Analysis

  • max time kernel
    149s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-12-2024 17:28

General

  • Target

    c0967a95f4a2ccfe64139ea5bbbb6c87688b64e26b0d61f068ccd0a4782a057e.exe

  • Size

    1010KB

  • MD5

    edbf90615adcab2e37525f41cfcbdcf0

  • SHA1

    8e5ad8f1ba8d2e0aad33e1a6b2b5ef90f628650c

  • SHA256

    c0967a95f4a2ccfe64139ea5bbbb6c87688b64e26b0d61f068ccd0a4782a057e

  • SHA512

    792e62f026ca3474f458ffdc15ed18ca5185989b735c69d18671dce8330fcc3744abad183e4ac5c5df4f77acb1c7bbf4f1bd2f4441b1b8e8671c17a95f83e12f

  • SSDEEP

    24576:IgWIa+M0IGZ3jGBUii9YkIw/61JuYrv+Ux7T:PkSIkIUiaPl/617+UZT

Malware Config

Extracted

Family

systembc

C2

wodresomdaymomentum.org

Attributes
  • dns

    5.132.191.104

Signatures

  • Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
  • SystemBC

    SystemBC is a proxy and remote administration tool first seen in 2019.

  • Systembc family
  • Drops startup file 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3520
      • C:\Users\Admin\AppData\Local\Temp\c0967a95f4a2ccfe64139ea5bbbb6c87688b64e26b0d61f068ccd0a4782a057e.exe
        "C:\Users\Admin\AppData\Local\Temp\c0967a95f4a2ccfe64139ea5bbbb6c87688b64e26b0d61f068ccd0a4782a057e.exe"
        2⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Drops startup file
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3220
      • C:\Users\Admin\AppData\Local\Temp\c0967a95f4a2ccfe64139ea5bbbb6c87688b64e26b0d61f068ccd0a4782a057e.exe
        "C:\Users\Admin\AppData\Local\Temp\c0967a95f4a2ccfe64139ea5bbbb6c87688b64e26b0d61f068ccd0a4782a057e.exe"
        2⤵
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        PID:4396
      • C:\ProgramData\kboltu\isftkp.exe
        "C:\ProgramData\kboltu\isftkp.exe"
        2⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:1592
    • C:\ProgramData\kboltu\isftkp.exe
      C:\ProgramData\kboltu\isftkp.exe
      1⤵
      • Suspicious use of NtCreateUserProcessOtherParentProcess
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4088
    • C:\ProgramData\kboltu\isftkp.exe
      C:\ProgramData\kboltu\isftkp.exe
      1⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:1916

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\kboltu\isftkp.exe

      Filesize

      1010KB

      MD5

      edbf90615adcab2e37525f41cfcbdcf0

      SHA1

      8e5ad8f1ba8d2e0aad33e1a6b2b5ef90f628650c

      SHA256

      c0967a95f4a2ccfe64139ea5bbbb6c87688b64e26b0d61f068ccd0a4782a057e

      SHA512

      792e62f026ca3474f458ffdc15ed18ca5185989b735c69d18671dce8330fcc3744abad183e4ac5c5df4f77acb1c7bbf4f1bd2f4441b1b8e8671c17a95f83e12f

    • C:\Windows\Tasks\Test Task17.job

      Filesize

      238B

      MD5

      ddb1af2706cbfd076cae7078bc35f46c

      SHA1

      9e6c69df01e7c813d1215b31e859a604dabaf21e

      SHA256

      023f7867cf60ec96bad1dfb8b8e3ee15c1209e920c9658b58944cced1c717a48

      SHA512

      28e01029b4356e7d3573877c802fda9a37fb0340e965f774349980014588b03f84dc43bfaf4e2fcad27e58d6c62afa3e7fb941d9e3a73283973cd76edccc0d11

