Analysis

  • max time kernel
    31s
  • max time network
    34s
  • platform
    windows7_x64
  • resource
    win7-20230621-en
  • resource tags

    arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system
  • submitted
    30-06-2023 12:26

General

  • Target

    socks5-clean.exe

  • Size

    268KB

  • MD5

    21eaa1da67a8d9f3b76b4a63a1da1442

  • SHA1

    677a156ca20cabf46fce1085e8743344ce075e9f

  • SHA256

    76d658bfc9ccc2e74cd4e4ef834506828072c49db03cac869f3b7d4146391335

  • SHA512

    f031d2746248b956246f2addc433160f1e677bb313e27eba33c6f0f3bccb7c2d7a2a0f9ef6e5474f867a57067c1ae06767e2fd9dd575618397cfc0997a2f43d1

  • SSDEEP

    3072:GpUWWln1EUWTQG9VnK+DMEMrvk1imdV8hXYKWF9j85WXuNSrq1k9jhQR8+t4Hk9q:g61E/QSnxoEMTlXEulock9X+t40VMeY

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\socks5-clean.exe
    "C:\Users\Admin\AppData\Local\Temp\socks5-clean.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1524
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -ExecutionPolicy Bypass -File socks5-clean.ps1
      2⤵
      • Blocklisted process makes network request
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1772

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\socks5-clean.ps1

    Filesize

    14KB

    MD5

    8e8a2af56c10a83cf0859b9c69b6d6af

    SHA1

    ec6ddf4db8c8e77c154a039783c11fbfa9be0f1c

    SHA256

    f6ec97aada7c02f8de0ec4b0859d1cb522b688085ccb5579fd913200b7d9220d

    SHA512

    c4cd6a1955a9fc9d10f9a4237793b7d3ddf126b26fc15f772609dc5beb70da076a8315160f3f8ff3cae5668506f218eab256d5083fbba210e96f3b4ab2fb5b23

  • memory/1772-58-0x0000000002740000-0x0000000002780000-memory.dmp

    Filesize

    256KB

  • memory/1772-61-0x0000000002740000-0x0000000002780000-memory.dmp

    Filesize

    256KB

  • memory/1772-60-0x0000000002740000-0x0000000002780000-memory.dmp

    Filesize

    256KB