Resubmissions

17-04-2024 09:29

240417-lf1vzaah95 10

17-04-2024 09:29

240417-lf1j7sce6y 10

17-04-2024 09:29

240417-lfzynsah94 10

17-04-2024 09:28

240417-lfvnysah89 10

17-04-2024 09:28

240417-lft3esah88 10

16-04-2024 13:46

240416-q3e91adb3v 10

Analysis

  • max time kernel
    1200s
  • max time network
    1201s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-04-2024 09:29

General

  • Target

    365d71d6a6fbc9bbb7efee8d4dd142555708c43b93721f86bbdf1f2f42cd6b08.exe

  • Size

    30KB

  • MD5

    2ad2c7b5700f4246447b90f07ec5359b

  • SHA1

    e9bf283f6dba0c0707a748fbd4a7c6f0c330f7d7

  • SHA256

    365d71d6a6fbc9bbb7efee8d4dd142555708c43b93721f86bbdf1f2f42cd6b08

  • SHA512

    625090c4b634c6d95b08bc8965d7445307c242ca9d6fb9e17cf402e82de317c33b21a3a894ec9ff12fbffa2c4fd17d7647c5db3414b81c6f48f565dd2257214c

  • SSDEEP

    768:j4Fd5REMkNoYKNen9OztmVWj9n52yoJImwJcaP:+1EMkNoxMgYVen0yoif

Score
10/10

Malware Config

Extracted

Family

systembc

C2

gmstar23.xyz:4044

scgsdstat14tp.xyz:4044

Signatures

  • SystemBC

    SystemBC is a proxy and remote administration tool first seen in 2019.

  • Executes dropped EXE 1 IoCs
  • Unexpected DNS network traffic destination 1 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Uses Tor communications 1 TTPs

    Malware can proxy its traffic through Tor for more anonymity.

  • Drops file in Windows directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\365d71d6a6fbc9bbb7efee8d4dd142555708c43b93721f86bbdf1f2f42cd6b08.exe
    "C:\Users\Admin\AppData\Local\Temp\365d71d6a6fbc9bbb7efee8d4dd142555708c43b93721f86bbdf1f2f42cd6b08.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    PID:2644
  • C:\ProgramData\ioqw\txekiur.exe
    C:\ProgramData\ioqw\txekiur.exe start
    1⤵
    • Executes dropped EXE
    PID:5044

Network

MITRE ATT&CK Matrix ATT&CK v13

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\ioqw\txekiur.exe
    Filesize

    30KB

    MD5

    2ad2c7b5700f4246447b90f07ec5359b

    SHA1

    e9bf283f6dba0c0707a748fbd4a7c6f0c330f7d7

    SHA256

    365d71d6a6fbc9bbb7efee8d4dd142555708c43b93721f86bbdf1f2f42cd6b08

    SHA512

    625090c4b634c6d95b08bc8965d7445307c242ca9d6fb9e17cf402e82de317c33b21a3a894ec9ff12fbffa2c4fd17d7647c5db3414b81c6f48f565dd2257214c