Analysis
-
max time kernel
143s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25-03-2024 12:17
Static task
static1
Behavioral task
behavioral1
Sample
ddfdcd1867cf1462a6b507d71eb15dd91703c06f55def388c81277c406c3f76d.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ddfdcd1867cf1462a6b507d71eb15dd91703c06f55def388c81277c406c3f76d.exe
Resource
win10v2004-20240226-en
General
-
Target
ddfdcd1867cf1462a6b507d71eb15dd91703c06f55def388c81277c406c3f76d.exe
-
Size
6.7MB
-
MD5
1db2a35c4d921cd6bb7a2fb3e090c6d0
-
SHA1
65f0b48e931cdec3b4682781771b33a57bdcb6c3
-
SHA256
ddfdcd1867cf1462a6b507d71eb15dd91703c06f55def388c81277c406c3f76d
-
SHA512
ed208da1ab29ba9883a91483f92cf5a322ee2637bfb5efea0c415a7df9af342290e2d19ed08b4589a13d49d54b5f0348f011d872d5daa0607b3724e9b5d7ec85
-
SSDEEP
196608:iALDrbajVlKIMFEuvgGD4sfovnvdn3A9UvudDoiC4dD:dDqJKEGWk+lAkirdD
Malware Config
Signatures
-
Detect Socks5Systemz Payload 3 IoCs
resource yara_rule behavioral1/memory/544-174-0x00000000029D0000-0x0000000002A72000-memory.dmp family_socks5systemz behavioral1/memory/544-177-0x00000000029D0000-0x0000000002A72000-memory.dmp family_socks5systemz behavioral1/memory/544-185-0x00000000029D0000-0x0000000002A72000-memory.dmp family_socks5systemz -
Socks5Systemz
Socks5Systemz is a botnet written in C++.
-
Executes dropped EXE 3 IoCs
pid Process 2096 ddfdcd1867cf1462a6b507d71eb15dd91703c06f55def388c81277c406c3f76d.tmp 2300 dbsmartref.exe 544 dbsmartref.exe -
Loads dropped DLL 6 IoCs
pid Process 2848 ddfdcd1867cf1462a6b507d71eb15dd91703c06f55def388c81277c406c3f76d.exe 2096 ddfdcd1867cf1462a6b507d71eb15dd91703c06f55def388c81277c406c3f76d.tmp 2096 ddfdcd1867cf1462a6b507d71eb15dd91703c06f55def388c81277c406c3f76d.tmp 2096 ddfdcd1867cf1462a6b507d71eb15dd91703c06f55def388c81277c406c3f76d.tmp 2096 ddfdcd1867cf1462a6b507d71eb15dd91703c06f55def388c81277c406c3f76d.tmp 2096 ddfdcd1867cf1462a6b507d71eb15dd91703c06f55def388c81277c406c3f76d.tmp -
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 152.89.198.214 -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 59 IoCs
description ioc Process File created C:\Program Files (x86)\DB Smart Refer\bin\x86\is-N6MO7.tmp ddfdcd1867cf1462a6b507d71eb15dd91703c06f55def388c81277c406c3f76d.tmp File created C:\Program Files (x86)\DB Smart Refer\bin\x86\is-JRSJV.tmp ddfdcd1867cf1462a6b507d71eb15dd91703c06f55def388c81277c406c3f76d.tmp File created C:\Program Files (x86)\DB Smart Refer\bin\x86\is-8T04A.tmp ddfdcd1867cf1462a6b507d71eb15dd91703c06f55def388c81277c406c3f76d.tmp File created C:\Program Files (x86)\DB Smart Refer\bin\x86\is-LAES5.tmp ddfdcd1867cf1462a6b507d71eb15dd91703c06f55def388c81277c406c3f76d.tmp File created C:\Program Files (x86)\DB Smart Refer\is-3K34N.tmp ddfdcd1867cf1462a6b507d71eb15dd91703c06f55def388c81277c406c3f76d.tmp File created C:\Program Files (x86)\DB Smart Refer\bin\x86\is-1D1OJ.tmp ddfdcd1867cf1462a6b507d71eb15dd91703c06f55def388c81277c406c3f76d.tmp File created C:\Program Files (x86)\DB Smart Refer\bin\x86\is-IMDCO.tmp ddfdcd1867cf1462a6b507d71eb15dd91703c06f55def388c81277c406c3f76d.tmp