Analysis

  • max time kernel
    135s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-01-2025 18:00

General

  • Target

    file.exe

  • Size

    1.2MB

  • MD5

    85ef87a0ec19c2b0040d09903af3bf95

  • SHA1

    c5c2cec3ccaf8e6893aac8e426d2c665110dc257

  • SHA256

    51182d0c1b3a9945b6d771bbeb03ac4f829fda788f7f80fe9a09a1a7f77c90c8

  • SHA512

    2342f2b3ad9c61284e4ca1ef815681a735422159872c10ccb21e44b9504cb746b64654a03235a9729e9cf9927f1bf4f86a6b0fcc4d5bf7e4cd999e696641159f

  • SSDEEP

    24576:An2puiGIDavIN67TWtK53yUFQFLUHwvoBBNnqRE9uPE3gt/iBi63U:7uUDawN6GksVMwvOqyucQtKBii

Malware Config

Extracted

Family

systembc

C2

wodresomdaymomentum.org

Attributes
  • dns

    5.132.191.104

Signatures

  • Suspicious use of NtCreateUserProcessOtherParentProcess 3 IoCs
  • SystemBC

    SystemBC is a proxy and remote administration tool first seen in 2019.

  • Systembc family
  • Downloads MZ/PE file
  • Executes dropped EXE 5 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Windows directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3376
      • C:\Users\Admin\AppData\Local\Temp\file.exe
        "C:\Users\Admin\AppData\Local\Temp\file.exe"
        2⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3196
      • C:\Users\Admin\AppData\Local\Temp\file.exe
        "C:\Users\Admin\AppData\Local\Temp\file.exe"
        2⤵
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        PID:3624
      • C:\ProgramData\acfucv\uoignv.exe
        "C:\ProgramData\acfucv\uoignv.exe"
        2⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        PID:2256
      • C:\ProgramData\acfucv\uoignv.exe
        "C:\ProgramData\acfucv\uoignv.exe"
        2⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:3120
    • C:\ProgramData\acfucv\uoignv.exe
      C:\ProgramData\acfucv\uoignv.exe
      1⤵
      • Suspicious use of NtCreateUserProcessOtherParentProcess
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4084
    • C:\ProgramData\acfucv\uoignv.exe
      C:\ProgramData\acfucv\uoignv.exe
      1⤵
      • Suspicious use of NtCreateUserProcessOtherParentProcess
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1648
    • C:\Users\Admin\AppData\Local\Temp\rumqku.exe
      C:\Users\Admin\AppData\Local\Temp\rumqku.exe
      1⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:348

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\acfucv\uoignv.exe

      Filesize

      1.2MB

      MD5

      85ef87a0ec19c2b0040d09903af3bf95

      SHA1

      c5c2cec3ccaf8e6893aac8e426d2c665110dc257

      SHA256

      51182d0c1b3a9945b6d771bbeb03ac4f829fda788f7f80fe9a09a1a7f77c90c8

      SHA512

      2342f2b3ad9c61284e4ca1ef815681a735422159872c10ccb21e44b9504cb746b64654a03235a9729e9cf9927f1bf4f86a6b0fcc4d5bf7e4cd999e696641159f

    • C:\Users\Admin\AppData\Local\Temp\rumqku.exe

      Filesize

      1.2MB

      MD5

      c306310f6b7674b64e7c48e46d480509

      SHA1

      0e75e48e8e63f081ee79aaf3bc70004d40f00b08

      SHA256

      c477f22f36f0c7e272e694e0e630996f6bfdbf5ba93296dabe63581ab8ca96f6

      SHA512

      73a7035def27aa1fc7748e5f25d98c569534e7bb8c5d65731fcf2ae26e6a2101e635f26548f7b759fcc0bc5b5f32a0f9f0888e51e03f7287ed67feef625ff711

    • C:\Windows\Tasks\Test Task17.job

      Filesize

      238B

      MD5

      bf0685ce99848036b82236ff334f3370

      SHA1

      82f42e7610505f7a31f11eae00d1bf78fd61fee5

      SHA256

      23b908d7caf5c7b56ef2569ac79b589906b5aa845a2ae30e7c829888a1ea22eb

      SHA512

      816f51281339f535c57dfd0c6fac4f2c15a542e5a933293363746136e7466db98c8ea72cf9e491774fe78bd9abd9be35d16c5081e311f0dde216dd4b740dd03e

