49eaee839da5fc62c999761efb835e7eb84f73cbf531cf0dd40c608b

  • SHA512

    17ae25cce526a5eb11202cc779f5d62fc45b14a4d547e2eb88694dc21c83fdb853731adfd7cb47fb3499f140ddedf61175415504a0c93cb2ed3b3f25e989f5e7

  • SSDEEP

    196608:JzxikPsLoM1ZPdUYcoV1alsmMzU5tReoS+P6n:JzIkP7M1ZP64alnB5t5SF

Malware Config

Extracted

Family

systembc

C2

89.22.225.242:4193

195.2.93.22:4193

Signatures

  • SystemBC

    SystemBC is a proxy and remote administration tool first seen in 2019.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Themida packer 8 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bbd8b41c49eaee839da5fc62c999761efb835e7eb84f73cbf531cf0dd40c608b.exe
    "C:\Users\Admin\AppData\Local\Temp\bbd8b41c49eaee839da5fc62c999761efb835e7eb84f73cbf531cf0dd40c608b.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Checks whether UAC is enabled
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4260
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\system32\schtasks.exe" /create /tn COMSurrogate /f /sc onlogon /rl highest /tr "C:\Users\Admin\Dage qui podeta xesaxapo copib pab tiqu fixolol pok xowa niweke\migeyih quipaha xajiced banokora ririb bevirov kimatis.exe"
      2⤵
      • Creates scheduled task(s)
      PID:4508
    • C:\Users\Admin\Dage qui podeta xesaxapo copib pab tiqu fixolol pok xowa niweke\migeyih quipaha xajiced banokora ririb bevirov kimatis.exe
      "C:\Users\Admin\Dage qui podeta xesaxapo copib pab tiqu fixolol pok xowa niweke\migeyih quipaha xajiced banokora ririb bevirov kimatis.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Executes dropped EXE
      • Checks BIOS information in registry
      • Checks whether UAC is enabled
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:3628
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
        3⤵
          PID:5040
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c chcp 65001 && ping 127.0.0.1 && DEL /F /S /Q /A "C:\Users\Admin\AppData\Local\Temp\bbd8b41c49eaee839da5fc62c999761efb835e7eb84f73cbf531cf0dd40c608b.exe"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:3600
        • C:\Windows\SysWOW64\chcp.com
          chcp 65001
          3⤵
            PID:3880
          • C:\Windows\SysWOW64\PING.EXE
            ping 127.0.0.1
            3⤵
            • Runs ping.exe
            PID:4980

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Execution

      Scheduled Task

      1
      T1053

      Persistence

      Scheduled Task

      1
      T1053

      Privilege Escalation

      Scheduled Task

      1
      T1053

      Defense Evasion

      Virtualization/Sandbox Evasion

      1
      T1497

      Discovery

      Query Registry

      3
      T1012

      Virtualization/Sandbox Evasion

      1
      T1497

      System Information Discovery

      4
      T1082

      Remote System Discovery

      1
      T1018

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\Dage qui podeta xesaxapo copib pab tiqu fixolol pok xowa niweke\migeyih quipaha xajiced banokora ririb bevirov kimatis.exe
        Filesize

        809.2MB

        MD5

        69070d28d23e9115fb799b5cb02a45d9

        SHA1

        de64936c28a814bf8951cda5c925c6de6543ad06

        SHA256

        5596f297490375d4a517841afd8f6950ad445eb8d31147263dc6d37c108c1cc2

        SHA512

        fa8114490f97f860570b5dde84d5e74eae3d46944b2535910d488264de03f10c866dba512468d04e3c001350e136bb9181c1841c13462f78cb26492dc7ba21d3

      • memory/3600-142-0x0000000000000000-mapping.dmp
      • memory/3628-153-0x000000000DDD0000-0x000000000DE27000-memory.dmp
        Filesize

        348KB

      • memory/3628-162-0x00000000039C1000-0x0000000003B31000-memory.dmp
        Filesize

        1.4MB

      • memory/3628-146-0x0000000000AA0000-0x00000000012E1000-memory.dmp
        Filesize

        8.3MB

      • memory/3628-161-0x0000000000AA0000-0x00000000012E1000-memory.dmp
        Filesize

        8.3MB

      • memory/3628-154-0x000000000DDD0000-0x000000000DE27000-memory.dmp
        Filesize

        348KB

      • memory/3628-140-0x0000000000000000-mapping.dmp
      • memory/3628-152-0x00000000039C1000-0x0000000003B31000-memory.dmp
        Filesize

        1.4MB

      • memory/3628-151-0x0000000003273000-0x00000000039B4000-memory.dmp
        Filesize

        7.3MB

      • memory/3628-143-0x0000000000AA0000-0x00000000012E1000-memory.dmp
        Filesize

        8.3MB

      • memory/3628-150-0x00000000039C1000-0x0000000003B31000-memory.dmp
        Filesize

        1.4MB

      • memory/3628-149-0x0000000003273000-0x00000000039B4000-memory.dmp
        Filesize

        7.3MB

      • memory/3880-147-0x0000000000000000-mapping.dmp
      • memory/4260-134-0x0000000000680000-0x0000000000EC1000-memory.dmp
        Filesize

        8.3MB

      • memory/4260-132-0x0000000000680000-0x0000000000EC1000-memory.dmp
        Filesize

        8.3MB

      • memory/4260-137-0x0000000003002000-0x0000000003743000-memory.dmp
        Filesize

        7.3MB

      • memory/4260-145-0x000000000375D000-0x00000000038CD000-memory.dmp
        Filesize

        1.4MB

      • memory/4260-144-0x0000000000680000-0x0000000000EC1000-memory.dmp
        Filesize

        8.3MB

      • memory/4260-133-0x0000000000680000-0x0000000000EC1000-memory.dmp
        Filesize

        8.3MB

      • memory/4260-135-0x0000000003002000-0x0000000003743000-memory.dmp
        Filesize

        7.3MB

      • memory/4260-136-0x000000000375D000-0x00000000038CD000-memory.dmp
        Filesize

        1.4MB

      • memory/4260-138-0x000000000375D000-0x00000000038CD000-memory.dmp
        Filesize

        1.4MB

      • memory/4508-139-0x0000000000000000-mapping.dmp
      • memory/4980-148-0x0000000000000000-mapping.dmp
      • memory/5040-156-0x0000000000400000-0x0000000000407000-memory.dmp
        Filesize

        28KB

      • memory/5040-158-0x0000000000400000-0x0000000000407000-memory.dmp
        Filesize

        28KB

      • memory/5040-160-0x0000000000400000-0x0000000000407000-memory.dmp
        Filesize

        28KB

      • memory/5040-155-0x0000000000000000-mapping.dmp