Malware Analysis Report

2025-08-10 12:06

Sample ID 240222-zwgnxsfb41
Target F98B2D4646C95810DB7AF07535AD6688.exe
SHA256 2f63ab6e1fc2c86308284d7e6becebb2b4581b6f520da008d9ea8a558718484a
Tags
socks5systemz botnet discovery
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

2f63ab6e1fc2c86308284d7e6becebb2b4581b6f520da008d9ea8a558718484a

Threat Level: Known bad

The file F98B2D4646C95810DB7AF07535AD6688.exe was found to be: Known bad.

Malicious Activity Summary

socks5systemz botnet discovery

Socks5Systemz

Detect Socks5Systemz Payload

Executes dropped EXE

Loads dropped DLL

Checks installed software on the system

Unsigned PE

Suspicious behavior: EnumeratesProcesses

Suspicious use of FindShellTrayWindow

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-02-22 21:03

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-02-22 21:03

Reported

2024-02-22 21:06

Platform

win7-20240221-en

Max time kernel

117s

Max time network

18s

Command Line

"C:\Users\Admin\AppData\Local\Temp\F98B2D4646C95810DB7AF07535AD6688.exe"

Signatures

Detect Socks5Systemz Payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Socks5Systemz

botnet socks5systemz

Checks installed software on the system

discovery

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\is-HM8A0.tmp\F98B2D4646C95810DB7AF07535AD6688.tmp N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2232 wrote to memory of 2020 N/A C:\Users\Admin\AppData\Local\Temp\F98B2D4646C95810DB7AF07535AD6688.exe C:\Users\Admin\AppData\Local\Temp\is-HM8A0.tmp\F98B2D4646C95810DB7AF07535AD6688.tmp
PID 2232 wrote to memory of 2020 N/A C:\Users\Admin\AppData\Local\Temp\F98B2D4646C95810DB7AF07535AD6688.exe C:\Users\Admin\AppData\Local\Temp\is-HM8A0.tmp\F98B2D4646C95810DB7AF07535AD6688.tmp
PID 2232 wrote to memory of 2020 N/A C:\Users\Admin\AppData\Local\Temp\F98B2D4646C95810DB7AF07535AD6688.exe C:\Users\Admin\AppData\Local\Temp\is-HM8A0.tmp\F98B2D4646C95810DB7AF07535AD6688.tmp
PID 2232 wrote to memory of 2020 N/A C:\Users\Admin\AppData\Local\Temp\F98B2D4646C95810DB7AF07535AD6688.exe C:\Users\Admin\AppData\Local\Temp\is-HM8A0.tmp\F98B2D4646C95810DB7AF07535AD6688.tmp
PID 2232 wrote to memory of 2020 N/A C:\Users\Admin\AppData\Local\Temp\F98B2D4646C95810DB7AF07535AD6688.exe C:\Users\Admin\AppData\Local\Temp\is-HM8A0.tmp\F98B2D4646C95810DB7AF07535AD6688.tmp
PID 2232 wrote to memory of 2020 N/A C:\Users\Admin\AppData\Local\Temp\F98B2D4646C95810DB7AF07535AD6688.exe C:\Users\Admin\AppData\Local\Temp\is-HM8A0.tmp\F98B2D4646C95810DB7AF07535AD6688.tmp
PID 2232 wrote to memory of 2020 N/A C:\Users\Admin\AppData\Local\Temp\F98B2D4646C95810DB7AF07535AD6688.exe C:\Users\Admin\AppData\Local\Temp\is-HM8A0.tmp\F98B2D4646C95810DB7AF07535AD6688.tmp
PID 2020 wrote to memory of 2712 N/A C:\Users\Admin\AppData\Local\Temp\is-HM8A0.tmp\F98B2D4646C95810DB7AF07535AD6688.tmp C:\Users\Admin\AppData\Local\VSO Inspector\vsoinspector.exe
PID 2020 wrote to memory of 2712 N/A C:\Users\Admin\AppData\Local\Temp\is-HM8A0.tmp\F98B2D4646C95810DB7AF07535AD6688.tmp C:\Users\Admin\AppData\Local\VSO Inspector\vsoinspector.exe
PID 2020 wrote to memory of 2712 N/A C:\Users\Admin\AppData\Local\Temp\is-HM8A0.tmp\F98B2D4646C95810DB7AF07535AD6688.tmp C:\Users\Admin\AppData\Local\VSO Inspector\vsoinspector.exe
PID 2020 wrote to memory of 2712 N/A C:\Users\Admin\AppData\Local\Temp\is-HM8A0.tmp\F98B2D4646C95810DB7AF07535AD6688.tmp C:\Users\Admin\AppData\Local\VSO Inspector\vsoinspector.exe
PID 2020 wrote to memory of 2372 N/A C:\Users\Admin\AppData\Local\Temp\is-HM8A0.tmp\F98B2D4646C95810DB7AF07535AD6688.tmp C:\Users\Admin\AppData\Local\VSO Inspector\vsoinspector.exe
PID 2020 wrote to memory of 2372 N/A C:\Users\Admin\AppData\Local\Temp\is-HM8A0.tmp\F98B2D4646C95810DB7AF07535AD6688.tmp C:\Users\Admin\AppData\Local\VSO Inspector\vsoinspector.exe
PID 2020 wrote to memory of 2372 N/A C:\Users\Admin\AppData\Local\Temp\is-HM8A0.tmp\F98B2D4646C95810DB7AF07535AD6688.tmp C:\Users\Admin\AppData\Local\VSO Inspector\vsoinspector.exe
PID 2020 wrote to memory of 2372 N/A C:\Users\Admin\AppData\Local\Temp\is-HM8A0.tmp\F98B2D4646C95810DB7AF07535AD6688.tmp C:\Users\Admin\AppData\Local\VSO Inspector\vsoinspector.exe

