Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-05-2023 14:36

General

  • Target

    aacf669866c69553c2983113400fd433.exe

  • Size

    8.5MB

  • MD5

    aacf669866c69553c2983113400fd433

  • SHA1

    7d7a8c49b2ed28f386351c74f590559eda609058

  • SHA256

    629c71be115db2a37c97087d5aec82351dbe505523fa6d520e88c5dc8a98858a

  • SHA512

    b4867e93b75cb5a8dff0e41b0153f13e4e9a2369fd87cf57e8619fa3d7399b10b29d8cd571cbeef46b052274e055c377379c3f96f13fdca802acd04f8a49881d

  • SSDEEP

    196608:ZuvGaLYgMZrsB/JvhpACDMR1DJZH4RIBHhfqXs8Teya:ZuvH0JZrkJLAyMR1D/H4RWhic8TeP

Malware Config

Extracted

Family

systembc

C2

78.46.206.251:4294

5.75.208.145:4294

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • SystemBC

    SystemBC is a proxy and remote administration tool first seen in 2019.

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 35 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\aacf669866c69553c2983113400fd433.exe
    "C:\Users\Admin\AppData\Local\Temp\aacf669866c69553c2983113400fd433.exe"
    1⤵
    • Checks computer location settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:4460
    • C:\Users\Admin\AppData\Local\Temp\e4c19a1f3c\nvopencl64.exe
      "C:\Users\Admin\AppData\Local\Temp\e4c19a1f3c\nvopencl64.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:3704
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN nvopencl64.exe /TR "C:\Users\Admin\AppData\Local\Temp\e4c19a1f3c\nvopencl64.exe" /F
        3⤵
        • Creates scheduled task(s)
        PID:4476
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "nvopencl64.exe" /P "Admin:N"&&CACLS "nvopencl64.exe" /P "Admin:R" /E&&echo Y|CACLS "..\e4c19a1f3c" /P "Admin:N"&&CACLS "..\e4c19a1f3c" /P "Admin:R" /E&&Exit
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2976
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /S /D /c" echo Y"
          4⤵
            PID:1140
          • C:\Windows\SysWOW64\cacls.exe
            CACLS "nvopencl64.exe" /P "Admin:N"
            4⤵
              PID:3484
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "nvopencl64.exe" /P "Admin:R" /E
              4⤵
                PID:220
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                4⤵
                  PID:4124
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "..\e4c19a1f3c" /P "Admin:N"
                  4⤵
                    PID:2160
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\e4c19a1f3c" /P "Admin:R" /E
                    4⤵
                      PID:464
                  • C:\Windows\SysWOW64\rundll32.exe
                    "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\1000188060\nvopencl64.dll, rundll
                    3⤵
                    • Loads dropped DLL
                    • Suspicious use of WriteProcessMemory
                    PID:2336
                    • C:\Windows\system32\rundll32.exe
                      "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\1000188060\nvopencl64.dll, rundll
                      4⤵
                      • Blocklisted process makes network request
                      • Loads dropped DLL
                      • Suspicious behavior: EnumeratesProcesses
                      PID:1832
                  • C:\Users\Admin\AppData\Local\Temp\1000214051\unsecapp.exe
                    "C:\Users\Admin\AppData\Local\Temp\1000214051\unsecapp.exe"
                    3⤵
                    • Executes dropped EXE
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3408
              • C:\Users\Admin\AppData\Local\Temp\e4c19a1f3c\nvopencl64.exe
                C:\Users\Admin\AppData\Local\Temp\e4c19a1f3c\nvopencl64.exe
                1⤵
                • Executes dropped EXE
                PID:2856
              • C:\Users\Admin\AppData\Local\Temp\e4c19a1f3c\nvopencl64.exe
                C:\Users\Admin\AppData\Local\Temp\e4c19a1f3c\nvopencl64.exe
                1⤵
                • Executes dropped EXE
                PID:6216

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\013461898371

                Filesize

                84KB

                MD5

                9676415c3bc4e15f3689f426bf7b1558

                SHA1

                65e797d4f607784acf46c17810664867ad466ce8

                SHA256

                86da923c6ccdaf0ea43dd6b593fb93049dbcaef97813fc48f0e1586522fd3f86

                SHA512

                09cd086c5962a9695fbe31ccc457d7a85b49de5435e4777204afd5a1775eb9496f3b9f16966fc3c937bff2fb746f1738a45ff6c618c8e228acda32badc990c9d

