Malware Analysis Report

2025-05-05 23:59

Sample ID 230209-j91qysbf8s
Target 6f21ef2acc3d9b4bb18800d61c61b2f4.exe
SHA256 1bd1c5a709b98d3b13c3cb3572c1c409334807a05257555e8c11f7ddc0d17e36
Tags
systembc trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

1bd1c5a709b98d3b13c3cb3572c1c409334807a05257555e8c11f7ddc0d17e36

Threat Level: Known bad

The file 6f21ef2acc3d9b4bb18800d61c61b2f4.exe was found to be: Known bad.

Malicious Activity Summary

systembc trojan

SystemBC

Executes dropped EXE

Drops file in Windows directory

Suspicious behavior: EnumeratesProcesses

Suspicious use of WriteProcessMemory

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2023-02-09 08:22

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2023-02-09 08:22

Reported

2023-02-09 08:26

Platform

win7-20221111-en

Max time kernel

168s

Max time network

215s

Command Line

"C:\Users\Admin\AppData\Local\Temp\6f21ef2acc3d9b4bb18800d61c61b2f4.exe"

Signatures

SystemBC

trojan systembc

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\ProgramData\hciac\evxl.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\Tasks\evxl.job C:\Users\Admin\AppData\Local\Temp\6f21ef2acc3d9b4bb18800d61c61b2f4.exe N/A
File opened for modification C:\Windows\Tasks\evxl.job C:\Users\Admin\AppData\Local\Temp\6f21ef2acc3d9b4bb18800d61c61b2f4.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\6f21ef2acc3d9b4bb18800d61c61b2f4.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 472 wrote to memory of 268 N/A C:\Windows\system32\taskeng.exe C:\ProgramData\hciac\evxl.exe
PID 472 wrote to memory of 268 N/A C:\Windows\system32\taskeng.exe C:\ProgramData\hciac\evxl.exe
PID 472 wrote to memory of 268 N/A C:\Windows\system32\taskeng.exe C:\ProgramData\hciac\evxl.exe
PID 472 wrote to memory of 268 N/A C:\Windows\system32\taskeng.exe C:\ProgramData\hciac\evxl.exe

Processes

C:\Users\Admin\AppData\Local\Temp\6f21ef2acc3d9b4bb18800d61c61b2f4.exe

"C:\Users\Admin\AppData\Local\Temp\6f21ef2acc3d9b4bb18800d61c61b2f4.exe"

C:\Windows\system32\taskeng.exe

taskeng.exe {0C037BB6-C8C5-4D8C-884C-53DF10441898} S-1-5-18:NT AUTHORITY\System:Service:

C:\ProgramData\hciac\evxl.exe

C:\ProgramData\hciac\evxl.exe start2

Network

Country Destination Domain Proto
US 8.8.8.8:53 inredrs5er.xyz udp
US 8.8.8.8:53 s5s4txirgtrtin.com udp

Files

memory/2016-54-0x00000000002C0000-0x00000000002D6000-memory.dmp

memory/2016-55-0x00000000760C1000-0x00000000760C3000-memory.dmp

memory/2016-56-0x0000000000400000-0x00000000004D4000-memory.dmp

memory/2016-57-0x00000000002C0000-0x00000000002D6000-memory.dmp

C:\ProgramData\hciac\evxl.exe

MD5 6f21ef2acc3d9b4bb18800d61c61b2f4
SHA1 d176b38b567ce050c82ecb8b0e4e8cc44a7ea0e4
SHA256 1bd1c5a709b98d3b13c3cb3572c1c409334807a05257555e8c11f7ddc0d17e36
SHA512 45051de1630858e982b0a5050700b8dde734fa5e04d95720abaa137433d6a8239a15187638d88c0697d73641136248a9cace5f001eba4f744899da619ea90033

C:\ProgramData\hciac\evxl.exe

MD5 6f21ef2acc3d9b4bb18800d61c61b2f4
SHA1 d176b38b567ce050c82ecb8b0e4e8cc44a7ea0e4
SHA256 1bd1c5a709b98d3b13c3cb3572c1c409334807a05257555e8c11f7ddc0d17e36
SHA512 45051de1630858e982b0a5050700b8dde734fa5e04d95720abaa137433d6a8239a15187638d88c0697d73641136248a9cace5f001eba4f744899da619ea90033

memory/268-59-0x0000000000000000-mapping.dmp

memory/268-62-0x0000000000380000-0x0000000000396000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2023-02-09 08:22

Reported

2023-02-09 08:25

Platform

win10v2004-20220901-en

Max time kernel

151s

Max time network

156s

Command Line

"C:\Users\Admin\AppData\Local\Temp\6f21ef2acc3d9b4bb18800d61c61b2f4.exe"

Signatures

SystemBC

trojan systembc

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\ProgramData\nkit\fmnn.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\Tasks\fmnn.job C:\Users\Admin\AppData\Local\Temp\6f21ef2acc3d9b4bb18800d61c61b2f4.exe N/A
File opened for modification C:\Windows\Tasks\fmnn.job C:\Users\Admin\AppData\Local\Temp\6f21ef2acc3d9b4bb18800d61c61b2f4.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\6f21ef2acc3d9b4bb18800d61c61b2f4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6f21ef2acc3d9b4bb18800d61c61b2f4.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\6f21ef2acc3d9b4bb18800d61c61b2f4.exe

