Resubmissions

18-04-2024 11:20

240418-nfk6macg3w 10

18-04-2024 11:20

240418-nfh19scg3t 10

18-04-2024 11:20

240418-nfheqsbd89 10

18-04-2024 11:20

240418-nfghfacg2x 10

18-04-2024 11:20

240418-nffwxacg2w 10

18-04-2024 09:59

240418-l1f2asba9x 10

Analysis

  • max time kernel
    1809s
  • max time network
    1820s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    18-04-2024 11:20

General

  • Target

    318e0bd67ccbf40f50b848831fb2885b161e68acdfaaa0c619c79b3912af2ecd.exe

  • Size

    350KB

  • MD5

    0dc61438b79668900bd081bac6109760

  • SHA1

    2ee66fd972c2d28ad30775971ba95056951910f0

  • SHA256

    318e0bd67ccbf40f50b848831fb2885b161e68acdfaaa0c619c79b3912af2ecd

  • SHA512

    467b352ce6188e6126050c229cd47b526e83ef3535449c3f02b70491e159523d7cc8ebb28caab4e8d98627a22a0af1faf13b134072309dfe56ad175d18177ca7

  • SSDEEP

    6144:RoX0oZ+rm/OV6ZH7XYuB4xpuMadbr2X3f+gOkXdhFr:Ry0xrm/h7XYuWCMaV2XWgO8hFr

Malware Config

Extracted

Family

systembc

C2

knock0909.monster:4035

knock0909.xyz:4035

Signatures

  • SystemBC

    SystemBC is a proxy and remote administration tool first seen in 2019.

  • Contacts a large (740) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 32 IoCs
  • Unexpected DNS network traffic destination 1 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Looks up external IP address via web service 4 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Uses Tor communications 1 TTPs

    Malware can proxy its traffic through Tor for more anonymity.

  • Suspicious use of SetThreadContext 17 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\318e0bd67ccbf40f50b848831fb2885b161e68acdfaaa0c619c79b3912af2ecd.exe
    "C:\Users\Admin\AppData\Local\Temp\318e0bd67ccbf40f50b848831fb2885b161e68acdfaaa0c619c79b3912af2ecd.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2488
    • C:\Users\Admin\AppData\Local\Temp\318e0bd67ccbf40f50b848831fb2885b161e68acdfaaa0c619c79b3912af2ecd.exe
      "C:\Users\Admin\AppData\Local\Temp\318e0bd67ccbf40f50b848831fb2885b161e68acdfaaa0c619c79b3912af2ecd.exe"
      2⤵
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      PID:2596
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {0039B306-5DC3-43BF-8EBF-C53227C6F71D} S-1-5-18:NT AUTHORITY\System:Service:
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2612
    • C:\ProgramData\mhgnve\snhrm.exe
      C:\ProgramData\mhgnve\snhrm.exe start
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:2660
      • C:\ProgramData\mhgnve\snhrm.exe
        C:\ProgramData\mhgnve\snhrm.exe start
        3⤵
        • Executes dropped EXE
        PID:2656
    • C:\ProgramData\mhgnve\snhrm.exe
      C:\ProgramData\mhgnve\snhrm.exe start
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1668
      • C:\ProgramData\mhgnve\snhrm.exe
        C:\ProgramData\mhgnve\snhrm.exe start
        3⤵
        • Executes dropped EXE
        PID:1196
    • C:\ProgramData\mhgnve\snhrm.exe
      C:\ProgramData\mhgnve\snhrm.exe start
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1772
      • C:\ProgramData\mhgnve\snhrm.exe
        C:\ProgramData\mhgnve\snhrm.exe start
        3⤵
        • Executes dropped EXE
        PID:1716
    • C:\ProgramData\mhgnve\snhrm.exe
      C:\ProgramData\mhgnve\snhrm.exe start
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:2624
      • C:\ProgramData\mhgnve\snhrm.exe
        C:\ProgramData\mhgnve\snhrm.exe start
        3⤵
        • Executes dropped EXE
        PID:2668
    • C:\ProgramData\mhgnve\snhrm.exe
      C:\ProgramData\mhgnve\snhrm.exe start
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      PID:1648
      • C:\ProgramData\mhgnve\snhrm.exe
        C:\ProgramData\mhgnve\snhrm.exe start
        3⤵
        • Executes dropped EXE
        PID:2344
    • C:\ProgramData\mhgnve\snhrm.exe
      C:\ProgramData\mhgnve\snhrm.exe start
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      PID:1900
      • C:\ProgramData\mhgnve\snhrm.exe
        C:\ProgramData\mhgnve\snhrm.exe start
        3⤵
        • Executes dropped EXE
        PID:628
    • C:\ProgramData\mhgnve\snhrm.exe
      C:\ProgramData\mhgnve\snhrm.exe start
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      PID:1520
      • C:\ProgramData\mhgnve\snhrm.exe
        C:\ProgramData\mhgnve\snhrm.exe start
        3⤵
        • Executes dropped EXE
        PID:3032
    • C:\ProgramData\mhgnve\snhrm.exe
      C:\ProgramData\mhgnve\snhrm.exe start
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      PID:1744
      • C:\ProgramData\mhgnve\snhrm.exe
        C:\ProgramData\mhgnve\snhrm.exe start
        3⤵
        • Executes dropped EXE
        PID:2740
    • C:\ProgramData\mhgnve\snhrm.exe
      C:\ProgramData\mhgnve\snhrm.exe start
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      PID:1504
      • C:\ProgramData\mhgnve\snhrm.exe
        C:\ProgramData\mhgnve\snhrm.exe start
        3⤵
        • Executes dropped EXE
        PID:1168
    • C:\ProgramData\mhgnve\snhrm.exe
      C:\ProgramData\mhgnve\snhrm.exe start
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      PID:2456
      • C:\ProgramData\mhgnve\snhrm.exe
        C:\ProgramData\mhgnve\snhrm.exe start
        3⤵
        • Executes dropped EXE
        PID:2404
    • C:\ProgramData\mhgnve\snhrm.exe
      C:\ProgramData\mhgnve\snhrm.exe start
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      PID:1396
      • C:\ProgramData\mhgnve\snhrm.exe
        C:\ProgramData\mhgnve\snhrm.exe start
        3⤵
        • Executes dropped EXE
        PID:1080
    • C:\ProgramData\mhgnve\snhrm.exe
      C:\ProgramData\mhgnve\snhrm.exe start
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      PID:3068
      • C:\ProgramData\mhgnve\snhrm.exe
        C:\ProgramData\mhgnve\snhrm.exe start
        3⤵
        • Executes dropped EXE
        PID:836
    • C:\ProgramData\mhgnve\snhrm.exe
      C:\ProgramData\mhgnve\snhrm.exe start
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      PID:2200
      • C:\ProgramData\mhgnve\snhrm.exe
        C:\ProgramData\mhgnve\snhrm.exe start
        3⤵
        • Executes dropped EXE
        PID:2324
    • C:\ProgramData\mhgnve\snhrm.exe
      C:\ProgramData\mhgnve\snhrm.exe start
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      PID:1480
      • C:\ProgramData\mhgnve\snhrm.exe
        C:\ProgramData\mhgnve\snhrm.exe start
        3⤵
        • Executes dropped EXE
        PID:2408
    • C:\ProgramData\mhgnve\snhrm.exe
      C:\ProgramData\mhgnve\snhrm.exe start
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      PID:2136
      • C:\ProgramData\mhgnve\snhrm.exe
        C:\ProgramData\mhgnve\snhrm.exe start
        3⤵
        • Executes dropped EXE
        PID:560
    • C:\ProgramData\mhgnve\snhrm.exe
      C:\ProgramData\mhgnve\snhrm.exe start
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      PID:2640
      • C:\ProgramData\mhgnve\snhrm.exe
        C:\ProgramData\mhgnve\snhrm.exe start
        3⤵
        • Executes dropped EXE
        PID:992

