Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/02/2024, 17:26 UTC

General

  • Target

    2f74d868692ce50e073cfdd6a2fbafa3.exe

  • Size

    2.4MB

  • MD5

    2f74d868692ce50e073cfdd6a2fbafa3

  • SHA1

    7e31e58f97728181a239583884cd6789e5ddf891

  • SHA256

    c237d3d7c79c5fb7795b875bd6f6c79e5bc95a96d41cf4249d755427dc4c1d58

  • SHA512

    811648978e206e396c790dca0bf61fd161711ed682842a6f95e4e2619e55a445078e56ff3c749ed1bd1e745c952276381029596e5b3d23a3415440b622279beb

  • SSDEEP

    49152:C9Poy707ePYSmuZMJdIdF/+zVQn/IZjjNf2UwcMyPOJPca0o83hlurCT:MAKbGcdFmVQn/IZjjfwcMyPGPcflH

Malware Config

Extracted

Family

socks5systemz

C2

http://aidoruu.ru/search/?q=67e28dd8655ba479120da84d7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4fe8889b5e4fa9281ae978a071ea771795af8e05c645db22f31dfe339426fa11af66c152adb719a9577e55b8603e983a608ef611c5eb9d9832

Signatures

  • Detect Socks5Systemz Payload 2 IoCs
  • Socks5Systemz

    Socks5Systemz is a botnet written in C++.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Unexpected DNS network traffic destination 1 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2f74d868692ce50e073cfdd6a2fbafa3.exe
    "C:\Users\Admin\AppData\Local\Temp\2f74d868692ce50e073cfdd6a2fbafa3.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3908
    • C:\Users\Admin\AppData\Local\Temp\is-2DLLC.tmp\2f74d868692ce50e073cfdd6a2fbafa3.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-2DLLC.tmp\2f74d868692ce50e073cfdd6a2fbafa3.tmp" /SL5="$70096,2127575,56832,C:\Users\Admin\AppData\Local\Temp\2f74d868692ce50e073cfdd6a2fbafa3.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:2168
      • C:\Users\Admin\AppData\Local\Sadko Drive Speed\sadkodrive.exe
        "C:\Users\Admin\AppData\Local\Sadko Drive Speed\sadkodrive.exe" -i
        3⤵
        • Executes dropped EXE
        PID:1276
      • C:\Users\Admin\AppData\Local\Sadko Drive Speed\sadkodrive.exe
        "C:\Users\Admin\AppData\Local\Sadko Drive Speed\sadkodrive.exe" -s
        3⤵
        • Executes dropped EXE
        PID:2428

Network

  • flag-us
    DNS
    2.159.190.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    2.159.190.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    241.154.82.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    241.154.82.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    186.178.17.96.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    186.178.17.96.in-addr.arpa
    IN PTR
    Response
    186.178.17.96.in-addr.arpa
    IN PTR
    a96-17-178-186deploystaticakamaitechnologiescom
  • flag-us
    DNS
    205.47.74.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    205.47.74.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    167.109.18.2.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    167.109.18.2.in-addr.arpa
    IN PTR
    Response
    167.109.18.2.in-addr.arpa
    IN PTR
    a2-18-109-167deploystaticakamaitechnologiescom
  • flag-us
    DNS
    157.123.68.40.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    157.123.68.40.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    15.164.165.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    15.164.165.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    217.135.221.88.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    217.135.221.88.in-addr.arpa
    IN PTR
    Response
    217.135.221.88.in-addr.arpa
    IN PTR
    a88-221-135-217deploystaticakamaitechnologiescom
  • flag-us
    DNS
    205.178.17.96.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    205.178.17.96.in-addr.arpa
    IN PTR
    Response
    205.178.17.96.in-addr.arpa
    IN PTR
    a96-17-178-205deploystaticakamaitechnologiescom
  • flag-us
    DNS
    202.178.17.96.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    202.178.17.96.in-addr.arpa
    IN PTR
    Response
    202.178.17.96.in-addr.arpa
    IN PTR
    a96-17-178-202deploystaticakamaitechnologiescom
  • flag-ru
    DNS
    aidoruu.ru
    sadkodrive.exe
    Remote address:
    152.89.198.214:53
    Request
    aidoruu.ru
    IN A
    Response
    aidoruu.ru
    IN A
    195.16.74.230
  • flag-tr
    GET
    http://aidoruu.ru/search/?q=67e28dd8655ba479120da84d7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4fe8889b5e4fa9281ae978a071ea771795af8e05c645db22f31dfe339426fa11af66c152adb719a9577e55b8603e983a608ef611c5eb9d9832
    sadkodrive.exe
    Remote address:
    195.16.74.230:80
    Request
    GET /search/?q=67e28dd8655ba479120da84d7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4fe8889b5e4fa9281ae978a071ea771795af8e05c645db22f31dfe339426fa11af66c152adb719a9577e55b8603e983a608ef611c5eb9d9832 HTTP/1.1
    Host: aidoruu.ru
    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
    Response
    HTTP/1.1 200 OK
    Server: nginx/1.20.1
    Date: Tue, 27 Feb 2024 17:28:11 GMT
    Content-Type: text/html; charset=UTF-8
    Transfer-Encoding: chunked
    Connection: keep-alive
    X-Powered-By: PHP/7.4.33
  • flag-us
    DNS
    214.198.89.152.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    214.198.89.152.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    230.74.16.195.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    230.74.16.195.in-addr.arpa
    IN PTR
    Response
    230.74.16.195.in-addr.arpa
    IN PTR
    vm1871319stark-industries solutions
  • flag-us
    DNS
    209.143.182.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    209.143.182.52.in-addr.arpa
    IN PTR
    Response
  • 195.16.74.230:80
    http://aidoruu.ru/search/?q=67e28dd8655ba479120da84d7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4fe8889b5e4fa9281ae978a071ea771795af8e05c645db22f31dfe339426fa11af66c152adb719a9577e55b8603e983a608ef611c5eb9d9832
    http
    sadkodrive.exe
    501 B
    352 B
    4
    3

