Analysis

  • max time kernel
    151s
  • max time network
    130s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-12-2022 11:37

General

  • Target

    1b6ceb8b05f92afaf73b8a2ce3f2bf0407f5481b7120d5ca031960d7d7537f57.exe

  • Size

    252KB

  • MD5

    a1059220efae8af834c8dd72aa570eed

  • SHA1

    98cbe923e03c32f8d7980f36b15f2c5fbc8337ee

  • SHA256

    1b6ceb8b05f92afaf73b8a2ce3f2bf0407f5481b7120d5ca031960d7d7537f57

  • SHA512

    97d0890b4cd2a9ef25bf9b1b3ca53b973eb1a6753a4f46d312b7cb51cb93693acd439491d4fa032fad71964ffb89d2edefe7ac6e6b03783e51eb2dad0a705036

  • SSDEEP

    3072:BdoedgUxUi+i5/riLzboMNrE71VMKp/OsjhTDw02rw4plyr2ZeXGMh0r:XUiFZAQRVd/s02s4pAUe2U

Malware Config

Extracted

Family

systembc

C2

109.205.214.18:443

Signatures

  • Detects Smokeloader packer 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • SystemBC

    SystemBC is a proxy and remote administration tool first seen in 2019.

  • Blocklisted process makes network request 2 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 47 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 19 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 29 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1b6ceb8b05f92afaf73b8a2ce3f2bf0407f5481b7120d5ca031960d7d7537f57.exe
    "C:\Users\Admin\AppData\Local\Temp\1b6ceb8b05f92afaf73b8a2ce3f2bf0407f5481b7120d5ca031960d7d7537f57.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:1692
  • C:\Users\Admin\AppData\Local\Temp\372D.exe
    C:\Users\Admin\AppData\Local\Temp\372D.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Checks processor information in registry
    • Suspicious use of WriteProcessMemory
    PID:1728
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#61
      2⤵
      • Blocklisted process makes network request
      PID:2132
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#61
      2⤵
      • Checks processor information in registry
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:1752
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1728 -s 644
      2⤵
      • Program crash
      PID:2396
  • C:\Users\Admin\AppData\Local\Temp\569D.exe
    C:\Users\Admin\AppData\Local\Temp\569D.exe
    1⤵
    • Executes dropped EXE
    PID:3668
  • C:\Users\Admin\AppData\Local\Temp\598C.exe
    C:\Users\Admin\AppData\Local\Temp\598C.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    PID:3664
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3664 -s 984
      2⤵
      • Program crash
      PID:3860
  • C:\ProgramData\vksds\kbulfx.exe
    C:\ProgramData\vksds\kbulfx.exe start
    1⤵
    • Executes dropped EXE
    PID:4116
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 1728 -ip 1728
    1⤵
      PID:3140
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 3664 -ip 3664
      1⤵
        PID:4580
      • C:\Users\Admin\AppData\Roaming\bdubces
        C:\Users\Admin\AppData\Roaming\bdubces
        1⤵
        • Executes dropped EXE
        • Checks SCSI registry key(s)
        • Suspicious behavior: MapViewOfSection
        PID:3524

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Defense Evasion

      Modify Registry

      1
      T1112

      Credential Access

      Credentials in Files

      1
      T1081

      Discovery

      Query Registry

      3
      T1012

      System Information Discovery

      3
      T1082

      Peripheral Device Discovery

      1
      T1120

      Collection

      Data from Local System

      1
      T1005

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\ProgramData\vksds\kbulfx.exe
        Filesize

        185KB

        MD5

        f89d628342ab6b02fb4e43b0959cffad

        SHA1

        ef346df6771087873a820f92c595d2ef42de4958

        SHA256

        3552afca2214180166dc53afd3588fc9de44e7bf5cf034d2622634ec53ffbd35

        SHA512

        65b7f3e89743f4937fba80bc2f535a74578d6c72377e041ff3a6bb642672b576de54c6c92e2fe35f8cb59278474d19d391f5593644aef0353f2896a4a175946d

