Resubmissions

22-02-2023 10:35

230222-mmyvmacf6x 10

22-02-2023 10:19

230222-mcwmhscf3y 6

Analysis

  • max time kernel
    595s
  • max time network
    601s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    22-02-2023 10:35

General

  • Target

    40003d01db9c34da73a415792dba3a617fab65e91d2aae7bbbcd335af198a66b.exe

  • Size

    7.2MB

  • MD5

    9606143c857bbfe1b1da8e3d1fa9ae0e

  • SHA1

    cb3a1b1d8e6acbe46c96b5b159a7be2d372b3cc6

  • SHA256

    40003d01db9c34da73a415792dba3a617fab65e91d2aae7bbbcd335af198a66b

  • SHA512

    2e118c618265b8769b15dff8add661c60f17afd46365773ca22e359b03a765c83a7f316057045293a71b53a889771fadf54e6ac1ee3fd9b3a7437f266f8af08b

  • SSDEEP

    196608:jeuNPzUCugRPeW7R9dGfqEjirb49GOD2MpkB:CmZB77R9d0q1A9GLM

Malware Config

Extracted

Family

systembc

C2

31.222.238.58:4280

192.168.1.28:4280

Signatures

  • SystemBC

    SystemBC is a proxy and remote administration tool first seen in 2019.

  • Downloads MZ/PE file
  • Drops startup file 1 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Runs ping.exe 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 51 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\40003d01db9c34da73a415792dba3a617fab65e91d2aae7bbbcd335af198a66b.exe
    "C:\Users\Admin\AppData\Local\Temp\40003d01db9c34da73a415792dba3a617fab65e91d2aae7bbbcd335af198a66b.exe"
    1⤵
    • Loads dropped DLL
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:1744
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c tzutil /g
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:976
      • C:\Windows\SysWOW64\tzutil.exe
        tzutil /g
        3⤵
          PID:968
      • C:\Users\Admin\AppData\Roaming\WindowsInstaller\Runtime Broker.exe
        "C:\Users\Admin\AppData\Roaming\WindowsInstaller\Runtime Broker.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1348
        • C:\Users\Admin\AppData\Roaming\WindowsInstaller\Runtime Broker.exe
          "C:\Users\Admin\AppData\Roaming\WindowsInstaller\Runtime Broker.exe"
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks processor information in registry
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1672
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\DGDAEHCBGI.exe"
            4⤵
            • Suspicious behavior: GetForegroundWindowSpam
            PID:1760
      • C:\Users\Admin\AppData\Roaming\WindowsInstaller\MsMpEng.exe
        "C:\Users\Admin\AppData\Roaming\WindowsInstaller\MsMpEng.exe"
        2⤵
        • Drops startup file
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1788
        • C:\Windows\SysWOW64\cmd.exe
          "cmd" /c ping 127.0.0.1 -n 43 > nul && copy "C:\Users\Admin\AppData\Roaming\WindowsInstaller\MsMpEng.exe" "C:\Users\Admin\AppData\Roaming\ncache\pu5xtvhm.exe" && ping 127.0.0.1 -n 43 > nul && "C:\Users\Admin\AppData\Roaming\ncache\pu5xtvhm.exe"
          3⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:824
          • C:\Windows\SysWOW64\PING.EXE
            ping 127.0.0.1 -n 43
            4⤵
            • Runs ping.exe
            PID:1656
          • C:\Windows\SysWOW64\PING.EXE
            ping 127.0.0.1 -n 43
            4⤵
            • Runs ping.exe
            PID:1512
          • C:\Users\Admin\AppData\Roaming\ncache\pu5xtvhm.exe
            "C:\Users\Admin\AppData\Roaming\ncache\pu5xtvhm.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1860
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
              5⤵
                PID:1540