    HTTP Request

    GET http://aidoruu.ru/search/?q=67e28dd8655ba479120da84d7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4fe8889b5e4fa9281ae978a071ea771795af8e05c645db22f31dfe339426fa11af66c152adb719a9577e55b8603e983a608ef611c5eb9d9832

    HTTP Response

    200
  • 8.8.8.8:53
    2.159.190.20.in-addr.arpa
    dns
    71 B
    157 B
    1
    1

    DNS Request

    2.159.190.20.in-addr.arpa

  • 8.8.8.8:53
    241.154.82.20.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    241.154.82.20.in-addr.arpa

  • 8.8.8.8:53
    186.178.17.96.in-addr.arpa
    dns
    72 B
    137 B
    1
    1

    DNS Request

    186.178.17.96.in-addr.arpa

  • 8.8.8.8:53
    205.47.74.20.in-addr.arpa
    dns
    71 B
    157 B
    1
    1

    DNS Request

    205.47.74.20.in-addr.arpa

  • 8.8.8.8:53
    167.109.18.2.in-addr.arpa
    dns
    71 B
    135 B
    1
    1

    DNS Request

    167.109.18.2.in-addr.arpa

  • 8.8.8.8:53
    157.123.68.40.in-addr.arpa
    dns
    72 B
    146 B
    1
    1

    DNS Request

    157.123.68.40.in-addr.arpa

  • 8.8.8.8:53
    15.164.165.52.in-addr.arpa
    dns
    72 B
    146 B
    1
    1

    DNS Request

    15.164.165.52.in-addr.arpa

  • 8.8.8.8:53
    217.135.221.88.in-addr.arpa
    dns
    73 B
    139 B
    1
    1

    DNS Request

    217.135.221.88.in-addr.arpa

  • 8.8.8.8:53
    205.178.17.96.in-addr.arpa
    dns
    72 B
    137 B
    1
    1

    DNS Request

    205.178.17.96.in-addr.arpa

  • 8.8.8.8:53
    202.178.17.96.in-addr.arpa
    dns
    72 B
    137 B
    1
    1

    DNS Request

    202.178.17.96.in-addr.arpa

  • 152.89.198.214:53
    aidoruu.ru
    dns
    sadkodrive.exe
    56 B
    82 B
    1
    1

    DNS Request

    aidoruu.ru

    DNS Response

    195.16.74.230

  • 8.8.8.8:53
    214.198.89.152.in-addr.arpa
    dns
    73 B
    127 B
    1
    1

    DNS Request

    214.198.89.152.in-addr.arpa

  • 8.8.8.8:53
    230.74.16.195.in-addr.arpa
    dns
    72 B
    122 B
    1
    1

    DNS Request

    230.74.16.195.in-addr.arpa

  • 8.8.8.8:53
    209.143.182.52.in-addr.arpa
    dns
    73 B
    147 B
    1
    1

    DNS Request

    209.143.182.52.in-addr.arpa

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Sadko Drive Speed\sadkodrive.exe

    Filesize

    3.2MB

    MD5

    d68a989948c07f8e3e645ba2c2453274

    SHA1

    9670803bcb662513464e8fbd2adb4eb1b11ec022

    SHA256

    46cc6f830e62ea1d053d49295db94f3dbf62b311e6af2b28905d1e1cc1c5dfca

    SHA512

    d71b7c1476fe487a6cf787acb292f5ed2f33f2a853b18c617a1fecb23cac94439fc6ea82764cd8ac6e99fc81aa048b3364184bbcfbed9e7a90c8f9866f915fe0