      • C:\ProgramData\vksds\kbulfx.exe
        Filesize

        185KB

        MD5

        f89d628342ab6b02fb4e43b0959cffad

        SHA1

        ef346df6771087873a820f92c595d2ef42de4958

        SHA256

        3552afca2214180166dc53afd3588fc9de44e7bf5cf034d2622634ec53ffbd35

        SHA512

        65b7f3e89743f4937fba80bc2f535a74578d6c72377e041ff3a6bb642672b576de54c6c92e2fe35f8cb59278474d19d391f5593644aef0353f2896a4a175946d

      • C:\Users\Admin\AppData\Local\Temp\372D.exe
        Filesize

        781KB

        MD5

        b7503f2ce1f8ae161525c09da6ce2fef

        SHA1

        79dae979810a3af3a8be3700c63c138b17249b32

        SHA256

        ea1a47b7593cfdd76d063a9c8320bd663098d7345ad361ca6881731e357d590b

        SHA512

        c164a781ca0e92befb5c27e9d07fbb37c9aa18275d76e9829261d97e427f71d9d7d16f619d23905a89e39a2caf56b6b11640730bd08ca0b2531b937034dd1a2e

      • C:\Users\Admin\AppData\Local\Temp\372D.exe
        Filesize

        781KB

        MD5

        b7503f2ce1f8ae161525c09da6ce2fef

        SHA1

        79dae979810a3af3a8be3700c63c138b17249b32

        SHA256

        ea1a47b7593cfdd76d063a9c8320bd663098d7345ad361ca6881731e357d590b

        SHA512

        c164a781ca0e92befb5c27e9d07fbb37c9aa18275d76e9829261d97e427f71d9d7d16f619d23905a89e39a2caf56b6b11640730bd08ca0b2531b937034dd1a2e

      • C:\Users\Admin\AppData\Local\Temp\569D.exe
        Filesize

        185KB

        MD5

        f89d628342ab6b02fb4e43b0959cffad

        SHA1

        ef346df6771087873a820f92c595d2ef42de4958

        SHA256

        3552afca2214180166dc53afd3588fc9de44e7bf5cf034d2622634ec53ffbd35

        SHA512

        65b7f3e89743f4937fba80bc2f535a74578d6c72377e041ff3a6bb642672b576de54c6c92e2fe35f8cb59278474d19d391f5593644aef0353f2896a4a175946d

      • C:\Users\Admin\AppData\Local\Temp\569D.exe
        Filesize

        185KB

        MD5

        f89d628342ab6b02fb4e43b0959cffad

        SHA1

        ef346df6771087873a820f92c595d2ef42de4958

        SHA256

        3552afca2214180166dc53afd3588fc9de44e7bf5cf034d2622634ec53ffbd35

        SHA512

        65b7f3e89743f4937fba80bc2f535a74578d6c72377e041ff3a6bb642672b576de54c6c92e2fe35f8cb59278474d19d391f5593644aef0353f2896a4a175946d

      • C:\Users\Admin\AppData\Local\Temp\598C.exe
        Filesize

        185KB

        MD5

        f89d628342ab6b02fb4e43b0959cffad

        SHA1

        ef346df6771087873a820f92c595d2ef42de4958

        SHA256

        3552afca2214180166dc53afd3588fc9de44e7bf5cf034d2622634ec53ffbd35

        SHA512

        65b7f3e89743f4937fba80bc2f535a74578d6c72377e041ff3a6bb642672b576de54c6c92e2fe35f8cb59278474d19d391f5593644aef0353f2896a4a175946d

      • C:\Users\Admin\AppData\Local\Temp\598C.exe
        Filesize

        185KB

        MD5

        f89d628342ab6b02fb4e43b0959cffad

        SHA1

        ef346df6771087873a820f92c595d2ef42de4958

        SHA256

        3552afca2214180166dc53afd3588fc9de44e7bf5cf034d2622634ec53ffbd35

        SHA512

        65b7f3e89743f4937fba80bc2f535a74578d6c72377e041ff3a6bb642672b576de54c6c92e2fe35f8cb59278474d19d391f5593644aef0353f2896a4a175946d

