Analysis
-
max time kernel
31s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230621-en -
resource tags
arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system -
submitted
30-06-2023 12:26
Static task
static1
Behavioral task
behavioral1
Sample
socks5-clean.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
socks5-clean.exe
Resource
win10v2004-20230621-en
General
-
Target
socks5-clean.exe
-
Size
268KB
-
MD5
21eaa1da67a8d9f3b76b4a63a1da1442
-
SHA1
677a156ca20cabf46fce1085e8743344ce075e9f
-
SHA256
76d658bfc9ccc2e74cd4e4ef834506828072c49db03cac869f3b7d4146391335
-
SHA512
f031d2746248b956246f2addc433160f1e677bb313e27eba33c6f0f3bccb7c2d7a2a0f9ef6e5474f867a57067c1ae06767e2fd9dd575618397cfc0997a2f43d1
-
SSDEEP
3072:GpUWWln1EUWTQG9VnK+DMEMrvk1imdV8hXYKWF9j85WXuNSrq1k9jhQR8+t4Hk9q:g61E/QSnxoEMTlXEulock9X+t40VMeY
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 1 1772 powershell.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1306246566-3334493410-3785284834-1000\Software\Microsoft\Windows\CurrentVersion\Run\socks_powershell = "Powershell.exe -windowstyle hidden -ExecutionPolicy Bypass -File \"C:\\Users\\Admin\\AppData\\Local\\Temp\\RarSFX0\\socks5-clean.ps1\"" powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1772 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1772 powershell.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1524 wrote to memory of 1772 1524 socks5-clean.exe 27 PID 1524 wrote to memory of 1772 1524 socks5-clean.exe 27 PID 1524 wrote to memory of 1772 1524 socks5-clean.exe 27 PID 1524 wrote to memory of 1772 1524 socks5-clean.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\socks5-clean.exe"C:\Users\Admin\AppData\Local\Temp\socks5-clean.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -ExecutionPolicy Bypass -File socks5-clean.ps12⤵
- Blocklisted process makes network request
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1772
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD58e8a2af56c10a83cf0859b9c69b6d6af
SHA1ec6ddf4db8c8e77c154a039783c11fbfa9be0f1c
SHA256f6ec97aada7c02f8de0ec4b0859d1cb522b688085ccb5579fd913200b7d9220d
SHA512c4cd6a1955a9fc9d10f9a4237793b7d3ddf126b26fc15f772609dc5beb70da076a8315160f3f8ff3cae5668506f218eab256d5083fbba210e96f3b4ab2fb5b23