Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
06/03/2025, 13:30
Behavioral task
behavioral1
Sample
b1663d4497ddd27a59f090b72adcedddac51724a1c126f7d6469f8045d065e15.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b1663d4497ddd27a59f090b72adcedddac51724a1c126f7d6469f8045d065e15.exe
Resource
win10v2004-20250217-en
General
-
Target
b1663d4497ddd27a59f090b72adcedddac51724a1c126f7d6469f8045d065e15.exe
-
Size
452KB
-
MD5
a9749ee52eefb0fd48a66527095354bb
-
SHA1
78170bcc54e1f774528dea3118b50ffc46064fe0
-
SHA256
b1663d4497ddd27a59f090b72adcedddac51724a1c126f7d6469f8045d065e15
-
SHA512
9d21f0e1e376b89df717403a3939ed86ef61095bb9f0167ff15c01d3bbbee03d4dd01b3e2769ecd921e40e43bab3cbf0a6844ab6f296982227b0cb507b4b0e25
-
SSDEEP
12288:Rib1rFTRH6serb/p93j6fGMWP1N72h8xp:IH659m+Mk1YW
Malware Config
Extracted
systembc
towerbingobongoboom.com
62.60.226.86
-
dns
5.132.191.104
Signatures
-
Systembc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axac.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ effectson.exe -
Downloads MZ/PE file 1 IoCs
flow pid Process 27 828 Gxtuum.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion effectson.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion effectson.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axac.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axac.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Control Panel\International\Geo\Nation b1663d4497ddd27a59f090b72adcedddac51724a1c126f7d6469f8045d065e15.exe Key value queried \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Control Panel\International\Geo\Nation Gxtuum.exe -
Executes dropped EXE 6 IoCs
pid Process 828 Gxtuum.exe 2672 effectson.exe 980 axac.exe 1720 Gxtuum.exe 4804 Gxtuum.exe 3016 Gxtuum.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Software\Wine effectson.exe Key opened \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Software\Wine axac.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2672 effectson.exe 980 axac.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\Gxtuum.job b1663d4497ddd27a59f090b72adcedddac51724a1c126f7d6469f8045d065e15.exe File created C:\Windows\Tasks\Test Task17.job effectson.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b1663d4497ddd27a59f090b72adcedddac51724a1c126f7d6469f8045d065e15.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gxtuum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language effectson.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language axac.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2672 effectson.exe 2672 effectson.exe 980 axac.exe 980 axac.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4768 b1663d4497ddd27a59f090b72adcedddac51724a1c126f7d6469f8045d065e15.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4768 wrote to memory of 828 4768 b1663d4497ddd27a59f090b72adcedddac51724a1c126f7d6469f8045d065e15.exe 89 PID 4768 wrote to memory of 828 4768 b1663d4497ddd27a59f090b72adcedddac51724a1c126f7d6469f8045d065e15.exe 89 PID 4768 wrote to memory of 828 4768 b1663d4497ddd27a59f090b72adcedddac51724a1c126f7d6469f8045d065e15.exe 89 PID 828 wrote to memory of 2672 828 Gxtuum.exe 94 PID 828 wrote to memory of 2672 828 Gxtuum.exe 94 PID 828 wrote to memory of 2672 828 Gxtuum.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\b1663d4497ddd27a59f090b72adcedddac51724a1c126f7d6469f8045d065e15.exe"C:\Users\Admin\AppData\Local\Temp\b1663d4497ddd27a59f090b72adcedddac51724a1c126f7d6469f8045d065e15.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4768 -
C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe"C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe"2⤵
- Downloads MZ/PE file
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:828 -
C:\Users\Admin\AppData\Roaming\10000790100\effectson.exe"C:\Users\Admin\AppData\Roaming\10000790100\effectson.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2672
-
-
-
C:\ProgramData\lxog\axac.exeC:\ProgramData\lxog\axac.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:980
-
C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe1⤵
- Executes dropped EXE
PID:1720
-
C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe1⤵
- Executes dropped EXE
PID:4804
-
C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe1⤵
- Executes dropped EXE
PID:3016
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
452KB
MD5a9749ee52eefb0fd48a66527095354bb
SHA178170bcc54e1f774528dea3118b50ffc46064fe0
SHA256b1663d4497ddd27a59f090b72adcedddac51724a1c126f7d6469f8045d065e15
SHA5129d21f0e1e376b89df717403a3939ed86ef61095bb9f0167ff15c01d3bbbee03d4dd01b3e2769ecd921e40e43bab3cbf0a6844ab6f296982227b0cb507b4b0e25
-
Filesize
1.7MB
MD53b4723591e7a82dc45cdd60b2162eee2
SHA19618f544c79dbae11634fc14bd472b3cb5eb046d
SHA2561582d61232dff45c014769e9be4fb06f839ee3e462189dbbf28ca0380a6fa410
SHA5121559f42a1dbdf1f78f971415f3252a1127ebd2f3490a374a13670fc366b54f50c58bac8234d30a43b3345fbecdf49f65b69500675887c81fa45bc06311917380
-
Filesize
230B
MD559b90faac9bd124f998ba57ff3e6c920
SHA148e87551cac427cdbd15a2fa5e9eb9dd7422d8be
SHA25607b5f7e234eb45c19edfa8e43f9f1db52d71376585fbf3c733db5e75fb481f07
SHA512f8a6baf7a54d7144534f690a5c6d588cce6ab289c0fbf0b704b390d479e84ae57e8dfa29070b28396e94290a25b8bf33a61867ca1a0ff057b962abb774e1325f