Malware Analysis Report

2025-05-28 17:37

Sample ID 250519-v3ytka1rv3
Target ku3qqiqo13kgw1.exe
SHA256 0e56c159b8c4fe60ee4a9d9bac1118c9467965086d1de239e1b27ecbbe540182
Tags
systembc discovery
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V16

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

0e56c159b8c4fe60ee4a9d9bac1118c9467965086d1de239e1b27ecbbe540182

Threat Level: Known bad

The file ku3qqiqo13kgw1.exe was found to be: Known bad.

Malicious Activity Summary

systembc discovery

Systembc family

Drops file in Windows directory

Unsigned PE

System Location Discovery: System Language Discovery

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2025-05-19 17:31

Signatures

Systembc family

systembc

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2025-05-19 17:31

Reported

2025-05-19 17:34

Platform

win10ltsc2021-20250425-en

Max time kernel

141s

Max time network

142s

Command Line

"C:\Users\Admin\AppData\Local\Temp\ku3qqiqo13kgw1.exe"

Signatures

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\Tasks\wow64.job C:\Users\Admin\AppData\Local\Temp\ku3qqiqo13kgw1.exe N/A
File opened for modification C:\Windows\Tasks\wow64.job C:\Users\Admin\AppData\Local\Temp\ku3qqiqo13kgw1.exe N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\ku3qqiqo13kgw1.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\ku3qqiqo13kgw1.exe

"C:\Users\Admin\AppData\Local\Temp\ku3qqiqo13kgw1.exe"

C:\Users\Admin\AppData\Local\Temp\ku3qqiqo13kgw1.exe

"C:\Users\Admin\AppData\Local\Temp\ku3qqiqo13kgw1.exe" start

Network

Country Destination Domain Proto
FR 85.25.207.68:4208 tcp
US 8.8.8.8:53 moscow11.icu udp
FR 85.25.207.68:4208 tcp
US 8.8.8.8:53 moscow11.icu udp
FR 85.25.207.68:4208 tcp
US 8.8.8.8:53 moscow11.icu udp
FR 85.25.207.68:4208 tcp
US 8.8.8.8:53 moscow11.icu udp
FR 85.25.207.68:4208 tcp
US 8.8.8.8:53 c.pki.goog udp
GB 216.58.201.99:80 c.pki.goog tcp
US 8.8.8.8:53 moscow11.icu udp
FR 85.25.207.68:4208 tcp
US 8.8.8.8:53 moscow11.icu udp
FR 85.25.207.68:4208 tcp
US 8.8.8.8:53 moscow11.icu udp

Files

N/A

Analysis: behavioral2

Detonation Overview

Submitted

2025-05-19 17:31

Reported

2025-05-19 17:34

Platform

win11-20250502-en

Max time kernel

141s

Max time network

142s

Command Line

"C:\Users\Admin\AppData\Local\Temp\ku3qqiqo13kgw1.exe"

Signatures

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\Tasks\wow64.job C:\Users\Admin\AppData\Local\Temp\ku3qqiqo13kgw1.exe N/A
File opened for modification C:\Windows\Tasks\wow64.job C:\Users\Admin\AppData\Local\Temp\ku3qqiqo13kgw1.exe N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\ku3qqiqo13kgw1.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\ku3qqiqo13kgw1.exe

"C:\Users\Admin\AppData\Local\Temp\ku3qqiqo13kgw1.exe"

C:\Users\Admin\AppData\Local\Temp\ku3qqiqo13kgw1.exe

C:\Users\Admin\AppData\Local\Temp\ku3qqiqo13kgw1.exe start

Network

Country Destination Domain Proto
FR 85.25.207.68:4208 tcp
US 8.8.8.8:53 moscow11.icu udp
FR 85.25.207.68:4208 tcp
FR 85.25.207.68:4208 tcp
FR 85.25.207.68:4208 tcp
FR 85.25.207.68:4208 tcp
FR 85.25.207.68:4208 tcp
FR 85.25.207.68:4208 tcp

Files

N/A