Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250207-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250207-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-02-2025 16:56

General

  • Target

    kzTq7Bt.exe

  • Size

    1.7MB

  • MD5

    35be87c37074612e552d655637c59a0f

  • SHA1

    d97b62245300b82004df138404e1863f7923de5c

  • SHA256

    d98d8488c405182e03c95b78692ca0bab65ade4838042aae4b3f0de662495ed3

  • SHA512

    7c5862ce057d1b38c3ea836f78585efb4c6c914aea1ac5e2ac757525d33f092a3e4f76c7ae7433df3d4995d3bbe6fe99728653123dbcf5bcb1f8d20badab34fa

  • SSDEEP

    49152:82DaBnPGGeftb0jn+yMVR6n9rMZzpornZoV:8LBP9ef9xrR6n9Ezpoq

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    alpha-se.co.th
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Pvp1999

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.netzero.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    fatdog117

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.netzero.net
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    73357335

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.netzero.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    whatt1

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.ic24.net
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Siemens1

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.totalise.co.uk
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    school

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.madasafish.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    bluewater1

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.mcstokes.co.uk
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Holiday1

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    fai1.menara.ma
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    sysmarket

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.resolveaudiovisuals.com.au
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    535Ellison!

Extracted

Family

systembc

C2

wodresomdaymomentum.org

Attributes
  • dns

    5.132.191.104

Signatures

  • SystemBC

    SystemBC is a proxy and remote administration tool first seen in 2019.

  • Systembc family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • Downloads MZ/PE file 1 IoCs
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 1 IoCs
  • Identifies Wine through registry keys 2 TTPs 2 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\kzTq7Bt.exe
    "C:\Users\Admin\AppData\Local\Temp\kzTq7Bt.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    PID:4488
  • C:\ProgramData\mlphs\mtet.exe
    C:\ProgramData\mlphs\mtet.exe
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Executes dropped EXE
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    PID:3164
  • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
    "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSI4IiBpbnN0YWxsZGF0ZXRpbWU9IjE3Mzg5NDY0MzMiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4MzQxODc1OTU2NTAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1MzkwNTMxNDY4Ii8-PC9hcHA-PC9yZXF1ZXN0Pg
    1⤵
    • System Location Discovery: System Language Discovery
    • System Network Configuration Discovery: Internet Connection Discovery
    PID:1688

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\mlphs\mtet.exe

    Filesize

    1.7MB

    MD5

    35be87c37074612e552d655637c59a0f

    SHA1

    d97b62245300b82004df138404e1863f7923de5c

    SHA256

    d98d8488c405182e03c95b78692ca0bab65ade4838042aae4b3f0de662495ed3

    SHA512

    7c5862ce057d1b38c3ea836f78585efb4c6c914aea1ac5e2ac757525d33f092a3e4f76c7ae7433df3d4995d3bbe6fe99728653123dbcf5bcb1f8d20badab34fa

  • C:\Windows\Tasks\Test Task17.job

    Filesize

    232B

    MD5

    649f3f957797921ffd353c0840159dc2

    SHA1

    22978c7512d34f29150f783acec7a3d08a34a1ac

    SHA256

    986889936786a35b8d81b0f7fc7692583ede79c438712e50c5b92550ced797f2

    SHA512

    8e297577c9c007c3d4fb13ccd43b5a75502b8c4553a20280bd00f64b0d8d356426eb305348f898b99354c57daa9ee05187080f4a7fa36d686598a2ae0755a31a

  • memory/3164-29-0x0000000000400000-0x0000000000870000-memory.dmp

    Filesize

    4.4MB

  • memory/3164-14-0x0000000000400000-0x0000000000870000-memory.dmp

    Filesize

    4.4MB

  • memory/3164-19-0x0000000000400000-0x0000000000870000-memory.dmp

    Filesize

    4.4MB

  • memory/3164-35-0x0000000000400000-0x0000000000870000-memory.dmp

    Filesize

    4.4MB

  • memory/3164-34-0x0000000000400000-0x0000000000870000-memory.dmp

    Filesize

    4.4MB

  • memory/3164-33-0x0000000000400000-0x0000000000870000-memory.dmp

    Filesize

    4.4MB

  • memory/3164-32-0x0000000000400000-0x0000000000870000-memory.dmp

    Filesize

    4.4MB

  • memory/3164-31-0x0000000000400000-0x0000000000870000-memory.dmp

    Filesize

    4.4MB

  • memory/3164-13-0x0000000000400000-0x0000000000870000-memory.dmp

    Filesize

    4.4MB

  • memory/3164-25-0x0000000000400000-0x0000000000870000-memory.dmp

    Filesize

    4.4MB

  • memory/3164-30-0x0000000000400000-0x0000000000870000-memory.dmp

    Filesize

    4.4MB

  • memory/3164-16-0x0000000000400000-0x0000000000870000-memory.dmp

    Filesize

    4.4MB

  • memory/3164-17-0x0000000000400000-0x0000000000870000-memory.dmp

    Filesize

    4.4MB

  • memory/3164-18-0x0000000000400000-0x0000000000870000-memory.dmp

    Filesize

    4.4MB

  • memory/3164-36-0x0000000000400000-0x0000000000870000-memory.dmp

    Filesize

    4.4MB

  • memory/3164-27-0x0000000000400000-0x0000000000870000-memory.dmp

    Filesize

    4.4MB

  • memory/3164-22-0x0000000000400000-0x0000000000870000-memory.dmp

    Filesize

    4.4MB

  • memory/3164-21-0x0000000000400000-0x0000000000870000-memory.dmp

    Filesize

    4.4MB

  • memory/4488-6-0x0000000000400000-0x0000000000870000-memory.dmp

    Filesize

    4.4MB

  • memory/4488-24-0x0000000000400000-0x0000000000870000-memory.dmp

    Filesize

    4.4MB

  • memory/4488-26-0x0000000000400000-0x0000000000870000-memory.dmp

    Filesize

    4.4MB

  • memory/4488-4-0x0000000000400000-0x0000000000870000-memory.dmp

    Filesize

    4.4MB

  • memory/4488-0-0x0000000000400000-0x0000000000870000-memory.dmp

    Filesize

    4.4MB

  • memory/4488-1-0x0000000077244000-0x0000000077246000-memory.dmp

    Filesize

    8KB

  • memory/4488-2-0x0000000000401000-0x0000000000406000-memory.dmp

    Filesize

    20KB

  • memory/4488-10-0x0000000000400000-0x0000000000870000-memory.dmp

    Filesize

    4.4MB

  • memory/4488-9-0x0000000000400000-0x0000000000870000-memory.dmp

    Filesize

    4.4MB

  • memory/4488-8-0x0000000000400000-0x0000000000870000-memory.dmp

    Filesize

    4.4MB

  • memory/4488-7-0x0000000000400000-0x0000000000870000-memory.dmp

    Filesize

    4.4MB

  • memory/4488-20-0x0000000000400000-0x0000000000870000-memory.dmp

    Filesize

    4.4MB