Analysis

  • max time kernel
    129s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    29-08-2024 15:40

General

  • Target

    Cbmefxrmnv.exe

  • Size

    2.0MB

  • MD5

    170fb4fa36de83de39a9e228f17b0060

  • SHA1

    4a9ee216442b6fc98152fe9e80e763d95caede6c

  • SHA256

    145dbb397089105d6d06a861d62b48be9fd2527fb7d023b114cf05b723cd3858

  • SHA512

    168f389ce7dd0a7feacf6505c1a52a6743900974dd11af86b2e07998817b2021f62dec0b00daffbc212fd51337500fa9ff1d669d708103de2337195db936ee8f

  • SSDEEP

    24576:qM7wJrWiSgXXHgdjvYiKs7KHxGoz8oVWtnq4cPgv07ZNAqbJBO+kLQL3cOEKFHt:r7wJVSoFL3cYFH

Malware Config

Extracted

Family

systembc

C2

claywyaeropumps.com

185.43.220.45

Attributes
  • dns

    5.132.191.104

Signatures

  • SystemBC

    SystemBC is a proxy and remote administration tool first seen in 2019.

  • Executes dropped EXE 5 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 44 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Cbmefxrmnv.exe
    "C:\Users\Admin\AppData\Local\Temp\Cbmefxrmnv.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3056
    • C:\Users\Admin\AppData\Local\Temp\Cbmefxrmnv.exe
      "C:\Users\Admin\AppData\Local\Temp\Cbmefxrmnv.exe"
      2⤵
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      PID:5700
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {B33076F5-452A-4302-AD9F-A7EA1124E9A0} S-1-5-21-3450744190-3404161390-554719085-1000:PDIZKVQX\Admin:Interactive:[1]
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:5820
    • C:\ProgramData\pbma\gjob.exe
      C:\ProgramData\pbma\gjob.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:5856
      • C:\ProgramData\pbma\gjob.exe
        "C:\ProgramData\pbma\gjob.exe"
        3⤵
        • Executes dropped EXE
        PID:5584
      • C:\ProgramData\pbma\gjob.exe
        "C:\ProgramData\pbma\gjob.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:5668
    • C:\ProgramData\pbma\gjob.exe
      C:\ProgramData\pbma\gjob.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:5916
      • C:\ProgramData\pbma\gjob.exe
        "C:\ProgramData\pbma\gjob.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:2896

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\pbma\gjob.exe

    Filesize

    2.0MB

    MD5

    170fb4fa36de83de39a9e228f17b0060

    SHA1

    4a9ee216442b6fc98152fe9e80e763d95caede6c

    SHA256

    145dbb397089105d6d06a861d62b48be9fd2527fb7d023b114cf05b723cd3858

    SHA512

    168f389ce7dd0a7feacf6505c1a52a6743900974dd11af86b2e07998817b2021f62dec0b00daffbc212fd51337500fa9ff1d669d708103de2337195db936ee8f

  • C:\Windows\Tasks\Test Task17.job

    Filesize

    212B

    MD5

    52b10d8474e4d0d75fbd6a91b5fbc053

    SHA1

    babbcadccbf0c94a9fe0b3f15f2c49a39c76ddd0

    SHA256

    9ef40b23dc494303ef86e5251e44ebc6a09ae39ec1bb09fb6a2438d2467ed724

    SHA512

    b7f5186c3246ede17d8cd6f6edb9664bc9e7d88792ba102e6f0f1d2454f5ebb5a318334d64fe648b87efe8cf92dd8f2c86136112676a9a9106e7e3e51d6708ce