              • C:\Users\Admin\AppData\Local\Temp\1000214051\unsecapp.exe

                Filesize

                141KB

                MD5

                880cc09f6957f8eea513d876344ac5ba

                SHA1

                150eef1ecf06848b6440031cbd1f88eb5213adc3

                SHA256

                374038d3b479d64d002df14a62bc561394613510b82cfbdbce25d18aaab03d27

                SHA512

                78eda2bb730760187f83b2341d13e7d6b94c6c4a2a0b826f21c03fd9a0e37c94e68d364badff159cd80860d09926c572b72465be109de24f06c7213f28cab562

              • C:\Users\Admin\AppData\Local\Temp\1000214051\unsecapp.exe

                Filesize

                141KB

                MD5

                880cc09f6957f8eea513d876344ac5ba

                SHA1

                150eef1ecf06848b6440031cbd1f88eb5213adc3

                SHA256

                374038d3b479d64d002df14a62bc561394613510b82cfbdbce25d18aaab03d27

                SHA512

                78eda2bb730760187f83b2341d13e7d6b94c6c4a2a0b826f21c03fd9a0e37c94e68d364badff159cd80860d09926c572b72465be109de24f06c7213f28cab562

              • C:\Users\Admin\AppData\Local\Temp\1000214051\unsecapp.exe

                Filesize

                141KB

                MD5

                880cc09f6957f8eea513d876344ac5ba

                SHA1

                150eef1ecf06848b6440031cbd1f88eb5213adc3

                SHA256

                374038d3b479d64d002df14a62bc561394613510b82cfbdbce25d18aaab03d27

                SHA512

                78eda2bb730760187f83b2341d13e7d6b94c6c4a2a0b826f21c03fd9a0e37c94e68d364badff159cd80860d09926c572b72465be109de24f06c7213f28cab562

              • C:\Users\Admin\AppData\Local\Temp\e4c19a1f3c\nvopencl64.exe

                Filesize

                8.5MB

                MD5

                aacf669866c69553c2983113400fd433

                SHA1

                7d7a8c49b2ed28f386351c74f590559eda609058

                SHA256

                629c71be115db2a37c97087d5aec82351dbe505523fa6d520e88c5dc8a98858a

                SHA512

                b4867e93b75cb5a8dff0e41b0153f13e4e9a2369fd87cf57e8619fa3d7399b10b29d8cd571cbeef46b052274e055c377379c3f96f13fdca802acd04f8a49881d

              • C:\Users\Admin\AppData\Local\Temp\e4c19a1f3c\nvopencl64.exe

                Filesize

                8.5MB

                MD5

                aacf669866c69553c2983113400fd433

                SHA1

                7d7a8c49b2ed28f386351c74f590559eda609058

                SHA256

                629c71be115db2a37c97087d5aec82351dbe505523fa6d520e88c5dc8a98858a

                SHA512

                b4867e93b75cb5a8dff0e41b0153f13e4e9a2369fd87cf57e8619fa3d7399b10b29d8cd571cbeef46b052274e055c377379c3f96f13fdca802acd04f8a49881d

              • C:\Users\Admin\AppData\Local\Temp\e4c19a1f3c\nvopencl64.exe

                Filesize

                8.5MB

                MD5

                aacf669866c69553c2983113400fd433

                SHA1

                7d7a8c49b2ed28f386351c74f590559eda609058

                SHA256

                629c71be115db2a37c97087d5aec82351dbe505523fa6d520e88c5dc8a98858a

                SHA512

                b4867e93b75cb5a8dff0e41b0153f13e4e9a2369fd87cf57e8619fa3d7399b10b29d8cd571cbeef46b052274e055c377379c3f96f13fdca802acd04f8a49881d

              • C:\Users\Admin\AppData\Local\Temp\e4c19a1f3c\nvopencl64.exe

                Filesize

                8.5MB

                MD5

                aacf669866c69553c2983113400fd433

                SHA1

                7d7a8c49b2ed28f386351c74f590559eda609058

                SHA256

                629c71be115db2a37c97087d5aec82351dbe505523fa6d520e88c5dc8a98858a

                SHA512

                b4867e93b75cb5a8dff0e41b0153f13e4e9a2369fd87cf57e8619fa3d7399b10b29d8cd571cbeef46b052274e055c377379c3f96f13fdca802acd04f8a49881d

