Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-02-2024 17:26

General

  • Target

    2f74d868692ce50e073cfdd6a2fbafa3.exe

  • Size

    2.4MB

  • MD5

    2f74d868692ce50e073cfdd6a2fbafa3

  • SHA1

    7e31e58f97728181a239583884cd6789e5ddf891

  • SHA256

    c237d3d7c79c5fb7795b875bd6f6c79e5bc95a96d41cf4249d755427dc4c1d58

  • SHA512

    811648978e206e396c790dca0bf61fd161711ed682842a6f95e4e2619e55a445078e56ff3c749ed1bd1e745c952276381029596e5b3d23a3415440b622279beb

  • SSDEEP

    49152:C9Poy707ePYSmuZMJdIdF/+zVQn/IZjjNf2UwcMyPOJPca0o83hlurCT:MAKbGcdFmVQn/IZjjfwcMyPGPcflH

Malware Config

Extracted

Family

socks5systemz

C2

http://aidoruu.ru/search/?q=67e28dd8655ba479120da84d7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4fe8889b5e4fa9281ae978a071ea771795af8e05c645db22f31dfe339426fa11af66c152adb719a9577e55b8603e983a608ef611c5eb9d9832

Signatures

  • Detect Socks5Systemz Payload 2 IoCs
  • Socks5Systemz

    Socks5Systemz is a botnet written in C++.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Unexpected DNS network traffic destination 1 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2f74d868692ce50e073cfdd6a2fbafa3.exe
    "C:\Users\Admin\AppData\Local\Temp\2f74d868692ce50e073cfdd6a2fbafa3.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3908
    • C:\Users\Admin\AppData\Local\Temp\is-2DLLC.tmp\2f74d868692ce50e073cfdd6a2fbafa3.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-2DLLC.tmp\2f74d868692ce50e073cfdd6a2fbafa3.tmp" /SL5="$70096,2127575,56832,C:\Users\Admin\AppData\Local\Temp\2f74d868692ce50e073cfdd6a2fbafa3.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:2168
      • C:\Users\Admin\AppData\Local\Sadko Drive Speed\sadkodrive.exe
        "C:\Users\Admin\AppData\Local\Sadko Drive Speed\sadkodrive.exe" -i
        3⤵
        • Executes dropped EXE
        PID:1276
      • C:\Users\Admin\AppData\Local\Sadko Drive Speed\sadkodrive.exe
        "C:\Users\Admin\AppData\Local\Sadko Drive Speed\sadkodrive.exe" -s
        3⤵
        • Executes dropped EXE
        PID:2428

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Sadko Drive Speed\sadkodrive.exe

    Filesize

    3.2MB

    MD5

    d68a989948c07f8e3e645ba2c2453274

    SHA1

    9670803bcb662513464e8fbd2adb4eb1b11ec022

    SHA256

    46cc6f830e62ea1d053d49295db94f3dbf62b311e6af2b28905d1e1cc1c5dfca

    SHA512

    d71b7c1476fe487a6cf787acb292f5ed2f33f2a853b18c617a1fecb23cac94439fc6ea82764cd8ac6e99fc81aa048b3364184bbcfbed9e7a90c8f9866f915fe0

  • C:\Users\Admin\AppData\Local\Temp\is-2DLLC.tmp\2f74d868692ce50e073cfdd6a2fbafa3.tmp

    Filesize

    690KB

    MD5

    a4a2a684c1454484e5b95a81c1bd1b34

    SHA1

    fcb5a95d4847a296f938a0f2e1b2d286d8c728a1

    SHA256

    6155c75f1b12a43374733984467f26adaf930b8b5c56e2986e3da0ffdcd13653

    SHA512

    7c9866bdb41e06de09a805efce06a6a2bcbea544f9dc7834c716d4ae7d15f413283782ec17a158aa8b35e247f20622fb65f803cb5c000820c164627ece5f9aef