"C:\Users\Admin\AppData\Local\Temp\6f21ef2acc3d9b4bb18800d61c61b2f4.exe"

C:\ProgramData\nkit\fmnn.exe

C:\ProgramData\nkit\fmnn.exe start2

Network

Country Destination Domain Proto
US 93.184.221.240:80 tcp
US 20.42.73.25:443 tcp
US 8.8.8.8:53 inredrs5er.xyz udp
US 8.8.8.8:53 s5s4txirgtrtin.com udp
US 93.184.221.240:80 tcp
US 93.184.221.240:80 tcp
US 93.184.221.240:80 tcp
US 8.8.8.8:53 s5s4txirgtrtin.com udp
US 8.8.8.8:53 inredrs5er.xyz udp
US 8.8.8.8:53 s5s4txirgtrtin.com udp
US 8.8.8.8:53 inredrs5er.xyz udp
US 8.8.8.8:53 s5s4txirgtrtin.com udp
US 8.8.8.8:53 inredrs5er.xyz udp
US 8.8.8.8:53 s5s4txirgtrtin.com udp
US 8.8.8.8:53 inredrs5er.xyz udp
US 8.8.8.8:53 s5s4txirgtrtin.com udp
US 8.8.8.8:53 inredrs5er.xyz udp
US 8.8.8.8:53 s5s4txirgtrtin.com udp
US 8.8.8.8:53 inredrs5er.xyz udp
NL 8.238.22.254:80 tcp
US 8.8.8.8:53 s5s4txirgtrtin.com udp
US 8.8.8.8:53 inredrs5er.xyz udp
US 8.8.8.8:53 s5s4txirgtrtin.com udp
US 8.8.8.8:53 inredrs5er.xyz udp
US 8.8.8.8:53 inredrs5er.xyz udp
US 8.8.8.8:53 s5s4txirgtrtin.com udp
US 8.8.8.8:53 inredrs5er.xyz udp
US 8.8.8.8:53 s5s4txirgtrtin.com udp
US 8.8.8.8:53 inredrs5er.xyz udp
US 8.8.8.8:53 s5s4txirgtrtin.com udp
US 8.8.8.8:53 s5s4txirgtrtin.com udp
US 8.8.8.8:53 inredrs5er.xyz udp
US 8.8.8.8:53 s5s4txirgtrtin.com udp
US 8.8.8.8:53 inredrs5er.xyz udp
US 8.8.8.8:53 inredrs5er.xyz udp
US 8.8.8.8:53 s5s4txirgtrtin.com udp
US 8.8.8.8:53 s5s4txirgtrtin.com udp
US 8.8.8.8:53 inredrs5er.xyz udp
US 8.8.8.8:53 inredrs5er.xyz udp
US 8.8.8.8:53 s5s4txirgtrtin.com udp
US 8.8.8.8:53 s5s4txirgtrtin.com udp
US 8.8.8.8:53 inredrs5er.xyz udp
US 8.8.8.8:53 inredrs5er.xyz udp
US 8.8.8.8:53 s5s4txirgtrtin.com udp
US 8.8.8.8:53 inredrs5er.xyz udp
US 8.8.8.8:53 s5s4txirgtrtin.com udp
US 8.8.8.8:53 inredrs5er.xyz udp
US 8.8.8.8:53 s5s4txirgtrtin.com udp
US 8.8.8.8:53 inredrs5er.xyz udp
US 8.8.8.8:53 s5s4txirgtrtin.com udp
US 8.8.8.8:53 s5s4txirgtrtin.com udp
US 8.8.8.8:53 inredrs5er.xyz udp
US 8.8.8.8:53 s5s4txirgtrtin.com udp
US 8.8.8.8:53 inredrs5er.xyz udp

Files

memory/1632-132-0x0000000000680000-0x0000000000696000-memory.dmp

memory/1632-133-0x0000000000400000-0x00000000004D4000-memory.dmp

C:\ProgramData\nkit\fmnn.exe

MD5 6f21ef2acc3d9b4bb18800d61c61b2f4
SHA1 d176b38b567ce050c82ecb8b0e4e8cc44a7ea0e4
SHA256 1bd1c5a709b98d3b13c3cb3572c1c409334807a05257555e8c11f7ddc0d17e36
SHA512 45051de1630858e982b0a5050700b8dde734fa5e04d95720abaa137433d6a8239a15187638d88c0697d73641136248a9cace5f001eba4f744899da619ea90033

C:\ProgramData\nkit\fmnn.exe

MD5 6f21ef2acc3d9b4bb18800d61c61b2f4
SHA1 d176b38b567ce050c82ecb8b0e4e8cc44a7ea0e4
SHA256 1bd1c5a709b98d3b13c3cb3572c1c409334807a05257555e8c11f7ddc0d17e36
SHA512 45051de1630858e982b0a5050700b8dde734fa5e04d95720abaa137433d6a8239a15187638d88c0697d73641136248a9cace5f001eba4f744899da619ea90033

memory/4408-136-0x00000000005A0000-0x00000000005B6000-memory.dmp