Analysis
-
max time kernel
141s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
13/01/2024, 03:36
Static task
static1
Behavioral task
behavioral1
Sample
56f2e82c10506d2ad399bbcd547fb4869909d7c9a64a3add918bf7534640d323.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
56f2e82c10506d2ad399bbcd547fb4869909d7c9a64a3add918bf7534640d323.exe
Resource
win10v2004-20231222-en
General
-
Target
56f2e82c10506d2ad399bbcd547fb4869909d7c9a64a3add918bf7534640d323.exe
-
Size
3.9MB
-
MD5
e850f5020fb5501d14bee48d7087e589
-
SHA1
f13d6f8987eb81173ada9be01be2a164f6b00ab8
-
SHA256
56f2e82c10506d2ad399bbcd547fb4869909d7c9a64a3add918bf7534640d323
-
SHA512
a8754ece133b7e30d9d38fe6974c02cd096c9887301fe6451bd5d0c17e8dabe7962372cb8c369579107677b77a086999dbafbfdf9cb10460cadb10035674b5d3
-
SSDEEP
98304:eiligBB2JqtMtultlsSUWNBD1uIyth/pXo5UOCBPA2MO3T7D5fPxIkS:rMATUulzLUWHhzq+wsWBP+r
Malware Config
Signatures
-
Detect Socks5Systemz Payload 5 IoCs
resource yara_rule behavioral2/memory/3296-142-0x0000000000920000-0x00000000009C2000-memory.dmp family_socks5systemz behavioral2/memory/3296-147-0x0000000000920000-0x00000000009C2000-memory.dmp family_socks5systemz behavioral2/memory/3296-154-0x0000000000920000-0x00000000009C2000-memory.dmp family_socks5systemz behavioral2/memory/3296-166-0x0000000000920000-0x00000000009C2000-memory.dmp family_socks5systemz behavioral2/memory/3296-167-0x0000000000920000-0x00000000009C2000-memory.dmp family_socks5systemz -
Socks5Systemz
Socks5Systemz is a botnet written in C++.
-
Executes dropped EXE 3 IoCs
pid Process 3552 is-RQ25J.tmp 3800 pcidevicechecker.exe 3296 pcidevicechecker.exe -
Loads dropped DLL 1 IoCs
pid Process 3552 is-RQ25J.tmp -
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 45.155.250.90 -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3592 wrote to memory of 3552 3592 56f2e82c10506d2ad399bbcd547fb4869909d7c9a64a3add918bf7534640d323.exe 89 PID 3592 wrote to memory of 3552 3592 56f2e82c10506d2ad399bbcd547fb4869909d7c9a64a3add918bf7534640d323.exe 89 PID 3592 wrote to memory of 3552 3592 56f2e82c10506d2ad399bbcd547fb4869909d7c9a64a3add918bf7534640d323.exe 89 PID 3552 wrote to memory of 1204 3552 is-RQ25J.tmp 97 PID 3552 wrote to memory of 1204 3552 is-RQ25J.tmp 97 PID 3552 wrote to memory of 1204 3552 is-RQ25J.tmp 97 PID 3552 wrote to memory of 3800 3552 is-RQ25J.tmp 93 PID 3552 wrote to memory of 3800 3552 is-RQ25J.tmp 93 PID 3552 wrote to memory of 3800 3552 is-RQ25J.tmp 93 PID 1204 wrote to memory of 1752 1204 net.exe 95 PID 1204 wrote to memory of 1752 1204 net.exe 95 PID 1204 wrote to memory of 1752 1204 net.exe 95 PID 3552 wrote to memory of 3296 3552 is-RQ25J.tmp 94 PID 3552 wrote to memory of 3296 3552 is-RQ25J.tmp 94 PID 3552 wrote to memory of 3296 3552 is-RQ25J.tmp 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\56f2e82c10506d2ad399bbcd547fb4869909d7c9a64a3add918bf7534640d323.exe"C:\Users\Admin\AppData\Local\Temp\56f2e82c10506d2ad399bbcd547fb4869909d7c9a64a3add918bf7534640d323.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3592 -
C:\Users\Admin\AppData\Local\Temp\is-5RV7N.tmp\is-RQ25J.tmp"C:\Users\Admin\AppData\Local\Temp\is-5RV7N.tmp\is-RQ25J.tmp" /SL4 $B0050 "C:\Users\Admin\AppData\Local\Temp\56f2e82c10506d2ad399bbcd547fb4869909d7c9a64a3add918bf7534640d323.exe" 3864290 522242⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3552 -
C:\Users\Admin\AppData\Local\PCI Device Checker\pcidevicechecker.exe"C:\Users\Admin\AppData\Local\PCI Device Checker\pcidevicechecker.exe" -i3⤵
- Executes dropped EXE
PID:3800
-
-
C:\Users\Admin\AppData\Local\PCI Device Checker\pcidevicechecker.exe"C:\Users\Admin\AppData\Local\PCI Device Checker\pcidevicechecker.exe" -s3⤵
- Executes dropped EXE
PID:3296
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" helpmsg 11133⤵
- Suspicious use of WriteProcessMemory
PID:1204
-
-
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 helpmsg 11131⤵PID:1752
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
832KB
MD55c67c1391395093199b1a0e86ece9814
SHA1b481c4bc48fbcda406f3d950822a3be2e7df70b3
SHA256c469f2c61acb6a0f67825b16916017e15a2b2ce637d9b63acfeb03e910430ae5
SHA51247cc66a3ee0d2bc682a787a46ced341fb5dd996b2a4c0f720dcc03b439c3b6fe975f56f09ecc99495a83afa4d81b8f7933fdfbde5cb1718fe7a391732acc4659
-
Filesize
257KB
MD52f0f099401ec09c93def71c3d94673d5
SHA137fb66b408204f33f527f89d16bdb877dbad6166
SHA256ee732678a733f33ecd955be12ad3fd121289a64e745f8aa3d445bb2ac5fa14a9
SHA512b2586a044328b2e39392f617bdc69c0a3a946bbebd53c0cf7cf32f6d1690ef13889585108cd656971adf4a9dc2cae460e385a0034dc1c4b179c07d519f0a1474
-
Filesize
320KB
MD5b1da678af31bba4db4020459a09b332a
SHA1a152926d415ed8e6d3b81dc815db54623cd7a931
SHA256f37d1fbe00fa3bec83a4b752815aeb5d59aee2023da2d7723bff2473989829cf
SHA512d071a772ec8f3b4a1b438b5c139570d287fafaa55d916615ebe43506575c73a946f85e95f8a5b6e878bce22d0d51e27564aae11c7b7710d008f7e2cd303e7065
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
155KB
MD5f1ed836319d0086c45f743180df05079
SHA1726e1f52f92093d41173aaefb9297b50eb0fe6d6
SHA2567db770d697915489407efced1de5affe22324e34870d919457180390c8d54212
SHA512444bf94b0e6d858db7a872d075597d322b000142deef6405df622210dbf84316dff74fc6ff1e7fadbab9d2188fc584e722ce4da532c769ec702f71f87678a0de
-
Filesize
92KB
MD50186461547d0bba32e1fe0b8b33f0895
SHA18fafd9dfff35b3b31a64b79729ed92d0a01044f3
SHA256c470f414af61f873405e96fa11e602cf31c3f45dfc7858fd0b1fb83cb2ca5348
SHA5127c11f6651ad15747577e13763690d6c06d9104e83929bc2a4ae454e8fbbd9226ff5ac296946929c16aeec27d12b779f7f35eac7930f45c5e6c1b1216b70b6787