Overview
overview
10Static
static
101edc123e5a...1c.exe
windows7-x64
101edc123e5a...1c.exe
windows10-2004-x64
10215a9d6110...dd.exe
windows7-x64
7215a9d6110...dd.exe
windows10-2004-x64
7351e31a389...15.exe
windows7-x64
10351e31a389...15.exe
windows10-2004-x64
107c711ab33a...07.exe
windows7-x64
87c711ab33a...07.exe
windows10-2004-x64
10a6b647b495...2a.exe
windows7-x64
3a6b647b495...2a.exe
windows10-2004-x64
3d521f17349...54.exe
windows7-x64
10d521f17349...54.exe
windows10-2004-x64
10df468fc510...a2.exe
windows7-x64
10df468fc510...a2.exe
windows10-2004-x64
10Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
06/03/2025, 00:51
Behavioral task
behavioral1
Sample
1edc123e5a8ea5ce814e2759ee38453404d4af72a3577b0af55e8d99fa38ef1c.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1edc123e5a8ea5ce814e2759ee38453404d4af72a3577b0af55e8d99fa38ef1c.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
215a9d61105d1ada2b22fbf70e58745cabfff72b93d95aae1ce20bbc6defa6dd.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
215a9d61105d1ada2b22fbf70e58745cabfff72b93d95aae1ce20bbc6defa6dd.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
351e31a389d6b59faf9842f34bbc27bab411ad796e187b98fb5c59361346a815.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
351e31a389d6b59faf9842f34bbc27bab411ad796e187b98fb5c59361346a815.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral7
Sample
7c711ab33a034ed733b18b76a0154c56065c74a9481cbd0e4f65aa2b03c8a207.exe
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
7c711ab33a034ed733b18b76a0154c56065c74a9481cbd0e4f65aa2b03c8a207.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral9
Sample
a6b647b49538fe599002c116ee5cd79c7e2d472cb48b24b1dfcf9a2718088c2a.exe
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
a6b647b49538fe599002c116ee5cd79c7e2d472cb48b24b1dfcf9a2718088c2a.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral11
Sample
d521f17349128cc6339aecb7a5e41f91ab02d338e5c722cd809d96c3a1c64454.exe
Resource
win7-20250207-en
Behavioral task
behavioral12
Sample
d521f17349128cc6339aecb7a5e41f91ab02d338e5c722cd809d96c3a1c64454.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral13
Sample
df468fc510aec82c827987f54b824b978dd71301f93d18d71e704727d6dfdfa2.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
df468fc510aec82c827987f54b824b978dd71301f93d18d71e704727d6dfdfa2.exe
Resource
win10v2004-20250217-en
General
-
Target
1edc123e5a8ea5ce814e2759ee38453404d4af72a3577b0af55e8d99fa38ef1c.exe
-
Size
457KB
-
MD5
73636685f823d103c54b30bc457c7f0d
-
SHA1
597dba03dce00cf6d30b082c80c8f9108ae90ccf
-
SHA256
1edc123e5a8ea5ce814e2759ee38453404d4af72a3577b0af55e8d99fa38ef1c
-
SHA512
183d4901a72afc044ef13c3a2cc21f93aefd954665f981c7886afc9019ca7d46f76b3459789dff5721542f2f9e7bbf606d7df68328e772e4c66dc789964f43f7
-
SSDEEP
6144:P2ib1rFTRH6sf1kroyfIWjpTX335ilMSp01Hj6fGMWPsEY15sFBc9TT6N7AOs+OK:+ib1rFTRH6serb/p93j6fGMWP1N72h
Malware Config
Extracted
systembc
towerbingobongoboom.com
62.60.226.86
�ai^����c��9�q|&)��Õv.