              • C:\Users\Admin\AppData\Local\Temp\e4c19a1f3c\nvopencl64.exe

                Filesize

                8.5MB

                MD5

                aacf669866c69553c2983113400fd433

                SHA1

                7d7a8c49b2ed28f386351c74f590559eda609058

                SHA256

                629c71be115db2a37c97087d5aec82351dbe505523fa6d520e88c5dc8a98858a

                SHA512

                b4867e93b75cb5a8dff0e41b0153f13e4e9a2369fd87cf57e8619fa3d7399b10b29d8cd571cbeef46b052274e055c377379c3f96f13fdca802acd04f8a49881d

              • C:\Users\Admin\AppData\Roaming\1000188060\nvopencl64.dll

                Filesize

                17.0MB

                MD5

                20b30ca723ee9c9550a015aa1185ccc3

                SHA1

                1ed87d9442015afcbbc14bb3e606da3321db5087

                SHA256

                ea1b24da4e93d815ccade12b0c27a8639f4b99ddb31b500265bfd51bb8d37217

                SHA512

                694a7d8ddeb9cc0cd0f0bdae73942a47f2093dc2aabc9e73987462e3026e61eaafdfd23603dcd67e95da54a08554ed5e9769fb446b103851e74bf2e92ad04b50

              • C:\Users\Admin\AppData\Roaming\1000188060\nvopencl64.dll

                Filesize

                17.0MB

                MD5

                20b30ca723ee9c9550a015aa1185ccc3

                SHA1

                1ed87d9442015afcbbc14bb3e606da3321db5087

                SHA256

                ea1b24da4e93d815ccade12b0c27a8639f4b99ddb31b500265bfd51bb8d37217

                SHA512

                694a7d8ddeb9cc0cd0f0bdae73942a47f2093dc2aabc9e73987462e3026e61eaafdfd23603dcd67e95da54a08554ed5e9769fb446b103851e74bf2e92ad04b50

              • C:\Users\Admin\AppData\Roaming\1000188060\nvopencl64.dll

                Filesize

                17.0MB

                MD5

                20b30ca723ee9c9550a015aa1185ccc3

                SHA1

                1ed87d9442015afcbbc14bb3e606da3321db5087

                SHA256

                ea1b24da4e93d815ccade12b0c27a8639f4b99ddb31b500265bfd51bb8d37217

                SHA512

                694a7d8ddeb9cc0cd0f0bdae73942a47f2093dc2aabc9e73987462e3026e61eaafdfd23603dcd67e95da54a08554ed5e9769fb446b103851e74bf2e92ad04b50

              • C:\Users\Admin\AppData\Roaming\1000188060\nvopencl64.dll

                Filesize

                17.0MB

                MD5

                20b30ca723ee9c9550a015aa1185ccc3

                SHA1

                1ed87d9442015afcbbc14bb3e606da3321db5087

                SHA256

                ea1b24da4e93d815ccade12b0c27a8639f4b99ddb31b500265bfd51bb8d37217

                SHA512

                694a7d8ddeb9cc0cd0f0bdae73942a47f2093dc2aabc9e73987462e3026e61eaafdfd23603dcd67e95da54a08554ed5e9769fb446b103851e74bf2e92ad04b50