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Defense Evasion

      Install Root Certificate

      1
      T1130

      Modify Registry

      1
      T1112

      Credential Access

      Credentials in Files

      2
      T1081

      Discovery

      Query Registry

      2
      T1012

      System Information Discovery

      2
      T1082

      Remote System Discovery

      1
      T1018

      Collection

      Data from Local System

      2
      T1005

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
        Filesize

        342B

        MD5

        8aa03dddcb3983334e4fecf2c2912564

        SHA1

        3ccbc3eb5d785bbafce4c8c88792469bb3fb8398

        SHA256

        e53a8b0092748a58320a76403e58a07da411a0f6658a18f3f337a98b23767167

        SHA512

        b6e979051bdbcba8b6a91551f9a904432b680fbee5030f6b08357770b2386b94e83c28db20dce1db81f4f9f4b7cda5a6369eac8bde77e9189fe351b1ab94581f

      • C:\Users\Admin\AppData\Local\Temp\Cab6B82.tmp
        Filesize

        61KB

        MD5

        fc4666cbca561e864e7fdf883a9e6661

        SHA1

        2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

        SHA256

        10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

        SHA512

        c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

      • C:\Users\Admin\AppData\Local\Temp\Tar6C31.tmp
        Filesize

        161KB

        MD5

        73b4b714b42fc9a6aaefd0ae59adb009

        SHA1

        efdaffd5b0ad21913d22001d91bf6c19ecb4ac41

        SHA256

        c0cf8cc04c34b5b80a2d86ad0eafb2dd71436f070c86b0321fba0201879625fd

        SHA512

        73af3c51b15f89237552b1718bef21fd80788fa416bab2cb2e7fb3a60d56249a716eda0d2dd68ab643752272640e7eaaaf57ce64bcb38373ddc3d035fb8d57cd

      • C:\Users\Admin\AppData\Roaming\WindowsInstaller\MsMpEng.exe
        Filesize

        420KB

        MD5

        e85fa08c1ed20440363e2e44eced6299

        SHA1

        e0867a371a5c6bfdf6bd84470b188f0817b4d23a

        SHA256

        c1f5b88413bef3bc89aacd544847d5690fe17247b10d5922e59e4cbc6c37707e

        SHA512

        73bc5a867c7b86f32257f43167c1816b9087a0fc6d70f1500194821abbdfcaddb4f79325e0b24837fabb9594284ff9bb7b180de5fc0264287a6345b146ffcfbf

      • C:\Users\Admin\AppData\Roaming\WindowsInstaller\MsMpEng.exe
        Filesize

        420KB

        MD5

        e85fa08c1ed20440363e2e44eced6299

        SHA1

        e0867a371a5c6bfdf6bd84470b188f0817b4d23a

        SHA256

        c1f5b88413bef3bc89aacd544847d5690fe17247b10d5922e59e4cbc6c37707e

        SHA512

        73bc5a867c7b86f32257f43167c1816b9087a0fc6d70f1500194821abbdfcaddb4f79325e0b24837fabb9594284ff9bb7b180de5fc0264287a6345b146ffcfbf

      • C:\Users\Admin\AppData\Roaming\WindowsInstaller\Runtime Broker.exe
        Filesize

        584KB

        MD5

        c32c03cf9a70ade1d4efc11853cd0225

        SHA1

        11ed71198457e158e15cc3e157dc7b979951d7e1

        SHA256

        b51beb1c3f5b26d7766492130826d5f985a05b72b628a257a06494999a054c02

        SHA512

        13b2ec3e400ef25596eb13e891ffdc7e9b6492a4cf0733b48252d2c1d273ab4fcbe0d843b00f1e491eaff339fa2a1cd68a59366e36cf24a0f1e2a45b7f8df20b

      • C:\Users\Admin\AppData\Roaming\WindowsInstaller\Runtime Broker.exe
        Filesize

