Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
177s -
max time network
180s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
11/01/2024, 06:46
Static task
static1
Behavioral task
behavioral1
Sample
1decbe120e5beaff817bc6dd186e2013.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1decbe120e5beaff817bc6dd186e2013.exe
Resource
win10v2004-20231215-en
General
-
Target
1decbe120e5beaff817bc6dd186e2013.exe
-
Size
4.6MB
-
MD5
1decbe120e5beaff817bc6dd186e2013
-
SHA1
4cbcb2ad2f50862b0910a036dd2fd12aa4a23f50
-
SHA256
6269c0afcf708d6b8bb3d7fa200009f6a177d60b6c5f9b174278dab56f716af1
-
SHA512
53f3ed6987f25a7e3aab470adb10df0a9408a4e5541c53a979761414a3fc2ec35cd3432927d30b60b9616c5e0472a5078222a163a96b5a620d247f4a8f5a830f
-
SSDEEP
98304:Ni/pvA3Q7kcOH1+TnUcumzJip7MDUzVm+3VvNppfc0ufQF3EMUc3Qq518SKH68S8:U/pv0ek5+7UVHoDUN3V5fc0wm0ZcgqwH
Malware Config
Signatures
-
Detect Socks5Systemz Payload 3 IoCs
resource yara_rule behavioral2/memory/4144-151-0x00000000008D0000-0x0000000000972000-memory.dmp family_socks5systemz behavioral2/memory/4144-152-0x00000000008D0000-0x0000000000972000-memory.dmp family_socks5systemz behavioral2/memory/4144-161-0x00000000008D0000-0x0000000000972000-memory.dmp family_socks5systemz -
Socks5Systemz
Socks5Systemz is a botnet written in C++.
-
Executes dropped EXE 3 IoCs
pid Process 2156 is-QBRP1.tmp 4184 imaptestplugin.exe 4144 imaptestplugin.exe -
Loads dropped DLL 1 IoCs
pid Process 2156 is-QBRP1.tmp -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4984 wrote to memory of 2156 4984 1decbe120e5beaff817bc6dd186e2013.exe 92 PID 4984 wrote to memory of 2156 4984 1decbe120e5beaff817bc6dd186e2013.exe 92 PID 4984 wrote to memory of 2156 4984 1decbe120e5beaff817bc6dd186e2013.exe 92 PID 2156 wrote to memory of 456 2156 is-QBRP1.tmp 94 PID 2156 wrote to memory of 456 2156 is-QBRP1.tmp 94 PID 2156 wrote to memory of 456 2156 is-QBRP1.tmp 94 PID 2156 wrote to memory of 4184 2156 is-QBRP1.tmp 96 PID 2156 wrote to memory of 4184 2156 is-QBRP1.tmp 96 PID 2156 wrote to memory of 4184 2156 is-QBRP1.tmp 96 PID 456 wrote to memory of 4372 456 net.exe 97 PID 456 wrote to memory of 4372 456 net.exe 97 PID 456 wrote to memory of 4372 456 net.exe 97 PID 2156 wrote to memory of 4144 2156 is-QBRP1.tmp 98 PID 2156 wrote to memory of 4144 2156 is-QBRP1.tmp 98 PID 2156 wrote to memory of 4144 2156 is-QBRP1.tmp 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\1decbe120e5beaff817bc6dd186e2013.exe"C:\Users\Admin\AppData\Local\Temp\1decbe120e5beaff817bc6dd186e2013.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Users\Admin\AppData\Local\Temp\is-NHF4S.tmp\is-QBRP1.tmp"C:\Users\Admin\AppData\Local\Temp\is-NHF4S.tmp\is-QBRP1.tmp" /SL4 $601FA "C:\Users\Admin\AppData\Local\Temp\1decbe120e5beaff817bc6dd186e2013.exe" 4639228 4316162⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" helpmsg 11113⤵
- Suspicious use of WriteProcessMemory
PID:456 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 helpmsg 11114⤵PID:4372
-
-
-
C:\Users\Admin\AppData\Local\IMAP test plugin\imaptestplugin.exe"C:\Users\Admin\AppData\Local\IMAP test plugin\imaptestplugin.exe" -i3⤵
- Executes dropped EXE
PID:4184
-
-
C:\Users\Admin\AppData\Local\IMAP test plugin\imaptestplugin.exe"C:\Users\Admin\AppData\Local\IMAP test plugin\imaptestplugin.exe" -s3⤵
- Executes dropped EXE
PID:4144
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD54e7770ab4d7d3d54e561c2a858d8e143
SHA1934b42fcd49c3941b343b40684de6e2e472465ce
SHA256d0b40fa656228e88dfc924f2e285629770676a51b908c1011811a302fd18e2c0
SHA51239add98c0bc46632a2fb625583b2a5d931b80b14b8b244f085c3b9f2a1729b3f1eb6de9963462fa7405609de5f0999be6f62b55eb9bfdb0c7575cc72d1e01870
-
Filesize
642KB
MD5856bce6609a05646759555e24a534467
SHA1800c78d9d82bc1d0d631bdd11a9b766b6b964d2d
SHA2562e7e5e01fa3d18a2a76e33dd139dbf251f1dd2ab77aba843b7ef09e51cd86c1a
SHA5125bbfca64610ed8c148a8e182de5e5568af34465698bf6cdd3f5ccc6857bb4b3d90cfc9e6f0f780464a2fe5c776e6ee69291877bb14b5f64b4e9d8791807af47a
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63