  • C:\Users\Admin\AppData\Local\Temp\is-F4I0J.tmp\_isetup\_iscrypt.dll

    Filesize

    2KB

    MD5

    a69559718ab506675e907fe49deb71e9

    SHA1

    bc8f404ffdb1960b50c12ff9413c893b56f2e36f

    SHA256

    2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

    SHA512

    e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

  • C:\Users\Admin\AppData\Local\Temp\is-F4I0J.tmp\_isetup\_isdecmp.dll

    Filesize

    19KB

    MD5

    3adaa386b671c2df3bae5b39dc093008

    SHA1

    067cf95fbdb922d81db58432c46930f86d23dded

    SHA256

    71cd2f5bc6e13b8349a7c98697c6d2e3fcdeea92699cedd591875bea869fae38

    SHA512

    bbe4187758d1a69f75a8cca6b3184e0c20cf8701b16531b55ed4987497934b3c9ef66ecd5e6b83c7357f69734f1c8301b9f82f0a024bb693b732a2d5760fd303

  • memory/1276-43-0x0000000000400000-0x000000000072D000-memory.dmp

    Filesize

    3.2MB

  • memory/1276-44-0x0000000000400000-0x000000000072D000-memory.dmp

    Filesize

    3.2MB

  • memory/1276-45-0x0000000000400000-0x000000000072D000-memory.dmp

    Filesize

    3.2MB

  • memory/1276-48-0x0000000000400000-0x000000000072D000-memory.dmp

    Filesize

    3.2MB

  • memory/2168-53-0x0000000000400000-0x00000000004BC000-memory.dmp

    Filesize

    752KB

  • memory/2168-55-0x0000000000690000-0x0000000000691000-memory.dmp

    Filesize

    4KB

  • memory/2168-7-0x0000000000690000-0x0000000000691000-memory.dmp

    Filesize

    4KB

  • memory/2428-58-0x0000000000400000-0x000000000072D000-memory.dmp

    Filesize

    3.2MB

  • memory/2428-72-0x0000000000920000-0x00000000009C2000-memory.dmp

    Filesize

    648KB

  • memory/2428-51-0x0000000000400000-0x000000000072D000-memory.dmp

    Filesize

    3.2MB

  • memory/2428-54-0x0000000000400000-0x000000000072D000-memory.dmp

    Filesize

    3.2MB

  • memory/2428-101-0x0000000000400000-0x000000000072D000-memory.dmp

    Filesize

    3.2MB

  • memory/2428-98-0x0000000000400000-0x000000000072D000-memory.dmp

    Filesize

    3.2MB

  • memory/2428-59-0x0000000000400000-0x000000000072D000-memory.dmp

    Filesize

    3.2MB

  • memory/2428-62-0x0000000000400000-0x000000000072D000-memory.dmp

    Filesize

    3.2MB

  • memory/2428-65-0x0000000000400000-0x000000000072D000-memory.dmp

    Filesize

    3.2MB

  • memory/2428-68-0x0000000000400000-0x000000000072D000-memory.dmp

    Filesize

    3.2MB

  • memory/2428-71-0x0000000000400000-0x000000000072D000-memory.dmp

    Filesize

    3.2MB

  • memory/2428-94-0x0000000000400000-0x000000000072D000-memory.dmp

    Filesize

    3.2MB

  • memory/2428-78-0x0000000000400000-0x000000000072D000-memory.dmp

    Filesize

    3.2MB

  • memory/2428-81-0x0000000000400000-0x000000000072D000-memory.dmp

    Filesize

    3.2MB

  • memory/2428-82-0x0000000000920000-0x00000000009C2000-memory.dmp

    Filesize

    648KB

  • memory/2428-85-0x0000000000400000-0x000000000072D000-memory.dmp

    Filesize

    3.2MB

  • memory/2428-88-0x0000000000400000-0x000000000072D000-memory.dmp

    Filesize

    3.2MB

  • memory/2428-91-0x0000000000400000-0x000000000072D000-memory.dmp

    Filesize

    3.2MB

  • memory/3908-52-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/3908-0-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/3908-2-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB