Malware Analysis Report

2025-05-28 17:38

Sample ID 221217-svjzbsbf5s
Target 89cb56d6ad669a38a4b234508dbaf512.exe
SHA256 ab971c45e2e31f860ac74d476aee2aeb850a5f4130ca12c6c8110e8c4621aca9
Tags
systembc
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

ab971c45e2e31f860ac74d476aee2aeb850a5f4130ca12c6c8110e8c4621aca9

Threat Level: Known bad

The file 89cb56d6ad669a38a4b234508dbaf512.exe was found to be: Known bad.

Malicious Activity Summary

systembc

Systembc family

Drops file in Windows directory

Suspicious use of WriteProcessMemory

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2022-12-17 15:26

Signatures

Systembc family

systembc

Analysis: behavioral1

Detonation Overview

Submitted

2022-12-17 15:26

Reported

2022-12-17 15:29

Platform

win7-20221111-en

Max time kernel

61s

Max time network

142s

Command Line

"C:\Users\Admin\AppData\Local\Temp\89cb56d6ad669a38a4b234508dbaf512.exe"

Signatures

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\Tasks\wow64.job C:\Users\Admin\AppData\Local\Temp\89cb56d6ad669a38a4b234508dbaf512.exe N/A
File opened for modification C:\Windows\Tasks\wow64.job C:\Users\Admin\AppData\Local\Temp\89cb56d6ad669a38a4b234508dbaf512.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\89cb56d6ad669a38a4b234508dbaf512.exe

"C:\Users\Admin\AppData\Local\Temp\89cb56d6ad669a38a4b234508dbaf512.exe"

C:\Windows\system32\taskeng.exe

taskeng.exe {8A0EBF7D-1365-48D3-BA0C-59862096658B} S-1-5-18:NT AUTHORITY\System:Service:

C:\Users\Admin\AppData\Local\Temp\89cb56d6ad669a38a4b234508dbaf512.exe

C:\Users\Admin\AppData\Local\Temp\89cb56d6ad669a38a4b234508dbaf512.exe start

Network

Country Destination Domain Proto
N/A 95.217.228.125:4249 tcp

Files

memory/1108-54-0x0000000075A91000-0x0000000075A93000-memory.dmp

memory/1028-55-0x0000000000000000-mapping.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2022-12-17 15:26

Reported

2022-12-17 15:29

Platform

win10v2004-20220901-en

Max time kernel

126s

Max time network

144s

Command Line

"C:\Users\Admin\AppData\Local\Temp\89cb56d6ad669a38a4b234508dbaf512.exe"

Signatures

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\Tasks\wow64.job C:\Users\Admin\AppData\Local\Temp\89cb56d6ad669a38a4b234508dbaf512.exe N/A
File opened for modification C:\Windows\Tasks\wow64.job C:\Users\Admin\AppData\Local\Temp\89cb56d6ad669a38a4b234508dbaf512.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\89cb56d6ad669a38a4b234508dbaf512.exe

"C:\Users\Admin\AppData\Local\Temp\89cb56d6ad669a38a4b234508dbaf512.exe"

C:\Users\Admin\AppData\Local\Temp\89cb56d6ad669a38a4b234508dbaf512.exe

C:\Users\Admin\AppData\Local\Temp\89cb56d6ad669a38a4b234508dbaf512.exe start

Network

Country Destination Domain Proto
N/A 93.184.220.29:80 tcp
N/A 95.217.228.125:4249 tcp
N/A 8.253.183.120:80 tcp
N/A 20.42.73.25:443 tcp
N/A 8.253.183.120:80 tcp
N/A 8.253.183.120:80 tcp
N/A 8.253.183.120:80 tcp

Files

N/A