Analysis

  • max time kernel
    148s
  • max time network
    34s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    07-05-2023 05:45

General

  • Target

    af1679585c261a5a4490b7848e65d45b6bc030fa124e75cccc2ac28e615d041e.exe

  • Size

    5.5MB

  • MD5

    c48a400ccdb846dfeecdb8564ed29e6a

  • SHA1

    a534f99c56d321e2b4cb111e5afbe38ee4dd2fd4

  • SHA256

    af1679585c261a5a4490b7848e65d45b6bc030fa124e75cccc2ac28e615d041e

  • SHA512

    7c97935c18cf8bdb575d210b13ebc204c81b60b05036da6bbd3bf755d7a1277fe3e9012977a6d5f4573b52e2b0963c6364f56d0a2092f84909e51883ec02383b

  • SSDEEP

    98304:097RqNuY64Jd70rj4uJUDFsPDDLuTw/mH8JVOYN8G3fPBuY5VGfiVC2jyi/HKqP6:+sNukdU4QN/mcJPVBuMAKsgqqP54

Score
10/10

Malware Config

Extracted

Family

systembc

C2

5.45.73.25:4246

poolsforyour.com:4246

Signatures

  • SystemBC

    SystemBC is a proxy and remote administration tool first seen in 2019.

  • Deletes itself 1 IoCs
  • Drops startup file 1 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 8 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 39 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\af1679585c261a5a4490b7848e65d45b6bc030fa124e75cccc2ac28e615d041e.exe
    "C:\Users\Admin\AppData\Local\Temp\af1679585c261a5a4490b7848e65d45b6bc030fa124e75cccc2ac28e615d041e.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1972
    • C:\Users\Admin\AppData\Local\Temp\is-G3MLK.tmp\af1679585c261a5a4490b7848e65d45b6bc030fa124e75cccc2ac28e615d041e.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-G3MLK.tmp\af1679585c261a5a4490b7848e65d45b6bc030fa124e75cccc2ac28e615d041e.tmp" /SL5="$70124,5336595,180224,C:\Users\Admin\AppData\Local\Temp\af1679585c261a5a4490b7848e65d45b6bc030fa124e75cccc2ac28e615d041e.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1924
      • C:\Users\Admin\AppData\Local\Temp\af1679585c261a5a4490b7848e65d45b6bc030fa124e75cccc2ac28e615d041e.exe
        "C:\Users\Admin\AppData\Local\Temp\af1679585c261a5a4490b7848e65d45b6bc030fa124e75cccc2ac28e615d041e.exe" /verysilent /sp-
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:672
        • C:\Users\Admin\AppData\Local\Temp\is-828IA.tmp\af1679585c261a5a4490b7848e65d45b6bc030fa124e75cccc2ac28e615d041e.tmp
          "C:\Users\Admin\AppData\Local\Temp\is-828IA.tmp\af1679585c261a5a4490b7848e65d45b6bc030fa124e75cccc2ac28e615d041e.tmp" /SL5="$80124,5336595,180224,C:\Users\Admin\AppData\Local\Temp\af1679585c261a5a4490b7848e65d45b6bc030fa124e75cccc2ac28e615d041e.exe" /verysilent /sp-
          4⤵
          • Drops startup file
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:1544
          • C:\Users\Admin\AppData\Roaming\CrystalDiskInfo8.17.4\lmsass.scr
            "C:\Users\Admin\AppData\Roaming\CrystalDiskInfo8.17.4\lmsass.scr"
            5⤵
            • Executes dropped EXE
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2032
            • C:\Users\Admin\AppData\Roaming\CrystalDiskInfo8.17.4\lmsass.sCr
              "C:\Users\Admin\AppData\Roaming\CrystalDiskInfo8.17.4\lmsass.sCr"
              6⤵
              • Executes dropped EXE
              PID:1268
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /C ""C:\Users\Admin\AppData\Local\Temp\.cmd""
            5⤵
            • Deletes itself
            PID:1608

