Analysis

  • max time kernel
    148s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    05/03/2025, 13:23

General

  • Target

    SecuriteInfo.com.Trojan.MulDrop29.15967.25640.16156.exe

  • Size

    1.6MB

  • MD5

    8c767708c9a9554c0afb504629e75ffd

  • SHA1

    c65394806c0f77af880c7ff8a021bd4222ca3f11

  • SHA256

    dcb373f73cc5e29881b6c97f753da1db91becee01b5eade03b0fd217d10b4e7d

  • SHA512

    f9531159b45f92db319f351ebf4dadf9ba3c413e87da401a0af81d25a446084ed30dee670462292b989e1c9b0074a3c2ae76bb8a1d992e4407f72360303b4e16

  • SSDEEP

    49152:R1aqCQ3KKia9icS8P80nPIIXQocVHmir6QmEGmNyRzs3Xn:R1aA37ia9iJ800QIXQocVHoEGV0

Malware Config

Extracted

Family

systembc

C2

towerbingobongoboom.com

62.60.226.86

Signatures

  • SystemBC

    SystemBC is a proxy and remote administration tool first seen in 2019.

  • Systembc family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 1 IoCs
  • Identifies Wine through registry keys 2 TTPs 2 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.MulDrop29.15967.25640.16156.exe
    "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.MulDrop29.15967.25640.16156.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    PID:3020
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {67060C41-8D9D-42E1-8A5E-11F7351700E4} S-1-5-21-1488793075-819845221-1497111674-1000:UPNECVIU\Admin:Interactive:[1]
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2732
    • C:\ProgramData\nenpjl\afmu.exe
      C:\ProgramData\nenpjl\afmu.exe
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2808

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\nenpjl\afmu.exe

    Filesize

    1.6MB

    MD5

    8c767708c9a9554c0afb504629e75ffd

    SHA1

    c65394806c0f77af880c7ff8a021bd4222ca3f11

    SHA256

    dcb373f73cc5e29881b6c97f753da1db91becee01b5eade03b0fd217d10b4e7d

    SHA512

    f9531159b45f92db319f351ebf4dadf9ba3c413e87da401a0af81d25a446084ed30dee670462292b989e1c9b0074a3c2ae76bb8a1d992e4407f72360303b4e16

  • C:\Windows\Tasks\Test Task17.job

    Filesize

    216B

    MD5

    83e0683daf1c1325854d01136815b118

    SHA1

    0a5d3db62b1f12d8c9e29e8d3f77d50dd03e2fd3

    SHA256

    7a7a7f8587dfafddc99ac19cf2865ba7a64c63aac2aaeae528db769aa55e191a

    SHA512

    ff296d2039735803d29fa6a09473adc5e4b24d6936f36d5141312fb71e8f0ef1dc78aeb0cfc9c370e21d022be5fb4525a7447d27dba1f449d9a217097da1bafb

  • memory/2808-28-0x0000000000400000-0x0000000000823000-memory.dmp

    Filesize

    4.1MB

  • memory/2808-32-0x0000000000400000-0x0000000000823000-memory.dmp

    Filesize

    4.1MB

  • memory/2808-36-0x0000000000400000-0x0000000000823000-memory.dmp

    Filesize

    4.1MB

  • memory/2808-35-0x0000000000400000-0x0000000000823000-memory.dmp

    Filesize

    4.1MB

  • memory/2808-9-0x0000000000400000-0x0000000000823000-memory.dmp

    Filesize

    4.1MB

  • memory/2808-34-0x0000000000400000-0x0000000000823000-memory.dmp

    Filesize

    4.1MB

  • memory/2808-11-0x0000000000400000-0x0000000000823000-memory.dmp

    Filesize

    4.1MB

  • memory/2808-33-0x0000000000400000-0x0000000000823000-memory.dmp

    Filesize

    4.1MB

  • memory/2808-13-0x0000000000400000-0x0000000000823000-memory.dmp

    Filesize

    4.1MB

  • memory/2808-24-0x0000000000400000-0x0000000000823000-memory.dmp

    Filesize

    4.1MB

  • memory/2808-15-0x0000000000400000-0x0000000000823000-memory.dmp

    Filesize

    4.1MB

  • memory/2808-16-0x0000000000400000-0x0000000000823000-memory.dmp

    Filesize

    4.1MB

  • memory/2808-31-0x0000000000400000-0x0000000000823000-memory.dmp

    Filesize

    4.1MB

  • memory/2808-18-0x0000000000400000-0x0000000000823000-memory.dmp

    Filesize

    4.1MB

  • memory/2808-30-0x0000000000400000-0x0000000000823000-memory.dmp

    Filesize

    4.1MB

  • memory/2808-29-0x0000000000400000-0x0000000000823000-memory.dmp

    Filesize

    4.1MB

  • memory/2808-27-0x0000000000400000-0x0000000000823000-memory.dmp

    Filesize

    4.1MB

  • memory/2808-22-0x0000000000400000-0x0000000000823000-memory.dmp

    Filesize

    4.1MB

  • memory/2808-20-0x0000000000400000-0x0000000000823000-memory.dmp

    Filesize

    4.1MB

  • memory/3020-21-0x0000000000400000-0x0000000000823000-memory.dmp

    Filesize

    4.1MB

  • memory/3020-25-0x0000000000400000-0x0000000000823000-memory.dmp

    Filesize

    4.1MB

  • memory/3020-23-0x0000000000400000-0x0000000000823000-memory.dmp

    Filesize

    4.1MB

  • memory/3020-0-0x0000000000400000-0x0000000000823000-memory.dmp

    Filesize

    4.1MB

  • memory/3020-19-0x0000000000400000-0x0000000000823000-memory.dmp

    Filesize

    4.1MB

  • memory/3020-4-0x0000000000400000-0x0000000000823000-memory.dmp

    Filesize

    4.1MB

  • memory/3020-17-0x0000000000400000-0x0000000000823000-memory.dmp

    Filesize

    4.1MB

  • memory/3020-14-0x0000000000400000-0x0000000000823000-memory.dmp

    Filesize

    4.1MB

  • memory/3020-1-0x0000000077700000-0x0000000077702000-memory.dmp

    Filesize

    8KB

  • memory/3020-10-0x0000000000400000-0x0000000000823000-memory.dmp

    Filesize

    4.1MB

  • memory/3020-2-0x0000000000401000-0x0000000000403000-memory.dmp

    Filesize

    8KB

  • memory/3020-6-0x0000000000400000-0x0000000000823000-memory.dmp

    Filesize

    4.1MB