        584KB

        MD5

        c32c03cf9a70ade1d4efc11853cd0225

        SHA1

        11ed71198457e158e15cc3e157dc7b979951d7e1

        SHA256

        b51beb1c3f5b26d7766492130826d5f985a05b72b628a257a06494999a054c02

        SHA512

        13b2ec3e400ef25596eb13e891ffdc7e9b6492a4cf0733b48252d2c1d273ab4fcbe0d843b00f1e491eaff339fa2a1cd68a59366e36cf24a0f1e2a45b7f8df20b

      • C:\Users\Admin\AppData\Roaming\WindowsInstaller\Runtime Broker.exe
        Filesize

        584KB

        MD5

        c32c03cf9a70ade1d4efc11853cd0225

        SHA1

        11ed71198457e158e15cc3e157dc7b979951d7e1

        SHA256

        b51beb1c3f5b26d7766492130826d5f985a05b72b628a257a06494999a054c02

        SHA512

        13b2ec3e400ef25596eb13e891ffdc7e9b6492a4cf0733b48252d2c1d273ab4fcbe0d843b00f1e491eaff339fa2a1cd68a59366e36cf24a0f1e2a45b7f8df20b

      • C:\Users\Admin\AppData\Roaming\WindowsInstaller\Runtime Broker.exe
        Filesize

        584KB

        MD5

        c32c03cf9a70ade1d4efc11853cd0225

        SHA1

        11ed71198457e158e15cc3e157dc7b979951d7e1

        SHA256

        b51beb1c3f5b26d7766492130826d5f985a05b72b628a257a06494999a054c02

        SHA512

        13b2ec3e400ef25596eb13e891ffdc7e9b6492a4cf0733b48252d2c1d273ab4fcbe0d843b00f1e491eaff339fa2a1cd68a59366e36cf24a0f1e2a45b7f8df20b

      • C:\Users\Admin\AppData\Roaming\ncache\pu5xtvhm.exe
        Filesize

        420KB

        MD5

        e85fa08c1ed20440363e2e44eced6299

        SHA1

        e0867a371a5c6bfdf6bd84470b188f0817b4d23a

        SHA256

        c1f5b88413bef3bc89aacd544847d5690fe17247b10d5922e59e4cbc6c37707e

        SHA512

        73bc5a867c7b86f32257f43167c1816b9087a0fc6d70f1500194821abbdfcaddb4f79325e0b24837fabb9594284ff9bb7b180de5fc0264287a6345b146ffcfbf

      • C:\Users\Admin\AppData\Roaming\ncache\pu5xtvhm.exe
        Filesize

        420KB

        MD5

        e85fa08c1ed20440363e2e44eced6299

        SHA1

        e0867a371a5c6bfdf6bd84470b188f0817b4d23a

        SHA256

        c1f5b88413bef3bc89aacd544847d5690fe17247b10d5922e59e4cbc6c37707e

        SHA512

        73bc5a867c7b86f32257f43167c1816b9087a0fc6d70f1500194821abbdfcaddb4f79325e0b24837fabb9594284ff9bb7b180de5fc0264287a6345b146ffcfbf

      • C:\Users\Admin\AppData\Roaming\ncache\pu5xtvhm.exe
        Filesize

        420KB

        MD5

        e85fa08c1ed20440363e2e44eced6299

        SHA1

        e0867a371a5c6bfdf6bd84470b188f0817b4d23a

        SHA256

        c1f5b88413bef3bc89aacd544847d5690fe17247b10d5922e59e4cbc6c37707e

        SHA512

        73bc5a867c7b86f32257f43167c1816b9087a0fc6d70f1500194821abbdfcaddb4f79325e0b24837fabb9594284ff9bb7b180de5fc0264287a6345b146ffcfbf

