Analysis

  • max time kernel
    156s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-12-2022 11:02

General

  • Target

    425617d0cbfb5ddb2285437fa6147cf3cfe024efdc4cf7ea56c2f61350ca70ac.exe

  • Size

    200KB

  • MD5

    241104b8eb8b3a657eb76a733be2014f

  • SHA1

    25274ee7cae23f038541bc1948bc58322a6fe433

  • SHA256

    425617d0cbfb5ddb2285437fa6147cf3cfe024efdc4cf7ea56c2f61350ca70ac

  • SHA512

    59be1f76ebf46e180c3b2ca34546c131c31e5836cb08c15fd40b8b40785a02dfca03cdf5ad8b27abf602822ffbe952e158b052baedb9ab7c059cd17f22a9ade4

  • SSDEEP

    3072:2jaJX1he96vwi5u5nITlai3JeYl1uW4TmqhTDw02rwpqLRc:w6vq5n2EzG1uW4i02spq

Malware Config

Extracted

Family

systembc

C2

109.205.214.18:443

Signatures

  • Detects Smokeloader packer 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • SystemBC

    SystemBC is a proxy and remote administration tool first seen in 2019.

  • Blocklisted process makes network request 2 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 4 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 43 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 43 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 34 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 29 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\425617d0cbfb5ddb2285437fa6147cf3cfe024efdc4cf7ea56c2f61350ca70ac.exe
    "C:\Users\Admin\AppData\Local\Temp\425617d0cbfb5ddb2285437fa6147cf3cfe024efdc4cf7ea56c2f61350ca70ac.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:1144
  • C:\Users\Admin\AppData\Local\Temp\55A2.exe
    C:\Users\Admin\AppData\Local\Temp\55A2.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Checks processor information in registry
    • Suspicious use of WriteProcessMemory
    PID:4880
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#61
      2⤵
      • Blocklisted process makes network request
      PID:2584
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#61
      2⤵
      • Suspicious use of SetThreadContext
      • Checks processor information in registry
      • Modifies registry class
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:780
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 14243
        3⤵
        • Modifies registry class
        • Suspicious use of FindShellTrayWindow
        PID:3936
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4880 -s 588
      2⤵
      • Program crash
      PID:3860
  • C:\Users\Admin\AppData\Local\Temp\8984.exe
    C:\Users\Admin\AppData\Local\Temp\8984.exe
    1⤵
    • Executes dropped EXE
    PID:4924
  • C:\Users\Admin\AppData\Local\Temp\8ED4.exe
    C:\Users\Admin\AppData\Local\Temp\8ED4.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    PID:4676
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4676 -s 496
      2⤵
      • Program crash
      PID:4000
  • C:\ProgramData\jrxosx\njphxo.exe
    C:\ProgramData\jrxosx\njphxo.exe start
    1⤵
    • Executes dropped EXE
    PID:4324
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:2132
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4880 -ip 4880
      1⤵
        PID:2908
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4676 -ip 4676
        1⤵
          PID:3472

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\ProgramData\jrxosx\njphxo.exe

          Filesize

          185KB

          MD5

          f89d628342ab6b02fb4e43b0959cffad

          SHA1

          ef346df6771087873a820f92c595d2ef42de4958

          SHA256

          3552afca2214180166dc53afd3588fc9de44e7bf5cf034d2622634ec53ffbd35

          SHA512

          65b7f3e89743f4937fba80bc2f535a74578d6c72377e041ff3a6bb642672b576de54c6c92e2fe35f8cb59278474d19d391f5593644aef0353f2896a4a175946d

        • C:\ProgramData\jrxosx\njphxo.exe

          Filesize

          185KB

          MD5

          f89d628342ab6b02fb4e43b0959cffad

          SHA1

          ef346df6771087873a820f92c595d2ef42de4958

          SHA256

          3552afca2214180166dc53afd3588fc9de44e7bf5cf034d2622634ec53ffbd35

          SHA512

          65b7f3e89743f4937fba80bc2f535a74578d6c72377e041ff3a6bb642672b576de54c6c92e2fe35f8cb59278474d19d391f5593644aef0353f2896a4a175946d

        • C:\Users\Admin\AppData\Local\Temp\55A2.exe

          Filesize

          781KB

          MD5

          b7503f2ce1f8ae161525c09da6ce2fef

          SHA1

          79dae979810a3af3a8be3700c63c138b17249b32

          SHA256

          ea1a47b7593cfdd76d063a9c8320bd663098d7345ad361ca6881731e357d590b

          SHA512

          c164a781ca0e92befb5c27e9d07fbb37c9aa18275d76e9829261d97e427f71d9d7d16f619d23905a89e39a2caf56b6b11640730bd08ca0b2531b937034dd1a2e