File created C:\Program Files (x86)\DB Smart Refer\bin\x86\is-RUUOI.tmp ddfdcd1867cf1462a6b507d71eb15dd91703c06f55def388c81277c406c3f76d.tmp File created C:\Program Files (x86)\DB Smart Refer\bin\x86\is-VT6U4.tmp ddfdcd1867cf1462a6b507d71eb15dd91703c06f55def388c81277c406c3f76d.tmp File created C:\Program Files (x86)\DB Smart Refer\bin\x86\is-U96E8.tmp ddfdcd1867cf1462a6b507d71eb15dd91703c06f55def388c81277c406c3f76d.tmp File created C:\Program Files (x86)\DB Smart Refer\bin\x86\plugins\internal\is-HAOK1.tmp ddfdcd1867cf1462a6b507d71eb15dd91703c06f55def388c81277c406c3f76d.tmp File created C:\Program Files (x86)\DB Smart Refer\bin\x86\is-GVT4D.tmp ddfdcd1867cf1462a6b507d71eb15dd91703c06f55def388c81277c406c3f76d.tmp File created C:\Program Files (x86)\DB Smart Refer\bin\x86\is-S7KR1.tmp ddfdcd1867cf1462a6b507d71eb15dd91703c06f55def388c81277c406c3f76d.tmp File created C:\Program Files (x86)\DB Smart Refer\bin\x86\is-KC3G9.tmp ddfdcd1867cf1462a6b507d71eb15dd91703c06f55def388c81277c406c3f76d.tmp File created C:\Program Files (x86)\DB Smart Refer\bin\x86\is-K07MS.tmp ddfdcd1867cf1462a6b507d71eb15dd91703c06f55def388c81277c406c3f76d.tmp File created C:\Program Files (x86)\DB Smart Refer\bin\x86\is-105DL.tmp ddfdcd1867cf1462a6b507d71eb15dd91703c06f55def388c81277c406c3f76d.tmp File created C:\Program Files (x86)\DB Smart Refer\bin\x86\is-Q1KV6.tmp ddfdcd1867cf1462a6b507d71eb15dd91703c06f55def388c81277c406c3f76d.tmp File created C:\Program Files (x86)\DB Smart Refer\bin\x86\is-J4Q3H.tmp ddfdcd1867cf1462a6b507d71eb15dd91703c06f55def388c81277c406c3f76d.tmp File created C:\Program Files (x86)\DB Smart Refer\bin\x86\is-C13IP.tmp ddfdcd1867cf1462a6b507d71eb15dd91703c06f55def388c81277c406c3f76d.tmp File created C:\Program Files (x86)\DB Smart Refer\bin\x86\is-7D7DK.tmp ddfdcd1867cf1462a6b507d71eb15dd91703c06f55def388c81277c406c3f76d.tmp File opened for modification C:\Program Files (x86)\DB Smart Refer\unins000.dat ddfdcd1867cf1462a6b507d71eb15dd91703c06f55def388c81277c406c3f76d.tmp File opened for modification C:\Program Files (x86)\DB Smart Refer\dbsmartref.exe ddfdcd1867cf1462a6b507d71eb15dd91703c06f55def388c81277c406c3f76d.tmp File created C:\Program Files (x86)\DB Smart Refer\bin\x86\is-3CVHC.tmp ddfdcd1867cf1462a6b507d71eb15dd91703c06f55def388c81277c406c3f76d.tmp File created C:\Program Files (x86)\DB Smart Refer\bin\x86\is-JGVTP.tmp ddfdcd1867cf1462a6b507d71eb15dd91703c06f55def388c81277c406c3f76d.tmp File created C:\Program Files (x86)\DB Smart Refer\bin\x86\is-13P6C.tmp ddfdcd1867cf1462a6b507d71eb15dd91703c06f55def388c81277c406c3f76d.tmp File created C:\Program Files (x86)\DB Smart Refer\bin\x86\is-G1N13.tmp ddfdcd1867cf1462a6b507d71eb15dd91703c06f55def388c81277c406c3f76d.tmp File created C:\Program Files (x86)\DB Smart Refer\bin\x86\is-QH127.tmp ddfdcd1867cf1462a6b507d71eb15dd91703c06f55def388c81277c406c3f76d.tmp File created C:\Program Files (x86)\DB Smart Refer\bin\x86\is-8IS95.tmp ddfdcd1867cf1462a6b507d71eb15dd91703c06f55def388c81277c406c3f76d.tmp File created