Analysis
-
max time kernel
143s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
11/01/2024, 06:46
Static task
static1
Behavioral task
behavioral1
Sample
1decbe120e5beaff817bc6dd186e2013.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1decbe120e5beaff817bc6dd186e2013.exe
Resource
win10v2004-20231215-en
General
-
Target
1decbe120e5beaff817bc6dd186e2013.exe
-
Size
4.6MB
-
MD5
1decbe120e5beaff817bc6dd186e2013
-
SHA1
4cbcb2ad2f50862b0910a036dd2fd12aa4a23f50
-
SHA256
6269c0afcf708d6b8bb3d7fa200009f6a177d60b6c5f9b174278dab56f716af1
-
SHA512
53f3ed6987f25a7e3aab470adb10df0a9408a4e5541c53a979761414a3fc2ec35cd3432927d30b60b9616c5e0472a5078222a163a96b5a620d247f4a8f5a830f
-
SSDEEP
98304:Ni/pvA3Q7kcOH1+TnUcumzJip7MDUzVm+3VvNppfc0ufQF3EMUc3Qq518SKH68S8:U/pv0ek5+7UVHoDUN3V5fc0wm0ZcgqwH
Malware Config
Signatures
-
Detect Socks5Systemz Payload 5 IoCs
resource yara_rule behavioral1/memory/2700-163-0x0000000002B40000-0x0000000002BE2000-memory.dmp family_socks5systemz behavioral1/memory/2700-160-0x0000000002B40000-0x0000000002BE2000-memory.dmp family_socks5systemz behavioral1/memory/2700-170-0x0000000002B40000-0x0000000002BE2000-memory.dmp family_socks5systemz behavioral1/memory/2700-184-0x0000000002B40000-0x0000000002BE2000-memory.dmp family_socks5systemz behavioral1/memory/2700-183-0x0000000002B40000-0x0000000002BE2000-memory.dmp family_socks5systemz -
Socks5Systemz
Socks5Systemz is a botnet written in C++.
-
Executes dropped EXE 3 IoCs
pid Process 3036 is-E9B4Q.tmp 1372 imaptestplugin.exe 2700 imaptestplugin.exe -
Loads dropped DLL 10 IoCs
pid Process 2932 1decbe120e5beaff817bc6dd186e2013.exe 3036 is-E9B4Q.tmp 3036 is-E9B4Q.tmp 3036 is-E9B4Q.tmp 3036 is-E9B4Q.tmp 1372 imaptestplugin.exe 1372 imaptestplugin.exe 3036 is-E9B4Q.tmp 2700 imaptestplugin.exe 2700 imaptestplugin.exe -
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 45.155.250.90 -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious use of WriteProcessMemory 35 IoCs
description pid Process procid_target PID 2932 wrote to memory of 3036 2932 1decbe120e5beaff817bc6dd186e2013.exe 17 PID 2932 wrote to memory of 3036 2932 1decbe120e5beaff817bc6dd186e2013.exe 17 PID 2932 wrote to memory of 3036 2932 1decbe120e5beaff817bc6dd186e2013.exe 17 PID 2932 wrote to memory of 3036 2932 1decbe120e5beaff817bc6dd186e2013.exe 17 PID 2932 wrote to memory of 3036 2932 1decbe120e5beaff817bc6dd186e2013.exe 17 PID 2932 wrote to memory of 3036 2932 1decbe120e5beaff817bc6dd186e2013.exe 17 PID 2932 wrote to memory of 3036 2932 1decbe120e5beaff817bc6dd186e2013.exe 17 PID 3036 wrote to memory of 1108 3036 is-E9B4Q.tmp 26 PID 3036 wrote to memory of 1108 3036 is-E9B4Q.tmp 26 PID 3036 wrote to memory of 1108 3036 is-E9B4Q.tmp 26 PID 3036 wrote to memory of 1108 3036 is-E9B4Q.tmp 26 PID 3036 wrote to memory of 1108 3036 is-E9B4Q.tmp 26 PID 3036 wrote to memory of 1108 3036 is-E9B4Q.tmp 