  • memory/3056-0-0x0000000073EEE000-0x0000000073EEF000-memory.dmp

    Filesize

    4KB

  • memory/3056-1-0x0000000001190000-0x00000000013A2000-memory.dmp

    Filesize

    2.1MB

  • memory/3056-2-0x0000000004D10000-0x0000000004DE6000-memory.dmp

    Filesize

    856KB

  • memory/3056-3-0x0000000004D10000-0x0000000004DE1000-memory.dmp

    Filesize

    836KB

  • memory/3056-4-0x0000000004D10000-0x0000000004DE1000-memory.dmp

    Filesize

    836KB

  • memory/3056-22-0x0000000004D10000-0x0000000004DE1000-memory.dmp

    Filesize

    836KB

  • memory/3056-6-0x0000000004D10000-0x0000000004DE1000-memory.dmp

    Filesize

    836KB

  • memory/3056-8-0x0000000004D10000-0x0000000004DE1000-memory.dmp

    Filesize

    836KB

  • memory/3056-14-0x0000000004D10000-0x0000000004DE1000-memory.dmp

    Filesize

    836KB

  • memory/3056-18-0x0000000004D10000-0x0000000004DE1000-memory.dmp

    Filesize

    836KB

  • memory/3056-32-0x0000000004D10000-0x0000000004DE1000-memory.dmp

    Filesize

    836KB

  • memory/3056-38-0x0000000004D10000-0x0000000004DE1000-memory.dmp

    Filesize

    836KB

  • memory/3056-36-0x0000000004D10000-0x0000000004DE1000-memory.dmp

    Filesize

    836KB

  • memory/3056-34-0x0000000004D10000-0x0000000004DE1000-memory.dmp

    Filesize

    836KB

  • memory/3056-30-0x0000000004D10000-0x0000000004DE1000-memory.dmp

    Filesize

    836KB

  • memory/3056-28-0x0000000004D10000-0x0000000004DE1000-memory.dmp

    Filesize

    836KB

  • memory/3056-26-0x0000000004D10000-0x0000000004DE1000-memory.dmp

    Filesize

    836KB

  • memory/3056-24-0x0000000004D10000-0x0000000004DE1000-memory.dmp

    Filesize

    836KB

  • memory/3056-20-0x0000000004D10000-0x0000000004DE1000-memory.dmp

    Filesize

    836KB

  • memory/3056-16-0x0000000004D10000-0x0000000004DE1000-memory.dmp

    Filesize

    836KB

  • memory/3056-12-0x0000000004D10000-0x0000000004DE1000-memory.dmp

    Filesize

    836KB

  • memory/3056-10-0x0000000004D10000-0x0000000004DE1000-memory.dmp

    Filesize

    836KB

  • memory/3056-40-0x0000000004D10000-0x0000000004DE1000-memory.dmp

    Filesize

    836KB

  • memory/3056-44-0x0000000004D10000-0x0000000004DE1000-memory.dmp

    Filesize

    836KB

  • memory/3056-48-0x0000000004D10000-0x0000000004DE1000-memory.dmp

    Filesize

    836KB

  • memory/3056-50-0x0000000004D10000-0x0000000004DE1000-memory.dmp

    Filesize

    836KB

  • memory/3056-56-0x0000000004D10000-0x0000000004DE1000-memory.dmp

    Filesize

    836KB

  • memory/3056-54-0x0000000004D10000-0x0000000004DE1000-memory.dmp

    Filesize

    836KB

  • memory/3056-52-0x0000000004D10000-0x0000000004DE1000-memory.dmp

    Filesize

    836KB

  • memory/3056-46-0x0000000004D10000-0x0000000004DE1000-memory.dmp

    Filesize

    836KB

  • memory/3056-42-0x0000000004D10000-0x0000000004DE1000-memory.dmp

    Filesize

    836KB

  • memory/3056-66-0x0000000004D10000-0x0000000004DE1000-memory.dmp

    Filesize

    836KB

  • memory/3056-58-0x0000000004D10000-0x0000000004DE1000-memory.dmp

    Filesize

    836KB

  • memory/3056-60-0x0000000004D10000-0x0000000004DE1000-memory.dmp

    Filesize

    836KB

  • memory/3056-64-0x0000000004D10000-0x0000000004DE1000-memory.dmp

    Filesize

    836KB

  • memory/3056-62-0x0000000004D10000-0x0000000004DE1000-memory.dmp

    Filesize

    836KB

  • memory/3056-1039-0x0000000073EE0000-0x00000000745CE000-memory.dmp

    Filesize

    6.9MB

  • memory/3056-1040-0x0000000073EE0000-0x00000000745CE000-memory.dmp

    Filesize

    6.9MB

  • memory/3056-1041-0x0000000000A40000-0x0000000000A98000-memory.dmp

    Filesize

    352KB

  • memory/3056-1042-0x0000000000D70000-0x0000000000DBC000-memory.dmp

    Filesize

    304KB

  • memory/3056-1043-0x0000000073EEE000-0x0000000073EEF000-memory.dmp

    Filesize

    4KB

  • memory/3056-1044-0x0000000073EE0000-0x00000000745CE000-memory.dmp

    Filesize

    6.9MB

  • memory/3056-1045-0x0000000000E80000-0x0000000000ED4000-memory.dmp

    Filesize

    336KB

  • memory/3056-1061-0x0000000073EE0000-0x00000000745CE000-memory.dmp

    Filesize

    6.9MB

  • memory/5700-1058-0x0000000000400000-0x0000000000407000-memory.dmp

    Filesize

    28KB

  • memory/5856-1064-0x0000000073E9E000-0x0000000073E9F000-memory.dmp

    Filesize

    4KB

  • memory/5856-1065-0x0000000000180000-0x0000000000392000-memory.dmp

    Filesize

    2.1MB

  • memory/5856-2102-0x0000000073E90000-0x000000007457E000-memory.dmp

    Filesize

    6.9MB

  • memory/5856-2103-0x0000000073E9E000-0x0000000073E9F000-memory.dmp

    Filesize

    4KB

  • memory/5856-2104-0x0000000073E90000-0x000000007457E000-memory.dmp

    Filesize

    6.9MB

  • memory/5856-2131-0x0000000073E90000-0x000000007457E000-memory.dmp

    Filesize

    6.9MB

  • memory/5916-2135-0x0000000000180000-0x0000000000392000-memory.dmp

    Filesize

    2.1MB