    • memory/348-5363-0x0000000005C00000-0x0000000005C56000-memory.dmp

      Filesize

      344KB

    • memory/348-5362-0x0000000005AB0000-0x0000000005B08000-memory.dmp

      Filesize

      352KB

    • memory/348-4039-0x0000000005970000-0x0000000005A6E000-memory.dmp

      Filesize

      1016KB

    • memory/348-4038-0x0000000005870000-0x000000000596E000-memory.dmp

      Filesize

      1016KB

    • memory/348-4037-0x0000000000E10000-0x0000000000F48000-memory.dmp

      Filesize

      1.2MB

    • memory/2256-2694-0x0000000000400000-0x0000000000407000-memory.dmp

      Filesize

      28KB

    • memory/3196-8-0x00000000059D0000-0x0000000005AC9000-memory.dmp

      Filesize

      996KB

    • memory/3196-1331-0x0000000005E10000-0x0000000005E66000-memory.dmp

      Filesize

      344KB

    • memory/3196-28-0x00000000059D0000-0x0000000005AC9000-memory.dmp

      Filesize

      996KB

    • memory/3196-70-0x00000000059D0000-0x0000000005AC9000-memory.dmp

      Filesize

      996KB

    • memory/3196-68-0x00000000059D0000-0x0000000005AC9000-memory.dmp

      Filesize

      996KB

    • memory/3196-67-0x00000000059D0000-0x0000000005AC9000-memory.dmp

      Filesize

      996KB

    • memory/3196-64-0x00000000059D0000-0x0000000005AC9000-memory.dmp

      Filesize

      996KB

    • memory/3196-63-0x00000000059D0000-0x0000000005AC9000-memory.dmp

      Filesize

      996KB

    • memory/3196-58-0x00000000059D0000-0x0000000005AC9000-memory.dmp

      Filesize

      996KB

    • memory/3196-56-0x00000000059D0000-0x0000000005AC9000-memory.dmp

      Filesize

      996KB

    • memory/3196-54-0x00000000059D0000-0x0000000005AC9000-memory.dmp

      Filesize

      996KB

    • memory/3196-52-0x00000000059D0000-0x0000000005AC9000-memory.dmp

      Filesize

      996KB

    • memory/3196-50-0x00000000059D0000-0x0000000005AC9000-memory.dmp

      Filesize

      996KB

    • memory/3196-46-0x00000000059D0000-0x0000000005AC9000-memory.dmp

      Filesize

      996KB

    • memory/3196-44-0x00000000059D0000-0x0000000005AC9000-memory.dmp

      Filesize

      996KB

    • memory/3196-42-0x00000000059D0000-0x0000000005AC9000-memory.dmp

      Filesize

      996KB

    • memory/3196-40-0x00000000059D0000-0x0000000005AC9000-memory.dmp

      Filesize

      996KB

    • memory/3196-38-0x00000000059D0000-0x0000000005AC9000-memory.dmp

      Filesize

      996KB

    • memory/3196-36-0x00000000059D0000-0x0000000005AC9000-memory.dmp

      Filesize

      996KB

    • memory/3196-34-0x00000000059D0000-0x0000000005AC9000-memory.dmp

      Filesize

      996KB

    • memory/3196-26-0x00000000059D0000-0x0000000005AC9000-memory.dmp

      Filesize

      996KB

    • memory/3196-25-0x00000000059D0000-0x0000000005AC9000-memory.dmp

      Filesize

      996KB

    • memory/3196-22-0x00000000059D0000-0x0000000005AC9000-memory.dmp

      Filesize

      996KB

    • memory/3196-18-0x00000000059D0000-0x0000000005AC9000-memory.dmp

      Filesize

      996KB

    • memory/3196-16-0x00000000059D0000-0x0000000005AC9000-memory.dmp

      Filesize

      996KB

    • memory/3196-12-0x00000000059D0000-0x0000000005AC9000-memory.dmp

      Filesize

      996KB

    • memory/3196-10-0x00000000059D0000-0x0000000005AC9000-memory.dmp

      Filesize

      996KB

    • memory/3196-0-0x0000000074B3E000-0x0000000074B3F000-memory.dmp

      Filesize

      4KB

    • memory/3196-7-0x00000000059D0000-0x0000000005AC9000-memory.dmp

      Filesize

      996KB

    • memory/3196-30-0x00000000059D0000-0x0000000005AC9000-memory.dmp

