Analysis
-
max time kernel
141s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/03/2025, 13:37
Static task
static1
Behavioral task
behavioral1
Sample
c13d59dc2e8ee1cbdb8016de0fb3b374f827406fa5d2d1aa4a2820170816d131.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c13d59dc2e8ee1cbdb8016de0fb3b374f827406fa5d2d1aa4a2820170816d131.exe
Resource
win10v2004-20250217-en
General
-
Target
c13d59dc2e8ee1cbdb8016de0fb3b374f827406fa5d2d1aa4a2820170816d131.exe
-
Size
1.7MB
-
MD5
190272ebd2e82a80b242b1bdd442b859
-
SHA1
fceb12a205c28c30b2049c55924a9872a1a3eb71
-
SHA256
c13d59dc2e8ee1cbdb8016de0fb3b374f827406fa5d2d1aa4a2820170816d131
-
SHA512
f3b30d8ea2dd2c451a042b4ed7a9e98d2bcfbb86a88bec2d672a3e1ae6ab3932daf8987eef872e6adb11144f92b9954ac6f6ce67e24a2bc391d7b34ebef876ae
-
SSDEEP
49152:Kq8Z+aOhmX72hf7OqockKkGYR7SGmUNmzKZg:yAaEhhyJcjkdNmeZg
Malware Config
Extracted
systembc
towerbingobongoboom.com
62.60.226.86
Signatures
-
Systembc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c13d59dc2e8ee1cbdb8016de0fb3b374f827406fa5d2d1aa4a2820170816d131.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ xgoecc.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c13d59dc2e8ee1cbdb8016de0fb3b374f827406fa5d2d1aa4a2820170816d131.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c13d59dc2e8ee1cbdb8016de0fb3b374f827406fa5d2d1aa4a2820170816d131.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion xgoecc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion xgoecc.exe -
Executes dropped EXE 1 IoCs
pid Process 2872 xgoecc.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine c13d59dc2e8ee1cbdb8016de0fb3b374f827406fa5d2d1aa4a2820170816d131.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine xgoecc.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 3020 c13d59dc2e8ee1cbdb8016de0fb3b374f827406fa5d2d1aa4a2820170816d131.exe 2872 xgoecc.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\Test Task17.job c13d59dc2e8ee1cbdb8016de0fb3b374f827406fa5d2d1aa4a2820170816d131.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c13d59dc2e8ee1cbdb8016de0fb3b374f827406fa5d2d1aa4a2820170816d131.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xgoecc.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3020 c13d59dc2e8ee1cbdb8016de0fb3b374f827406fa5d2d1aa4a2820170816d131.exe 2872 xgoecc.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2832 wrote to memory of 2872 2832 taskeng.exe 32 PID 2832 wrote to memory of 2872 2832 taskeng.exe 32 PID 2832 wrote to memory of 2872 2832 taskeng.exe 32 PID 2832 wrote to memory of 2872 2832 taskeng.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\c13d59dc2e8ee1cbdb8016de0fb3b374f827406fa5d2d1aa4a2820170816d131.exe"C:\Users\Admin\AppData\Local\Temp\c13d59dc2e8ee1cbdb8016de0fb3b374f827406fa5d2d1aa4a2820170816d131.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3020
-
C:\Windows\system32\taskeng.exetaskeng.exe {8B5BCF8D-C98E-49BE-A99F-979F04F3AFCB} S-1-5-21-1488793075-819845221-1497111674-1000:UPNECVIU\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\ProgramData\lumic\xgoecc.exeC:\ProgramData\lumic\xgoecc.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2872
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD5190272ebd2e82a80b242b1bdd442b859
SHA1fceb12a205c28c30b2049c55924a9872a1a3eb71
SHA256c13d59dc2e8ee1cbdb8016de0fb3b374f827406fa5d2d1aa4a2820170816d131
SHA512f3b30d8ea2dd2c451a042b4ed7a9e98d2bcfbb86a88bec2d672a3e1ae6ab3932daf8987eef872e6adb11144f92b9954ac6f6ce67e24a2bc391d7b34ebef876ae
-
Filesize
218B
MD5ea97085873ca3cb52f45fc8c35a6a3cf
SHA115d9a55d1be2dd6654e6b2da130680b5c8bf51a2
SHA2568550c2231a1f6698ce7b609f4a4fb5616a6de6f957ffc9c47b4ae2f58b8724b2
SHA51202c5fde1aeb10352604fa3a393a577b9a56b489244952da58aa955ceb716cab79e78af86f40b4d9a77e8e53066a882e197781b06f5517373aa17c16ef5fb3377