Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13/01/2024, 03:42
Static task
static1
Behavioral task
behavioral1
Sample
836702e8e9b5cc72d071836f7aece14f2f55103db492110feb3d1df399cb5a7e.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
836702e8e9b5cc72d071836f7aece14f2f55103db492110feb3d1df399cb5a7e.exe
Resource
win10v2004-20231215-en
General
-
Target
836702e8e9b5cc72d071836f7aece14f2f55103db492110feb3d1df399cb5a7e.exe
-
Size
3.9MB
-
MD5
eb7073f79738bc3871d8fdcdda2f6d07
-
SHA1
660b50ca01cb57643dabc899305bb56272874070
-
SHA256
836702e8e9b5cc72d071836f7aece14f2f55103db492110feb3d1df399cb5a7e
-
SHA512
5b271b1d56ff77f62dccde03c94c7767b4133cc1467f6f85ffec08cdcec8efcb91c8657d2c308db9af576a54abaeb5738b837edce123d05c655968573c9da4ac
-
SSDEEP
98304:Ci5y4bUjbSiDmlFQh0GSRxSe5hbFSXQrUCngi+5PpkE:n5boj5D+yh0GSrSUbIALngrF
Malware Config
Signatures
-
Detect Socks5Systemz Payload 3 IoCs
resource yara_rule behavioral2/memory/1280-141-0x00000000008F0000-0x0000000000992000-memory.dmp family_socks5systemz behavioral2/memory/1280-146-0x00000000008F0000-0x0000000000992000-memory.dmp family_socks5systemz behavioral2/memory/1280-153-0x00000000008F0000-0x0000000000992000-memory.dmp family_socks5systemz -
Socks5Systemz
Socks5Systemz is a botnet written in C++.
-
Executes dropped EXE 3 IoCs
pid Process 4496 is-1K01V.tmp 3996 pcidevicechecker.exe 1280 pcidevicechecker.exe -
Loads dropped DLL 1 IoCs
pid Process 4496 is-1K01V.tmp -
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 152.89.198.214 -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1360 wrote to memory of 4496 1360 836702e8e9b5cc72d071836f7aece14f2f55103db492110feb3d1df399cb5a7e.exe 90 PID 1360 wrote to memory of 4496 1360 836702e8e9b5cc72d071836f7aece14f2f55103db492110feb3d1df399cb5a7e.exe 90 PID 1360 wrote to memory of 4496 1360 836702e8e9b5cc72d071836f7aece14f2f55103db492110feb3d1df399cb5a7e.exe 90 PID 4496 wrote to memory of 3028 4496 is-1K01V.tmp 92 PID 4496 wrote to memory of 3028 4496 is-1K01V.tmp 92 PID 4496 wrote to memory of 3028 4496 is-1K01V.tmp 92 PID 4496 wrote to memory of 3996 4496 is-1K01V.tmp 94 PID 4496 wrote to memory of 3996 4496 is-1K01V.tmp 94 PID 4496 wrote to memory of 3996 4496 is-1K01V.tmp 94 PID 3028 wrote to memory of 3684 3028 net.exe 95 PID 3028 wrote to memory of 3684 3028 net.exe 95 PID 3028 wrote to memory of 3684 3028 net.exe 95 PID 4496 wrote to memory of 1280 4496 is-1K01V.tmp 96 PID 4496 wrote to memory of 1280 4496 is-1K01V.tmp 96 PID 4496 wrote to memory of 1280 4496 is-1K01V.tmp 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\836702e8e9b5cc72d071836f7aece14f2f55103db492110feb3d1df399cb5a7e.exe"C:\Users\Admin\AppData\Local\Temp\836702e8e9b5cc72d071836f7aece14f2f55103db492110feb3d1df399cb5a7e.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Users\Admin\AppData\Local\Temp\is-26QPB.tmp\is-1K01V.tmp"C:\Users\Admin\AppData\Local\Temp\is-26QPB.tmp\is-1K01V.tmp" /SL4 $11006E "C:\Users\Admin\AppData\Local\Temp\836702e8e9b5cc72d071836f7aece14f2f55103db492110feb3d1df399cb5a7e.exe" 3871317 522242⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" helpmsg 11133⤵
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 helpmsg 11134⤵PID:3684
-
-
-
C:\Users\Admin\AppData\Local\PCI Device Checker\pcidevicechecker.exe"C:\Users\Admin\AppData\Local\PCI Device Checker\pcidevicechecker.exe" -i3⤵
- Executes dropped EXE
PID:3996
-
-
C:\Users\Admin\AppData\Local\PCI Device Checker\pcidevicechecker.exe"C:\Users\Admin\AppData\Local\PCI Device Checker\pcidevicechecker.exe" -s3⤵
- Executes dropped EXE
PID:1280
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
701KB
MD5f6381681b5922eb5b5e883a6d42b0319
SHA1a7052d36312d2c61d3de4244e57364eb6b11e502
SHA256d509c21be825113e3634122b55652968fe0189a26d5527517e560026c7b5fbfc
SHA512e996358926229a9c228c8c0c24ee26ca57bceec4a1171ec0704ec5325083ce6e446d273adeb8bbc180e9a2707e46e0573cdca488975aa598609375024f4167ce
-
Filesize
220KB
MD56e85c9be2da3f4e9e5a5f3429b513ce1
SHA1eea8a446c23311911335e92822de26135a0e1134
SHA2563ae143f7e0a1d42954a923338a53f359946b78c0888c5bcfdb6d08f908caa354
SHA51221368bf244601783d9ce339c622136f6f83d9746d92941892637d8ca6f990b694c12f6922efe1d94ea38191feb79ae1aa9c86ac8952efe0202cfa8f501aa443c
-
Filesize
171KB
MD5fc9a36e60475f621203ed46bbd5b59a5
SHA19ed6b61f3f438cfdb6fe1b6f8eeb968cdcd6c31b
SHA256eab2e726b25a8556de83f9d3d7405226a896705eff77a412adfd5f422af6f58d
SHA51238811fdb9652037918880d88431dc153054a7dd8cdd9442b6f334fac26dd8456af40289bb1c72ecb02c1b640c7ec49b2644b61fc034be1407e893e5b0db80c47
-
Filesize
642KB
MD5856bce6609a05646759555e24a534467
SHA1800c78d9d82bc1d0d631bdd11a9b766b6b964d2d
SHA2562e7e5e01fa3d18a2a76e33dd139dbf251f1dd2ab77aba843b7ef09e51cd86c1a
SHA5125bbfca64610ed8c148a8e182de5e5568af34465698bf6cdd3f5ccc6857bb4b3d90cfc9e6f0f780464a2fe5c776e6ee69291877bb14b5f64b4e9d8791807af47a
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63