      Filesize

      996KB

    • memory/3196-20-0x00000000059D0000-0x0000000005AC9000-memory.dmp

      Filesize

      996KB

    • memory/3196-1329-0x0000000074B30000-0x00000000752E0000-memory.dmp

      Filesize

      7.7MB

    • memory/3196-1330-0x0000000005CB0000-0x0000000005D08000-memory.dmp

      Filesize

      352KB

    • memory/3196-32-0x00000000059D0000-0x0000000005AC9000-memory.dmp

      Filesize

      996KB

    • memory/3196-1332-0x0000000005EA0000-0x0000000005EEC000-memory.dmp

      Filesize

      304KB

    • memory/3196-1333-0x0000000074B3E000-0x0000000074B3F000-memory.dmp

      Filesize

      4KB

    • memory/3196-1334-0x0000000074B30000-0x00000000752E0000-memory.dmp

      Filesize

      7.7MB

    • memory/3196-1335-0x0000000074B30000-0x00000000752E0000-memory.dmp

      Filesize

      7.7MB

    • memory/3196-1336-0x0000000005F50000-0x0000000005FA4000-memory.dmp

      Filesize

      336KB

    • memory/3196-1340-0x0000000074B30000-0x00000000752E0000-memory.dmp

      Filesize

      7.7MB

    • memory/3196-1342-0x0000000074B30000-0x00000000752E0000-memory.dmp

      Filesize

      7.7MB

    • memory/3196-1347-0x0000000074B30000-0x00000000752E0000-memory.dmp

      Filesize

      7.7MB

    • memory/3196-1350-0x0000000074B30000-0x00000000752E0000-memory.dmp

      Filesize

      7.7MB

    • memory/3196-1-0x0000000000DC0000-0x0000000000EF8000-memory.dmp

      Filesize

      1.2MB

    • memory/3196-1348-0x0000000074B30000-0x00000000752E0000-memory.dmp

      Filesize

      7.7MB

    • memory/3196-48-0x00000000059D0000-0x0000000005AC9000-memory.dmp

      Filesize

      996KB

    • memory/3196-2-0x0000000074B30000-0x00000000752E0000-memory.dmp

      Filesize

      7.7MB

    • memory/3196-3-0x00000000058D0000-0x00000000059CE000-memory.dmp

      Filesize

      1016KB

    • memory/3196-4-0x00000000059D0000-0x0000000005ACE000-memory.dmp

      Filesize

      1016KB

    • memory/3196-5-0x0000000006080000-0x0000000006624000-memory.dmp

      Filesize

      5.6MB

    • memory/3196-6-0x0000000005BB0000-0x0000000005C42000-memory.dmp

      Filesize

      584KB

    • memory/3196-14-0x00000000059D0000-0x0000000005AC9000-memory.dmp

      Filesize

      996KB

    • memory/3196-60-0x00000000059D0000-0x0000000005AC9000-memory.dmp

      Filesize

      996KB

    • memory/3624-1349-0x0000000000400000-0x0000000000407000-memory.dmp

      Filesize

      28KB

    • memory/4084-2686-0x0000000074B30000-0x00000000752E0000-memory.dmp

      Filesize

      7.7MB

    • memory/4084-2696-0x000000000281E000-0x000000000281F000-memory.dmp

      Filesize

      4KB

    • memory/4084-2682-0x0000000074B30000-0x00000000752E0000-memory.dmp

      Filesize

      7.7MB

    • memory/4084-2695-0x00000000027D6000-0x00000000027D7000-memory.dmp

      Filesize

      4KB

    • memory/4084-2693-0x0000000074B30000-0x00000000752E0000-memory.dmp

      Filesize

      7.7MB

    • memory/4084-2698-0x0000000074B30000-0x00000000752E0000-memory.dmp

      Filesize

      7.7MB

    • memory/4084-2681-0x0000000074B30000-0x00000000752E0000-memory.dmp

      Filesize

      7.7MB

    • memory/4084-2680-0x0000000074B3E000-0x0000000074B3F000-memory.dmp

      Filesize

      4KB

    • memory/4084-2679-0x0000000074B30000-0x00000000752E0000-memory.dmp

      Filesize

      7.7MB

    • memory/4084-1355-0x0000000074B3E000-0x0000000074B3F000-memory.dmp

      Filesize

      4KB

    • memory/4084-1356-0x0000000074B30000-0x00000000752E0000-memory.dmp

      Filesize

      7.7MB