Overview
overview
10Static
static
101edc123e5a...1c.exe
windows7-x64
101edc123e5a...1c.exe
windows10-2004-x64
10215a9d6110...dd.exe
windows7-x64
7215a9d6110...dd.exe
windows10-2004-x64
7351e31a389...15.exe
windows7-x64
10351e31a389...15.exe
windows10-2004-x64
107c711ab33a...07.exe
windows7-x64
87c711ab33a...07.exe
windows10-2004-x64
10a6b647b495...2a.exe
windows7-x64
3a6b647b495...2a.exe
windows10-2004-x64
3d521f17349...54.exe
windows7-x64
10d521f17349...54.exe
windows10-2004-x64
10df468fc510...a2.exe
windows7-x64
10df468fc510...a2.exe
windows10-2004-x64
10Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20250207-en -
resource tags
arch:x64arch:x86image:win7-20250207-enlocale:en-usos:windows7-x64system -
submitted
06/03/2025, 00:51
Behavioral task
behavioral1
Sample
1edc123e5a8ea5ce814e2759ee38453404d4af72a3577b0af55e8d99fa38ef1c.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1edc123e5a8ea5ce814e2759ee38453404d4af72a3577b0af55e8d99fa38ef1c.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
215a9d61105d1ada2b22fbf70e58745cabfff72b93d95aae1ce20bbc6defa6dd.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
215a9d61105d1ada2b22fbf70e58745cabfff72b93d95aae1ce20bbc6defa6dd.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
351e31a389d6b59faf9842f34bbc27bab411ad796e187b98fb5c59361346a815.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
351e31a389d6b59faf9842f34bbc27bab411ad796e187b98fb5c59361346a815.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral7
Sample
7c711ab33a034ed733b18b76a0154c56065c74a9481cbd0e4f65aa2b03c8a207.exe
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
7c711ab33a034ed733b18b76a0154c56065c74a9481cbd0e4f65aa2b03c8a207.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral9
Sample
a6b647b49538fe599002c116ee5cd79c7e2d472cb48b24b1dfcf9a2718088c2a.exe
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
a6b647b49538fe599002c116ee5cd79c7e2d472cb48b24b1dfcf9a2718088c2a.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral11
Sample
d521f17349128cc6339aecb7a5e41f91ab02d338e5c722cd809d96c3a1c64454.exe
Resource
win7-20250207-en
Behavioral task
behavioral12
Sample
d521f17349128cc6339aecb7a5e41f91ab02d338e5c722cd809d96c3a1c64454.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral13
Sample
df468fc510aec82c827987f54b824b978dd71301f93d18d71e704727d6dfdfa2.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
df468fc510aec82c827987f54b824b978dd71301f93d18d71e704727d6dfdfa2.exe
Resource
win10v2004-20250217-en
General
-
Target
d521f17349128cc6339aecb7a5e41f91ab02d338e5c722cd809d96c3a1c64454.exe
-
Size
1.6MB
-
MD5
1dc908064451d5d79018241cea28bc2f
-
SHA1
f0d9a7d23603e9dd3974ab15400f5ad3938d657a
-
SHA256
d521f17349128cc6339aecb7a5e41f91ab02d338e5c722cd809d96c3a1c64454
-
SHA512
6f072459376181f7ddb211cf615731289706e7d90b7c81e306c6cd5c79311544d0b4be946791ae4fad3c2c034901bc0a2fd5b2a710844e3fe928a92d1cc0814f
-
SSDEEP
49152:Uq8Z+aOhmX72hf7OqockKkGYR7SGmUNmzKZg:sAaEhhyJcjkdNmeZg
Malware Config
Extracted
systembc
towerbingobongoboom.com
62.60.226.86
Signatures
-
Systembc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ueob.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d521f17349128cc6339aecb7a5e41f91ab02d338e5c722cd809d96c3a1c64454.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d521f17349128cc6339aecb7a5e41f91ab02d338e5c722cd809d96c3a1c64454.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d521f17349128cc6339aecb7a5e41f91ab02d338e5c722cd809d96c3a1c64454.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ueob.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ueob.exe -
Executes dropped EXE 1 IoCs
pid Process 2660 ueob.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Wine ueob.exe Key opened \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Wine d521f17349128cc6339aecb7a5e41f91ab02d338e5c722cd809d96c3a1c64454.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2740 d521f17349128cc6339aecb7a5e41f91ab02d338e5c722cd809d96c3a1c64454.exe 2660 ueob.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\Test Task17.job d521f17349128cc6339aecb7a5e41f91ab02d338e5c722cd809d96c3a1c64454.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d521f17349128cc6339aecb7a5e41f91ab02d338e5c722cd809d96c3a1c64454.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ueob.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2740 d521f17349128cc6339aecb7a5e41f91ab02d338e5c722cd809d96c3a1c64454.exe 2660 ueob.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1648 wrote to memory of 2660 1648 taskeng.exe 31 PID 1648 wrote to memory of 2660 1648 taskeng.exe 31 PID 1648 wrote to memory of 2660 1648 taskeng.exe 31 PID 1648 wrote to memory of 2660 1648 taskeng.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\d521f17349128cc6339aecb7a5e41f91ab02d338e5c722cd809d96c3a1c64454.exe"C:\Users\Admin\AppData\Local\Temp\d521f17349128cc6339aecb7a5e41f91ab02d338e5c722cd809d96c3a1c64454.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2740
-
C:\Windows\system32\taskeng.exetaskeng.exe {2BD1E1E6-16F1-43D5-97DE-71485ABFE05B} S-1-5-21-677481364-2238709445-1347953534-1000:JXXXDSWS\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\ProgramData\fvoj\ueob.exeC:\ProgramData\fvoj\ueob.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2660
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD51dc908064451d5d79018241cea28bc2f
SHA1f0d9a7d23603e9dd3974ab15400f5ad3938d657a
SHA256d521f17349128cc6339aecb7a5e41f91ab02d338e5c722cd809d96c3a1c64454
SHA5126f072459376181f7ddb211cf615731289706e7d90b7c81e306c6cd5c79311544d0b4be946791ae4fad3c2c034901bc0a2fd5b2a710844e3fe928a92d1cc0814f
-
Filesize
212B
MD5dc2bab69606410150c00fa0931960a4e
SHA19a7ae1eda06d87a712fdabde4a7e92bf38e20bae
SHA256025457678db09f1c55c3c9a94ad43891fca4b75dd97e03316c4822824e5ee6fc
SHA51272516cb393d855ed8e77ba23f46a0a5267ce2a545de9f7c2f52c1d80f30e8ca690fdd0c90deabc46334c2c09a579658d7fe74d15b70b1ab6ea43837b05806bed