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\.cmd

    Filesize

    260B

    MD5

    4af21e3fc07cc9c73f4c50e7901c8c77

    SHA1

    94c18702bf325aaa2d9c90305d2fe153a9503062

    SHA256

    bc5610e5d7384956a9b479ac767ef072daf46c92d952a6cf1db6fa2f31eae6d3

    SHA512

    400bbde81b3e4fe9a3e92e07d34113982aefeeb7867c2c229f585ff02148924fe15fcefa6330992436540620b06702da4ae6192b92997e40d5003a4a99439e8c

  • C:\Users\Admin\AppData\Local\Temp\is-828IA.tmp\af1679585c261a5a4490b7848e65d45b6bc030fa124e75cccc2ac28e615d041e.tmp

    Filesize

    1.5MB

    MD5

    52b26165c6e3716fb6a13f90199b8945

    SHA1

    af0276a652e8ee18b2275d1182305c78275852bb

    SHA256

    9db907ea722ff077ccb615d1e78c9c948a019e820ea732a380f0e0ed1cf812bc

    SHA512

    38e6623bc859addf36e8f9e4caecd0947338a56912c4fa6876af969138efcb3af4a65ccbe4f609bb81f07df87a73eb539b66a0508a51dc62a4295ba40d90b3c6

  • C:\Users\Admin\AppData\Local\Temp\is-828IA.tmp\af1679585c261a5a4490b7848e65d45b6bc030fa124e75cccc2ac28e615d041e.tmp

    Filesize

    1.5MB

    MD5

    52b26165c6e3716fb6a13f90199b8945

    SHA1

    af0276a652e8ee18b2275d1182305c78275852bb

    SHA256

    9db907ea722ff077ccb615d1e78c9c948a019e820ea732a380f0e0ed1cf812bc

    SHA512

    38e6623bc859addf36e8f9e4caecd0947338a56912c4fa6876af969138efcb3af4a65ccbe4f609bb81f07df87a73eb539b66a0508a51dc62a4295ba40d90b3c6

  • C:\Users\Admin\AppData\Local\Temp\is-G3MLK.tmp\af1679585c261a5a4490b7848e65d45b6bc030fa124e75cccc2ac28e615d041e.tmp

    Filesize

    1.5MB

    MD5

    52b26165c6e3716fb6a13f90199b8945

    SHA1

    af0276a652e8ee18b2275d1182305c78275852bb

    SHA256

    9db907ea722ff077ccb615d1e78c9c948a019e820ea732a380f0e0ed1cf812bc

    SHA512

    38e6623bc859addf36e8f9e4caecd0947338a56912c4fa6876af969138efcb3af4a65ccbe4f609bb81f07df87a73eb539b66a0508a51dc62a4295ba40d90b3c6

  • C:\Users\Admin\AppData\Local\Temp\is-PILCD.tmp\_isetup\_shfoldr.dll

    Filesize

    22KB

    MD5

    92dc6ef532fbb4a5c3201469a5b5eb63

    SHA1

    3e89ff837147c16b4e41c30d6c796374e0b8e62c

    SHA256

    9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

    SHA512

    9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

  • C:\Users\Admin\AppData\Roaming\CrystalDiskInfo8.17.4\lmsass.sCr

    Filesize

    5.3MB

    MD5

    1fe7083d76e76df3f3d571beb38669fb

    SHA1

    dfd0b4769a35ec89b1e3a67f619d9e0437c7f022

    SHA256

    3993cae18dd547c0a2836ee251f250f4e691b1947a81816695236c971f848b87

    SHA512

    a1ed0ea9c5835fdc43715b547bf7630a73b3a4fc02243dfb05d1462cab194fc4f98b61a22698c62060d00654452f6a8cf158df3e7716a48062a867b67ca3fe70

