Analysis

  • max time kernel
    143s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    11/01/2024, 06:46

General

  • Target

    1decbe120e5beaff817bc6dd186e2013.exe

  • Size

    4.6MB

  • MD5

    1decbe120e5beaff817bc6dd186e2013

  • SHA1

    4cbcb2ad2f50862b0910a036dd2fd12aa4a23f50

  • SHA256

    6269c0afcf708d6b8bb3d7fa200009f6a177d60b6c5f9b174278dab56f716af1

  • SHA512

    53f3ed6987f25a7e3aab470adb10df0a9408a4e5541c53a979761414a3fc2ec35cd3432927d30b60b9616c5e0472a5078222a163a96b5a620d247f4a8f5a830f

  • SSDEEP

    98304:Ni/pvA3Q7kcOH1+TnUcumzJip7MDUzVm+3VvNppfc0ufQF3EMUc3Qq518SKH68S8:U/pv0ek5+7UVHoDUN3V5fc0wm0ZcgqwH

Malware Config

Signatures

  • Detect Socks5Systemz Payload 5 IoCs
  • Socks5Systemz

    Socks5Systemz is a botnet written in C++.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 10 IoCs
  • Unexpected DNS network traffic destination 1 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Runs net.exe
  • Suspicious use of WriteProcessMemory 35 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1decbe120e5beaff817bc6dd186e2013.exe
    "C:\Users\Admin\AppData\Local\Temp\1decbe120e5beaff817bc6dd186e2013.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2932
    • C:\Users\Admin\AppData\Local\Temp\is-VTN99.tmp\is-E9B4Q.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-VTN99.tmp\is-E9B4Q.tmp" /SL4 $3012C "C:\Users\Admin\AppData\Local\Temp\1decbe120e5beaff817bc6dd186e2013.exe" 4639228 431616
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:3036
      • C:\Users\Admin\AppData\Local\IMAP test plugin\imaptestplugin.exe
        "C:\Users\Admin\AppData\Local\IMAP test plugin\imaptestplugin.exe" -i
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:1372
      • C:\Windows\SysWOW64\net.exe
        "C:\Windows\system32\net.exe" helpmsg 1111
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1108
      • C:\Users\Admin\AppData\Local\IMAP test plugin\imaptestplugin.exe
        "C:\Users\Admin\AppData\Local\IMAP test plugin\imaptestplugin.exe" -s
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:2700
  • C:\Windows\SysWOW64\net1.exe
    C:\Windows\system32\net1 helpmsg 1111
    1⤵
      PID:2868

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\is-VTN99.tmp\is-E9B4Q.tmp

      Filesize

      92KB

      MD5

      0186461547d0bba32e1fe0b8b33f0895

      SHA1

      8fafd9dfff35b3b31a64b79729ed92d0a01044f3

      SHA256

      c470f414af61f873405e96fa11e602cf31c3f45dfc7858fd0b1fb83cb2ca5348

      SHA512

      7c11f6651ad15747577e13763690d6c06d9104e83929bc2a4ae454e8fbbd9226ff5ac296946929c16aeec27d12b779f7f35eac7930f45c5e6c1b1216b70b6787

    • \Users\Admin\AppData\Local\Temp\is-VTN99.tmp\is-E9B4Q.tmp

      Filesize

      381KB

      MD5

      34e180b2a41488bd877c4a573ea58568

      SHA1

      6bd3ea4c79cc8a6cd1b969edff332be13500a969

      SHA256

      70bfb56e6cf15d2b21bd83f9bd77990fc4678a639a47b0d717470c25146b8bbe

      SHA512

      1e6146d025dafaece40c5a25b846e6970afce8f031d6459f0ac1d0dee69af18d69e76eb8ac59463be33f62e59e21ad5d7f35e9034a098592f13df6065efdec14