Processes

C:\Users\Admin\AppData\Local\Temp\F98B2D4646C95810DB7AF07535AD6688.exe

"C:\Users\Admin\AppData\Local\Temp\F98B2D4646C95810DB7AF07535AD6688.exe"

C:\Users\Admin\AppData\Local\Temp\is-HM8A0.tmp\F98B2D4646C95810DB7AF07535AD6688.tmp

"C:\Users\Admin\AppData\Local\Temp\is-HM8A0.tmp\F98B2D4646C95810DB7AF07535AD6688.tmp" /SL5="$70120,4181011,54272,C:\Users\Admin\AppData\Local\Temp\F98B2D4646C95810DB7AF07535AD6688.exe"

C:\Users\Admin\AppData\Local\VSO Inspector\vsoinspector.exe

"C:\Users\Admin\AppData\Local\VSO Inspector\vsoinspector.exe" -i

C:\Users\Admin\AppData\Local\VSO Inspector\vsoinspector.exe

"C:\Users\Admin\AppData\Local\VSO Inspector\vsoinspector.exe" -s

Network

N/A

Files

memory/2232-0-0x0000000000400000-0x0000000000414000-memory.dmp

\Users\Admin\AppData\Local\Temp\is-HM8A0.tmp\F98B2D4646C95810DB7AF07535AD6688.tmp

MD5 d5709c2171e58c1106a886c080be01f8
SHA1 1f7ae64452f9ba78d65c0d4e6a4d0167f26d04d1
SHA256 4f80b4906439bec266cc9f4552f7cfd82bdeac0d7bf29da0040a673cd6576561
SHA512 965d1eca832cbc354717170a42833212da56117485219203758aff248ceb95139ac0a208fe5eb998467307c13e0be3dd6a1b196ef141bd462cc7642c2cdb5ccd

memory/2020-7-0x0000000000240000-0x0000000000241000-memory.dmp

\Users\Admin\AppData\Local\Temp\is-VU9TK.tmp\_isetup\_shfoldr.dll

MD5 92dc6ef532fbb4a5c3201469a5b5eb63
SHA1 3e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA256 9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA512 9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

\Users\Admin\AppData\Local\Temp\is-VU9TK.tmp\_isetup\_isdecmp.dll

MD5 a813d18268affd4763dde940246dc7e5
SHA1 c7366e1fd925c17cc6068001bd38eaef5b42852f
SHA256 e19781aabe466dd8779cb9c8fa41bbb73375447066bb34e876cf388a6ed63c64
SHA512 b310ed4cd2e94381c00a6a370fcb7cc867ebe425d705b69caaaaffdafbab91f72d357966916053e72e68ecf712f2af7585500c58bb53ec3e1d539179fcb45fb4

