Resubmissions

13/04/2024, 09:24

240413-ldke7sfe9s 10

13/04/2024, 09:21

240413-lbhhtsfe8v 10

13/04/2024, 09:21

240413-lbef6sfe8t 10

13/04/2024, 09:21

240413-lbd6eafe8s 10

13/04/2024, 09:21

240413-lbdvmsfe71 10

09/04/2024, 08:13

240409-j4mxxaad33 10

09/04/2024, 08:13

240409-j4ml5sad32 10

09/04/2024, 08:13

240409-j4l1lsad29 10

09/04/2024, 08:13

240409-j4lpvaad28 10

Analysis

  • max time kernel
    1798s
  • max time network
    1801s
  • platform
    windows7_x64
  • resource
    win7-20240319-en
  • resource tags

    arch:x64arch:x86image:win7-20240319-enlocale:en-usos:windows7-x64system
  • submitted
    09/04/2024, 08:13

General

  • Target

    sample.exe

  • Size

    171KB

  • MD5

    8e3a80163ebba090c69ecdeec8860c8b

  • SHA1

    3beb3fdd46f78d54c19f5d66f46172d6f5cde830

  • SHA256

    c68035aabbe9b80ace209290aa28b8108cbb03a9d6a6301eb9a8d638db024ad0

  • SHA512

    fe327e9f59d87f333ec0b2fcae916f41af8e5df5edaa2a2085e7998f3903746ad7de8b891f553b81d44ee49098de3105fae24e380c540b50c78a96ffc859da03

  • SSDEEP

    3072:PGq7Cm2r13QuGGz7qr+qf8v0knEyc9TXA2J:Pj7jmGqqrlfGDcfJ

Malware Config

Extracted

Family

systembc

C2

admex175x.xyz:4044

servx278x.xyz:4044

Signatures

  • SystemBC

    SystemBC is a proxy and remote administration tool first seen in 2019.

  • Contacts a large (643) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unexpected DNS network traffic destination 1 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Looks up external IP address via web service 4 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Uses Tor communications 1 TTPs

    Malware can proxy its traffic through Tor for more anonymity.

  • Drops file in Windows directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\sample.exe
    "C:\Users\Admin\AppData\Local\Temp\sample.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    PID:1684
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {2614E71B-9CA7-4D04-9493-43767005C69C} S-1-5-18:NT AUTHORITY\System:Service:
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2580
    • C:\ProgramData\ccopoon\ewsdc.exe
      C:\ProgramData\ccopoon\ewsdc.exe start
      2⤵
      • Executes dropped EXE
      PID:2660

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\ccopoon\ewsdc.exe

    Filesize

    171KB

    MD5

    8e3a80163ebba090c69ecdeec8860c8b

    SHA1

    3beb3fdd46f78d54c19f5d66f46172d6f5cde830

    SHA256

    c68035aabbe9b80ace209290aa28b8108cbb03a9d6a6301eb9a8d638db024ad0

    SHA512

    fe327e9f59d87f333ec0b2fcae916f41af8e5df5edaa2a2085e7998f3903746ad7de8b891f553b81d44ee49098de3105fae24e380c540b50c78a96ffc859da03

  • memory/1684-1-0x00000000052D0000-0x00000000053D0000-memory.dmp

    Filesize

    1024KB

  • memory/1684-2-0x0000000000020000-0x0000000000029000-memory.dmp

    Filesize

    36KB

  • memory/1684-3-0x0000000000400000-0x0000000005162000-memory.dmp

    Filesize

    77.4MB

  • memory/1684-13-0x00000000052D0000-0x00000000053D0000-memory.dmp

    Filesize

    1024KB

  • memory/2660-10-0x0000000005220000-0x0000000005320000-memory.dmp

    Filesize

    1024KB

  • memory/2660-11-0x0000000000020000-0x0000000000029000-memory.dmp

    Filesize

    36KB

  • memory/2660-14-0x0000000000400000-0x0000000005162000-memory.dmp

    Filesize

    77.4MB

  • memory/2660-18-0x0000000005220000-0x0000000005320000-memory.dmp

    Filesize

    1024KB