Malware Analysis Report

2025-05-05 23:59

Sample ID 230209-j8fdmabh66
Target 5cacf2b43b8d5578156df066f2181117.exe
SHA256 7d17668ad7a09802bbf39bd76093ddb9658d74cffaefc3528463b77573802728
Tags
systembc trojan upx
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

7d17668ad7a09802bbf39bd76093ddb9658d74cffaefc3528463b77573802728

Threat Level: Known bad

The file 5cacf2b43b8d5578156df066f2181117.exe was found to be: Known bad.

Malicious Activity Summary

systembc trojan upx

SystemBC

UPX packed file

Executes dropped EXE

Drops file in Windows directory

Suspicious behavior: EnumeratesProcesses

Suspicious use of WriteProcessMemory

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2023-02-09 08:20

Signatures

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral2

Detonation Overview

Submitted

2023-02-09 08:20

Reported

2023-02-09 09:38

Platform

win10v2004-20221111-en

Max time kernel

260s

Max time network

298s

Command Line

"C:\Users\Admin\AppData\Local\Temp\5cacf2b43b8d5578156df066f2181117.exe"

Signatures

SystemBC

trojan systembc

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\ProgramData\pgpfaej\lwkahq.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\Tasks\lwkahq.job C:\Users\Admin\AppData\Local\Temp\5cacf2b43b8d5578156df066f2181117.exe N/A
File opened for modification C:\Windows\Tasks\lwkahq.job C:\Users\Admin\AppData\Local\Temp\5cacf2b43b8d5578156df066f2181117.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\5cacf2b43b8d5578156df066f2181117.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\5cacf2b43b8d5578156df066f2181117.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\5cacf2b43b8d5578156df066f2181117.exe

"C:\Users\Admin\AppData\Local\Temp\5cacf2b43b8d5578156df066f2181117.exe"

C:\ProgramData\pgpfaej\lwkahq.exe

C:\ProgramData\pgpfaej\lwkahq.exe start2

Network

Country Destination Domain Proto
US 93.184.220.29:80 tcp
IE 20.50.80.209:443 tcp
US 93.184.220.29:80 tcp
NL 104.80.225.205:443 tcp
US 72.21.81.240:80 tcp
US 72.21.81.240:80 tcp
US 72.21.81.240:80 tcp
US 8.247.210.254:80 tcp

Files

memory/632-132-0x0000000000400000-0x0000000000459000-memory.dmp

memory/632-133-0x0000000000400000-0x0000000000459000-memory.dmp

memory/632-134-0x0000000000400000-0x0000000000459000-memory.dmp

memory/632-135-0x0000000002270000-0x00000000022A4000-memory.dmp

C:\ProgramData\pgpfaej\lwkahq.exe

MD5 5cacf2b43b8d5578156df066f2181117
SHA1 7e4e1385713db3e859bdd5ad6b503e7013b37796
SHA256 7d17668ad7a09802bbf39bd76093ddb9658d74cffaefc3528463b77573802728
SHA512 c7a1e2fafc31d2ce366f5130d28835afdb88f9298fede4121c812f2d5222ff8d855f31e11e54b5b44fbc1d376e16103f0a04794baac62618c72f00aaef6a8142

C:\ProgramData\pgpfaej\lwkahq.exe

MD5 5cacf2b43b8d5578156df066f2181117
SHA1 7e4e1385713db3e859bdd5ad6b503e7013b37796
SHA256 7d17668ad7a09802bbf39bd76093ddb9658d74cffaefc3528463b77573802728
SHA512 c7a1e2fafc31d2ce366f5130d28835afdb88f9298fede4121c812f2d5222ff8d855f31e11e54b5b44fbc1d376e16103f0a04794baac62618c72f00aaef6a8142

memory/4632-138-0x0000000000400000-0x0000000000459000-memory.dmp

memory/4632-139-0x0000000000400000-0x0000000000459000-memory.dmp

memory/4632-140-0x0000000000400000-0x0000000000459000-memory.dmp

memory/4632-141-0x0000000002730000-0x0000000002764000-memory.dmp

memory/632-142-0x0000000000400000-0x0000000000459000-memory.dmp

memory/4632-143-0x0000000000400000-0x0000000000459000-memory.dmp

Analysis: behavioral1

Detonation Overview

Submitted

2023-02-09 08:20

Reported

2023-02-09 09:18

Platform

win7-20221111-en

Max time kernel

171s

Max time network

149s

Command Line

"C:\Users\Admin\AppData\Local\Temp\5cacf2b43b8d5578156df066f2181117.exe"