\Users\Admin\AppData\Local\Temp\is-VU9TK.tmp\_isetup\_iscrypt.dll

MD5 a69559718ab506675e907fe49deb71e9
SHA1 bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA256 2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512 e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

\Users\Admin\AppData\Local\VSO Inspector\vsoinspector.exe

MD5 6817d1a22f42e096ad657f591962d4be
SHA1 60c4bd31aef44293bc9f1b7765419f926c7da876
SHA256 4a62e215b029be175b8d1c5d877a052be9498108dfd0e20fe0946f2345317eaa
SHA512 343728cf09fb344bb016ecfe6a9a88fada58466cd8862c3db0217790e05654859f8149e48453e35f2c3eadcbb0f053c7128398e6eaf83c17665c33b7eead4aed

memory/2712-61-0x0000000000400000-0x0000000000758000-memory.dmp

memory/2020-60-0x0000000003100000-0x0000000003458000-memory.dmp

memory/2712-62-0x0000000000400000-0x0000000000758000-memory.dmp

memory/2712-63-0x0000000000400000-0x0000000000758000-memory.dmp

memory/2712-66-0x0000000000400000-0x0000000000758000-memory.dmp

memory/2372-68-0x0000000000400000-0x0000000000758000-memory.dmp

memory/2372-70-0x0000000000400000-0x0000000000758000-memory.dmp

memory/2232-71-0x0000000000400000-0x0000000000414000-memory.dmp

memory/2020-72-0x0000000000400000-0x00000000004BC000-memory.dmp

memory/2372-73-0x0000000000400000-0x0000000000758000-memory.dmp

memory/2020-74-0x0000000000240000-0x0000000000241000-memory.dmp

memory/2020-75-0x0000000003100000-0x0000000003458000-memory.dmp

memory/2372-78-0x0000000000400000-0x0000000000758000-memory.dmp

memory/2372-81-0x0000000000400000-0x0000000000758000-memory.dmp

memory/2372-82-0x0000000000400000-0x0000000000758000-memory.dmp

memory/2372-85-0x0000000000400000-0x0000000000758000-memory.dmp

memory/2372-88-0x0000000000400000-0x0000000000758000-memory.dmp

memory/2372-91-0x0000000000400000-0x0000000000758000-memory.dmp

memory/2372-92-0x0000000002700000-0x00000000027A2000-memory.dmp

memory/2372-94-0x0000000002700000-0x00000000027A2000-memory.dmp

memory/2372-99-0x0000000000400000-0x0000000000758000-memory.dmp

memory/2372-102-0x0000000000400000-0x0000000000758000-memory.dmp

memory/2372-105-0x0000000002700000-0x00000000027A2000-memory.dmp

memory/2372-106-0x0000000000400000-0x0000000000758000-memory.dmp

memory/2372-109-0x0000000000400000-0x0000000000758000-memory.dmp

memory/2372-112-0x0000000000400000-0x0000000000758000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-02-22 21:03

Reported

2024-02-22 21:06

Platform

win10v2004-20240221-en

Max time kernel

113s

Max time network

124s

Command Line

"C:\Users\Admin\AppData\Local\Temp\F98B2D4646C95810DB7AF07535AD6688.exe"

Signatures

Detect Socks5Systemz Payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Socks5Systemz