      • C:\Users\Admin\AppData\Local\Temp\Prewodwyyerdeuy..tmp
        Filesize

        3.5MB

        MD5

        1951049d57a12b81d96e53ba69eecc2e

        SHA1

        7c02ee5b4c4f1de5e7955d641c0c4949a9907a22

        SHA256

        f904e96e8666928f318f5515400282402d1f5d4a6f05304b9e92982ef32e3ba4

        SHA512

        e7d4f0fd41b8cb17f3969ad094e114bff74c82d57676a23728bd232b83c36116104c1b364d896681f1b0ce0b6ecb746f47ddafbc0b5ac88801bfd599db5abe15

      • C:\Users\Admin\AppData\Roaming\bdubces
        Filesize

        252KB

        MD5

        a1059220efae8af834c8dd72aa570eed

        SHA1

        98cbe923e03c32f8d7980f36b15f2c5fbc8337ee

        SHA256

        1b6ceb8b05f92afaf73b8a2ce3f2bf0407f5481b7120d5ca031960d7d7537f57

        SHA512

        97d0890b4cd2a9ef25bf9b1b3ca53b973eb1a6753a4f46d312b7cb51cb93693acd439491d4fa032fad71964ffb89d2edefe7ac6e6b03783e51eb2dad0a705036

      • C:\Users\Admin\AppData\Roaming\bdubces
        Filesize

        252KB

        MD5

        a1059220efae8af834c8dd72aa570eed

        SHA1

        98cbe923e03c32f8d7980f36b15f2c5fbc8337ee

        SHA256

        1b6ceb8b05f92afaf73b8a2ce3f2bf0407f5481b7120d5ca031960d7d7537f57

        SHA512

        97d0890b4cd2a9ef25bf9b1b3ca53b973eb1a6753a4f46d312b7cb51cb93693acd439491d4fa032fad71964ffb89d2edefe7ac6e6b03783e51eb2dad0a705036

      • memory/1692-136-0x0000000000400000-0x0000000000475000-memory.dmp
        Filesize

        468KB

      • memory/1692-132-0x0000000000608000-0x0000000000619000-memory.dmp
        Filesize

        68KB

      • memory/1692-135-0x0000000000608000-0x0000000000619000-memory.dmp
        Filesize

        68KB

      • memory/1692-134-0x0000000000400000-0x0000000000475000-memory.dmp
        Filesize

        468KB

      • memory/1692-133-0x00000000004F0000-0x00000000004F9000-memory.dmp
        Filesize

        36KB

      • memory/1728-141-0x000000000058E000-0x000000000062F000-memory.dmp
        Filesize

        644KB

      • memory/1728-166-0x00000000068D0000-0x0000000006A10000-memory.dmp
        Filesize

        1.2MB

      • memory/1728-187-0x0000000000400000-0x00000000004F9000-memory.dmp
        Filesize

        996KB

      • memory/1728-143-0x0000000000400000-0x00000000004F9000-memory.dmp
        Filesize

        996KB

      • memory/1728-142-0x00000000021A0000-0x0000000002295000-memory.dmp
        Filesize

        980KB

      • memory/1728-165-0x00000000068D0000-0x0000000006A10000-memory.dmp
        Filesize

        1.2MB

      • memory/1728-172-0x0000000000400000-0x00000000004F9000-memory.dmp
        Filesize

        996KB

      • memory/1728-170-0x00000000068D0000-0x0000000006A10000-memory.dmp
        Filesize

        1.2MB

      • memory/1728-169-0x00000000068D0000-0x0000000006A10000-memory.dmp
        Filesize

        1.2MB

      • memory/1728-184-0x0000000005C30000-0x0000000006789000-memory.dmp
        Filesize