      • \ProgramData\mozglue.dll
        Filesize

        593KB

        MD5

        c8fd9be83bc728cc04beffafc2907fe9

        SHA1

        95ab9f701e0024cedfbd312bcfe4e726744c4f2e

        SHA256

        ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

        SHA512

        fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

      • \ProgramData\nss3.dll
        Filesize

        2.0MB

        MD5

        1cc453cdf74f31e4d913ff9c10acdde2

        SHA1

        6e85eae544d6e965f15fa5c39700fa7202f3aafe

        SHA256

        ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

        SHA512

        dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

      • \Users\Admin\AppData\Roaming\WindowsInstaller\MsMpEng.exe
        Filesize

        420KB

        MD5

        e85fa08c1ed20440363e2e44eced6299

        SHA1

        e0867a371a5c6bfdf6bd84470b188f0817b4d23a

        SHA256

        c1f5b88413bef3bc89aacd544847d5690fe17247b10d5922e59e4cbc6c37707e

        SHA512

        73bc5a867c7b86f32257f43167c1816b9087a0fc6d70f1500194821abbdfcaddb4f79325e0b24837fabb9594284ff9bb7b180de5fc0264287a6345b146ffcfbf

      • \Users\Admin\AppData\Roaming\WindowsInstaller\Runtime Broker.exe
        Filesize

        584KB

        MD5

        c32c03cf9a70ade1d4efc11853cd0225

        SHA1

        11ed71198457e158e15cc3e157dc7b979951d7e1

        SHA256

        b51beb1c3f5b26d7766492130826d5f985a05b72b628a257a06494999a054c02

        SHA512

        13b2ec3e400ef25596eb13e891ffdc7e9b6492a4cf0733b48252d2c1d273ab4fcbe0d843b00f1e491eaff339fa2a1cd68a59366e36cf24a0f1e2a45b7f8df20b

      • \Users\Admin\AppData\Roaming\WindowsInstaller\Runtime Broker.exe
        Filesize

        584KB

        MD5

        c32c03cf9a70ade1d4efc11853cd0225

        SHA1

        11ed71198457e158e15cc3e157dc7b979951d7e1

        SHA256

        b51beb1c3f5b26d7766492130826d5f985a05b72b628a257a06494999a054c02

        SHA512

        13b2ec3e400ef25596eb13e891ffdc7e9b6492a4cf0733b48252d2c1d273ab4fcbe0d843b00f1e491eaff339fa2a1cd68a59366e36cf24a0f1e2a45b7f8df20b

      • \Users\Admin\AppData\Roaming\ncache\pu5xtvhm.exe
        Filesize

        420KB

        MD5

        e85fa08c1ed20440363e2e44eced6299

        SHA1

        e0867a371a5c6bfdf6bd84470b188f0817b4d23a

        SHA256

        c1f5b88413bef3bc89aacd544847d5690fe17247b10d5922e59e4cbc6c37707e

        SHA512

        73bc5a867c7b86f32257f43167c1816b9087a0fc6d70f1500194821abbdfcaddb4f79325e0b24837fabb9594284ff9bb7b180de5fc0264287a6345b146ffcfbf

      • memory/1348-169-0x0000000000240000-0x0000000000248000-memory.dmp
        Filesize

        32KB

      • memory/1348-164-0x0000000000230000-0x0000000000231000-memory.dmp
        Filesize

        4KB

      • memory/1348-165-0x0000000000240000-0x0000000000248000-memory.dmp
        Filesize

        32KB

      • memory/1540-299-0x000000007EFDE000-0x000000007EFDF000-memory.dmp
        Filesize

        4KB

      • memory/1540-294-0x0000000000400000-0x0000000000406000-memory.dmp
        Filesize

        24KB

      • memory/1540-295-0x0000000000400000-0x0000000000406000-memory.dmp
        Filesize

        24KB

      • memory/1540-301-0x0000000000400000-0x0000000000406000-memory.dmp
        Filesize

        24KB

      • memory/1540-300-0x0000000000400000-0x0000000000406000-memory.dmp
        Filesize

        24KB

      • memory/1540-296-0x0000000000400000-0x0000000000406000-memory.dmp
        Filesize

