Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/03/2025, 00:51

General

  • Target

    1edc123e5a8ea5ce814e2759ee38453404d4af72a3577b0af55e8d99fa38ef1c.exe

  • Size

    457KB

  • MD5

    73636685f823d103c54b30bc457c7f0d

  • SHA1

    597dba03dce00cf6d30b082c80c8f9108ae90ccf

  • SHA256

    1edc123e5a8ea5ce814e2759ee38453404d4af72a3577b0af55e8d99fa38ef1c

  • SHA512

    183d4901a72afc044ef13c3a2cc21f93aefd954665f981c7886afc9019ca7d46f76b3459789dff5721542f2f9e7bbf606d7df68328e772e4c66dc789964f43f7

  • SSDEEP

    6144:P2ib1rFTRH6sf1kroyfIWjpTX335ilMSp01Hj6fGMWPsEY15sFBc9TT6N7AOs+OK:+ib1rFTRH6serb/p93j6fGMWP1N72h

Malware Config

Extracted

Family

systembc

C2

towerbingobongoboom.com

62.60.226.86

�ai^����c��9�q|&)��Õv.

Signatures

  • SystemBC

    SystemBC is a proxy and remote administration tool first seen in 2019.

  • Systembc family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • Downloads MZ/PE file 1 IoCs
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Identifies Wine through registry keys 2 TTPs 2 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1edc123e5a8ea5ce814e2759ee38453404d4af72a3577b0af55e8d99fa38ef1c.exe
    "C:\Users\Admin\AppData\Local\Temp\1edc123e5a8ea5ce814e2759ee38453404d4af72a3577b0af55e8d99fa38ef1c.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:1240
    • C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe
      "C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe"
      2⤵
      • Downloads MZ/PE file
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:464
      • C:\Users\Admin\AppData\Roaming\10000770100\vertualiziren.exe
        "C:\Users\Admin\AppData\Roaming\10000770100\vertualiziren.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:2840
  • C:\ProgramData\tjdkln\ermh.exe
    C:\ProgramData\tjdkln\ermh.exe
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Executes dropped EXE
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    PID:3028

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe

    Filesize

    457KB

    MD5

    73636685f823d103c54b30bc457c7f0d

    SHA1

    597dba03dce00cf6d30b082c80c8f9108ae90ccf

    SHA256

    1edc123e5a8ea5ce814e2759ee38453404d4af72a3577b0af55e8d99fa38ef1c

    SHA512

    183d4901a72afc044ef13c3a2cc21f93aefd954665f981c7886afc9019ca7d46f76b3459789dff5721542f2f9e7bbf606d7df68328e772e4c66dc789964f43f7

  • C:\Users\Admin\AppData\Roaming\10000770100\vertualiziren.exe

    Filesize

    1.6MB

    MD5

    1dc908064451d5d79018241cea28bc2f

    SHA1

    f0d9a7d23603e9dd3974ab15400f5ad3938d657a

    SHA256

    d521f17349128cc6339aecb7a5e41f91ab02d338e5c722cd809d96c3a1c64454

    SHA512

    6f072459376181f7ddb211cf615731289706e7d90b7c81e306c6cd5c79311544d0b4be946791ae4fad3c2c034901bc0a2fd5b2a710844e3fe928a92d1cc0814f

  • C:\Windows\Tasks\Test Task17.job

    Filesize

    234B

    MD5

    e28cdaad92fc263cef7f0db464eddce6

    SHA1

    a602433ff5456cc62c2e318ca1387afc32814d57

    SHA256

    7044e6c29a3b9101569631d080f5374ea5a68c2df16d46f66dd2b3202e3f17b5

    SHA512

    85876fe2685f3923b95182bb25f3b3f1f73c34450193ccae65b85653278ef0c7d9c5a0763e96c7e7107005ee8155e47753b6304b9607f747f1bde36d1fbafb67

  • memory/2840-33-0x0000000000400000-0x0000000000840000-memory.dmp

    Filesize

    4.2MB

  • memory/2840-51-0x0000000000400000-0x0000000000840000-memory.dmp

    Filesize

    4.2MB

  • memory/2840-28-0x0000000000400000-0x0000000000840000-memory.dmp

    Filesize

    4.2MB

  • memory/2840-31-0x0000000000400000-0x0000000000840000-memory.dmp

    Filesize

    4.2MB

  • memory/2840-32-0x0000000000400000-0x0000000000840000-memory.dmp

    Filesize

    4.2MB

  • memory/2840-45-0x0000000000400000-0x0000000000840000-memory.dmp

    Filesize

    4.2MB

  • memory/2840-36-0x0000000000400000-0x0000000000840000-memory.dmp

    Filesize

    4.2MB

  • memory/2840-27-0x0000000000401000-0x0000000000403000-memory.dmp

    Filesize

    8KB

  • memory/2840-26-0x0000000077AE4000-0x0000000077AE6000-memory.dmp

    Filesize

    8KB

  • memory/2840-40-0x0000000000400000-0x0000000000840000-memory.dmp

    Filesize

    4.2MB

  • memory/2840-49-0x0000000000400000-0x0000000000840000-memory.dmp

    Filesize

    4.2MB

  • memory/2840-47-0x0000000000400000-0x0000000000840000-memory.dmp

    Filesize

    4.2MB

  • memory/2840-43-0x0000000000400000-0x0000000000840000-memory.dmp

    Filesize

    4.2MB

  • memory/2840-24-0x0000000000400000-0x0000000000840000-memory.dmp

    Filesize

    4.2MB

  • memory/3028-44-0x0000000000400000-0x0000000000840000-memory.dmp

    Filesize

    4.2MB

  • memory/3028-46-0x0000000000400000-0x0000000000840000-memory.dmp

    Filesize

    4.2MB

  • memory/3028-41-0x0000000000400000-0x0000000000840000-memory.dmp

    Filesize

    4.2MB

  • memory/3028-48-0x0000000000400000-0x0000000000840000-memory.dmp

    Filesize

    4.2MB

  • memory/3028-42-0x0000000000400000-0x0000000000840000-memory.dmp

    Filesize

    4.2MB

  • memory/3028-50-0x0000000000400000-0x0000000000840000-memory.dmp

    Filesize

    4.2MB

  • memory/3028-38-0x0000000000400000-0x0000000000840000-memory.dmp

    Filesize

    4.2MB

  • memory/3028-52-0x0000000000400000-0x0000000000840000-memory.dmp

    Filesize

    4.2MB

  • memory/3028-53-0x0000000000400000-0x0000000000840000-memory.dmp

    Filesize

    4.2MB

  • memory/3028-54-0x0000000000400000-0x0000000000840000-memory.dmp

    Filesize

    4.2MB

  • memory/3028-55-0x0000000000400000-0x0000000000840000-memory.dmp

    Filesize

    4.2MB

  • memory/3028-56-0x0000000000400000-0x0000000000840000-memory.dmp

    Filesize

    4.2MB

  • memory/3028-57-0x0000000000400000-0x0000000000840000-memory.dmp

    Filesize

    4.2MB

  • memory/3028-58-0x0000000000400000-0x0000000000840000-memory.dmp

    Filesize

    4.2MB

  • memory/3028-59-0x0000000000400000-0x0000000000840000-memory.dmp

    Filesize

    4.2MB