  • C:\Users\Admin\AppData\Roaming\CrystalDiskInfo8.17.4\lmsass.scr

    Filesize

    5.3MB

    MD5

    1fe7083d76e76df3f3d571beb38669fb

    SHA1

    dfd0b4769a35ec89b1e3a67f619d9e0437c7f022

    SHA256

    3993cae18dd547c0a2836ee251f250f4e691b1947a81816695236c971f848b87

    SHA512

    a1ed0ea9c5835fdc43715b547bf7630a73b3a4fc02243dfb05d1462cab194fc4f98b61a22698c62060d00654452f6a8cf158df3e7716a48062a867b67ca3fe70

  • C:\Users\Admin\AppData\Roaming\CrystalDiskInfo8.17.4\lmsass.scr

    Filesize

    5.3MB

    MD5

    1fe7083d76e76df3f3d571beb38669fb

    SHA1

    dfd0b4769a35ec89b1e3a67f619d9e0437c7f022

    SHA256

    3993cae18dd547c0a2836ee251f250f4e691b1947a81816695236c971f848b87

    SHA512

    a1ed0ea9c5835fdc43715b547bf7630a73b3a4fc02243dfb05d1462cab194fc4f98b61a22698c62060d00654452f6a8cf158df3e7716a48062a867b67ca3fe70

  • C:\Users\Admin\AppData\Roaming\CrystalDiskInfo8.17.4\lmsass.scr

    Filesize

    5.3MB

    MD5

    1fe7083d76e76df3f3d571beb38669fb

    SHA1

    dfd0b4769a35ec89b1e3a67f619d9e0437c7f022

    SHA256

    3993cae18dd547c0a2836ee251f250f4e691b1947a81816695236c971f848b87

    SHA512

    a1ed0ea9c5835fdc43715b547bf7630a73b3a4fc02243dfb05d1462cab194fc4f98b61a22698c62060d00654452f6a8cf158df3e7716a48062a867b67ca3fe70

  • \Users\Admin\AppData\Local\Temp\is-0LV55.tmp\_isetup\_shfoldr.dll

    Filesize

    22KB

    MD5

    92dc6ef532fbb4a5c3201469a5b5eb63

    SHA1

    3e89ff837147c16b4e41c30d6c796374e0b8e62c

    SHA256

    9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

    SHA512

    9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

  • \Users\Admin\AppData\Local\Temp\is-0LV55.tmp\_isetup\_shfoldr.dll

    Filesize

    22KB

    MD5

    92dc6ef532fbb4a5c3201469a5b5eb63

    SHA1

    3e89ff837147c16b4e41c30d6c796374e0b8e62c

    SHA256

    9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

    SHA512

    9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

  • \Users\Admin\AppData\Local\Temp\is-828IA.tmp\af1679585c261a5a4490b7848e65d45b6bc030fa124e75cccc2ac28e615d041e.tmp

    Filesize

    1.5MB

    MD5

    52b26165c6e3716fb6a13f90199b8945

    SHA1

    af0276a652e8ee18b2275d1182305c78275852bb

    SHA256

    9db907ea722ff077ccb615d1e78c9c948a019e820ea732a380f0e0ed1cf812bc

    SHA512

    38e6623bc859addf36e8f9e4caecd0947338a56912c4fa6876af969138efcb3af4a65ccbe4f609bb81f07df87a73eb539b66a0508a51dc62a4295ba40d90b3c6

  • \Users\Admin\AppData\Local\Temp\is-G3MLK.tmp\af1679585c261a5a4490b7848e65d45b6bc030fa124e75cccc2ac28e615d041e.tmp

    Filesize

    1.5MB

    MD5

    52b26165c6e3716fb6a13f90199b8945

    SHA1

    af0276a652e8ee18b2275d1182305c78275852bb

    SHA256

    9db907ea722ff077ccb615d1e78c9c948a019e820ea732a380f0e0ed1cf812bc

    SHA512

    38e6623bc859addf36e8f9e4caecd0947338a56912c4fa6876af969138efcb3af4a65ccbe4f609bb81f07df87a73eb539b66a0508a51dc62a4295ba40d90b3c6

