Behavioral task
behavioral1
Sample
socks.exe
Resource
win7-20231129-en
General
-
Target
socks.exe
-
Size
16KB
-
MD5
cc64f95a4208489ff4d7e00d84ef92c5
-
SHA1
7d8a4bf93e558db774ccf9054cfc72825df9e9cc
-
SHA256
8cd25f3890b83cca1983424be8866191f6cdc63006e9d7b84d97c333cb4d149a
-
SHA512
97b0ef4f04e107f470a5387e732392cb583a4a5bc13289fcf4770a10b881bcf33741f64d4766321e3b1c04441c5a7327a32e542f53f584e6760b3434ea50152d
-
SSDEEP
384:rC+AHNZw/WnlrobdglGbLMoy+yG+yir1dV:r0gklrydgQP1yO67V
Malware Config
Extracted
systembc
185.73.124.42:4001
Signatures
-
Systembc family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource socks.exe
Files
-
socks.exe.exe windows:4 windows x86 arch:x86
b83b4c7be0b1cdd8e117bba9096d9768
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetMessageA
GetWindowTextA
GetWindowThreadProcessId
LoadCursorA
LoadIconA
CreateWindowExA
RegisterClassA
SendMessageA
ShowWindow
TranslateMessage
UpdateWindow
GetClassNameA
EnumWindows
DispatchMessageA
DefWindowProcA
wsprintfA
kernel32
ResetEvent
SetEvent
SetFilePointer
OpenProcess
RemoveDirectoryA
LocalAlloc
WriteFile
WaitForSingleObject
VirtualFree
VirtualAlloc
SystemTimeToFileTime
CloseHandle
CopyFileA
CreateDirectoryA
CreateEventA
CreateFileA
CreateMutexA
CreateThread
CreateToolhelp32Snapshot
DeleteFileA
ExitProcess
FileTimeToSystemTime
GetCommandLineW
GetCurrentProcess
GetCurrentProcessId
GetEnvironmentVariableA
GetLastError
GetLocalTime
GetModuleFileNameA
GetModuleHandleA
GetTempPathA
GetVolumeInformationA
LocalFree
Sleep
advapi32
GetSidSubAuthority
GetUserNameW
OpenProcessToken
GetTokenInformation
wsock32
htons
inet_addr
inet_ntoa
recv
select
send
setsockopt
shutdown
socket
connect
closesocket
ioctlsocket
WSAStartup
WSACleanup
shell32
CommandLineToArgvW
ws2_32
freeaddrinfo
WSAIoctl
getaddrinfo
ole32
CoUninitialize
CoInitialize
CoCreateInstance
secur32
GetUserNameExW
QueryContextAttributesA
AcquireCredentialsHandleA
DecryptMessage
DeleteSecurityContext
EncryptMessage
FreeContextBuffer
FreeCredentialsHandle
GetUserNameExA
InitializeSecurityContextA
psapi
GetModuleFileNameExA
Sections
.text Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 812B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE