Overview
overview
10Static
static
3quarantine...zX.exe
windows7-x64
10quarantine...zX.exe
windows10-2004-x64
10quarantine...LN.exe
windows7-x64
1quarantine...LN.exe
windows10-2004-x64
10quarantine...xj.exe
windows7-x64
10quarantine...xj.exe
windows10-2004-x64
10quarantine...uj.exe
windows7-x64
3quarantine...uj.exe
windows10-2004-x64
3quarantine...9F.exe
windows7-x64
8quarantine...9F.exe
windows10-2004-x64
8quarantine...LB.exe
windows7-x64
10quarantine...LB.exe
windows10-2004-x64
10quarantine...ty.exe
windows7-x64
10quarantine...ty.exe
windows10-2004-x64
10quarantine...Qw.exe
windows7-x64
3quarantine...Qw.exe
windows10-2004-x64
7quarantine...ff.exe
windows7-x64
10quarantine...ff.exe
windows10-2004-x64
10quarantine...nc.exe
windows7-x64
9quarantine...nc.exe
windows10-2004-x64
9quarantine...Ws.exe
windows7-x64
7quarantine...Ws.exe
windows10-2004-x64
7Analysis
-
max time kernel
145s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04/03/2025, 00:44
Static task
static1
Behavioral task
behavioral1
Sample
quarantine/7UlMpzX.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
quarantine/7UlMpzX.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
quarantine/BXxKvLN.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
quarantine/BXxKvLN.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
quarantine/JCFx2xj.exe
Resource
win7-20241023-en
Behavioral task
behavioral6
Sample
quarantine/JCFx2xj.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral7
Sample
quarantine/UBiTCuj.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
quarantine/UBiTCuj.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral9
Sample
quarantine/bPDDW9F.exe
Resource
win7-20250207-en
Behavioral task
behavioral10
Sample
quarantine/bPDDW9F.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral11
Sample
quarantine/d0HNrLB.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
quarantine/d0HNrLB.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral13
Sample
quarantine/infinity.exe
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
quarantine/infinity.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral15
Sample
quarantine/khykuQw.exe
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
quarantine/khykuQw.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral17
Sample
quarantine/soudneff.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
quarantine/soudneff.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral19
Sample
quarantine/v6Oqdnc.exe
Resource
win7-20241023-en
Behavioral task
behavioral20
Sample
quarantine/v6Oqdnc.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral21
Sample
quarantine/zY9sqWs.exe
Resource
win7-20240903-en
General
-
Target
quarantine/soudneff.exe
-
Size
1.7MB
-
MD5
efac52cc9304919d4f9e49c56bdbd484
-
SHA1
68e90fd0a473ba822bb4f708d718afcbbd660850
-
SHA256
e903bd6ec4817fca7a718b770d6d6a509c7e522cbebb41bd26e48bfe009d0510
-
SHA512
9185437c21c56772d3dd7172269b3569380b518e78c8cb9dcf947968476d4d79beb2aeb31da66d3736a2a0f3be88d3caf86d9ba79c59608aaca196c409466ada
-
SSDEEP
49152:dWiPyNzLHax6WxKPQx1GyGe4/xU7VNT1xMJ1NxjnW8EtV:dhGW4OOCbhGQ
Malware Config
Extracted
systembc
towerbingobongoboom.com
213.209.150.137
Signatures
-
Systembc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ soudneff.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dehms.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion soudneff.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion soudneff.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion dehms.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion dehms.exe -
Executes dropped EXE 1 IoCs
pid Process 2864 dehms.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine soudneff.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine dehms.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1484 soudneff.exe 2864 dehms.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\Test Task17.job soudneff.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language soudneff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dehms.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1484 soudneff.exe 2864 dehms.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2868 wrote to memory of 2864 2868 taskeng.exe 32 PID 2868 wrote to memory of 2864 2868 taskeng.exe 32 PID 2868 wrote to memory of 2864 2868 taskeng.exe 32 PID 2868 wrote to memory of 2864 2868 taskeng.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\quarantine\soudneff.exe"C:\Users\Admin\AppData\Local\Temp\quarantine\soudneff.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1484
-
C:\Windows\system32\taskeng.exetaskeng.exe {9606F752-8187-4FF6-AB77-030002174F2E} S-1-5-21-2872745919-2748461613-2989606286-1000:CCJBVTGQ\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\ProgramData\ejqa\dehms.exeC:\ProgramData\ejqa\dehms.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2864
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD5efac52cc9304919d4f9e49c56bdbd484
SHA168e90fd0a473ba822bb4f708d718afcbbd660850
SHA256e903bd6ec4817fca7a718b770d6d6a509c7e522cbebb41bd26e48bfe009d0510
SHA5129185437c21c56772d3dd7172269b3569380b518e78c8cb9dcf947968476d4d79beb2aeb31da66d3736a2a0f3be88d3caf86d9ba79c59608aaca196c409466ada
-
Filesize
214B
MD54887385ed6b14d359e6297c851044acc
SHA1c0d431751afb63e8fb4beb428bd454003afcc77a
SHA2565718e266f7a2450202a8967a179986d1288de84848755586f080cab002f38c0e
SHA5120e25625535d1d4b7aff5a7c12cb4a60dabdb57133b4aa28dc25fed499ffa2e30c3709d3974839d570fe516158cf21a467802f5788479e4c83eb3e95187bc9f62