Analysis
-
max time kernel
150s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09/04/2024, 09:01
Static task
static1
Behavioral task
behavioral1
Sample
412b93a1f6f91b331774d5f3a5e04722.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
412b93a1f6f91b331774d5f3a5e04722.exe
Resource
win10v2004-20240226-en
General
-
Target
412b93a1f6f91b331774d5f3a5e04722.exe
-
Size
3.9MB
-
MD5
412b93a1f6f91b331774d5f3a5e04722
-
SHA1
4af3037ed7bedc7c07d75fa93d5fb9369351466e
-
SHA256
ed707049234c4794563e0232662dfa73978a532cdaf08beb3b6fc0db0e1b2b08
-
SHA512
f1f1650b28fe59be5ca965a24ea922d88212bdb6b78f75358f7a62a1f341b9d02933d1e5cb5050104cfe84392c54dfd8646f04a6a91d4b58618731891b3ba05c
-
SSDEEP
98304:ChZhES6/LCPctbw2sStNDyRCtNaxqDZxjXD8m6K8:eES6DJtb3tcKJDbjT8m6b
Malware Config
Extracted
socks5systemz
http://dtygnwz.info/search/?q=67e28dd8655aa729110daa1b7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978a771ea771795af8e05c645db22f31dfe339426fa11af66c152adb719a9577e55b8603e983a608ffd17c5ec96993c
http://dtygnwz.info/search/?q=67e28dd8655aa729110daa1b7c27d78406abdd88be4b12eab517aa5c96bd86e89d8e4f96148ab2865b77f80ebad9c40f7cb63037ed2ab423a4624383ba915d911ec07bb606a0708727e40ea678c45abbe74ffb0e2807e12571c17f3e83fe16c1ed939f38ce6c91
Signatures
-
Detect Socks5Systemz Payload 5 IoCs
resource yara_rule behavioral2/memory/2496-69-0x00000000009B0000-0x0000000000A52000-memory.dmp family_socks5systemz behavioral2/memory/2496-70-0x00000000009B0000-0x0000000000A52000-memory.dmp family_socks5systemz behavioral2/memory/2496-80-0x00000000009B0000-0x0000000000A52000-memory.dmp family_socks5systemz behavioral2/memory/2496-93-0x00000000009B0000-0x0000000000A52000-memory.dmp family_socks5systemz behavioral2/memory/2496-94-0x00000000009B0000-0x0000000000A52000-memory.dmp family_socks5systemz -
Socks5Systemz
Socks5Systemz is a botnet written in C++.
-
Executes dropped EXE 3 IoCs
pid Process 2272 412b93a1f6f91b331774d5f3a5e04722.tmp 2208 sunvox.exe 2496 sunvox.exe -
Loads dropped DLL 1 IoCs
pid Process 2272 412b93a1f6f91b331774d5f3a5e04722.tmp -
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 141.98.234.31 -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1976 wrote to memory of 2272 1976 412b93a1f6f91b331774d5f3a5e04722.exe 92 PID 1976 wrote to memory of 2272 1976 412b93a1f6f91b331774d5f3a5e04722.exe 92 PID 1976 wrote to memory of 2272 1976 412b93a1f6f91b331774d5f3a5e04722.exe 92 PID 2272 wrote to memory of 2208 2272 412b93a1f6f91b331774d5f3a5e04722.tmp 95 PID 2272 wrote to memory of 2208 2272 412b93a1f6f91b331774d5f3a5e04722.tmp 95 PID 2272 wrote to memory of 2208 2272 412b93a1f6f91b331774d5f3a5e04722.tmp 95 PID 2272 wrote to memory of 2496 2272 412b93a1f6f91b331774d5f3a5e04722.tmp 96 PID 2272 wrote to memory of 2496 2272 412b93a1f6f91b331774d5f3a5e04722.tmp 96 PID 2272 wrote to memory of 2496 2272 412b93a1f6f91b331774d5f3a5e04722.tmp 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\412b93a1f6f91b331774d5f3a5e04722.exe"C:\Users\Admin\AppData\Local\Temp\412b93a1f6f91b331774d5f3a5e04722.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Users\Admin\AppData\Local\Temp\is-NJ8HI.tmp\412b93a1f6f91b331774d5f3a5e04722.tmp"C:\Users\Admin\AppData\Local\Temp\is-NJ8HI.tmp\412b93a1f6f91b331774d5f3a5e04722.tmp" /SL5="$8011E,3706011,54272,C:\Users\Admin\AppData\Local\Temp\412b93a1f6f91b331774d5f3a5e04722.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Users\Admin\AppData\Local\Sun Vox\sunvox.exe"C:\Users\Admin\AppData\Local\Sun Vox\sunvox.exe" -i3⤵
- Executes dropped EXE
PID:2208
-
-
C:\Users\Admin\AppData\Local\Sun Vox\sunvox.exe"C:\Users\Admin\AppData\Local\Sun Vox\sunvox.exe" -s3⤵
- Executes dropped EXE
PID:2496
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3488 --field-trial-handle=2228,i,521073434451423547,2311651514500527526,262144 --variations-seed-version /prefetch:81⤵PID:4036
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD5034eedf0e338381cc21515606426b59d
SHA1f62943abc769d0f92914801e3243268d1d0eedd9
SHA256c061ffd2b068c9cd58c1919c4c6d3f0f42c1521b14ce2d94c8f9eb34aefc8b62
SHA5120a88ee699e4295bc0e5fd8e639fdcba5c931c7444c984339a225462157db07aa593d843efb68b53bcf69858e45e2724736be92cc9a8cd8cebd055d6c46af29f2
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
680KB
MD5cfc3dc1faa46b9a5e3136e0af237c612
SHA19c48427a6629fa547eebbbe19955714ededfbd6c
SHA256a67eab19df530cc412391f37e453d12cacb4a767534e2c9fa8b619b36a7f012c
SHA512637de9098986b0e95b2401d6703f197cebe5f644b3b3bec2224f1b6b30137b6f7bc87195f2be3a0e0181b24abe4b509f04e02c62dc24ede22f9bdfdd3bd527a6