Analysis

  • max time kernel
    149s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/03/2025, 00:51

General

  • Target

    d521f17349128cc6339aecb7a5e41f91ab02d338e5c722cd809d96c3a1c64454.exe

  • Size

    1.6MB

  • MD5

    1dc908064451d5d79018241cea28bc2f

  • SHA1

    f0d9a7d23603e9dd3974ab15400f5ad3938d657a

  • SHA256

    d521f17349128cc6339aecb7a5e41f91ab02d338e5c722cd809d96c3a1c64454

  • SHA512

    6f072459376181f7ddb211cf615731289706e7d90b7c81e306c6cd5c79311544d0b4be946791ae4fad3c2c034901bc0a2fd5b2a710844e3fe928a92d1cc0814f

  • SSDEEP

    49152:Uq8Z+aOhmX72hf7OqockKkGYR7SGmUNmzKZg:sAaEhhyJcjkdNmeZg

Malware Config

Extracted

Family

systembc

C2

towerbingobongoboom.com

62.60.226.86

Signatures

  • SystemBC

    SystemBC is a proxy and remote administration tool first seen in 2019.

  • Systembc family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 1 IoCs
  • Identifies Wine through registry keys 2 TTPs 2 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d521f17349128cc6339aecb7a5e41f91ab02d338e5c722cd809d96c3a1c64454.exe
    "C:\Users\Admin\AppData\Local\Temp\d521f17349128cc6339aecb7a5e41f91ab02d338e5c722cd809d96c3a1c64454.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    PID:2944
  • C:\ProgramData\hxrnhkv\xogrd.exe
    C:\ProgramData\hxrnhkv\xogrd.exe
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Executes dropped EXE
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    PID:2648

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\hxrnhkv\xogrd.exe

    Filesize

    1.6MB

    MD5

    1dc908064451d5d79018241cea28bc2f

    SHA1

    f0d9a7d23603e9dd3974ab15400f5ad3938d657a

    SHA256

    d521f17349128cc6339aecb7a5e41f91ab02d338e5c722cd809d96c3a1c64454

    SHA512

    6f072459376181f7ddb211cf615731289706e7d90b7c81e306c6cd5c79311544d0b4be946791ae4fad3c2c034901bc0a2fd5b2a710844e3fe928a92d1cc0814f

  • C:\Windows\Tasks\Test Task17.job

    Filesize

    238B

    MD5

    b1f4fa9535c2775dddebf3da01dd02cb

    SHA1

    9a709c06ec9b4657fa00cbfd04a5ccecb45ce683

    SHA256

    bcd2759ef7b7a76e617c0ba2cf583041cf6c895666a66ed29d1912372b4bf30e

    SHA512

    df9fa75d43846f02e6cdb5d385d3562d0a58c8f17ec5f5c4b94f1b4938ee0ff1344df450f7fe07ad2da3cab3ec82d061d1f1f842bf50e56bec709f636d56e769

  • memory/2648-19-0x0000000000400000-0x0000000000840000-memory.dmp

    Filesize

    4.2MB

  • memory/2648-30-0x0000000000400000-0x0000000000840000-memory.dmp

    Filesize

    4.2MB

  • memory/2648-35-0x0000000000400000-0x0000000000840000-memory.dmp

    Filesize

    4.2MB

  • memory/2648-34-0x0000000000400000-0x0000000000840000-memory.dmp

    Filesize

    4.2MB

  • memory/2648-33-0x0000000000400000-0x0000000000840000-memory.dmp

    Filesize

    4.2MB

  • memory/2648-32-0x0000000000400000-0x0000000000840000-memory.dmp

    Filesize

    4.2MB

  • memory/2648-11-0x0000000000400000-0x0000000000840000-memory.dmp

    Filesize

    4.2MB

  • memory/2648-12-0x0000000000400000-0x0000000000840000-memory.dmp

    Filesize

    4.2MB

  • memory/2648-31-0x0000000000400000-0x0000000000840000-memory.dmp

    Filesize

    4.2MB

  • memory/2648-23-0x0000000000400000-0x0000000000840000-memory.dmp

    Filesize

    4.2MB

  • memory/2648-15-0x0000000000400000-0x0000000000840000-memory.dmp

    Filesize

    4.2MB

  • memory/2648-16-0x0000000000400000-0x0000000000840000-memory.dmp

    Filesize

    4.2MB

  • memory/2648-17-0x0000000000400000-0x0000000000840000-memory.dmp

    Filesize

    4.2MB

  • memory/2648-29-0x0000000000400000-0x0000000000840000-memory.dmp

    Filesize

    4.2MB

  • memory/2648-21-0x0000000000400000-0x0000000000840000-memory.dmp

    Filesize

    4.2MB

  • memory/2648-27-0x0000000000400000-0x0000000000840000-memory.dmp

    Filesize

    4.2MB

  • memory/2648-28-0x0000000000400000-0x0000000000840000-memory.dmp

    Filesize

    4.2MB

  • memory/2944-1-0x0000000077BA4000-0x0000000077BA6000-memory.dmp

    Filesize

    8KB

  • memory/2944-22-0x0000000000400000-0x0000000000840000-memory.dmp

    Filesize

    4.2MB

  • memory/2944-24-0x0000000000400000-0x0000000000840000-memory.dmp

    Filesize

    4.2MB

  • memory/2944-20-0x0000000000400000-0x0000000000840000-memory.dmp

    Filesize

    4.2MB

  • memory/2944-26-0x0000000000400000-0x0000000000840000-memory.dmp

    Filesize

    4.2MB

  • memory/2944-4-0x0000000000400000-0x0000000000840000-memory.dmp

    Filesize

    4.2MB

  • memory/2944-18-0x0000000000400000-0x0000000000840000-memory.dmp

    Filesize

    4.2MB

  • memory/2944-14-0x0000000000400000-0x0000000000840000-memory.dmp

    Filesize

    4.2MB

  • memory/2944-0-0x0000000000400000-0x0000000000840000-memory.dmp

    Filesize

    4.2MB

  • memory/2944-2-0x0000000000401000-0x0000000000403000-memory.dmp

    Filesize

    8KB

  • memory/2944-8-0x0000000000400000-0x0000000000840000-memory.dmp

    Filesize

    4.2MB

  • memory/2944-7-0x0000000000400000-0x0000000000840000-memory.dmp

    Filesize

    4.2MB

  • memory/2944-6-0x0000000000400000-0x0000000000840000-memory.dmp

    Filesize

    4.2MB