26 PID 3036 wrote to memory of 1108 3036 is-E9B4Q.tmp 26 PID 3036 wrote to memory of 1372 3036 is-E9B4Q.tmp 24 PID 3036 wrote to memory of 1372 3036 is-E9B4Q.tmp 24 PID 3036 wrote to memory of 1372 3036 is-E9B4Q.tmp 24 PID 3036 wrote to memory of 1372 3036 is-E9B4Q.tmp 24 PID 3036 wrote to memory of 1372 3036 is-E9B4Q.tmp 24 PID 3036 wrote to memory of 1372 3036 is-E9B4Q.tmp 24 PID 3036 wrote to memory of 1372 3036 is-E9B4Q.tmp 24 PID 1108 wrote to memory of 2868 1108 net.exe 23 PID 1108 wrote to memory of 2868 1108 net.exe 23 PID 1108 wrote to memory of 2868 1108 net.exe 23 PID 1108 wrote to memory of 2868 1108 net.exe 23 PID 1108 wrote to memory of 2868 1108 net.exe 23 PID 1108 wrote to memory of 2868 1108 net.exe 23 PID 1108 wrote to memory of 2868 1108 net.exe 23 PID 3036 wrote to memory of 2700 3036 is-E9B4Q.tmp 33 PID 3036 wrote to memory of 2700 3036 is-E9B4Q.tmp 33 PID 3036 wrote to memory of 2700 3036 is-E9B4Q.tmp 33 PID 3036 wrote to memory of 2700 3036 is-E9B4Q.tmp 33 PID 3036 wrote to memory of 2700 3036 is-E9B4Q.tmp 33 PID 3036 wrote to memory of 2700 3036 is-E9B4Q.tmp 33 PID 3036 wrote to memory of 2700 3036 is-E9B4Q.tmp 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\1decbe120e5beaff817bc6dd186e2013.exe"C:\Users\Admin\AppData\Local\Temp\1decbe120e5beaff817bc6dd186e2013.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Users\Admin\AppData\Local\Temp\is-VTN99.tmp\is-E9B4Q.tmp"C:\Users\Admin\AppData\Local\Temp\is-VTN99.tmp\is-E9B4Q.tmp" /SL4 $3012C "C:\Users\Admin\AppData\Local\Temp\1decbe120e5beaff817bc6dd186e2013.exe" 4639228 4316162⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Users\Admin\AppData\Local\IMAP test plugin\imaptestplugin.exe"C:\Users\Admin\AppData\Local\IMAP test plugin\imaptestplugin.exe" -i3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1372
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" helpmsg 11113⤵
- Suspicious use of WriteProcessMemory
PID:1108
-
-
C:\Users\Admin\AppData\Local\IMAP test plugin\imaptestplugin.exe"C:\Users\Admin\AppData\Local\IMAP test plugin\imaptestplugin.exe" -s3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2700
-
-
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 helpmsg 11111⤵PID:2868
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD50186461547d0bba32e1fe0b8b33f0895
SHA18fafd9dfff35b3b31a64b79729ed92d0a01044f3
SHA256c470f414af61f873405e96fa11e602cf31c3f45dfc7858fd0b1fb83cb2ca5348
SHA5127c11f6651ad15747577e13763690d6c06d9104e83929bc2a4ae454e8fbbd9226ff5ac296946929c16aeec27d12b779f7f35eac7930f45c5e6c1b1216b70b6787
-
Filesize
381KB
MD534e180b2a41488bd877c4a573ea58568
SHA16bd3ea4c79cc8a6cd1b969edff332be13500a969
SHA25670bfb56e6cf15d2b21bd83f9bd77990fc4678a639a47b0d717470c25146b8bbe
SHA5121e6146d025dafaece40c5a25b846e6970afce8f031d6459f0ac1d0dee69af18d69e76eb8ac59463be33f62e59e21ad5d7f35e9034a098592f13df6065efdec14