Resubmissions

13/04/2024, 09:24

240413-ldke7sfe9s 10

13/04/2024, 09:21

240413-lbhhtsfe8v 10

13/04/2024, 09:21

240413-lbef6sfe8t 10

13/04/2024, 09:21

240413-lbd6eafe8s 10

13/04/2024, 09:21

240413-lbdvmsfe71 10

09/04/2024, 08:13

240409-j4mxxaad33 10

09/04/2024, 08:13

240409-j4ml5sad32 10

09/04/2024, 08:13

240409-j4l1lsad29 10

09/04/2024, 08:13

240409-j4lpvaad28 10

Analysis

  • max time kernel
    1793s
  • max time network
    1794s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    09/04/2024, 08:13

General

  • Target

    sample.exe

  • Size

    171KB

  • MD5

    8e3a80163ebba090c69ecdeec8860c8b

  • SHA1

    3beb3fdd46f78d54c19f5d66f46172d6f5cde830

  • SHA256

    c68035aabbe9b80ace209290aa28b8108cbb03a9d6a6301eb9a8d638db024ad0

  • SHA512

    fe327e9f59d87f333ec0b2fcae916f41af8e5df5edaa2a2085e7998f3903746ad7de8b891f553b81d44ee49098de3105fae24e380c540b50c78a96ffc859da03

  • SSDEEP

    3072:PGq7Cm2r13QuGGz7qr+qf8v0knEyc9TXA2J:Pj7jmGqqrlfGDcfJ

Score
10/10

Malware Config

Extracted

Family

systembc

C2

admex175x.xyz:4044

servx278x.xyz:4044

Signatures

  • SystemBC

    SystemBC is a proxy and remote administration tool first seen in 2019.

  • Executes dropped EXE 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Uses Tor communications 1 TTPs

    Malware can proxy its traffic through Tor for more anonymity.

  • Drops file in Windows directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\sample.exe
    "C:\Users\Admin\AppData\Local\Temp\sample.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    PID:2688
  • C:\ProgramData\rjoanx\carehk.exe
    C:\ProgramData\rjoanx\carehk.exe start
    1⤵
    • Executes dropped EXE
    PID:3984

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\ProgramData\rjoanx\carehk.exe

          Filesize

          171KB

          MD5

          8e3a80163ebba090c69ecdeec8860c8b

          SHA1

          3beb3fdd46f78d54c19f5d66f46172d6f5cde830

          SHA256

          c68035aabbe9b80ace209290aa28b8108cbb03a9d6a6301eb9a8d638db024ad0

          SHA512

          fe327e9f59d87f333ec0b2fcae916f41af8e5df5edaa2a2085e7998f3903746ad7de8b891f553b81d44ee49098de3105fae24e380c540b50c78a96ffc859da03

        • memory/2688-1-0x0000000005430000-0x0000000005530000-memory.dmp

          Filesize

          1024KB

        • memory/2688-2-0x0000000005280000-0x0000000005289000-memory.dmp

          Filesize

          36KB

        • memory/2688-9-0x0000000000400000-0x0000000005162000-memory.dmp

          Filesize

          77.4MB

        • memory/2688-14-0x0000000005430000-0x0000000005530000-memory.dmp

          Filesize

          1024KB

        • memory/3984-10-0x0000000005280000-0x0000000005380000-memory.dmp

          Filesize

          1024KB

        • memory/3984-11-0x00000000001C0000-0x00000000001C9000-memory.dmp

          Filesize

          36KB

        • memory/3984-13-0x0000000000400000-0x0000000005162000-memory.dmp

          Filesize

          77.4MB

        • memory/3984-17-0x0000000005280000-0x0000000005380000-memory.dmp

          Filesize

          1024KB