    • memory/1372-127-0x0000000000400000-0x0000000000608000-memory.dmp

      Filesize

      2.0MB

    • memory/1372-125-0x0000000000400000-0x0000000000608000-memory.dmp

      Filesize

      2.0MB

    • memory/1372-128-0x0000000000400000-0x0000000000608000-memory.dmp

      Filesize

      2.0MB

    • memory/1372-122-0x0000000000400000-0x0000000000608000-memory.dmp

      Filesize

      2.0MB

    • memory/1372-123-0x0000000000C50000-0x0000000000E58000-memory.dmp

      Filesize

      2.0MB

    • memory/1372-124-0x0000000000C50000-0x0000000000E58000-memory.dmp

      Filesize

      2.0MB

    • memory/2700-146-0x0000000000F40000-0x0000000001148000-memory.dmp

      Filesize

      2.0MB

    • memory/2700-170-0x0000000002B40000-0x0000000002BE2000-memory.dmp

      Filesize

      648KB

    • memory/2700-135-0x0000000000F40000-0x0000000001148000-memory.dmp

      Filesize

      2.0MB

    • memory/2700-133-0x0000000000400000-0x0000000000608000-memory.dmp

      Filesize

      2.0MB

    • memory/2700-191-0x0000000000400000-0x0000000000608000-memory.dmp

      Filesize

      2.0MB

    • memory/2700-188-0x0000000000400000-0x0000000000608000-memory.dmp

      Filesize

      2.0MB

    • memory/2700-137-0x0000000000400000-0x0000000000608000-memory.dmp

      Filesize

      2.0MB

    • memory/2700-183-0x0000000002B40000-0x0000000002BE2000-memory.dmp

      Filesize

      648KB

    • memory/2700-184-0x0000000002B40000-0x0000000002BE2000-memory.dmp

      Filesize

      648KB

    • memory/2700-141-0x0000000000400000-0x0000000000608000-memory.dmp

      Filesize

      2.0MB

    • memory/2700-143-0x0000000000400000-0x0000000000608000-memory.dmp

      Filesize

      2.0MB

    • memory/2700-182-0x0000000000400000-0x0000000000608000-memory.dmp

      Filesize

      2.0MB

    • memory/2700-145-0x0000000000400000-0x0000000000608000-memory.dmp

      Filesize

      2.0MB

    • memory/2700-147-0x0000000000400000-0x0000000000608000-memory.dmp

      Filesize

      2.0MB

    • memory/2700-150-0x0000000000400000-0x0000000000608000-memory.dmp

      Filesize

      2.0MB

    • memory/2700-153-0x0000000000400000-0x0000000000608000-memory.dmp

      Filesize

      2.0MB

    • memory/2700-156-0x0000000000400000-0x0000000000608000-memory.dmp

      Filesize

      2.0MB

    • memory/2700-159-0x0000000000400000-0x0000000000608000-memory.dmp

      Filesize

      2.0MB

    • memory/2700-163-0x0000000002B40000-0x0000000002BE2000-memory.dmp

      Filesize

      648KB

    • memory/2700-160-0x0000000002B40000-0x0000000002BE2000-memory.dmp

      Filesize

      648KB

    • memory/2700-166-0x0000000000400000-0x0000000000608000-memory.dmp

      Filesize

      2.0MB

    • memory/2700-169-0x0000000000400000-0x0000000000608000-memory.dmp

      Filesize

      2.0MB

    • memory/2700-134-0x0000000000F40000-0x0000000001148000-memory.dmp

      Filesize

      2.0MB

    • memory/2700-173-0x0000000000400000-0x0000000000608000-memory.dmp

      Filesize

      2.0MB

    • memory/2700-176-0x0000000000400000-0x0000000000608000-memory.dmp

      Filesize

      2.0MB

    • memory/2700-179-0x0000000000400000-0x0000000000608000-memory.dmp

      Filesize

      2.0MB

    • memory/2932-0-0x0000000000400000-0x0000000000470000-memory.dmp

      Filesize

      448KB

    • memory/2932-138-0x0000000000400000-0x0000000000470000-memory.dmp

      Filesize

      448KB

    • memory/2932-2-0x0000000000400000-0x0000000000470000-memory.dmp

      Filesize

      448KB

    • memory/3036-140-0x0000000000400000-0x00000000004CF000-memory.dmp

      Filesize

      828KB

    • memory/3036-118-0x0000000003A90000-0x0000000003C98000-memory.dmp

      Filesize

      2.0MB