Analysis

  • max time kernel
    142s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    25/02/2025, 22:21

General

  • Target

    quarantine/netdriver.exe

  • Size

    1.7MB

  • MD5

    77c6d4944106ec80bb717043741b57da

  • SHA1

    aa1550acb66847744e99ee1181d8a7c9035f1339

  • SHA256

    686990b05fbd39d1d4e0d4af60242a5b69c1dbfb218214a20bb4c67bde5c6f80

  • SHA512

    b2d7b47a95dafb732d65b7af2131ceb0b60c950c29697f4c07ff21381599558990fa03a9b8fc7dfe1d96787f6adce90b4b916c71cf2f4f32c4b070aae7fcd16a

  • SSDEEP

    49152:2SbpgcpHeCiXhWpshQEQCw+GEeL7p22p3b6I8:2Sbi0e1NyES+GEeg2p3b18

Malware Config

Extracted

Family

systembc

C2

towerbingobongoboom.com

93.186.202.3

Signatures

  • SystemBC

    SystemBC is a proxy and remote administration tool first seen in 2019.

  • Systembc family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 1 IoCs
  • Identifies Wine through registry keys 2 TTPs 2 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\quarantine\netdriver.exe
    "C:\Users\Admin\AppData\Local\Temp\quarantine\netdriver.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    PID:2244
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {786B5192-4D60-4AF8-9257-2A1E8B4E4A68} S-1-5-21-1488793075-819845221-1497111674-1000:UPNECVIU\Admin:Interactive:[1]
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2624
    • C:\ProgramData\bvts\vsqo.exe
      C:\ProgramData\bvts\vsqo.exe
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2572

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\bvts\vsqo.exe

    Filesize

    1.7MB

    MD5

    77c6d4944106ec80bb717043741b57da

    SHA1

    aa1550acb66847744e99ee1181d8a7c9035f1339

    SHA256

    686990b05fbd39d1d4e0d4af60242a5b69c1dbfb218214a20bb4c67bde5c6f80

    SHA512

    b2d7b47a95dafb732d65b7af2131ceb0b60c950c29697f4c07ff21381599558990fa03a9b8fc7dfe1d96787f6adce90b4b916c71cf2f4f32c4b070aae7fcd16a

  • C:\Windows\Tasks\Test Task17.job

    Filesize

    212B

    MD5

    d7378aeab567869510665c70d9f74917

    SHA1

    42642dd5f115e6885b0a9a1fe38bbf6814dad254

    SHA256

    3d613854f3db162dea3df4007b240f5b69874222d62ba38f96e98736a44f4adb

    SHA512

    adba346eb9f275300cc33d0a76a04314da25cb1bef726786b74f94a0c74c7ebf05e8f922d93192486811a1d8e67db88d703093d01d48ecec4e4ac503561e6f12

  • memory/2244-27-0x0000000000400000-0x0000000000846000-memory.dmp

    Filesize

    4.3MB

  • memory/2244-18-0x0000000000400000-0x0000000000846000-memory.dmp

    Filesize

    4.3MB

  • memory/2244-6-0x0000000000400000-0x0000000000846000-memory.dmp

    Filesize

    4.3MB

  • memory/2244-7-0x0000000000400000-0x0000000000846000-memory.dmp

    Filesize

    4.3MB

  • memory/2244-8-0x0000000000400000-0x0000000000846000-memory.dmp

    Filesize

    4.3MB

  • memory/2244-9-0x0000000000400000-0x0000000000846000-memory.dmp

    Filesize

    4.3MB

  • memory/2244-2-0x0000000000401000-0x0000000000403000-memory.dmp

    Filesize

    8KB

  • memory/2244-0-0x0000000000400000-0x0000000000846000-memory.dmp

    Filesize

    4.3MB

  • memory/2244-25-0x0000000000400000-0x0000000000846000-memory.dmp

    Filesize

    4.3MB

  • memory/2244-1-0x00000000777D0000-0x00000000777D2000-memory.dmp

    Filesize

    8KB

  • memory/2244-21-0x0000000000400000-0x0000000000846000-memory.dmp

    Filesize

    4.3MB

  • memory/2244-23-0x0000000000400000-0x0000000000846000-memory.dmp

    Filesize

    4.3MB

  • memory/2244-4-0x0000000000400000-0x0000000000846000-memory.dmp

    Filesize

    4.3MB

  • memory/2572-22-0x0000000000400000-0x0000000000846000-memory.dmp

    Filesize

    4.3MB

  • memory/2572-12-0x0000000000400000-0x0000000000846000-memory.dmp

    Filesize

    4.3MB

  • memory/2572-20-0x0000000000400000-0x0000000000846000-memory.dmp

    Filesize

    4.3MB

  • memory/2572-17-0x0000000000400000-0x0000000000846000-memory.dmp

    Filesize

    4.3MB

  • memory/2572-16-0x0000000000400000-0x0000000000846000-memory.dmp

    Filesize

    4.3MB

  • memory/2572-15-0x0000000000400000-0x0000000000846000-memory.dmp

    Filesize

    4.3MB

  • memory/2572-24-0x0000000000400000-0x0000000000846000-memory.dmp

    Filesize

    4.3MB

  • memory/2572-13-0x0000000000400000-0x0000000000846000-memory.dmp

    Filesize

    4.3MB

  • memory/2572-26-0x0000000000400000-0x0000000000846000-memory.dmp

    Filesize

    4.3MB

  • memory/2572-19-0x0000000000400000-0x0000000000846000-memory.dmp

    Filesize

    4.3MB

  • memory/2572-29-0x0000000000400000-0x0000000000846000-memory.dmp

    Filesize

    4.3MB

  • memory/2572-31-0x0000000000400000-0x0000000000846000-memory.dmp

    Filesize

    4.3MB

  • memory/2572-32-0x0000000000400000-0x0000000000846000-memory.dmp

    Filesize

    4.3MB

  • memory/2572-33-0x0000000000400000-0x0000000000846000-memory.dmp

    Filesize

    4.3MB

  • memory/2572-34-0x0000000000400000-0x0000000000846000-memory.dmp

    Filesize

    4.3MB

  • memory/2572-35-0x0000000000400000-0x0000000000846000-memory.dmp

    Filesize

    4.3MB

  • memory/2572-36-0x0000000000400000-0x0000000000846000-memory.dmp

    Filesize

    4.3MB

  • memory/2572-37-0x0000000000400000-0x0000000000846000-memory.dmp

    Filesize

    4.3MB

  • memory/2572-38-0x0000000000400000-0x0000000000846000-memory.dmp

    Filesize

    4.3MB

  • memory/2572-39-0x0000000000400000-0x0000000000846000-memory.dmp

    Filesize

    4.3MB