Malware Analysis Report

2025-05-05 23:59

Sample ID 230207-n5x7gsef61
Target 08fdb6c4bdfd23bbd7e438eb0644eaf2f204e6d1aeff3e6cbaf7513beba2e717.dll
SHA256 08fdb6c4bdfd23bbd7e438eb0644eaf2f204e6d1aeff3e6cbaf7513beba2e717
Tags
systembc trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

08fdb6c4bdfd23bbd7e438eb0644eaf2f204e6d1aeff3e6cbaf7513beba2e717

Threat Level: Known bad

The file 08fdb6c4bdfd23bbd7e438eb0644eaf2f204e6d1aeff3e6cbaf7513beba2e717.dll was found to be: Known bad.

Malicious Activity Summary

systembc trojan

SystemBC

Program crash

Suspicious use of WriteProcessMemory

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2023-02-07 11:59

Signatures

N/A

Analysis: behavioral2

Detonation Overview

Submitted

2023-02-07 11:59

Reported

2023-02-07 12:02

Platform

win10v2004-20220812-en

Max time kernel

125s

Max time network

141s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\08fdb6c4bdfd23bbd7e438eb0644eaf2f204e6d1aeff3e6cbaf7513beba2e717.dll,#1

Signatures

SystemBC

trojan systembc

Program crash

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\rundll32.exe

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1420 wrote to memory of 4988 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 1420 wrote to memory of 4988 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 1420 wrote to memory of 4988 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\08fdb6c4bdfd23bbd7e438eb0644eaf2f204e6d1aeff3e6cbaf7513beba2e717.dll,#1

C:\Windows\SysWOW64\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\08fdb6c4bdfd23bbd7e438eb0644eaf2f204e6d1aeff3e6cbaf7513beba2e717.dll,#1

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4988 -ip 4988

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 4988 -s 588

Network

Country Destination Domain Proto
NL 104.80.225.205:443 tcp
US 52.182.143.208:443 tcp
US 8.248.5.254:80 tcp
US 8.248.5.254:80 tcp
US 8.248.5.254:80 tcp
US 8.248.5.254:80 tcp
US 8.248.5.254:80 tcp

Files

memory/4988-132-0x0000000000000000-mapping.dmp

memory/4988-133-0x0000000010000000-0x0000000010177000-memory.dmp

memory/4988-134-0x0000000001EE0000-0x0000000002021000-memory.dmp

memory/4988-135-0x0000000000520000-0x0000000000524000-memory.dmp

memory/4988-136-0x00000000006A0000-0x00000000006A4000-memory.dmp

memory/4988-137-0x0000000001EE0000-0x0000000002021000-memory.dmp

Analysis: behavioral1

Detonation Overview

Submitted

2023-02-07 11:59

Reported

2023-02-07 12:02

Platform

win7-20220812-en

Max time kernel

124s

Max time network

45s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\08fdb6c4bdfd23bbd7e438eb0644eaf2f204e6d1aeff3e6cbaf7513beba2e717.dll,#1

Signatures

SystemBC

trojan systembc

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1784 wrote to memory of 2028 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 1784 wrote to memory of 2028 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 1784 wrote to memory of 2028 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 1784 wrote to memory of 2028 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 1784 wrote to memory of 2028 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 1784 wrote to memory of 2028 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 1784 wrote to memory of 2028 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\08fdb6c4bdfd23bbd7e438eb0644eaf2f204e6d1aeff3e6cbaf7513beba2e717.dll,#1

C:\Windows\SysWOW64\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\08fdb6c4bdfd23bbd7e438eb0644eaf2f204e6d1aeff3e6cbaf7513beba2e717.dll,#1

Network

N/A

Files

memory/2028-54-0x0000000000000000-mapping.dmp

memory/2028-55-0x00000000762F1000-0x00000000762F3000-memory.dmp

memory/2028-56-0x0000000010000000-0x0000000010177000-memory.dmp

memory/2028-57-0x00000000003A0000-0x00000000004E1000-memory.dmp

memory/2028-58-0x00000000001C0000-0x00000000001C4000-memory.dmp

memory/2028-59-0x00000000003A0000-0x00000000004E1000-memory.dmp