Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
27-02-2024 17:26
Static task
static1
Behavioral task
behavioral1
Sample
2f74d868692ce50e073cfdd6a2fbafa3.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2f74d868692ce50e073cfdd6a2fbafa3.exe
Resource
win10v2004-20240226-en
General
-
Target
2f74d868692ce50e073cfdd6a2fbafa3.exe
-
Size
2.4MB
-
MD5
2f74d868692ce50e073cfdd6a2fbafa3
-
SHA1
7e31e58f97728181a239583884cd6789e5ddf891
-
SHA256
c237d3d7c79c5fb7795b875bd6f6c79e5bc95a96d41cf4249d755427dc4c1d58
-
SHA512
811648978e206e396c790dca0bf61fd161711ed682842a6f95e4e2619e55a445078e56ff3c749ed1bd1e745c952276381029596e5b3d23a3415440b622279beb
-
SSDEEP
49152:C9Poy707ePYSmuZMJdIdF/+zVQn/IZjjNf2UwcMyPOJPca0o83hlurCT:MAKbGcdFmVQn/IZjjfwcMyPGPcflH
Malware Config
Extracted
socks5systemz
http://aidoruu.ru/search/?q=67e28dd8655ba479120da84d7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4fe8889b5e4fa9281ae978a071ea771795af8e05c645db22f31dfe339426fa11af66c152adb719a9577e55b8603e983a608ef611c5eb9d9832
Signatures
-
Detect Socks5Systemz Payload 2 IoCs
resource yara_rule behavioral2/memory/2428-72-0x0000000000920000-0x00000000009C2000-memory.dmp family_socks5systemz behavioral2/memory/2428-82-0x0000000000920000-0x00000000009C2000-memory.dmp family_socks5systemz -
Socks5Systemz
Socks5Systemz is a botnet written in C++.
-
Executes dropped EXE 3 IoCs
pid Process 2168 2f74d868692ce50e073cfdd6a2fbafa3.tmp 1276 sadkodrive.exe 2428 sadkodrive.exe -
Loads dropped DLL 3 IoCs
pid Process 2168 2f74d868692ce50e073cfdd6a2fbafa3.tmp 2168 2f74d868692ce50e073cfdd6a2fbafa3.tmp 2168 2f74d868692ce50e073cfdd6a2fbafa3.tmp -
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 152.89.198.214 -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2168 2f74d868692ce50e073cfdd6a2fbafa3.tmp 2168 2f74d868692ce50e073cfdd6a2fbafa3.tmp -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2168 2f74d868692ce50e073cfdd6a2fbafa3.tmp -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3908 wrote to memory of 2168 3908 2f74d868692ce50e073cfdd6a2fbafa3.exe 86 PID 3908 wrote to memory of 2168 3908 2f74d868692ce50e073cfdd6a2fbafa3.exe 86 PID 3908 wrote to memory of 2168 3908 2f74d868692ce50e073cfdd6a2fbafa3.exe 86 PID 2168 wrote to memory of 1276 2168 2f74d868692ce50e073cfdd6a2fbafa3.tmp 90 PID 2168 wrote to memory of 1276 2168 2f74d868692ce50e073cfdd6a2fbafa3.tmp 90 PID 2168 wrote to memory of 1276 2168 2f74d868692ce50e073cfdd6a2fbafa3.tmp 90 PID 2168 wrote to memory of 2428 2168 2f74d868692ce50e073cfdd6a2fbafa3.tmp 91 PID 2168 wrote to memory of 2428 2168 2f74d868692ce50e073cfdd6a2fbafa3.tmp 91 PID 2168 wrote to memory of 2428 2168 2f74d868692ce50e073cfdd6a2fbafa3.tmp 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\2f74d868692ce50e073cfdd6a2fbafa3.exe"C:\Users\Admin\AppData\Local\Temp\2f74d868692ce50e073cfdd6a2fbafa3.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3908 -
C:\Users\Admin\AppData\Local\Temp\is-2DLLC.tmp\2f74d868692ce50e073cfdd6a2fbafa3.tmp"C:\Users\Admin\AppData\Local\Temp\is-2DLLC.tmp\2f74d868692ce50e073cfdd6a2fbafa3.tmp" /SL5="$70096,2127575,56832,C:\Users\Admin\AppData\Local\Temp\2f74d868692ce50e073cfdd6a2fbafa3.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Users\Admin\AppData\Local\Sadko Drive Speed\sadkodrive.exe"C:\Users\Admin\AppData\Local\Sadko Drive Speed\sadkodrive.exe" -i3⤵
- Executes dropped EXE
PID:1276
-
-
C:\Users\Admin\AppData\Local\Sadko Drive Speed\sadkodrive.exe"C:\Users\Admin\AppData\Local\Sadko Drive Speed\sadkodrive.exe" -s3⤵
- Executes dropped EXE
PID:2428
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.2MB
MD5d68a989948c07f8e3e645ba2c2453274
SHA19670803bcb662513464e8fbd2adb4eb1b11ec022
SHA25646cc6f830e62ea1d053d49295db94f3dbf62b311e6af2b28905d1e1cc1c5dfca
SHA512d71b7c1476fe487a6cf787acb292f5ed2f33f2a853b18c617a1fecb23cac94439fc6ea82764cd8ac6e99fc81aa048b3364184bbcfbed9e7a90c8f9866f915fe0
-
Filesize
690KB
MD5a4a2a684c1454484e5b95a81c1bd1b34
SHA1fcb5a95d4847a296f938a0f2e1b2d286d8c728a1
SHA2566155c75f1b12a43374733984467f26adaf930b8b5c56e2986e3da0ffdcd13653
SHA5127c9866bdb41e06de09a805efce06a6a2bcbea544f9dc7834c716d4ae7d15f413283782ec17a158aa8b35e247f20622fb65f803cb5c000820c164627ece5f9aef
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
19KB
MD53adaa386b671c2df3bae5b39dc093008
SHA1067cf95fbdb922d81db58432c46930f86d23dded
SHA25671cd2f5bc6e13b8349a7c98697c6d2e3fcdeea92699cedd591875bea869fae38
SHA512bbe4187758d1a69f75a8cca6b3184e0c20cf8701b16531b55ed4987497934b3c9ef66ecd5e6b83c7357f69734f1c8301b9f82f0a024bb693b732a2d5760fd303