Overview
overview
10Static
static
10dll/socks32.dll
windows7_x64
8dll/socks32.dll
windows10_x64
8dll/socks64.dll
windows7_x64
8dll/socks64.dll
windows10_x64
8server.exe
windows7_x64
8server.exe
windows10_x64
8server.out
linux_amd64
server.out
linux_mipsel
server.out
linux_mips
socks.exe
windows7_x64
4socks.exe
windows10_x64
4www/system...har.js
windows7_x64
1www/system...har.js
windows10_x64
1www/system...x.html
windows7_x64
1www/system...x.html
windows10_x64
1www/system...php.js
windows7_x64
1www/system...php.js
windows10_x64
1Analysis
-
max time kernel
147s -
max time network
154s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
13-07-2021 14:02
Static task
static1
Behavioral task
behavioral1
Sample
dll/socks32.dll
Resource
win7v20210410
Behavioral task
behavioral2
Sample
dll/socks32.dll
Resource
win10v20210408
Behavioral task
behavioral3
Sample
dll/socks64.dll
Resource
win7v20210410
Behavioral task
behavioral4
Sample
dll/socks64.dll
Resource
win10v20210410
Behavioral task
behavioral5
Sample
server.exe
Resource
win7v20210408
Behavioral task
behavioral6
Sample
server.exe
Resource
win10v20210410
Behavioral task
behavioral7
Sample
server.out
Resource
ubuntu-amd64
Behavioral task
behavioral8
Sample
server.out
Resource
debian9-mipsel
Behavioral task
behavioral9
Sample
server.out
Resource
debian9-mipsbe
Behavioral task
behavioral10
Sample
socks.exe
Resource
win7v20210408
Behavioral task
behavioral11
Sample
socks.exe
Resource
win10v20210408
Behavioral task
behavioral12
Sample
www/systembc/geoip/geoip2.phar.js
Resource
win7v20210408
Behavioral task
behavioral13
Sample
www/systembc/geoip/geoip2.phar.js
Resource
win10v20210410
Behavioral task
behavioral14
Sample
www/systembc/index.html
Resource
win7v20210408
Behavioral task
behavioral15
Sample
www/systembc/index.html
Resource
win10v20210410
Behavioral task
behavioral16
Sample
www/systembc/password.php.js
Resource
win7v20210408
Behavioral task
behavioral17
Sample
www/systembc/password.php.js
Resource
win10v20210410
General
-
Target
dll/socks32.dll
-
Size
13KB
-
MD5
65c17c463e5b6aa86563ddc2d1cc7d94
-
SHA1
5d2de9c471fccac50d001ba2ccc9904545b712fd
-
SHA256
683e6f42222caf44fdc3917be95d55a3f2213c5e3f966e33996ecd1f0743197f
-
SHA512
b31577aee0c3f40167f9956d09ba9090cc75ac037712daf73528896f067cebdcc5e9bd7be92992ea7169750d4363d572ca87a7a692dcbf0292348c900a09efb8
Malware Config
Signatures
-
Blocklisted process makes network request 14 IoCs
Processes:
rundll32.exeflow pid process 15 1400 rundll32.exe 16 1400 rundll32.exe 17 1400 rundll32.exe 18 1400 rundll32.exe 20 1400 rundll32.exe 21 1400 rundll32.exe 22 1400 rundll32.exe 23 1400 rundll32.exe 24 1400 rundll32.exe 25 1400 rundll32.exe 26 1400 rundll32.exe 27 1400 rundll32.exe 28 1400 rundll32.exe 29 1400 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 800 wrote to memory of 1400 800 rundll32.exe rundll32.exe PID 800 wrote to memory of 1400 800 rundll32.exe rundll32.exe PID 800 wrote to memory of 1400 800 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\dll\socks32.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:800 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\dll\socks32.dll,#12⤵
- Blocklisted process makes network request
PID:1400
-