C:\Program Files (x86)\DB Smart Refer\stuff\is-VFCSU.tmp ddfdcd1867cf1462a6b507d71eb15dd91703c06f55def388c81277c406c3f76d.tmp File created C:\Program Files (x86)\DB Smart Refer\bin\x86\is-TPDBL.tmp ddfdcd1867cf1462a6b507d71eb15dd91703c06f55def388c81277c406c3f76d.tmp File created C:\Program Files (x86)\DB Smart Refer\bin\x86\is-6AB8U.tmp ddfdcd1867cf1462a6b507d71eb15dd91703c06f55def388c81277c406c3f76d.tmp File created C:\Program Files (x86)\DB Smart Refer\stuff\is-20N81.tmp ddfdcd1867cf1462a6b507d71eb15dd91703c06f55def388c81277c406c3f76d.tmp File created C:\Program Files (x86)\DB Smart Refer\bin\x86\is-MAIKI.tmp ddfdcd1867cf1462a6b507d71eb15dd91703c06f55def388c81277c406c3f76d.tmp File created C:\Program Files (x86)\DB Smart Refer\bin\x86\plugins\internal\is-MRLCQ.tmp ddfdcd1867cf1462a6b507d71eb15dd91703c06f55def388c81277c406c3f76d.tmp File created C:\Program Files (x86)\DB Smart Refer\bin\x86\is-NG9FI.tmp ddfdcd1867cf1462a6b507d71eb15dd91703c06f55def388c81277c406c3f76d.tmp File created C:\Program Files (x86)\DB Smart Refer\bin\x86\is-2G7O3.tmp ddfdcd1867cf1462a6b507d71eb15dd91703c06f55def388c81277c406c3f76d.tmp File created C:\Program Files (x86)\DB Smart Refer\unins000.dat ddfdcd1867cf1462a6b507d71eb15dd91703c06f55def388c81277c406c3f76d.tmp File created C:\Program Files (x86)\DB Smart Refer\bin\x86\is-PMB6M.tmp ddfdcd1867cf1462a6b507d71eb15dd91703c06f55def388c81277c406c3f76d.tmp File created C:\Program Files (x86)\DB Smart Refer\bin\x86\is-8QPTE.tmp ddfdcd1867cf1462a6b507d71eb15dd91703c06f55def388c81277c406c3f76d.tmp File created C:\Program Files (x86)\DB Smart Refer\bin\x86\is-V99M1.tmp ddfdcd1867cf1462a6b507d71eb15dd91703c06f55def388c81277c406c3f76d.tmp File created C:\Program Files (x86)\DB Smart Refer\bin\x86\is-QPORN.tmp ddfdcd1867cf1462a6b507d71eb15dd91703c06f55def388c81277c406c3f76d.tmp File created C:\Program Files (x86)\DB Smart Refer\bin\x86\is-NB5HL.tmp ddfdcd1867cf1462a6b507d71eb15dd91703c06f55def388c81277c406c3f76d.tmp File created C:\Program Files (x86)\DB Smart Refer\bin\x86\is-2I99K.tmp ddfdcd1867cf1462a6b507d71eb15dd91703c06f55def388c81277c406c3f76d.tmp File created C:\Program Files (x86)\DB Smart Refer\bin\x86\is-CGO03.tmp ddfdcd1867cf1462a6b507d71eb15dd91703c06f55def388c81277c406c3f76d.tmp File created C:\Program Files (x86)\DB Smart Refer\bin\x86\lessmsi\is-O4EAJ.tmp ddfdcd1867cf1462a6b507d71eb15dd91703c06f55def388c81277c406c3f76d.tmp File created C:\Program Files (x86)\DB Smart Refer\bin\x86\is-R740J.tmp ddfdcd1867cf1462a6b507d71eb15dd91703c06f55def388c81277c406c3f76d.tmp File created C:\Program Files (x86)\DB Smart Refer\bin\x86\is-AIE29.tmp ddfdcd1867cf1462a6b507d71eb15dd91703c06f55def388c81277c406c3f76d.tmp File created C:\Program Files (x86)\DB Smart Refer\stuff\is-7PA52.tmp ddfdcd1867cf1462a6b507d71eb15dd91703c06f55def388c81277c406c3f76d.tmp File created C:\Program Files (x86)\DB Smart Refer\is-8M3GB.tmp ddfdcd1867cf1462a6b507d71eb15dd91703c06f55def388c81277c406c3f76d.tmp File created C:\Program Files (x86)\DB Smart Refer\bin\x86\is-U9AJG.tmp