Signatures

SystemBC

trojan systembc

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\ProgramData\vkquc\vpibwo.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\Tasks\vpibwo.job C:\Users\Admin\AppData\Local\Temp\5cacf2b43b8d5578156df066f2181117.exe N/A
File opened for modification C:\Windows\Tasks\vpibwo.job C:\Users\Admin\AppData\Local\Temp\5cacf2b43b8d5578156df066f2181117.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\5cacf2b43b8d5578156df066f2181117.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1480 wrote to memory of 1852 N/A C:\Windows\system32\taskeng.exe C:\ProgramData\vkquc\vpibwo.exe
PID 1480 wrote to memory of 1852 N/A C:\Windows\system32\taskeng.exe C:\ProgramData\vkquc\vpibwo.exe
PID 1480 wrote to memory of 1852 N/A C:\Windows\system32\taskeng.exe C:\ProgramData\vkquc\vpibwo.exe
PID 1480 wrote to memory of 1852 N/A C:\Windows\system32\taskeng.exe C:\ProgramData\vkquc\vpibwo.exe

Processes

C:\Users\Admin\AppData\Local\Temp\5cacf2b43b8d5578156df066f2181117.exe

"C:\Users\Admin\AppData\Local\Temp\5cacf2b43b8d5578156df066f2181117.exe"

C:\Windows\system32\taskeng.exe

taskeng.exe {59AE4BBD-F34A-42F7-8E88-976DAF5CAF41} S-1-5-21-3406023954-474543476-3319432036-1000:VUIIVLGQ\Admin:Interactive:[1]

C:\ProgramData\vkquc\vpibwo.exe

C:\ProgramData\vkquc\vpibwo.exe start2

Network

Country Destination Domain Proto
US 204.79.197.200:443 tcp
NL 84.53.175.11:80 tcp

Files

memory/588-54-0x0000000075881000-0x0000000075883000-memory.dmp

memory/588-55-0x0000000000400000-0x0000000000459000-memory.dmp

memory/588-56-0x0000000000400000-0x0000000000459000-memory.dmp

memory/588-57-0x0000000000400000-0x0000000000459000-memory.dmp

memory/588-58-0x0000000000550000-0x0000000000584000-memory.dmp

C:\ProgramData\vkquc\vpibwo.exe

MD5 5cacf2b43b8d5578156df066f2181117
SHA1 7e4e1385713db3e859bdd5ad6b503e7013b37796
SHA256 7d17668ad7a09802bbf39bd76093ddb9658d74cffaefc3528463b77573802728
SHA512 c7a1e2fafc31d2ce366f5130d28835afdb88f9298fede4121c812f2d5222ff8d855f31e11e54b5b44fbc1d376e16103f0a04794baac62618c72f00aaef6a8142

memory/1852-60-0x0000000000000000-mapping.dmp

C:\ProgramData\vkquc\vpibwo.exe

MD5 5cacf2b43b8d5578156df066f2181117
SHA1 7e4e1385713db3e859bdd5ad6b503e7013b37796
SHA256 7d17668ad7a09802bbf39bd76093ddb9658d74cffaefc3528463b77573802728
SHA512 c7a1e2fafc31d2ce366f5130d28835afdb88f9298fede4121c812f2d5222ff8d855f31e11e54b5b44fbc1d376e16103f0a04794baac62618c72f00aaef6a8142

memory/1852-63-0x0000000000400000-0x0000000000459000-memory.dmp

memory/1852-64-0x0000000000400000-0x0000000000459000-memory.dmp

memory/1852-65-0x0000000001CE0000-0x0000000001D14000-memory.dmp

memory/1852-66-0x0000000000400000-0x0000000000459000-memory.dmp

memory/588-67-0x0000000000400000-0x0000000000459000-memory.dmp