Resubmissions

10/04/2024, 03:10

240410-dpckqsfg9s 10

10/04/2024, 03:10

240410-dpby7sce45 10

10/04/2024, 03:10

240410-dpbcnsfg8y 10

10/04/2024, 03:10

240410-dpa2xafg8x 10

22/12/2023, 13:30

231222-qrz52abfd4 10

Analysis

  • max time kernel
    607s
  • max time network
    616s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    10/04/2024, 03:10

General

  • Target

    a41982f4915a70f246b0d6109280f39b.exe

  • Size

    209KB

  • MD5

    a41982f4915a70f246b0d6109280f39b

  • SHA1

    a256130c4872a7860a95dbabfd6e8b5ea60e83aa

  • SHA256

    31cdb1024e6010e5a59c0fc509432e6928c4eaf1a42c82e9fbd33e9aac2c552c

  • SHA512

    890395bc017590ccf80e08b0d542c7c556c6d30cb7bb1902acc525745bcb225467fe0c9c213836eca0f577058334bfc90e6a767cbcb9e9ea5bff870ba006032a

  • SSDEEP

    6144:YDnLgI91y1UkT57iJz/DpURWPSvHuUiYphu1Us:cnLh9yn52rpUR5vHuRYpM+s

Score
10/10

Malware Config

Extracted

Family

systembc

C2

yan0212.com:4039

yan0212.net:4039

Signatures

  • SystemBC

    SystemBC is a proxy and remote administration tool first seen in 2019.

  • Executes dropped EXE 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unexpected DNS network traffic destination 1 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Uses Tor communications 1 TTPs

    Malware can proxy its traffic through Tor for more anonymity.

  • Drops file in Windows directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a41982f4915a70f246b0d6109280f39b.exe
    "C:\Users\Admin\AppData\Local\Temp\a41982f4915a70f246b0d6109280f39b.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    PID:4028
  • C:\ProgramData\qluujja\imtjej.exe
    C:\ProgramData\qluujja\imtjej.exe start
    1⤵
    • Executes dropped EXE
    PID:3108

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\ProgramData\qluujja\imtjej.exe

          Filesize

          209KB

          MD5

          a41982f4915a70f246b0d6109280f39b

          SHA1

          a256130c4872a7860a95dbabfd6e8b5ea60e83aa

          SHA256

          31cdb1024e6010e5a59c0fc509432e6928c4eaf1a42c82e9fbd33e9aac2c552c

          SHA512

          890395bc017590ccf80e08b0d542c7c556c6d30cb7bb1902acc525745bcb225467fe0c9c213836eca0f577058334bfc90e6a767cbcb9e9ea5bff870ba006032a

        • memory/3108-10-0x0000000004770000-0x0000000004870000-memory.dmp

          Filesize

          1024KB

        • memory/3108-11-0x00000000001C0000-0x00000000001C9000-memory.dmp

          Filesize

          36KB

        • memory/3108-13-0x0000000000400000-0x00000000045F0000-memory.dmp

          Filesize

          65.9MB

        • memory/3108-17-0x0000000004770000-0x0000000004870000-memory.dmp

          Filesize

          1024KB

        • memory/4028-1-0x0000000004740000-0x0000000004840000-memory.dmp

          Filesize

          1024KB

        • memory/4028-2-0x00000000001C0000-0x00000000001C9000-memory.dmp

          Filesize

          36KB

        • memory/4028-9-0x0000000000400000-0x00000000045F0000-memory.dmp

          Filesize

          65.9MB

        • memory/4028-14-0x0000000004740000-0x0000000004840000-memory.dmp

          Filesize

          1024KB