ddfdcd1867cf1462a6b507d71eb15dd91703c06f55def388c81277c406c3f76d.tmp File created C:\Program Files (x86)\DB Smart Refer\bin\x86\is-AM1HE.tmp ddfdcd1867cf1462a6b507d71eb15dd91703c06f55def388c81277c406c3f76d.tmp File created C:\Program Files (x86)\DB Smart Refer\bin\x86\is-14AGU.tmp ddfdcd1867cf1462a6b507d71eb15dd91703c06f55def388c81277c406c3f76d.tmp File created C:\Program Files (x86)\DB Smart Refer\bin\x86\is-8CF01.tmp ddfdcd1867cf1462a6b507d71eb15dd91703c06f55def388c81277c406c3f76d.tmp File created C:\Program Files (x86)\DB Smart Refer\bin\x86\is-FPB2Q.tmp ddfdcd1867cf1462a6b507d71eb15dd91703c06f55def388c81277c406c3f76d.tmp File created C:\Program Files (x86)\DB Smart Refer\bin\x86\is-6A6DI.tmp ddfdcd1867cf1462a6b507d71eb15dd91703c06f55def388c81277c406c3f76d.tmp File created C:\Program Files (x86)\DB Smart Refer\bin\x86\is-NN330.tmp ddfdcd1867cf1462a6b507d71eb15dd91703c06f55def388c81277c406c3f76d.tmp File created C:\Program Files (x86)\DB Smart Refer\bin\x86\is-HLRIJ.tmp ddfdcd1867cf1462a6b507d71eb15dd91703c06f55def388c81277c406c3f76d.tmp File created C:\Program Files (x86)\DB Smart Refer\bin\x86\is-419PV.tmp ddfdcd1867cf1462a6b507d71eb15dd91703c06f55def388c81277c406c3f76d.tmp File created C:\Program Files (x86)\DB Smart Refer\stuff\is-HL6Q3.tmp ddfdcd1867cf1462a6b507d71eb15dd91703c06f55def388c81277c406c3f76d.tmp -
Runs net.exe
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2096 ddfdcd1867cf1462a6b507d71eb15dd91703c06f55def388c81277c406c3f76d.tmp -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 2848 wrote to memory of 2096 2848 ddfdcd1867cf1462a6b507d71eb15dd91703c06f55def388c81277c406c3f76d.exe 28 PID 2848 wrote to memory of 2096 2848 ddfdcd1867cf1462a6b507d71eb15dd91703c06f55def388c81277c406c3f76d.exe 28 PID 2848 wrote to memory of 2096 2848 ddfdcd1867cf1462a6b507d71eb15dd91703c06f55def388c81277c406c3f76d.exe 28 PID 2848 wrote to memory of 2096 2848 ddfdcd1867cf1462a6b507d71eb15dd91703c06f55def388c81277c406c3f76d.exe 28 PID 2848 wrote to memory of 2096 2848 ddfdcd1867cf1462a6b507d71eb15dd91703c06f55def388c81277c406c3f76d.exe 28 PID 2848 wrote to memory of 2096 2848 ddfdcd1867cf1462a6b507d71eb15dd91703c06f55def388c81277c406c3f76d.exe 28 PID 2848 wrote to memory of 2096 2848 ddfdcd1867cf1462a6b507d71eb15dd91703c06f55def388c81277c406c3f76d.exe 28 PID 2096 wrote to memory of 472 2096 ddfdcd1867cf1462a6b507d71eb15dd91703c06f55def388c81277c406c3f76d.tmp 29 PID 2096 wrote to memory of 472 2096 ddfdcd1867cf1462a6b507d71eb15dd91703c06f55def388c81277c406c3f76d.tmp 29 PID 2096 wrote to memory of 472 2096 ddfdcd1867cf1462a6b507d71eb15dd91703c06f55def388c81277c406c3f76d.tmp 29 PID 2096 wrote to memory of 472 2096 ddfdcd1867cf1462a6b507d71eb15dd91703c06f55def388c81277c406c3f76d.tmp 29 PID 2096 wrote to memory of 2300 2096 ddfdcd1867cf1462a6b507d71eb15dd91703c06f55def388c81277c406c3f76d.tmp 31 PID 2096 wrote to memory of 2300 2096 ddfdcd1867cf1462a6b507d71eb15dd91703c06f55def388c81277c406c3f76d.tmp 31 PID 2096 wrote to memory of 2300 2096 ddfdcd1867cf1462a6b507d71eb15dd91703c06f55def388c81277c406c3f76d.tmp 