        11.3MB

      • memory/1728-137-0x0000000000000000-mapping.dmp
      • memory/1728-168-0x00000000068D0000-0x0000000006A10000-memory.dmp
        Filesize

        1.2MB

      • memory/1728-167-0x0000000005C30000-0x0000000006789000-memory.dmp
        Filesize

        11.3MB

      • memory/1728-161-0x0000000005C30000-0x0000000006789000-memory.dmp
        Filesize

        11.3MB

      • memory/1728-162-0x00000000068D0000-0x0000000006A10000-memory.dmp
        Filesize

        1.2MB

      • memory/1728-163-0x00000000068D0000-0x0000000006A10000-memory.dmp
        Filesize

        1.2MB

      • memory/1728-164-0x00000000068D0000-0x0000000006A10000-memory.dmp
        Filesize

        1.2MB

      • memory/1752-177-0x0000000003330000-0x0000000003E89000-memory.dmp
        Filesize

        11.3MB

      • memory/1752-174-0x0000000003F60000-0x00000000040A0000-memory.dmp
        Filesize

        1.2MB

      • memory/1752-180-0x0000000003330000-0x0000000003E89000-memory.dmp
        Filesize

        11.3MB

      • memory/1752-179-0x0000000003F60000-0x00000000040A0000-memory.dmp
        Filesize

        1.2MB

      • memory/1752-178-0x0000000003F60000-0x00000000040A0000-memory.dmp
        Filesize

        1.2MB

      • memory/1752-176-0x0000000000E00000-0x0000000001839000-memory.dmp
        Filesize

        10.2MB

      • memory/1752-171-0x0000000000000000-mapping.dmp
      • memory/1752-175-0x0000000003F60000-0x00000000040A0000-memory.dmp
        Filesize

        1.2MB

      • memory/1752-173-0x0000000003330000-0x0000000003E89000-memory.dmp
        Filesize

        11.3MB

      • memory/2132-146-0x0000000000B80000-0x0000000000B83000-memory.dmp
        Filesize

        12KB

      • memory/2132-145-0x0000000000B80000-0x0000000000B83000-memory.dmp
        Filesize

        12KB

      • memory/2132-140-0x0000000000000000-mapping.dmp
      • memory/2132-144-0x0000000000A80000-0x0000000000A83000-memory.dmp
        Filesize

        12KB

      • memory/3524-192-0x0000000000400000-0x0000000000475000-memory.dmp
        Filesize

        468KB

      • memory/3524-191-0x0000000000400000-0x0000000000475000-memory.dmp
        Filesize

        468KB

      • memory/3524-190-0x0000000000658000-0x0000000000668000-memory.dmp
        Filesize

        64KB

      • memory/3664-183-0x00000000004BD000-0x00000000004CD000-memory.dmp
        Filesize

        64KB

      • memory/3664-159-0x00000000004BD000-0x00000000004CD000-memory.dmp
        Filesize

        64KB

      • memory/3664-150-0x0000000000000000-mapping.dmp
      • memory/3664-160-0x0000000000400000-0x0000000000464000-memory.dmp
        Filesize

        400KB

      • memory/3668-147-0x0000000000000000-mapping.dmp
      • memory/3668-154-0x00000000004A0000-0x00000000004A9000-memory.dmp
        Filesize

        36KB

      • memory/3668-157-0x0000000000400000-0x0000000000464000-memory.dmp
        Filesize

        400KB

      • memory/3668-156-0x00000000004A0000-0x00000000004A9000-memory.dmp
        Filesize

        36KB

      • memory/3668-153-0x000000000068D000-0x000000000069D000-memory.dmp
        Filesize

        64KB

      • memory/3668-155-0x000000000068D000-0x000000000069D000-memory.dmp
        Filesize

        64KB

      • memory/4116-186-0x0000000000400000-0x0000000000464000-memory.dmp
        Filesize

        400KB

      • memory/4116-185-0x0000000000628000-0x0000000000638000-memory.dmp
        Filesize

        64KB