Malware Analysis Report

2025-05-05 23:59

Sample ID 230209-j7vrxsbe7t
Target 6f21ef2acc3d9b4bb18800d61c61b2f4.exe
SHA256 1bd1c5a709b98d3b13c3cb3572c1c409334807a05257555e8c11f7ddc0d17e36
Tags
systembc trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

1bd1c5a709b98d3b13c3cb3572c1c409334807a05257555e8c11f7ddc0d17e36

Threat Level: Known bad

The file 6f21ef2acc3d9b4bb18800d61c61b2f4.exe was found to be: Known bad.

Malicious Activity Summary

systembc trojan

SystemBC

Executes dropped EXE

Drops file in Windows directory

Suspicious behavior: EnumeratesProcesses

Suspicious use of WriteProcessMemory

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2023-02-09 08:19

Signatures

N/A

Analysis: behavioral2

Detonation Overview

Submitted

2023-02-09 08:19

Reported

2023-02-09 10:32

Platform

win10v2004-20220812-en

Max time kernel

171s

Max time network

173s

Command Line

"C:\Users\Admin\AppData\Local\Temp\6f21ef2acc3d9b4bb18800d61c61b2f4.exe"

Signatures

SystemBC

trojan systembc

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\ProgramData\gxlbeg\elpgwx.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\Tasks\elpgwx.job C:\Users\Admin\AppData\Local\Temp\6f21ef2acc3d9b4bb18800d61c61b2f4.exe N/A
File opened for modification C:\Windows\Tasks\elpgwx.job C:\Users\Admin\AppData\Local\Temp\6f21ef2acc3d9b4bb18800d61c61b2f4.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\6f21ef2acc3d9b4bb18800d61c61b2f4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6f21ef2acc3d9b4bb18800d61c61b2f4.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\6f21ef2acc3d9b4bb18800d61c61b2f4.exe

"C:\Users\Admin\AppData\Local\Temp\6f21ef2acc3d9b4bb18800d61c61b2f4.exe"

C:\ProgramData\gxlbeg\elpgwx.exe

C:\ProgramData\gxlbeg\elpgwx.exe start2

Network

Country Destination Domain Proto
US 93.184.221.240:80 tcp
US 93.184.221.240:80 tcp
US 209.197.3.8:80 tcp
US 93.184.221.240:80 tcp
US 20.189.173.14:443 tcp
US 8.8.8.8:53 inredrs5er.xyz udp
US 8.8.8.8:53 s5s4txirgtrtin.com udp
US 8.8.8.8:53 s5s4txirgtrtin.com udp
US 8.8.8.8:53 inredrs5er.xyz udp
US 8.8.8.8:53 inredrs5er.xyz udp
US 8.8.8.8:53 s5s4txirgtrtin.com udp
US 8.8.8.8:53 inredrs5er.xyz udp
US 8.8.8.8:53 s5s4txirgtrtin.com udp
US 8.8.8.8:53 s5s4txirgtrtin.com udp
US 8.8.8.8:53 inredrs5er.xyz udp
US 8.8.8.8:53 s5s4txirgtrtin.com udp
US 8.8.8.8:53 inredrs5er.xyz udp
US 93.184.221.240:80 tcp
US 93.184.221.240:80 tcp
US 8.8.8.8:53 s5s4txirgtrtin.com udp
US 8.8.8.8:53 inredrs5er.xyz udp
US 8.8.8.8:53 inredrs5er.xyz udp
US 8.8.8.8:53 s5s4txirgtrtin.com udp
US 8.8.8.8:53 s5s4txirgtrtin.com udp
US 8.8.8.8:53 inredrs5er.xyz udp
US 8.8.8.8:53 s5s4txirgtrtin.com udp
US 8.8.8.8:53 inredrs5er.xyz udp
US 8.8.8.8:53 inredrs5er.xyz udp
US 8.8.8.8:53 s5s4txirgtrtin.com udp
US 8.8.8.8:53 inredrs5er.xyz udp
US 8.8.8.8:53 s5s4txirgtrtin.com udp
US 8.8.8.8:53 inredrs5er.xyz udp
US 8.8.8.8:53 s5s4txirgtrtin.com udp
US 8.8.8.8:53 s5s4txirgtrtin.com udp
US 8.8.8.8:53 inredrs5er.xyz udp
US 8.8.8.8:53 inredrs5er.xyz udp
US 8.8.8.8:53 s5s4txirgtrtin.com udp
US 8.8.8.8:53 inredrs5er.xyz udp
US 8.8.8.8:53 s5s4txirgtrtin.com udp
US 8.8.8.8:53 s5s4txirgtrtin.com udp
US 8.8.8.8:53 inredrs5er.xyz udp
US 8.8.8.8:53 inredrs5er.xyz udp
US 8.8.8.8:53 s5s4txirgtrtin.com udp
US 8.8.8.8:53 s5s4txirgtrtin.com udp
US 8.8.8.8:53 inredrs5er.xyz udp
US 8.8.8.8:53 inredrs5er.xyz udp
US 8.8.8.8:53 s5s4txirgtrtin.com udp
US 8.8.8.8:53 s5s4txirgtrtin.com udp
US 8.8.8.8:53 inredrs5er.xyz udp
US 8.8.8.8:53 inredrs5er.xyz udp
US 8.8.8.8:53 s5s4txirgtrtin.com udp
US 8.8.8.8:53 inredrs5er.xyz udp
US 8.8.8.8:53 s5s4txirgtrtin.com udp
US 8.8.8.8:53 inredrs5er.xyz udp
US 8.8.8.8:53 s5s4txirgtrtin.com udp
US 8.8.8.8:53 inredrs5er.xyz udp
US 8.8.8.8:53 s5s4txirgtrtin.com udp