        24KB

      • memory/1540-297-0x0000000000400000-0x0000000000406000-memory.dmp
        Filesize

        24KB

      • memory/1540-298-0x0000000000400000-0x0000000000406000-memory.dmp
        Filesize

        24KB

      • memory/1540-302-0x0000000000400000-0x0000000000406000-memory.dmp
        Filesize

        24KB

      • memory/1672-167-0x0000000000400000-0x000000000062D000-memory.dmp
        Filesize

        2.2MB

      • memory/1672-178-0x0000000061E00000-0x0000000061EF3000-memory.dmp
        Filesize

        972KB

      • memory/1672-236-0x0000000000400000-0x000000000062D000-memory.dmp
        Filesize

        2.2MB

      • memory/1672-238-0x0000000000400000-0x0000000000628000-memory.dmp
        Filesize

        2.2MB

      • memory/1672-171-0x0000000000400000-0x000000000062D000-memory.dmp
        Filesize

        2.2MB

      • memory/1672-176-0x0000000000030000-0x0000000000031000-memory.dmp
        Filesize

        4KB

      • memory/1672-173-0x0000000000400000-0x0000000000628000-memory.dmp
        Filesize

        2.2MB

      • memory/1744-141-0x0000000000400000-0x000000000040E000-memory.dmp
        Filesize

        56KB

      • memory/1744-54-0x0000000000CF0000-0x0000000001764000-memory.dmp
        Filesize

        10.5MB

      • memory/1744-61-0x0000000000400000-0x000000000040E000-memory.dmp
        Filesize

        56KB

      • memory/1744-58-0x0000000000400000-0x000000000040E000-memory.dmp
        Filesize

        56KB

      • memory/1760-274-0x0000000002250000-0x0000000002251000-memory.dmp
        Filesize

        4KB

      • memory/1788-162-0x0000000000EC0000-0x0000000000F2E000-memory.dmp
        Filesize

        440KB

      • memory/1788-277-0x0000000002490000-0x00000000024D0000-memory.dmp
        Filesize

        256KB

      • memory/1788-163-0x0000000002490000-0x00000000024D0000-memory.dmp
        Filesize

        256KB

      • memory/1788-174-0x0000000000420000-0x000000000046A000-memory.dmp
        Filesize

        296KB

      • memory/1788-175-0x0000000000610000-0x0000000000628000-memory.dmp
        Filesize

        96KB

      • memory/1788-177-0x0000000002490000-0x00000000024D0000-memory.dmp
        Filesize

        256KB

      • memory/1788-235-0x0000000002490000-0x00000000024D0000-memory.dmp
        Filesize

        256KB

      • memory/1788-275-0x0000000002490000-0x00000000024D0000-memory.dmp
        Filesize

        256KB

      • memory/1788-276-0x0000000002490000-0x00000000024D0000-memory.dmp
        Filesize

        256KB

      • memory/1860-290-0x0000000004E90000-0x0000000004ED0000-memory.dmp
        Filesize

        256KB

      • memory/1860-285-0x0000000001300000-0x000000000136E000-memory.dmp
        Filesize

        440KB

      • memory/1860-293-0x0000000000540000-0x0000000000546000-memory.dmp
        Filesize

        24KB

      • memory/1860-292-0x0000000000B60000-0x0000000000B7A000-memory.dmp
        Filesize

        104KB

      • memory/1860-291-0x0000000004E90000-0x0000000004ED0000-memory.dmp
        Filesize

        256KB

      • memory/1860-286-0x0000000004E90000-0x0000000004ED0000-memory.dmp
        Filesize

        256KB

      • memory/1860-289-0x0000000004E90000-0x0000000004ED0000-memory.dmp
        Filesize

        256KB

      • memory/1860-288-0x0000000004E90000-0x0000000004ED0000-memory.dmp
        Filesize

        256KB

      • memory/1860-287-0x0000000004E90000-0x0000000004ED0000-memory.dmp
        Filesize

        256KB