Analysis
-
max time kernel
292s -
max time network
294s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
08/05/2024, 23:50
Static task
static1
Behavioral task
behavioral1
Sample
c1665247f95fdcfb0db93a040416adb12885eef3f527b4d83142e0ea3e5b41a6.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
c1665247f95fdcfb0db93a040416adb12885eef3f527b4d83142e0ea3e5b41a6.exe
Resource
win10-20240404-en
General
-
Target
c1665247f95fdcfb0db93a040416adb12885eef3f527b4d83142e0ea3e5b41a6.exe
-
Size
4.2MB
-
MD5
f9315da19f4066846e78838cf1768cb7
-
SHA1
bd8424086cb6d83d0bee950ca0e2a74c198e8870
-
SHA256
c1665247f95fdcfb0db93a040416adb12885eef3f527b4d83142e0ea3e5b41a6
-
SHA512
43f3af9de33070fa03a0c119ad19a972956952905073c9372dc88e6be32f6e042b1cc13518ac8fdc03bf43f2f0d6da5c28fa6c179037fa2a07344660758cb078
-
SSDEEP
98304:+u2GOfCtgrcoDA+MHFZy049HHA0f0M6d7l1Zh3T73vHrnOqjd1Zt:BcfCJCKa04p4M6n1Zh3TXnOaXt
Malware Config
Extracted
socks5systemz
http://bvilbzo.com/search/?q=67e28dd86c0ca77c400cfe4c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa44e8889b5e4fa9281ae978f271ea771795af8e05c645db22f31dfe339426fa11a366c350adb719a9577e55b8603e983a608ffa13c1ed97923d
Signatures
-
Detect Socks5Systemz Payload 1 IoCs
resource yara_rule behavioral2/memory/4400-83-0x00000000007D0000-0x0000000000872000-memory.dmp family_socks5systemz -
Socks5Systemz
Socks5Systemz is a botnet written in C++.
-
Executes dropped EXE 3 IoCs
pid Process 4640 c1665247f95fdcfb0db93a040416adb12885eef3f527b4d83142e0ea3e5b41a6.tmp 820 auditorium32.exe 4400 auditorium32.exe -
Loads dropped DLL 1 IoCs
pid Process 4640 c1665247f95fdcfb0db93a040416adb12885eef3f527b4d83142e0ea3e5b41a6.tmp -
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 152.89.198.214 -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 404 wrote to memory of 4640 404 c1665247f95fdcfb0db93a040416adb12885eef3f527b4d83142e0ea3e5b41a6.exe 75 PID 404 wrote to memory of 4640 404 c1665247f95fdcfb0db93a040416adb12885eef3f527b4d83142e0ea3e5b41a6.exe 75 PID 404 wrote to memory of 4640 404 c1665247f95fdcfb0db93a040416adb12885eef3f527b4d83142e0ea3e5b41a6.exe 75 PID 4640 wrote to memory of 820 4640 c1665247f95fdcfb0db93a040416adb12885eef3f527b4d83142e0ea3e5b41a6.tmp 76 PID 4640 wrote to memory of 820 4640 c1665247f95fdcfb0db93a040416adb12885eef3f527b4d83142e0ea3e5b41a6.tmp 76 PID 4640 wrote to memory of 820 4640 c1665247f95fdcfb0db93a040416adb12885eef3f527b4d83142e0ea3e5b41a6.tmp 76 PID 4640 wrote to memory of 4400 4640 c1665247f95fdcfb0db93a040416adb12885eef3f527b4d83142e0ea3e5b41a6.tmp 77 PID 4640 wrote to memory of 4400 4640 c1665247f95fdcfb0db93a040416adb12885eef3f527b4d83142e0ea3e5b41a6.tmp 77 PID 4640 wrote to memory of 4400 4640 c1665247f95fdcfb0db93a040416adb12885eef3f527b4d83142e0ea3e5b41a6.tmp 77
Processes
-
C:\Users\Admin\AppData\Local\Temp\c1665247f95fdcfb0db93a040416adb12885eef3f527b4d83142e0ea3e5b41a6.exe"C:\Users\Admin\AppData\Local\Temp\c1665247f95fdcfb0db93a040416adb12885eef3f527b4d83142e0ea3e5b41a6.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:404 -
C:\Users\Admin\AppData\Local\Temp\is-61G83.tmp\c1665247f95fdcfb0db93a040416adb12885eef3f527b4d83142e0ea3e5b41a6.tmp"C:\Users\Admin\AppData\Local\Temp\is-61G83.tmp\c1665247f95fdcfb0db93a040416adb12885eef3f527b4d83142e0ea3e5b41a6.tmp" /SL5="$C01D2,4153722,54272,C:\Users\Admin\AppData\Local\Temp\c1665247f95fdcfb0db93a040416adb12885eef3f527b4d83142e0ea3e5b41a6.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4640 -
C:\Users\Admin\AppData\Local\Auditorium\auditorium32.exe"C:\Users\Admin\AppData\Local\Auditorium\auditorium32.exe" -i3⤵
- Executes dropped EXE
PID:820
-
-
C:\Users\Admin\AppData\Local\Auditorium\auditorium32.exe"C:\Users\Admin\AppData\Local\Auditorium\auditorium32.exe" -s3⤵
- Executes dropped EXE
PID:4400
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.1MB
MD5949a5b0ab9f3297b03bdb7a2225e1925
SHA143f84593c41ea8632975fa44b693f1f6faf9a590
SHA256faef547d3fe97dc31b5fc76743d6fd844f1163a71f65db918d0e5c2999b49220
SHA512471cc2a48f2df523b9e261ca03559a3ff075a65e87a10f24faa87416bedf0e2bbf9a9532a2554655daac8e615c978666b303c39f9f28cf4ca8d82261ababcc1e
-
Filesize
2.3MB
MD55afad5dd0bae7f01c2be79f9f168c9e8
SHA1553fe32e9cc002b3357c11de74478b85b04657bc
SHA2564c5c6debe9453f0343f163aa72b7049f3167bc08d3b2d549fcabc4ee6bfbafcd
SHA5123f78196965db2fa5f6a13fecd9d93abbbaafaa52a6b43e8bd957d3b1e52bc3930db2d72e79cd34315f56b9758ed37a5d6b122533351d90296abfe8ca7f62fb3f
-
C:\Users\Admin\AppData\Local\Temp\is-61G83.tmp\c1665247f95fdcfb0db93a040416adb12885eef3f527b4d83142e0ea3e5b41a6.tmp
Filesize695KB
MD5a287ecffad7cec4fca751c14eb6a1e03
SHA1b23ea238468f657f049e70067cfc75a22858c395
SHA2569f31cf21012d515b2f351c0e69bf0b94954a9807a847c98388c3302320362948
SHA5120669d5d06444a5a0c589f5fe85550efafbf96ff38ab1bbdd1b3a76408e79307c5af2cd266d403c41762d7b354efdf2bd6d29e02bb40c74e843716ca8ffe9a087
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63