  • \Users\Admin\AppData\Local\Temp\is-PILCD.tmp\_isetup\_shfoldr.dll

    Filesize

    22KB

    MD5

    92dc6ef532fbb4a5c3201469a5b5eb63

    SHA1

    3e89ff837147c16b4e41c30d6c796374e0b8e62c

    SHA256

    9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

    SHA512

    9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

  • \Users\Admin\AppData\Local\Temp\is-PILCD.tmp\_isetup\_shfoldr.dll

    Filesize

    22KB

    MD5

    92dc6ef532fbb4a5c3201469a5b5eb63

    SHA1

    3e89ff837147c16b4e41c30d6c796374e0b8e62c

    SHA256

    9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

    SHA512

    9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

  • \Users\Admin\AppData\Roaming\CrystalDiskInfo8.17.4\lmsass.scr

    Filesize

    5.3MB

    MD5

    1fe7083d76e76df3f3d571beb38669fb

    SHA1

    dfd0b4769a35ec89b1e3a67f619d9e0437c7f022

    SHA256

    3993cae18dd547c0a2836ee251f250f4e691b1947a81816695236c971f848b87

    SHA512

    a1ed0ea9c5835fdc43715b547bf7630a73b3a4fc02243dfb05d1462cab194fc4f98b61a22698c62060d00654452f6a8cf158df3e7716a48062a867b67ca3fe70

  • \Users\Admin\AppData\Roaming\CrystalDiskInfo8.17.4\lmsass.scr

    Filesize

    5.3MB

    MD5

    1fe7083d76e76df3f3d571beb38669fb

    SHA1

    dfd0b4769a35ec89b1e3a67f619d9e0437c7f022

    SHA256

    3993cae18dd547c0a2836ee251f250f4e691b1947a81816695236c971f848b87

    SHA512

    a1ed0ea9c5835fdc43715b547bf7630a73b3a4fc02243dfb05d1462cab194fc4f98b61a22698c62060d00654452f6a8cf158df3e7716a48062a867b67ca3fe70

  • memory/672-123-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/672-70-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/1268-137-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/1268-133-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/1268-141-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/1268-132-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/1268-138-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/1268-142-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/1268-136-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/1268-134-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/1268-135-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/1544-86-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/1544-117-0x0000000000400000-0x0000000000582000-memory.dmp

    Filesize

    1.5MB

  • memory/1924-71-0x0000000000400000-0x0000000000582000-memory.dmp

    Filesize

    1.5MB

  • memory/1924-61-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/1972-54-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/1972-74-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/2032-109-0x0000000000250000-0x0000000000251000-memory.dmp

    Filesize

    4KB

  • memory/2032-124-0x00000000002A0000-0x00000000002A1000-memory.dmp

    Filesize

    4KB

  • memory/2032-120-0x0000000000290000-0x0000000000291000-memory.dmp

    Filesize

    4KB

  • memory/2032-121-0x00000000002A0000-0x00000000002A1000-memory.dmp

    Filesize

    4KB

  • memory/2032-125-0x00000000002A0000-0x00000000002A1000-memory.dmp

    Filesize

    4KB

  • memory/2032-126-0x0000000000400000-0x0000000000D54000-memory.dmp

    Filesize

    9.3MB

  • memory/2032-119-0x0000000000290000-0x0000000000291000-memory.dmp

    Filesize

    4KB

  • memory/2032-115-0x0000000000270000-0x0000000000271000-memory.dmp

    Filesize

    4KB

  • memory/2032-116-0x0000000000270000-0x0000000000271000-memory.dmp

    Filesize

    4KB

  • memory/2032-113-0x0000000000260000-0x0000000000261000-memory.dmp

    Filesize

    4KB

  • memory/2032-112-0x0000000000260000-0x0000000000261000-memory.dmp

    Filesize

    4KB

  • memory/2032-110-0x0000000000250000-0x0000000000251000-memory.dmp

    Filesize

    4KB

  • memory/2032-107-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/2032-106-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/2032-105-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/2032-104-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/2032-103-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/2032-102-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB