Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-12-2024 14:28

General

  • Target

    1af0e12fc38a64654bce554612545b34.exe

  • Size

    1004KB

  • MD5

    1af0e12fc38a64654bce554612545b34

  • SHA1

    2704339f5dc0a824b08b978ccf324cc99231b406

  • SHA256

    79b8594b53a0516453df5007270848fc2018f630b7f4f88feb4beacd420ed83a

  • SHA512

    fb5ff981722253b73549db4d306f02ca21649455b9260a781cb0c2b24164e72bf4cdf24a140fd3dcaad5b21e32a84b49cb3ec558e2d6ab7253f4cb63e91a9ca3

  • SSDEEP

    24576:io23milEV1TtrBxLdx+WjQw8cSh638FF3HEh/LEVbfGf:W2RrBfxzMh6sFtkh/LEbfGf

Malware Config

Extracted

Family

systembc

C2

wodresomdaymomentum.org

Attributes
  • dns

    5.132.191.104

Signatures

  • Suspicious use of NtCreateUserProcessOtherParentProcess 3 IoCs
  • SystemBC

    SystemBC is a proxy and remote administration tool first seen in 2019.

  • Systembc family
  • Drops startup file 1 IoCs
  • Executes dropped EXE 4 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3348
      • C:\Users\Admin\AppData\Local\Temp\1af0e12fc38a64654bce554612545b34.exe
        "C:\Users\Admin\AppData\Local\Temp\1af0e12fc38a64654bce554612545b34.exe"
        2⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Drops startup file
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1408
      • C:\Users\Admin\AppData\Local\Temp\1af0e12fc38a64654bce554612545b34.exe
        "C:\Users\Admin\AppData\Local\Temp\1af0e12fc38a64654bce554612545b34.exe"
        2⤵
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        PID:3460
      • C:\ProgramData\lpucki\urqmc.exe
        "C:\ProgramData\lpucki\urqmc.exe"
        2⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:1924
      • C:\ProgramData\lpucki\urqmc.exe
        "C:\ProgramData\lpucki\urqmc.exe"
        2⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:2728
    • C:\ProgramData\lpucki\urqmc.exe
      C:\ProgramData\lpucki\urqmc.exe
      1⤵
      • Suspicious use of NtCreateUserProcessOtherParentProcess
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4716
    • C:\ProgramData\lpucki\urqmc.exe
      C:\ProgramData\lpucki\urqmc.exe
      1⤵
      • Suspicious use of NtCreateUserProcessOtherParentProcess
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2924

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\lpucki\urqmc.exe

      Filesize

      1004KB

      MD5

      1af0e12fc38a64654bce554612545b34

      SHA1

      2704339f5dc0a824b08b978ccf324cc99231b406

      SHA256

      79b8594b53a0516453df5007270848fc2018f630b7f4f88feb4beacd420ed83a

      SHA512

      fb5ff981722253b73549db4d306f02ca21649455b9260a781cb0c2b24164e72bf4cdf24a140fd3dcaad5b21e32a84b49cb3ec558e2d6ab7253f4cb63e91a9ca3

    • C:\Windows\Tasks\Test Task17.job

      Filesize

      236B

      MD5

      4d7cebf277b23f44cf693915e626b3cd

      SHA1

      a79ef7bb87021f1fbbbebe991c73f719f4e0e451

      SHA256

      c29edb543fb1d37433724684e65a086292f1886218d416abb48b5488b2f0cafa

      SHA512

      2dbb8fb9095d6892a8e74bb5a27be280a67780834d96b5bb51f1ee00a25a00aa952deb5881877269b77c685b28215cec752aed2602059af4ac4c6b264628987f

