Analysis

  • max time kernel
    297s
  • max time network
    303s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    17-12-2022 15:29

General

  • Target

    2288.exe

  • Size

    303KB

  • MD5

    a91d1ad4f99dc142a63342a79a04a61c

  • SHA1

    9328310f5567fc7247516d21f339fb99b67706be

  • SHA256

    2c3fade9317146109c3dad7e9e06168a2af28d04185c248a3322cd8b8ae8901f

  • SHA512

    f869c9568afb90bec12732ce55552e66fe1dc2f9a52212a8011e2509805bfc59574ecbe4f52144ed8bde0b240849816cdb261ccefcb9d00f1ba65f0daa9cc39a

  • SSDEEP

    3072:S7WJjr2Y4hMi7RVRypzplBot6LB1fhnYAfm8QBmP22tThsNbNweGj+Qo6hNz5/a:++js57SFlnLDfhYAfLP22tThsIeGjY6

Score
10/10

Malware Config

Extracted

Family

systembc

C2

89.248.163.218:443

Signatures

  • SystemBC

    SystemBC is a proxy and remote administration tool first seen in 2019.

  • Executes dropped EXE 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2288.exe
    "C:\Users\Admin\AppData\Local\Temp\2288.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    PID:2032
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {BB91848E-F31F-471B-8947-76F3CBFF86ED} S-1-5-18:NT AUTHORITY\System:Service:
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1680
    • C:\ProgramData\icplu\kxlnr.exe
      C:\ProgramData\icplu\kxlnr.exe start
      2⤵
      • Executes dropped EXE
      PID:976

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\icplu\kxlnr.exe

    Filesize

    303KB

    MD5

    a91d1ad4f99dc142a63342a79a04a61c

    SHA1

    9328310f5567fc7247516d21f339fb99b67706be

    SHA256

    2c3fade9317146109c3dad7e9e06168a2af28d04185c248a3322cd8b8ae8901f

    SHA512

    f869c9568afb90bec12732ce55552e66fe1dc2f9a52212a8011e2509805bfc59574ecbe4f52144ed8bde0b240849816cdb261ccefcb9d00f1ba65f0daa9cc39a

  • C:\ProgramData\icplu\kxlnr.exe

    Filesize

    303KB

    MD5

    a91d1ad4f99dc142a63342a79a04a61c

    SHA1

    9328310f5567fc7247516d21f339fb99b67706be

    SHA256

    2c3fade9317146109c3dad7e9e06168a2af28d04185c248a3322cd8b8ae8901f

    SHA512

    f869c9568afb90bec12732ce55552e66fe1dc2f9a52212a8011e2509805bfc59574ecbe4f52144ed8bde0b240849816cdb261ccefcb9d00f1ba65f0daa9cc39a

  • memory/976-59-0x0000000000000000-mapping.dmp

  • memory/976-63-0x00000000002AC000-0x00000000002C1000-memory.dmp

    Filesize

    84KB

  • memory/976-64-0x0000000000400000-0x0000000000451000-memory.dmp

    Filesize

    324KB

  • memory/976-65-0x00000000002AC000-0x00000000002C1000-memory.dmp

    Filesize

    84KB

  • memory/2032-54-0x00000000766D1000-0x00000000766D3000-memory.dmp

    Filesize

    8KB

  • memory/2032-56-0x00000000001B0000-0x00000000001B9000-memory.dmp

    Filesize

    36KB

  • memory/2032-55-0x00000000002EC000-0x0000000000301000-memory.dmp

    Filesize

    84KB

  • memory/2032-57-0x0000000000400000-0x0000000000451000-memory.dmp

    Filesize

    324KB

  • memory/2032-61-0x00000000002EC000-0x0000000000301000-memory.dmp

    Filesize

    84KB