Signatures
-
Systembc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ vertualiziren.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ermh.exe -
Downloads MZ/PE file 1 IoCs
flow pid Process 27 464 Gxtuum.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ermh.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion vertualiziren.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion vertualiziren.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ermh.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\Control Panel\International\Geo\Nation 1edc123e5a8ea5ce814e2759ee38453404d4af72a3577b0af55e8d99fa38ef1c.exe Key value queried \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\Control Panel\International\Geo\Nation Gxtuum.exe -
Executes dropped EXE 3 IoCs
pid Process 464 Gxtuum.exe 2840 vertualiziren.exe 3028 ermh.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\Software\Wine vertualiziren.exe Key opened \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\Software\Wine ermh.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2840 vertualiziren.exe 3028 ermh.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\Gxtuum.job 1edc123e5a8ea5ce814e2759ee38453404d4af72a3577b0af55e8d99fa38ef1c.exe File created C:\Windows\Tasks\Test Task17.job vertualiziren.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1edc123e5a8ea5ce814e2759ee38453404d4af72a3577b0af55e8d99fa38ef1c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gxtuum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vertualiziren.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ermh.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2840 vertualiziren.exe 2840 vertualiziren.exe 3028 ermh.exe 3028 ermh.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1240 1edc123e5a8ea5ce814e2759ee38453404d4af72a3577b0af55e8d99fa38ef1c.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1240 wrote to memory of 464 1240 1edc123e5a8ea5ce814e2759ee38453404d4af72a3577b0af55e8d99fa38ef1c.exe 87 PID 1240 wrote to memory of 464 1240 1edc123e5a8ea5ce814e2759ee38453404d4af72a3577b0af55e8d99fa38ef1c.exe 87 PID 1240 wrote to memory of 464 1240 1edc123e5a8ea5ce814e2759ee38453404d4af72a3577b0af55e8d99fa38ef1c.exe 87 PID 464 wrote to memory of 2840 464 Gxtuum.exe 92 PID 464 wrote to memory of 2840 464 Gxtuum.exe 92 PID 464 wrote to memory of 2840 464 Gxtuum.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\1edc123e5a8ea5ce814e2759ee38453404d4af72a3577b0af55e8d99fa38ef1c.exe"C:\Users\Admin\AppData\Local\Temp\1edc123e5a8ea5ce814e2759ee38453404d4af72a3577b0af55e8d99fa38ef1c.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe"C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe"2⤵
- Downloads MZ/PE file
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:464 -
C:\Users\Admin\AppData\Roaming\10000770100\vertualiziren.exe"C:\Users\Admin\AppData\Roaming\10000770100\vertualiziren.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2840
-
-
-
C:\ProgramData\tjdkln\ermh.exeC:\ProgramData\tjdkln\ermh.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3028
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
457KB
MD573636685f823d103c54b30bc457c7f0d
SHA1597dba03dce00cf6d30b082c80c8f9108ae90ccf
SHA2561edc123e5a8ea5ce814e2759ee38453404d4af72a3577b0af55e8d99fa38ef1c
SHA512183d4901a72afc044ef13c3a2cc21f93aefd954665f981c7886afc9019ca7d46f76b3459789dff5721542f2f9e7bbf606d7df68328e772e4c66dc789964f43f7
-
Filesize
1.6MB
MD51dc908064451d5d79018241cea28bc2f
SHA1f0d9a7d23603e9dd3974ab15400f5ad3938d657a
SHA256d521f17349128cc6339aecb7a5e41f91ab02d338e5c722cd809d96c3a1c64454
SHA5126f072459376181f7ddb211cf615731289706e7d90b7c81e306c6cd5c79311544d0b4be946791ae4fad3c2c034901bc0a2fd5b2a710844e3fe928a92d1cc0814f
-
Filesize
234B
MD5e28cdaad92fc263cef7f0db464eddce6
SHA1a602433ff5456cc62c2e318ca1387afc32814d57
SHA2567044e6c29a3b9101569631d080f5374ea5a68c2df16d46f66dd2b3202e3f17b5
SHA51285876fe2685f3923b95182bb25f3b3f1f73c34450193ccae65b85653278ef0c7d9c5a0763e96c7e7107005ee8155e47753b6304b9607f747f1bde36d1fbafb67