        • C:\Users\Admin\AppData\Local\Temp\55A2.exe

          Filesize

          781KB

          MD5

          b7503f2ce1f8ae161525c09da6ce2fef

          SHA1

          79dae979810a3af3a8be3700c63c138b17249b32

          SHA256

          ea1a47b7593cfdd76d063a9c8320bd663098d7345ad361ca6881731e357d590b

          SHA512

          c164a781ca0e92befb5c27e9d07fbb37c9aa18275d76e9829261d97e427f71d9d7d16f619d23905a89e39a2caf56b6b11640730bd08ca0b2531b937034dd1a2e

        • C:\Users\Admin\AppData\Local\Temp\8984.exe

          Filesize

          185KB

          MD5

          f89d628342ab6b02fb4e43b0959cffad

          SHA1

          ef346df6771087873a820f92c595d2ef42de4958

          SHA256

          3552afca2214180166dc53afd3588fc9de44e7bf5cf034d2622634ec53ffbd35

          SHA512

          65b7f3e89743f4937fba80bc2f535a74578d6c72377e041ff3a6bb642672b576de54c6c92e2fe35f8cb59278474d19d391f5593644aef0353f2896a4a175946d

        • C:\Users\Admin\AppData\Local\Temp\8984.exe

          Filesize

          185KB

          MD5

          f89d628342ab6b02fb4e43b0959cffad

          SHA1

          ef346df6771087873a820f92c595d2ef42de4958

          SHA256

          3552afca2214180166dc53afd3588fc9de44e7bf5cf034d2622634ec53ffbd35

          SHA512

          65b7f3e89743f4937fba80bc2f535a74578d6c72377e041ff3a6bb642672b576de54c6c92e2fe35f8cb59278474d19d391f5593644aef0353f2896a4a175946d

        • C:\Users\Admin\AppData\Local\Temp\8ED4.exe

          Filesize

          185KB

          MD5

          f89d628342ab6b02fb4e43b0959cffad

          SHA1

          ef346df6771087873a820f92c595d2ef42de4958

          SHA256

          3552afca2214180166dc53afd3588fc9de44e7bf5cf034d2622634ec53ffbd35

          SHA512

          65b7f3e89743f4937fba80bc2f535a74578d6c72377e041ff3a6bb642672b576de54c6c92e2fe35f8cb59278474d19d391f5593644aef0353f2896a4a175946d

        • C:\Users\Admin\AppData\Local\Temp\8ED4.exe

          Filesize

          185KB

          MD5

          f89d628342ab6b02fb4e43b0959cffad

          SHA1

          ef346df6771087873a820f92c595d2ef42de4958

          SHA256

          3552afca2214180166dc53afd3588fc9de44e7bf5cf034d2622634ec53ffbd35

          SHA512

          65b7f3e89743f4937fba80bc2f535a74578d6c72377e041ff3a6bb642672b576de54c6c92e2fe35f8cb59278474d19d391f5593644aef0353f2896a4a175946d

        • C:\Users\Admin\AppData\Local\Temp\Prewodwyyerdeuy..tmp

          Filesize

          3.5MB

          MD5

          1951049d57a12b81d96e53ba69eecc2e

          SHA1

          7c02ee5b4c4f1de5e7955d641c0c4949a9907a22

          SHA256

          f904e96e8666928f318f5515400282402d1f5d4a6f05304b9e92982ef32e3ba4

          SHA512

          e7d4f0fd41b8cb17f3969ad094e114bff74c82d57676a23728bd232b83c36116104c1b364d896681f1b0ce0b6ecb746f47ddafbc0b5ac88801bfd599db5abe15