  • C:\Users\Admin\AppData\Local\Temp\is-2DLLC.tmp\2f74d868692ce50e073cfdd6a2fbafa3.tmp

    Filesize

    690KB

    MD5

    a4a2a684c1454484e5b95a81c1bd1b34

    SHA1

    fcb5a95d4847a296f938a0f2e1b2d286d8c728a1

    SHA256

    6155c75f1b12a43374733984467f26adaf930b8b5c56e2986e3da0ffdcd13653

    SHA512

    7c9866bdb41e06de09a805efce06a6a2bcbea544f9dc7834c716d4ae7d15f413283782ec17a158aa8b35e247f20622fb65f803cb5c000820c164627ece5f9aef

  • C:\Users\Admin\AppData\Local\Temp\is-F4I0J.tmp\_isetup\_iscrypt.dll

    Filesize

    2KB

    MD5

    a69559718ab506675e907fe49deb71e9

    SHA1

    bc8f404ffdb1960b50c12ff9413c893b56f2e36f

    SHA256

    2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

    SHA512

    e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

  • C:\Users\Admin\AppData\Local\Temp\is-F4I0J.tmp\_isetup\_isdecmp.dll

    Filesize

    19KB

    MD5

    3adaa386b671c2df3bae5b39dc093008

    SHA1

    067cf95fbdb922d81db58432c46930f86d23dded

    SHA256

    71cd2f5bc6e13b8349a7c98697c6d2e3fcdeea92699cedd591875bea869fae38

    SHA512

    bbe4187758d1a69f75a8cca6b3184e0c20cf8701b16531b55ed4987497934b3c9ef66ecd5e6b83c7357f69734f1c8301b9f82f0a024bb693b732a2d5760fd303

  • memory/1276-43-0x0000000000400000-0x000000000072D000-memory.dmp

    Filesize

    3.2MB

  • memory/1276-44-0x0000000000400000-0x000000000072D000-memory.dmp

    Filesize

    3.2MB

  • memory/1276-45-0x0000000000400000-0x000000000072D000-memory.dmp

    Filesize

    3.2MB

  • memory/1276-48-0x0000000000400000-0x000000000072D000-memory.dmp

    Filesize

    3.2MB

  • memory/2168-53-0x0000000000400000-0x00000000004BC000-memory.dmp

    Filesize

    752KB

  • memory/2168-55-0x0000000000690000-0x0000000000691000-memory.dmp

    Filesize

    4KB

  • memory/2168-7-0x0000000000690000-0x0000000000691000-memory.dmp

    Filesize

    4KB

  • memory/2428-58-0x0000000000400000-0x000000000072D000-memory.dmp

    Filesize

    3.2MB

  • memory/2428-72-0x0000000000920000-0x00000000009C2000-memory.dmp

    Filesize

    648KB

  • memory/2428-51-0x0000000000400000-0x000000000072D000-memory.dmp

    Filesize

    3.2MB

  • memory/2428-54-0x0000000000400000-0x000000000072D000-memory.dmp

    Filesize

    3.2MB

  • memory/2428-101-0x0000000000400000-0x000000000072D000-memory.dmp

    Filesize

    3.2MB

  • memory/2428-98-0x0000000000400000-0x000000000072D000-memory.dmp

    Filesize

    3.2MB

  • memory/2428-59-0x0000000000400000-0x000000000072D000-memory.dmp

    Filesize

    3.2MB

  • memory/2428-62-0x0000000000400000-0x000000000072D000-memory.dmp

    Filesize

    3.2MB

  • memory/2428-65-0x0000000000400000-0x000000000072D000-memory.dmp

    Filesize

    3.2MB

  • memory/2428-68-0x0000000000400000-0x000000000072D000-memory.dmp

    Filesize

    3.2MB

  • memory/2428-71-0x0000000000400000-0x000000000072D000-memory.dmp

    Filesize

    3.2MB

  • memory/2428-94-0x0000000000400000-0x000000000072D000-memory.dmp

    Filesize

    3.2MB

  • memory/2428-78-0x0000000000400000-0x000000000072D000-memory.dmp

    Filesize

    3.2MB

  • memory/2428-81-0x0000000000400000-0x000000000072D000-memory.dmp

    Filesize

    3.2MB

  • memory/2428-82-0x0000000000920000-0x00000000009C2000-memory.dmp

    Filesize

    648KB

  • memory/2428-85-0x0000000000400000-0x000000000072D000-memory.dmp

    Filesize

    3.2MB

  • memory/2428-88-0x0000000000400000-0x000000000072D000-memory.dmp

    Filesize

    3.2MB

  • memory/2428-91-0x0000000000400000-0x000000000072D000-memory.dmp

    Filesize

    3.2MB

  • memory/3908-52-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/3908-0-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/3908-2-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.