botnet socks5systemz

Checks installed software on the system

discovery

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\is-E8K1M.tmp\F98B2D4646C95810DB7AF07535AD6688.tmp N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 4868 wrote to memory of 2540 N/A C:\Users\Admin\AppData\Local\Temp\F98B2D4646C95810DB7AF07535AD6688.exe C:\Users\Admin\AppData\Local\Temp\is-E8K1M.tmp\F98B2D4646C95810DB7AF07535AD6688.tmp
PID 4868 wrote to memory of 2540 N/A C:\Users\Admin\AppData\Local\Temp\F98B2D4646C95810DB7AF07535AD6688.exe C:\Users\Admin\AppData\Local\Temp\is-E8K1M.tmp\F98B2D4646C95810DB7AF07535AD6688.tmp
PID 4868 wrote to memory of 2540 N/A C:\Users\Admin\AppData\Local\Temp\F98B2D4646C95810DB7AF07535AD6688.exe C:\Users\Admin\AppData\Local\Temp\is-E8K1M.tmp\F98B2D4646C95810DB7AF07535AD6688.tmp
PID 2540 wrote to memory of 5016 N/A C:\Users\Admin\AppData\Local\Temp\is-E8K1M.tmp\F98B2D4646C95810DB7AF07535AD6688.tmp C:\Users\Admin\AppData\Local\VSO Inspector\vsoinspector.exe
PID 2540 wrote to memory of 5016 N/A C:\Users\Admin\AppData\Local\Temp\is-E8K1M.tmp\F98B2D4646C95810DB7AF07535AD6688.tmp C:\Users\Admin\AppData\Local\VSO Inspector\vsoinspector.exe
PID 2540 wrote to memory of 5016 N/A C:\Users\Admin\AppData\Local\Temp\is-E8K1M.tmp\F98B2D4646C95810DB7AF07535AD6688.tmp C:\Users\Admin\AppData\Local\VSO Inspector\vsoinspector.exe
PID 2540 wrote to memory of 1376 N/A C:\Users\Admin\AppData\Local\Temp\is-E8K1M.tmp\F98B2D4646C95810DB7AF07535AD6688.tmp C:\Users\Admin\AppData\Local\VSO Inspector\vsoinspector.exe
PID 2540 wrote to memory of 1376 N/A C:\Users\Admin\AppData\Local\Temp\is-E8K1M.tmp\F98B2D4646C95810DB7AF07535AD6688.tmp C:\Users\Admin\AppData\Local\VSO Inspector\vsoinspector.exe
PID 2540 wrote to memory of 1376 N/A C:\Users\Admin\AppData\Local\Temp\is-E8K1M.tmp\F98B2D4646C95810DB7AF07535AD6688.tmp C:\Users\Admin\AppData\Local\VSO Inspector\vsoinspector.exe

Processes

C:\Users\Admin\AppData\Local\Temp\F98B2D4646C95810DB7AF07535AD6688.exe

"C:\Users\Admin\AppData\Local\Temp\F98B2D4646C95810DB7AF07535AD6688.exe"

C:\Users\Admin\AppData\Local\Temp\is-E8K1M.tmp\F98B2D4646C95810DB7AF07535AD6688.tmp

"C:\Users\Admin\AppData\Local\Temp\is-E8K1M.tmp\F98B2D4646C95810DB7AF07535AD6688.tmp" /SL5="$3022C,4181011,54272,C:\Users\Admin\AppData\Local\Temp\F98B2D4646C95810DB7AF07535AD6688.exe"

C:\Users\Admin\AppData\Local\VSO Inspector\vsoinspector.exe

"C:\Users\Admin\AppData\Local\VSO Inspector\vsoinspector.exe" -i

C:\Users\Admin\AppData\Local\VSO Inspector\vsoinspector.exe

"C:\Users\Admin\AppData\Local\VSO Inspector\vsoinspector.exe" -s

Network

Country Destination Domain Proto
US 8.8.8.8:53 175.178.17.96.in-addr.arpa udp
US 8.8.8.8:53 20.160.190.20.in-addr.arpa udp
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.200:443 g.bing.com tcp
US 8.8.8.8:53 200.197.79.204.in-addr.arpa udp
US 8.8.8.8:53 9.228.82.20.in-addr.arpa udp
US 8.8.8.8:53 167.109.18.2.in-addr.arpa udp
US 20.231.121.79:80 tcp
US 8.8.8.8:53 88.156.103.20.in-addr.arpa udp
US 8.8.8.8:53 183.59.114.20.in-addr.arpa udp
US 8.8.8.8:53 18.31.95.13.in-addr.arpa udp
US 8.8.8.8:53 28.160.77.104.in-addr.arpa udp
US 8.8.8.8:53 45.179.17.96.in-addr.arpa udp
US 8.8.8.8:53 193.178.17.96.in-addr.arpa udp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp

Files

memory/4868-0-0x0000000000400000-0x0000000000414000-memory.dmp

memory/4868-2-0x0000000000400000-0x0000000000414000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\is-E8K1M.tmp\F98B2D4646C95810DB7AF07535AD6688.tmp

