Analysis

  • max time kernel
    145s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-05-2023 08:50

General

  • Target

    322626ca37f3929c517b4c0ceeb130836be5f36a1eb68ab0adb00c0f4a3f3813.exe

  • Size

    1.6MB

  • MD5

    08e3930a42197a422d064569c4778997

  • SHA1

    74832aa332b48422e5d448f5099b397e84c18712

  • SHA256

    322626ca37f3929c517b4c0ceeb130836be5f36a1eb68ab0adb00c0f4a3f3813

  • SHA512

    b70952bc3cd54abcc2c7c1c71b1f16d96a001900574237263a210512a348542e6ec7a05e7fcc0ff5831a200db23fae06f2bbb0f0bb249599fed0fa1761516368

  • SSDEEP

    24576:mzE0vhwHbExPyG6Ci5KqGxgxvgwEL3h3z1MKiA9iS888PXmNkAZvrdt/kFPXjdpr:mtaEpGcqmtwEbhD1ViA9/PjPwPXj3VV

Malware Config

Extracted

Family

systembc

C2

185.161.248.16:4440

Signatures

  • SystemBC

    SystemBC is a proxy and remote administration tool first seen in 2019.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\322626ca37f3929c517b4c0ceeb130836be5f36a1eb68ab0adb00c0f4a3f3813.exe
    "C:\Users\Admin\AppData\Local\Temp\322626ca37f3929c517b4c0ceeb130836be5f36a1eb68ab0adb00c0f4a3f3813.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Adds Run key to start application
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    PID:4424

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4424-133-0x0000000000400000-0x000000000083B000-memory.dmp

    Filesize

    4.2MB

  • memory/4424-134-0x0000000004910000-0x0000000004911000-memory.dmp

    Filesize

    4KB

  • memory/4424-135-0x0000000004900000-0x0000000004901000-memory.dmp

    Filesize

    4KB

  • memory/4424-136-0x00000000048F0000-0x00000000048F1000-memory.dmp

    Filesize

    4KB

  • memory/4424-137-0x00000000048E0000-0x00000000048E1000-memory.dmp

    Filesize

    4KB

  • memory/4424-138-0x0000000000400000-0x000000000083B000-memory.dmp

    Filesize

    4.2MB

  • memory/4424-139-0x0000000000400000-0x000000000083B000-memory.dmp

    Filesize

    4.2MB

  • memory/4424-140-0x0000000000400000-0x000000000083B000-memory.dmp

    Filesize

    4.2MB

  • memory/4424-141-0x0000000000400000-0x000000000083B000-memory.dmp

    Filesize

    4.2MB

  • memory/4424-142-0x0000000000400000-0x000000000083B000-memory.dmp

    Filesize

    4.2MB

  • memory/4424-143-0x0000000000400000-0x000000000083B000-memory.dmp

    Filesize

    4.2MB

  • memory/4424-144-0x0000000000400000-0x000000000083B000-memory.dmp

    Filesize

    4.2MB

  • memory/4424-145-0x0000000000400000-0x000000000083B000-memory.dmp

    Filesize

    4.2MB

  • memory/4424-146-0x0000000000400000-0x000000000083B000-memory.dmp

    Filesize

    4.2MB

  • memory/4424-147-0x0000000000400000-0x000000000083B000-memory.dmp

    Filesize

    4.2MB

  • memory/4424-148-0x0000000000400000-0x000000000083B000-memory.dmp

    Filesize

    4.2MB

  • memory/4424-149-0x0000000000400000-0x000000000083B000-memory.dmp

    Filesize

    4.2MB

  • memory/4424-150-0x0000000000400000-0x000000000083B000-memory.dmp

    Filesize

    4.2MB

  • memory/4424-151-0x0000000000400000-0x000000000083B000-memory.dmp

    Filesize

    4.2MB