Files

memory/3500-132-0x0000000000650000-0x0000000000666000-memory.dmp

memory/3500-133-0x0000000000400000-0x00000000004D4000-memory.dmp

C:\ProgramData\gxlbeg\elpgwx.exe

MD5 6f21ef2acc3d9b4bb18800d61c61b2f4
SHA1 d176b38b567ce050c82ecb8b0e4e8cc44a7ea0e4
SHA256 1bd1c5a709b98d3b13c3cb3572c1c409334807a05257555e8c11f7ddc0d17e36
SHA512 45051de1630858e982b0a5050700b8dde734fa5e04d95720abaa137433d6a8239a15187638d88c0697d73641136248a9cace5f001eba4f744899da619ea90033

C:\ProgramData\gxlbeg\elpgwx.exe

MD5 6f21ef2acc3d9b4bb18800d61c61b2f4
SHA1 d176b38b567ce050c82ecb8b0e4e8cc44a7ea0e4
SHA256 1bd1c5a709b98d3b13c3cb3572c1c409334807a05257555e8c11f7ddc0d17e36
SHA512 45051de1630858e982b0a5050700b8dde734fa5e04d95720abaa137433d6a8239a15187638d88c0697d73641136248a9cace5f001eba4f744899da619ea90033

memory/3728-136-0x0000000000660000-0x0000000000676000-memory.dmp

Analysis: behavioral1

Detonation Overview

Submitted

2023-02-09 08:19

Reported

2023-02-09 10:30

Platform

win7-20220901-en

Max time kernel

148s

Max time network

156s

Command Line

"C:\Users\Admin\AppData\Local\Temp\6f21ef2acc3d9b4bb18800d61c61b2f4.exe"

Signatures

SystemBC

trojan systembc

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\ProgramData\rlps\kweeu.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\Tasks\kweeu.job C:\Users\Admin\AppData\Local\Temp\6f21ef2acc3d9b4bb18800d61c61b2f4.exe N/A
File created C:\Windows\Tasks\kweeu.job C:\Users\Admin\AppData\Local\Temp\6f21ef2acc3d9b4bb18800d61c61b2f4.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\6f21ef2acc3d9b4bb18800d61c61b2f4.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2036 wrote to memory of 2020 N/A C:\Windows\system32\taskeng.exe C:\ProgramData\rlps\kweeu.exe
PID 2036 wrote to memory of 2020 N/A C:\Windows\system32\taskeng.exe C:\ProgramData\rlps\kweeu.exe
PID 2036 wrote to memory of 2020 N/A C:\Windows\system32\taskeng.exe C:\ProgramData\rlps\kweeu.exe
PID 2036 wrote to memory of 2020 N/A C:\Windows\system32\taskeng.exe C:\ProgramData\rlps\kweeu.exe

Processes

C:\Users\Admin\AppData\Local\Temp\6f21ef2acc3d9b4bb18800d61c61b2f4.exe

"C:\Users\Admin\AppData\Local\Temp\6f21ef2acc3d9b4bb18800d61c61b2f4.exe"

C:\Windows\system32\taskeng.exe

taskeng.exe {7F964D56-A78A-4D63-857C-EE23C042E6CC} S-1-5-18:NT AUTHORITY\System:Service:

C:\ProgramData\rlps\kweeu.exe

C:\ProgramData\rlps\kweeu.exe start2

Network

Country Destination Domain Proto
US 8.8.8.8:53 inredrs5er.xyz udp
US 8.8.8.8:53 s5s4txirgtrtin.com udp

Files

memory/828-54-0x0000000075AC1000-0x0000000075AC3000-memory.dmp

memory/828-55-0x00000000001D0000-0x00000000001E6000-memory.dmp

memory/828-56-0x0000000000400000-0x00000000004D4000-memory.dmp

C:\ProgramData\rlps\kweeu.exe

MD5 6f21ef2acc3d9b4bb18800d61c61b2f4
SHA1 d176b38b567ce050c82ecb8b0e4e8cc44a7ea0e4
SHA256 1bd1c5a709b98d3b13c3cb3572c1c409334807a05257555e8c11f7ddc0d17e36
SHA512 45051de1630858e982b0a5050700b8dde734fa5e04d95720abaa137433d6a8239a15187638d88c0697d73641136248a9cace5f001eba4f744899da619ea90033

memory/2020-58-0x0000000000000000-mapping.dmp

C:\ProgramData\rlps\kweeu.exe

MD5 6f21ef2acc3d9b4bb18800d61c61b2f4
SHA1 d176b38b567ce050c82ecb8b0e4e8cc44a7ea0e4
SHA256 1bd1c5a709b98d3b13c3cb3572c1c409334807a05257555e8c11f7ddc0d17e36
SHA512 45051de1630858e982b0a5050700b8dde734fa5e04d95720abaa137433d6a8239a15187638d88c0697d73641136248a9cace5f001eba4f744899da619ea90033

memory/2020-61-0x0000000000240000-0x0000000000256000-memory.dmp