    • memory/1592-2405-0x0000000000400000-0x0000000000407000-memory.dmp

      Filesize

      28KB

    • memory/3220-0-0x000000007487E000-0x000000007487F000-memory.dmp

      Filesize

      4KB

    • memory/3220-1-0x00000000008E0000-0x00000000009DC000-memory.dmp

      Filesize

      1008KB

    • memory/3220-2-0x0000000005340000-0x0000000005426000-memory.dmp

      Filesize

      920KB

    • memory/3220-3-0x0000000074870000-0x0000000075020000-memory.dmp

      Filesize

      7.7MB

    • memory/3220-4-0x0000000005460000-0x0000000005546000-memory.dmp

      Filesize

      920KB

    • memory/3220-18-0x0000000005460000-0x0000000005541000-memory.dmp

      Filesize

      900KB

    • memory/3220-32-0x0000000005460000-0x0000000005541000-memory.dmp

      Filesize

      900KB

    • memory/3220-44-0x0000000005460000-0x0000000005541000-memory.dmp

      Filesize

      900KB

    • memory/3220-56-0x0000000005460000-0x0000000005541000-memory.dmp

      Filesize

      900KB

    • memory/3220-68-0x0000000005460000-0x0000000005541000-memory.dmp

      Filesize

      900KB

    • memory/3220-66-0x0000000005460000-0x0000000005541000-memory.dmp

      Filesize

      900KB

    • memory/3220-64-0x0000000005460000-0x0000000005541000-memory.dmp

      Filesize

      900KB

    • memory/3220-62-0x0000000005460000-0x0000000005541000-memory.dmp

      Filesize

      900KB

    • memory/3220-60-0x0000000005460000-0x0000000005541000-memory.dmp

      Filesize

      900KB

    • memory/3220-58-0x0000000005460000-0x0000000005541000-memory.dmp

      Filesize

      900KB

    • memory/3220-52-0x0000000005460000-0x0000000005541000-memory.dmp

      Filesize

      900KB

    • memory/3220-50-0x0000000005460000-0x0000000005541000-memory.dmp

      Filesize

      900KB

    • memory/3220-48-0x0000000005460000-0x0000000005541000-memory.dmp

      Filesize

      900KB

    • memory/3220-46-0x0000000005460000-0x0000000005541000-memory.dmp

      Filesize

      900KB

    • memory/3220-42-0x0000000005460000-0x0000000005541000-memory.dmp

      Filesize

      900KB

    • memory/3220-40-0x0000000005460000-0x0000000005541000-memory.dmp

      Filesize

      900KB

    • memory/3220-38-0x0000000005460000-0x0000000005541000-memory.dmp

      Filesize

      900KB

    • memory/3220-36-0x0000000005460000-0x0000000005541000-memory.dmp

      Filesize

      900KB

    • memory/3220-34-0x0000000005460000-0x0000000005541000-memory.dmp

      Filesize

      900KB

    • memory/3220-30-0x0000000005460000-0x0000000005541000-memory.dmp

      Filesize

      900KB

    • memory/3220-28-0x0000000005460000-0x0000000005541000-memory.dmp

      Filesize

      900KB

    • memory/3220-26-0x0000000005460000-0x0000000005541000-memory.dmp

      Filesize

      900KB

    • memory/3220-54-0x0000000005460000-0x0000000005541000-memory.dmp

      Filesize

      900KB

    • memory/3220-24-0x0000000005460000-0x0000000005541000-memory.dmp

      Filesize

      900KB

    • memory/3220-22-0x0000000005460000-0x0000000005541000-memory.dmp

      Filesize

      900KB

    • memory/3220-20-0x0000000005460000-0x0000000005541000-memory.dmp

      Filesize

      900KB

    • memory/3220-16-0x0000000005460000-0x0000000005541000-memory.dmp

      Filesize

      900KB

    • memory/3220-14-0x0000000005460000-0x0000000005541000-memory.dmp

      Filesize

      900KB

    • memory/3220-12-0x0000000005460000-0x0000000005541000-memory.dmp

      Filesize

      900KB

    • memory/3220-10-0x0000000005460000-0x0000000005541000-memory.dmp

      Filesize

      900KB

    • memory/3220-8-0x0000000005460000-0x0000000005541000-memory.dmp

      Filesize

      900KB

    • memory/3220-6-0x0000000005460000-0x0000000005541000-memory.dmp

      Filesize

      900KB

    • memory/3220-5-0x0000000005460000-0x0000000005541000-memory.dmp

      Filesize

      900KB

    • memory/3220-1181-0x0000000074870000-0x0000000075020000-memory.dmp

      Filesize

      7.7MB

    • memory/3220-1182-0x00000000055E0000-0x0000000005638000-memory.dmp

      Filesize

      352KB

    • memory/3220-1183-0x0000000005640000-0x000000000568C000-memory.dmp

      Filesize

      304KB

    • memory/3220-1184-0x000000007487E000-0x000000007487F000-memory.dmp

      Filesize

      4KB

    • memory/3220-1185-0x0000000074870000-0x0000000075020000-memory.dmp

      Filesize

      7.7MB

    • memory/3220-1186-0x0000000074870000-0x0000000075020000-memory.dmp

      Filesize

      7.7MB

    • memory/3220-1187-0x0000000006030000-0x00000000065D4000-memory.dmp

      Filesize

      5.6MB

    • memory/3220-1188-0x00000000058F0000-0x0000000005944000-memory.dmp

      Filesize

      336KB

    • memory/3220-1194-0x0000000074870000-0x0000000075020000-memory.dmp

      Filesize

      7.7MB

    • memory/3220-1200-0x0000000074870000-0x0000000075020000-memory.dmp

      Filesize

      7.7MB

    • memory/3220-1204-0x0000000074870000-0x0000000075020000-memory.dmp

      Filesize

      7.7MB

    • memory/3220-1203-0x0000000002F44000-0x0000000002F45000-memory.dmp

      Filesize

      4KB

    • memory/3220-1202-0x0000000002EEC000-0x0000000002EED000-memory.dmp

      Filesize

      4KB

    • memory/4088-1209-0x000000007475E000-0x000000007475F000-memory.dmp

      Filesize

      4KB

    • memory/4088-1210-0x0000000074750000-0x0000000074F00000-memory.dmp

      Filesize

      7.7MB

    • memory/4088-2387-0x0000000074750000-0x0000000074F00000-memory.dmp

      Filesize

      7.7MB

    • memory/4088-2388-0x000000007475E000-0x000000007475F000-memory.dmp

      Filesize

      4KB

    • memory/4088-2389-0x0000000074750000-0x0000000074F00000-memory.dmp

      Filesize

      7.7MB

    • memory/4088-2390-0x0000000074750000-0x0000000074F00000-memory.dmp

      Filesize

      7.7MB

    • memory/4088-2396-0x0000000074750000-0x0000000074F00000-memory.dmp

      Filesize

      7.7MB

    • memory/4088-2406-0x000000000335E000-0x000000000335F000-memory.dmp

      Filesize

      4KB

    • memory/4088-2404-0x0000000074750000-0x0000000074F00000-memory.dmp

      Filesize

      7.7MB

    • memory/4088-2407-0x0000000074750000-0x0000000074F00000-memory.dmp

      Filesize

      7.7MB

    • memory/4396-1201-0x0000000000400000-0x0000000000407000-memory.dmp

      Filesize

      28KB