31 PID 2096 wrote to memory of 2300 2096 ddfdcd1867cf1462a6b507d71eb15dd91703c06f55def388c81277c406c3f76d.tmp 31 PID 472 wrote to memory of 1572 472 net.exe 32 PID 472 wrote to memory of 1572 472 net.exe 32 PID 472 wrote to memory of 1572 472 net.exe 32 PID 472 wrote to memory of 1572 472 net.exe 32 PID 2096 wrote to memory of 544 2096 ddfdcd1867cf1462a6b507d71eb15dd91703c06f55def388c81277c406c3f76d.tmp 33 PID 2096 wrote to memory of 544 2096 ddfdcd1867cf1462a6b507d71eb15dd91703c06f55def388c81277c406c3f76d.tmp 33 PID 2096 wrote to memory of 544 2096 ddfdcd1867cf1462a6b507d71eb15dd91703c06f55def388c81277c406c3f76d.tmp 33 PID 2096 wrote to memory of 544 2096 ddfdcd1867cf1462a6b507d71eb15dd91703c06f55def388c81277c406c3f76d.tmp 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\ddfdcd1867cf1462a6b507d71eb15dd91703c06f55def388c81277c406c3f76d.exe"C:\Users\Admin\AppData\Local\Temp\ddfdcd1867cf1462a6b507d71eb15dd91703c06f55def388c81277c406c3f76d.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Users\Admin\AppData\Local\Temp\is-A2I4O.tmp\ddfdcd1867cf1462a6b507d71eb15dd91703c06f55def388c81277c406c3f76d.tmp"C:\Users\Admin\AppData\Local\Temp\is-A2I4O.tmp\ddfdcd1867cf1462a6b507d71eb15dd91703c06f55def388c81277c406c3f76d.tmp" /SL5="$50150,6794025,328192,C:\Users\Admin\AppData\Local\Temp\ddfdcd1867cf1462a6b507d71eb15dd91703c06f55def388c81277c406c3f76d.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" helpmsg 243⤵
- Suspicious use of WriteProcessMemory
PID:472 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 helpmsg 244⤵PID:1572
-
-
-
C:\Program Files (x86)\DB Smart Refer\dbsmartref.exe"C:\Program Files (x86)\DB Smart Refer\dbsmartref.exe" -i3⤵
- Executes dropped EXE
PID:2300
-
-
C:\Program Files (x86)\DB Smart Refer\dbsmartref.exe"C:\Program Files (x86)\DB Smart Refer\dbsmartref.exe" -s3⤵
- Executes dropped EXE
PID:544
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD54cb3e39998474774364ee9e0dfc9d7b3
SHA14098ff5f8545d0457822adfa35d6850117e60dc1
SHA256eab9ace81611f33c7d3eafb88252719cd99ac12c561462334489bf520f1397b5
SHA512c74f6125922a1fbfec9c67ace66ffc22bd45268913af5cecce35526868b17ef6a650654218b93bb32f4dd53dc5c37d79c39ab4eb97e4ed446d8f8e5b2e04a4ed
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
19KB
MD53adaa386b671c2df3bae5b39dc093008
SHA1067cf95fbdb922d81db58432c46930f86d23dded
SHA25671cd2f5bc6e13b8349a7c98697c6d2e3fcdeea92699cedd591875bea869fae38
SHA512bbe4187758d1a69f75a8cca6b3184e0c20cf8701b16531b55ed4987497934b3c9ef66ecd5e6b83c7357f69734f1c8301b9f82f0a024bb693b732a2d5760fd303
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
\Users\Admin\AppData\Local\Temp\is-A2I4O.tmp\ddfdcd1867cf1462a6b507d71eb15dd91703c06f55def388c81277c406c3f76d.tmp
Filesize688KB
MD5a7662827ecaeb4fc68334f6b8791b917
SHA1f93151dd228d680aa2910280e51f0a84d0cad105
SHA25605f159722d6905719d2d6f340981a293f40ab8a0d2d4a282c948066809d4af6d
SHA512e9880b3f3ec9201e59114850e9c570d0ad6d3b0e04c60929a03cf983c62c505fcb6bb9dc3adeee88c78d43bd484159626b4a2f000a34b8883164c263f21e6f4a