MD5 d5709c2171e58c1106a886c080be01f8
SHA1 1f7ae64452f9ba78d65c0d4e6a4d0167f26d04d1
SHA256 4f80b4906439bec266cc9f4552f7cfd82bdeac0d7bf29da0040a673cd6576561
SHA512 965d1eca832cbc354717170a42833212da56117485219203758aff248ceb95139ac0a208fe5eb998467307c13e0be3dd6a1b196ef141bd462cc7642c2cdb5ccd

memory/2540-7-0x00000000007A0000-0x00000000007A1000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\is-M0ORN.tmp\_isetup\_isdecmp.dll

MD5 a813d18268affd4763dde940246dc7e5
SHA1 c7366e1fd925c17cc6068001bd38eaef5b42852f
SHA256 e19781aabe466dd8779cb9c8fa41bbb73375447066bb34e876cf388a6ed63c64
SHA512 b310ed4cd2e94381c00a6a370fcb7cc867ebe425d705b69caaaaffdafbab91f72d357966916053e72e68ecf712f2af7585500c58bb53ec3e1d539179fcb45fb4

C:\Users\Admin\AppData\Local\Temp\is-M0ORN.tmp\_isetup\_iscrypt.dll

MD5 a69559718ab506675e907fe49deb71e9
SHA1 bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA256 2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512 e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

C:\Users\Admin\AppData\Local\VSO Inspector\vsoinspector.exe

MD5 6817d1a22f42e096ad657f591962d4be
SHA1 60c4bd31aef44293bc9f1b7765419f926c7da876
SHA256 4a62e215b029be175b8d1c5d877a052be9498108dfd0e20fe0946f2345317eaa
SHA512 343728cf09fb344bb016ecfe6a9a88fada58466cd8862c3db0217790e05654859f8149e48453e35f2c3eadcbb0f053c7128398e6eaf83c17665c33b7eead4aed

memory/5016-59-0x0000000000400000-0x0000000000758000-memory.dmp

memory/5016-60-0x0000000000400000-0x0000000000758000-memory.dmp

memory/5016-64-0x0000000000400000-0x0000000000758000-memory.dmp

C:\Users\Admin\AppData\Local\VSO Inspector\vsoinspector.exe

MD5 c15f7495a8f6222e70d79a2bc7d8a8d4
SHA1 103e1d93d477af85048d3a67ff931adf999cf3ad
SHA256 60bdad8aba0131faf92b09d55a1e5faa54a23be3a7f3c6feefe64da94f9edae4
SHA512 c6ee301c8be51d78f4a0e0991bf2b5ce85e662853a05fcd30503344fac4c5aee90bb82a18cde845eb44b64d3692e7bbc287f53b7f793199f57ff1b32fc3b8d64

memory/1376-67-0x0000000000400000-0x0000000000758000-memory.dmp

memory/4868-68-0x0000000000400000-0x0000000000414000-memory.dmp

memory/2540-69-0x0000000000400000-0x00000000004BC000-memory.dmp

memory/1376-70-0x0000000000400000-0x0000000000758000-memory.dmp

memory/2540-71-0x00000000007A0000-0x00000000007A1000-memory.dmp

memory/1376-74-0x0000000000400000-0x0000000000758000-memory.dmp

memory/1376-75-0x0000000000400000-0x0000000000758000-memory.dmp

memory/1376-78-0x0000000000400000-0x0000000000758000-memory.dmp

memory/1376-81-0x0000000000400000-0x0000000000758000-memory.dmp

memory/1376-84-0x0000000000400000-0x0000000000758000-memory.dmp

memory/1376-87-0x0000000000960000-0x0000000000A02000-memory.dmp

memory/1376-88-0x0000000000400000-0x0000000000758000-memory.dmp

memory/1376-90-0x0000000000960000-0x0000000000A02000-memory.dmp

memory/1376-95-0x0000000000400000-0x0000000000758000-memory.dmp

memory/1376-98-0x0000000000400000-0x0000000000758000-memory.dmp

memory/1376-99-0x0000000000960000-0x0000000000A02000-memory.dmp

memory/1376-102-0x0000000000400000-0x0000000000758000-memory.dmp

memory/1376-105-0x0000000000400000-0x0000000000758000-memory.dmp

memory/1376-108-0x0000000000400000-0x0000000000758000-memory.dmp