    • memory/1408-0-0x0000000074D4E000-0x0000000074D4F000-memory.dmp

      Filesize

      4KB

    • memory/1408-1-0x0000000000B80000-0x0000000000C7A000-memory.dmp

      Filesize

      1000KB

    • memory/1408-2-0x0000000074D40000-0x00000000754F0000-memory.dmp

      Filesize

      7.7MB

    • memory/1408-3-0x00000000054B0000-0x0000000005596000-memory.dmp

      Filesize

      920KB

    • memory/1408-4-0x00000000056B0000-0x0000000005796000-memory.dmp

      Filesize

      920KB

    • memory/1408-12-0x00000000056B0000-0x0000000005791000-memory.dmp

      Filesize

      900KB

    • memory/1408-10-0x00000000056B0000-0x0000000005791000-memory.dmp

      Filesize

      900KB

    • memory/1408-8-0x00000000056B0000-0x0000000005791000-memory.dmp

      Filesize

      900KB

    • memory/1408-40-0x00000000056B0000-0x0000000005791000-memory.dmp

      Filesize

      900KB

    • memory/1408-39-0x00000000056B0000-0x0000000005791000-memory.dmp

      Filesize

      900KB

    • memory/1408-36-0x00000000056B0000-0x0000000005791000-memory.dmp

      Filesize

      900KB

    • memory/1408-26-0x00000000056B0000-0x0000000005791000-memory.dmp

      Filesize

      900KB

    • memory/1408-6-0x00000000056B0000-0x0000000005791000-memory.dmp

      Filesize

      900KB

    • memory/1408-24-0x00000000056B0000-0x0000000005791000-memory.dmp

      Filesize

      900KB

    • memory/1408-5-0x00000000056B0000-0x0000000005791000-memory.dmp

      Filesize

      900KB

    • memory/1408-68-0x00000000056B0000-0x0000000005791000-memory.dmp

      Filesize

      900KB

    • memory/1408-67-0x00000000056B0000-0x0000000005791000-memory.dmp

      Filesize

      900KB

    • memory/1408-64-0x00000000056B0000-0x0000000005791000-memory.dmp

      Filesize

      900KB

    • memory/1408-62-0x00000000056B0000-0x0000000005791000-memory.dmp

      Filesize

      900KB

    • memory/1408-61-0x00000000056B0000-0x0000000005791000-memory.dmp

      Filesize

      900KB

    • memory/1408-58-0x00000000056B0000-0x0000000005791000-memory.dmp

      Filesize

      900KB

    • memory/1408-56-0x00000000056B0000-0x0000000005791000-memory.dmp

      Filesize

      900KB

    • memory/1408-54-0x00000000056B0000-0x0000000005791000-memory.dmp

      Filesize

      900KB

    • memory/1408-53-0x00000000056B0000-0x0000000005791000-memory.dmp

      Filesize

      900KB

    • memory/1408-50-0x00000000056B0000-0x0000000005791000-memory.dmp

      Filesize

      900KB

    • memory/1408-49-0x00000000056B0000-0x0000000005791000-memory.dmp

      Filesize

      900KB

    • memory/1408-46-0x00000000056B0000-0x0000000005791000-memory.dmp

      Filesize

      900KB

    • memory/1408-44-0x00000000056B0000-0x0000000005791000-memory.dmp

      Filesize

      900KB

    • memory/1408-42-0x00000000056B0000-0x0000000005791000-memory.dmp

      Filesize

      900KB

    • memory/1408-34-0x00000000056B0000-0x0000000005791000-memory.dmp

      Filesize

      900KB

    • memory/1408-32-0x00000000056B0000-0x0000000005791000-memory.dmp

      Filesize

      900KB

    • memory/1408-30-0x00000000056B0000-0x0000000005791000-memory.dmp

      Filesize

      900KB

    • memory/1408-28-0x00000000056B0000-0x0000000005791000-memory.dmp

      Filesize

      900KB

    • memory/1408-22-0x00000000056B0000-0x0000000005791000-memory.dmp

      Filesize

      900KB

    • memory/1408-20-0x00000000056B0000-0x0000000005791000-memory.dmp

      Filesize

      900KB

    • memory/1408-18-0x00000000056B0000-0x0000000005791000-memory.dmp

      Filesize

      900KB

    • memory/1408-16-0x00000000056B0000-0x0000000005791000-memory.dmp

      Filesize

      900KB

    • memory/1408-14-0x00000000056B0000-0x0000000005791000-memory.dmp

      Filesize

      900KB

    • memory/1408-1181-0x0000000074D40000-0x00000000754F0000-memory.dmp

      Filesize

      7.7MB

    • memory/1408-1182-0x0000000005950000-0x00000000059A8000-memory.dmp

      Filesize

      352KB

    • memory/1408-1183-0x00000000058F0000-0x000000000593C000-memory.dmp

      Filesize

      304KB

    • memory/1408-1184-0x0000000074D4E000-0x0000000074D4F000-memory.dmp

      Filesize

      4KB

    • memory/1408-1185-0x0000000074D40000-0x00000000754F0000-memory.dmp

      Filesize

      7.7MB

    • memory/1408-1186-0x0000000074D40000-0x00000000754F0000-memory.dmp

      Filesize

      7.7MB

    • memory/1408-1187-0x00000000062E0000-0x0000000006884000-memory.dmp

      Filesize

      5.6MB

    • memory/1408-1188-0x00000000057E0000-0x0000000005834000-memory.dmp

      Filesize

      336KB

    • memory/1408-1194-0x0000000074D40000-0x00000000754F0000-memory.dmp

      Filesize

      7.7MB

    • memory/1408-1203-0x0000000003236000-0x0000000003237000-memory.dmp

      Filesize

      4KB

    • memory/1408-1202-0x000000000331F000-0x0000000003320000-memory.dmp

      Filesize

      4KB

    • memory/1408-1200-0x0000000074D40000-0x00000000754F0000-memory.dmp

      Filesize

      7.7MB

    • memory/1408-1206-0x0000000074D40000-0x00000000754F0000-memory.dmp

      Filesize

      7.7MB

    • memory/1924-2405-0x0000000000400000-0x0000000000407000-memory.dmp

      Filesize

      28KB

    • memory/3460-1201-0x0000000000400000-0x0000000000407000-memory.dmp

      Filesize

      28KB

    • memory/4716-1210-0x0000000074D40000-0x00000000754F0000-memory.dmp

      Filesize

      7.7MB

    • memory/4716-1209-0x0000000074D4E000-0x0000000074D4F000-memory.dmp

      Filesize

      4KB

    • memory/4716-2387-0x0000000074D40000-0x00000000754F0000-memory.dmp

      Filesize

      7.7MB

    • memory/4716-2388-0x0000000074D4E000-0x0000000074D4F000-memory.dmp

      Filesize

      4KB

    • memory/4716-2389-0x0000000074D40000-0x00000000754F0000-memory.dmp

      Filesize

      7.7MB

    • memory/4716-2390-0x0000000074D40000-0x00000000754F0000-memory.dmp

      Filesize

      7.7MB

    • memory/4716-2402-0x0000000074D40000-0x00000000754F0000-memory.dmp

      Filesize

      7.7MB

    • memory/4716-2404-0x0000000074D40000-0x00000000754F0000-memory.dmp

      Filesize

      7.7MB

    • memory/4716-2396-0x0000000074D40000-0x00000000754F0000-memory.dmp

      Filesize

      7.7MB