              • memory/1832-208-0x00007FF9A4630000-0x00007FF9A4632000-memory.dmp

                Filesize

                8KB

              • memory/1832-209-0x00007FF9A4640000-0x00007FF9A4642000-memory.dmp

                Filesize

                8KB

              • memory/1832-215-0x00007FF9842A0000-0x00007FF985E11000-memory.dmp

                Filesize

                27.4MB

              • memory/1832-214-0x00007FF9A2180000-0x00007FF9A2182000-memory.dmp

                Filesize

                8KB

              • memory/1832-213-0x00007FF9A2170000-0x00007FF9A2172000-memory.dmp

                Filesize

                8KB

              • memory/1832-212-0x00007FF9A43A0000-0x00007FF9A43A2000-memory.dmp

                Filesize

                8KB

              • memory/1832-210-0x00007FF9A4650000-0x00007FF9A4652000-memory.dmp

                Filesize

                8KB

              • memory/1832-211-0x00007FF9A4390000-0x00007FF9A4392000-memory.dmp

                Filesize

                8KB

              • memory/2856-222-0x0000000000A90000-0x0000000000A91000-memory.dmp

                Filesize

                4KB

              • memory/2856-223-0x0000000000AA0000-0x0000000000AA1000-memory.dmp

                Filesize

                4KB

              • memory/2856-224-0x0000000000EB0000-0x0000000001BF3000-memory.dmp

                Filesize

                13.3MB

              • memory/2856-218-0x0000000000A40000-0x0000000000A41000-memory.dmp

                Filesize

                4KB

              • memory/2856-221-0x0000000000A80000-0x0000000000A81000-memory.dmp

                Filesize

                4KB

              • memory/2856-220-0x0000000000A70000-0x0000000000A71000-memory.dmp

                Filesize

                4KB

              • memory/2856-219-0x0000000000A50000-0x0000000000A51000-memory.dmp

                Filesize

                4KB

              • memory/3408-205-0x00000000051F0000-0x0000000005200000-memory.dmp

                Filesize

                64KB

              • memory/3408-206-0x00000000066A0000-0x0000000006C44000-memory.dmp

                Filesize

                5.6MB

              • memory/3408-207-0x00000000060F0000-0x0000000006182000-memory.dmp

                Filesize

                584KB

              • memory/3408-204-0x0000000000730000-0x0000000000754000-memory.dmp

                Filesize

                144KB

              • memory/3408-216-0x00000000051F0000-0x0000000005200000-memory.dmp

                Filesize

                64KB

              • memory/3704-155-0x0000000000EA0000-0x0000000000EA1000-memory.dmp

                Filesize

                4KB

              • memory/3704-161-0x0000000000EB0000-0x0000000001BF3000-memory.dmp

                Filesize

                13.3MB

              • memory/3704-160-0x0000000001D60000-0x0000000001D61000-memory.dmp

                Filesize

                4KB

              • memory/3704-159-0x0000000001D50000-0x0000000001D51000-memory.dmp

                Filesize

                4KB

              • memory/3704-158-0x0000000001D40000-0x0000000001D41000-memory.dmp

                Filesize

                4KB

              • memory/3704-157-0x0000000001D30000-0x0000000001D31000-memory.dmp

                Filesize

                4KB

              • memory/3704-156-0x0000000001D10000-0x0000000001D11000-memory.dmp

                Filesize

                4KB

              • memory/4460-139-0x0000000000100000-0x0000000000E43000-memory.dmp

                Filesize

                13.3MB

              • memory/4460-133-0x0000000002E40000-0x0000000002E41000-memory.dmp

                Filesize

                4KB

              • memory/4460-138-0x0000000002EA0000-0x0000000002EA1000-memory.dmp

                Filesize

                4KB

              • memory/4460-137-0x0000000002E90000-0x0000000002E91000-memory.dmp

                Filesize

                4KB

              • memory/4460-136-0x0000000002E80000-0x0000000002E81000-memory.dmp

                Filesize

                4KB

              • memory/4460-135-0x0000000002E70000-0x0000000002E71000-memory.dmp

                Filesize

                4KB

              • memory/4460-134-0x0000000002E50000-0x0000000002E51000-memory.dmp

                Filesize

                4KB

              • memory/6216-228-0x00000000008B0000-0x00000000008B1000-memory.dmp

                Filesize

                4KB

              • memory/6216-229-0x00000000008C0000-0x00000000008C1000-memory.dmp

                Filesize

                4KB

              • memory/6216-230-0x00000000008E0000-0x00000000008E1000-memory.dmp

                Filesize

                4KB

              • memory/6216-231-0x00000000008F0000-0x00000000008F1000-memory.dmp

                Filesize

                4KB

              • memory/6216-232-0x0000000000900000-0x0000000000901000-memory.dmp

                Filesize

                4KB

              • memory/6216-233-0x0000000000920000-0x0000000000921000-memory.dmp

                Filesize

                4KB

              • memory/6216-234-0x0000000000EB0000-0x0000000001BF3000-memory.dmp

                Filesize

                13.3MB