        • memory/780-182-0x0000000003AE0000-0x0000000003C20000-memory.dmp

          Filesize

          1.2MB

        • memory/780-181-0x0000000000A00000-0x0000000001439000-memory.dmp

          Filesize

          10.2MB

        • memory/780-186-0x0000000003AE0000-0x0000000003C20000-memory.dmp

          Filesize

          1.2MB

        • memory/780-189-0x0000000003AE0000-0x0000000003C20000-memory.dmp

          Filesize

          1.2MB

        • memory/780-183-0x0000000003AE0000-0x0000000003C20000-memory.dmp

          Filesize

          1.2MB

        • memory/780-188-0x0000000003AE0000-0x0000000003C20000-memory.dmp

          Filesize

          1.2MB

        • memory/780-184-0x0000000002E80000-0x00000000039D9000-memory.dmp

          Filesize

          11.3MB

        • memory/780-195-0x0000000002E80000-0x00000000039D9000-memory.dmp

          Filesize

          11.3MB

        • memory/780-177-0x0000000000000000-mapping.dmp

        • memory/780-187-0x0000000003AE0000-0x0000000003C20000-memory.dmp

          Filesize

          1.2MB

        • memory/780-179-0x0000000003AE0000-0x0000000003C20000-memory.dmp

          Filesize

          1.2MB

        • memory/780-180-0x0000000003AE0000-0x0000000003C20000-memory.dmp

          Filesize

          1.2MB

        • memory/780-178-0x0000000002E80000-0x00000000039D9000-memory.dmp

          Filesize

          11.3MB

        • memory/1144-136-0x0000000000400000-0x0000000000468000-memory.dmp

          Filesize

          416KB

        • memory/1144-135-0x0000000000578000-0x0000000000588000-memory.dmp

          Filesize

          64KB

        • memory/1144-132-0x0000000000578000-0x0000000000588000-memory.dmp

          Filesize

          64KB

        • memory/1144-134-0x0000000000400000-0x0000000000468000-memory.dmp

          Filesize

          416KB

        • memory/1144-133-0x00000000004E0000-0x00000000004E9000-memory.dmp

          Filesize

          36KB

        • memory/2584-149-0x0000000000590000-0x0000000000593000-memory.dmp

          Filesize

          12KB

        • memory/2584-143-0x0000000000000000-mapping.dmp

        • memory/2584-161-0x0000000000590000-0x0000000000593000-memory.dmp

          Filesize

          12KB

        • memory/2584-144-0x0000000000500000-0x0000000000503000-memory.dmp

          Filesize

          12KB

        • memory/3936-194-0x00000185868E0000-0x0000018586B93000-memory.dmp

          Filesize

          2.7MB

        • memory/3936-193-0x00000000004C0000-0x0000000000761000-memory.dmp

          Filesize

          2.6MB

        • memory/3936-192-0x0000018588340000-0x0000018588480000-memory.dmp

          Filesize

          1.2MB

        • memory/3936-191-0x0000018588340000-0x0000018588480000-memory.dmp

          Filesize

          1.2MB

        • memory/3936-190-0x00007FF647E26890-mapping.dmp

        • memory/4324-164-0x00000000006E8000-0x00000000006F8000-memory.dmp

          Filesize

          64KB

        • memory/4324-165-0x0000000000400000-0x0000000000464000-memory.dmp

          Filesize

          400KB

        • memory/4324-185-0x00000000006E8000-0x00000000006F8000-memory.dmp

          Filesize

          64KB

        • memory/4676-158-0x0000000000400000-0x0000000000464000-memory.dmp

          Filesize

          400KB

        • memory/4676-157-0x00000000005B0000-0x00000000005B9000-memory.dmp

          Filesize

          36KB

        • memory/4676-156-0x000000000073D000-0x000000000074D000-memory.dmp

          Filesize

          64KB

        • memory/4676-152-0x0000000000000000-mapping.dmp

        • memory/4880-142-0x0000000000400000-0x00000000004F9000-memory.dmp

          Filesize

          996KB

        • memory/4880-169-0x0000000006AA0000-0x0000000006BE0000-memory.dmp

          Filesize

          1.2MB

        • memory/4880-175-0x0000000006AA0000-0x0000000006BE0000-memory.dmp

          Filesize

          1.2MB

        • memory/4880-197-0x0000000000400000-0x00000000004F9000-memory.dmp

          Filesize

          996KB

        • memory/4880-173-0x0000000006AA0000-0x0000000006BE0000-memory.dmp

          Filesize

          1.2MB

        • memory/4880-196-0x0000000005E00000-0x0000000006959000-memory.dmp

          Filesize

          11.3MB

        • memory/4880-137-0x0000000000000000-mapping.dmp

        • memory/4880-167-0x0000000005E00000-0x0000000006959000-memory.dmp

          Filesize

          11.3MB

        • memory/4880-145-0x0000000000400000-0x00000000004F9000-memory.dmp

          Filesize

          996KB

        • memory/4880-174-0x0000000006AA0000-0x0000000006BE0000-memory.dmp

          Filesize

          1.2MB

        • memory/4880-172-0x0000000006AA0000-0x0000000006BE0000-memory.dmp

          Filesize

          1.2MB

        • memory/4880-170-0x0000000006AA0000-0x0000000006BE0000-memory.dmp

          Filesize

          1.2MB

        • memory/4880-168-0x0000000005E00000-0x0000000006959000-memory.dmp

          Filesize

          11.3MB

        • memory/4880-141-0x0000000002250000-0x0000000002345000-memory.dmp

          Filesize

          980KB

        • memory/4880-171-0x0000000006AA0000-0x0000000006BE0000-memory.dmp

          Filesize

          1.2MB

        • memory/4880-140-0x00000000021A8000-0x0000000002249000-memory.dmp

          Filesize

          644KB

        • memory/4880-176-0x0000000006AA0000-0x0000000006BE0000-memory.dmp

          Filesize

          1.2MB

        • memory/4924-160-0x00000000004FD000-0x000000000050E000-memory.dmp

          Filesize

          68KB

        • memory/4924-146-0x0000000000000000-mapping.dmp

        • memory/4924-159-0x00000000004FD000-0x000000000050E000-memory.dmp

          Filesize

          68KB

        • memory/4924-150-0x00000000004FD000-0x000000000050E000-memory.dmp

          Filesize

          68KB

        • memory/4924-151-0x00000000004B0000-0x00000000004B9000-memory.dmp

          Filesize

          36KB

        • memory/4924-155-0x0000000000400000-0x0000000000464000-memory.dmp

          Filesize

          400KB