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\mhgnve\snhrm.exe

    Filesize

    350KB

    MD5

    0dc61438b79668900bd081bac6109760

    SHA1

    2ee66fd972c2d28ad30775971ba95056951910f0

    SHA256

    318e0bd67ccbf40f50b848831fb2885b161e68acdfaaa0c619c79b3912af2ecd

    SHA512

    467b352ce6188e6126050c229cd47b526e83ef3535449c3f02b70491e159523d7cc8ebb28caab4e8d98627a22a0af1faf13b134072309dfe56ad175d18177ca7

  • memory/1396-302-0x0000000000250000-0x0000000000350000-memory.dmp

    Filesize

    1024KB

  • memory/1480-389-0x0000000000D80000-0x0000000000E80000-memory.dmp

    Filesize

    1024KB

  • memory/1504-246-0x0000000000CD0000-0x0000000000DD0000-memory.dmp

    Filesize

    1024KB

  • memory/1520-189-0x0000000000E10000-0x0000000000F10000-memory.dmp

    Filesize

    1024KB

  • memory/1520-196-0x0000000000E10000-0x0000000000F10000-memory.dmp

    Filesize

    1024KB

  • memory/1648-129-0x0000000000271000-0x0000000000277000-memory.dmp

    Filesize

    24KB

  • memory/1668-42-0x0000000000D70000-0x0000000000E70000-memory.dmp

    Filesize

    1024KB

  • memory/1744-216-0x00000000010A0000-0x00000000011A0000-memory.dmp

    Filesize

    1024KB

  • memory/1772-71-0x0000000000331000-0x0000000000337000-memory.dmp

    Filesize

    24KB

  • memory/1900-159-0x0000000000291000-0x0000000000297000-memory.dmp

    Filesize

    24KB

  • memory/2136-421-0x0000000000DA0000-0x0000000000EA0000-memory.dmp

    Filesize

    1024KB

  • memory/2136-429-0x0000000000DA0000-0x0000000000EA0000-memory.dmp

    Filesize

    1024KB

  • memory/2200-360-0x0000000000DF0000-0x0000000000EF0000-memory.dmp

    Filesize

    1024KB

  • memory/2456-276-0x0000000000D11000-0x0000000000D17000-memory.dmp

    Filesize

    24KB

  • memory/2488-1-0x0000000000D00000-0x0000000000E00000-memory.dmp

    Filesize

    1024KB

  • memory/2488-3-0x0000000000020000-0x000000000002A000-memory.dmp

    Filesize

    40KB

  • memory/2596-14-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2596-7-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2596-5-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2596-2-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2624-100-0x00000000002F0000-0x00000000003F0000-memory.dmp

    Filesize

    1024KB

  • memory/2640-452-0x00000000010C1000-0x00000000010C7000-memory.dmp

    Filesize

    24KB

  • memory/2656-16-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2660-17-0x0000000000290000-0x0000000000390000-memory.dmp

    Filesize

    1024KB

  • memory/3068-333-0x0000000000D00000-0x0000000000E00000-memory.dmp

    Filesize

    1024KB