Analysis
-
max time kernel
144s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27-02-2024 18:36
Static task
static1
Behavioral task
behavioral1
Sample
5b420a717a26e87669adc7ddcb94a545.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5b420a717a26e87669adc7ddcb94a545.exe
Resource
win10v2004-20240226-en
General
-
Target
5b420a717a26e87669adc7ddcb94a545.exe
-
Size
2.4MB
-
MD5
5b420a717a26e87669adc7ddcb94a545
-
SHA1
d68fe3d6384afca42ce84592e96f92703f6c5a56
-
SHA256
8bd83991686cc480de09a4a436bb15dbd5ec7ec129b10dfa6f60e6d425e2772a
-
SHA512
c349ea2f052d5696ec6679beae3dc9cb2fd2363d2ecf660adb035819f364b39ef3255fda96063d803249d5efea340ef63e74abed656fce7478a3756d1ae7fb71
-
SSDEEP
49152:C98S78YwFBpSt7zxLdrvx5G9iVH39Uwk26BIqov0Fr3LJmtAopGP3CT:M85Idrvx5G9iVX9UFWqIyBm/EU
Malware Config
Extracted
socks5systemz
http://cebzuqq.net/search/?q=67e28dd86a5ef62a130aa5197c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978a771ea771795af8e05c645db22f31df92d8b38e316a667d307eca743ec4c2b07b52966923b6e8efa18c0ec97
Signatures
-
Detect Socks5Systemz Payload 3 IoCs
resource yara_rule behavioral1/memory/2724-77-0x00000000026D0000-0x0000000002772000-memory.dmp family_socks5systemz behavioral1/memory/2724-78-0x00000000026D0000-0x0000000002772000-memory.dmp family_socks5systemz behavioral1/memory/2724-88-0x00000000026D0000-0x0000000002772000-memory.dmp family_socks5systemz -
Socks5Systemz
Socks5Systemz is a botnet written in C++.
-
Executes dropped EXE 3 IoCs
pid Process 2516 5b420a717a26e87669adc7ddcb94a545.tmp 2588 sadkodrive.exe 2724 sadkodrive.exe -
Loads dropped DLL 6 IoCs
pid Process 3028 5b420a717a26e87669adc7ddcb94a545.exe 2516 5b420a717a26e87669adc7ddcb94a545.tmp 2516 5b420a717a26e87669adc7ddcb94a545.tmp 2516 5b420a717a26e87669adc7ddcb94a545.tmp 2516 5b420a717a26e87669adc7ddcb94a545.tmp 2516 5b420a717a26e87669adc7ddcb94a545.tmp -
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 91.211.247.248 -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2516 5b420a717a26e87669adc7ddcb94a545.tmp 2516 5b420a717a26e87669adc7ddcb94a545.tmp -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2516 5b420a717a26e87669adc7ddcb94a545.tmp -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3028 wrote to memory of 2516 3028 5b420a717a26e87669adc7ddcb94a545.exe 28 PID 3028 wrote to memory of 2516 3028 5b420a717a26e87669adc7ddcb94a545.exe 28 PID 3028 wrote to memory of 2516 3028 5b420a717a26e87669adc7ddcb94a545.exe 28 PID 3028 wrote to memory of 2516 3028 5b420a717a26e87669adc7ddcb94a545.exe 28 PID 3028 wrote to memory of 2516 3028 5b420a717a26e87669adc7ddcb94a545.exe 28 PID 3028 wrote to memory of 2516 3028 5b420a717a26e87669adc7ddcb94a545.exe 28 PID 3028 wrote to memory of 2516 3028 5b420a717a26e87669adc7ddcb94a545.exe 28 PID 2516 wrote to memory of 2588 2516 5b420a717a26e87669adc7ddcb94a545.tmp 29 PID 2516 wrote to memory of 2588 2516 5b420a717a26e87669adc7ddcb94a545.tmp 29 PID 2516 wrote to memory of 2588 2516 5b420a717a26e87669adc7ddcb94a545.tmp 29 PID 2516 wrote to memory of 2588 2516 5b420a717a26e87669adc7ddcb94a545.tmp 29 PID 2516 wrote to memory of 2724 2516 5b420a717a26e87669adc7ddcb94a545.tmp 30 PID 2516 wrote to memory of 2724 2516 5b420a717a26e87669adc7ddcb94a545.tmp 30 PID 2516 wrote to memory of 2724 2516 5b420a717a26e87669adc7ddcb94a545.tmp 30 PID 2516 wrote to memory of 2724 2516 5b420a717a26e87669adc7ddcb94a545.tmp 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\5b420a717a26e87669adc7ddcb94a545.exe"C:\Users\Admin\AppData\Local\Temp\5b420a717a26e87669adc7ddcb94a545.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Users\Admin\AppData\Local\Temp\is-PMB4D.tmp\5b420a717a26e87669adc7ddcb94a545.tmp"C:\Users\Admin\AppData\Local\Temp\is-PMB4D.tmp\5b420a717a26e87669adc7ddcb94a545.tmp" /SL5="$5014E,2188603,56832,C:\Users\Admin\AppData\Local\Temp\5b420a717a26e87669adc7ddcb94a545.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Users\Admin\AppData\Local\Sadko Drive Speed\sadkodrive.exe"C:\Users\Admin\AppData\Local\Sadko Drive Speed\sadkodrive.exe" -i3⤵
- Executes dropped EXE
PID:2588
-
-
C:\Users\Admin\AppData\Local\Sadko Drive Speed\sadkodrive.exe"C:\Users\Admin\AppData\Local\Sadko Drive Speed\sadkodrive.exe" -s3⤵
- Executes dropped EXE
PID:2724
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.2MB
MD5aaad1d27e940f262aba9a18dc9fe716c
SHA10243907c37c554da0178ffd95cb76c43a0a5fe1e
SHA25693fb1ddbd30e9d182ae8bd542abe6adac38774fa2ca4015dc2de8979310e4548
SHA5126cc60f7016017d89b05432c042820c1dbe8e5901e264c2c917bca1b3eed40156ecc73621869471d420defbf927c060ecc500e63a6f4e902f8960a5008e1dd997
-
Filesize
1.4MB
MD59cc0e29b4c614f6bc833eb67a23ce55d
SHA1e1787776d9c1f2d19d794b9d00769f6b9883c4aa
SHA25604fc4a706862ff4e0c22a1cb05796228966364137a8d6019b63146de2be1deec
SHA512e8081262327370f40d7692d65fce32c48e44f232956d99e0af932bc1a51daf31b7306af9568c6355ecd7aaffa2f1e06876530fda5a683d4bfa64eafe252fa10d
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
19KB
MD53adaa386b671c2df3bae5b39dc093008
SHA1067cf95fbdb922d81db58432c46930f86d23dded
SHA25671cd2f5bc6e13b8349a7c98697c6d2e3fcdeea92699cedd591875bea869fae38
SHA512bbe4187758d1a69f75a8cca6b3184e0c20cf8701b16531b55ed4987497934b3c9ef66ecd5e6b83c7357f69734f1c8301b9f82f0a024bb693b732a2d5760fd303
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
690KB
MD5a4a2a684c1454484e5b95a81c1bd1b34
SHA1fcb5a95d4847a296f938a0f2e1b2d286d8c728a1
SHA2566155c75f1b12a43374733984467f26adaf930b8b5c56e2986e3da0ffdcd13653
SHA5127c9866bdb41e06de09a805efce06a6a2bcbea544f9dc7834c716d4ae7d15f413283782ec17a158aa8b35e247f20622fb65f803cb5c000820c164627ece5f9aef