Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
15-05-2024 04:37
Static task
static1
Behavioral task
behavioral1
Sample
0df55988c016ca5853fbfe50690be0d80e02ecaf3f19f78a616121c5885ad1ed.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
0df55988c016ca5853fbfe50690be0d80e02ecaf3f19f78a616121c5885ad1ed.exe
Resource
win11-20240426-en
General
-
Target
0df55988c016ca5853fbfe50690be0d80e02ecaf3f19f78a616121c5885ad1ed.exe
-
Size
4.7MB
-
MD5
e5e23787ec50d71208a32b63304c3169
-
SHA1
66a677dc220c924b3ee33fa72218b3490215328a
-
SHA256
0df55988c016ca5853fbfe50690be0d80e02ecaf3f19f78a616121c5885ad1ed
-
SHA512
66881400417e00d9ec38fb2b225deb3c5b6321b5f77b38cbf762c8f597f3988bf83e708f72f3394e34f0156e993b9308b13a2fd30eff63572f4b45f2555c81a5
-
SSDEEP
98304:KYGmEtw0dnFNEzrT2HB/6ybaGbN1MheX1duVIsi8QtD9JNHvp:KY8W0dYHuBh2G51MidZ5JNHvp
Malware Config
Signatures
-
Detect Socks5Systemz Payload 1 IoCs
resource yara_rule behavioral2/memory/1564-86-0x00000000008C0000-0x0000000000962000-memory.dmp family_socks5systemz -
Socks5Systemz
Socks5Systemz is a botnet written in C++.
-
Executes dropped EXE 3 IoCs
pid Process 2020 0df55988c016ca5853fbfe50690be0d80e02ecaf3f19f78a616121c5885ad1ed.tmp 2820 victoriapigments.exe 1564 victoriapigments.exe -
Loads dropped DLL 1 IoCs
pid Process 2020 0df55988c016ca5853fbfe50690be0d80e02ecaf3f19f78a616121c5885ad1ed.tmp -
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 152.89.198.214 -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2964 wrote to memory of 2020 2964 0df55988c016ca5853fbfe50690be0d80e02ecaf3f19f78a616121c5885ad1ed.exe 78 PID 2964 wrote to memory of 2020 2964 0df55988c016ca5853fbfe50690be0d80e02ecaf3f19f78a616121c5885ad1ed.exe 78 PID 2964 wrote to memory of 2020 2964 0df55988c016ca5853fbfe50690be0d80e02ecaf3f19f78a616121c5885ad1ed.exe 78 PID 2020 wrote to memory of 2820 2020 0df55988c016ca5853fbfe50690be0d80e02ecaf3f19f78a616121c5885ad1ed.tmp 80 PID 2020 wrote to memory of 2820 2020 0df55988c016ca5853fbfe50690be0d80e02ecaf3f19f78a616121c5885ad1ed.tmp 80 PID 2020 wrote to memory of 2820 2020 0df55988c016ca5853fbfe50690be0d80e02ecaf3f19f78a616121c5885ad1ed.tmp 80 PID 2020 wrote to memory of 1564 2020 0df55988c016ca5853fbfe50690be0d80e02ecaf3f19f78a616121c5885ad1ed.tmp 81 PID 2020 wrote to memory of 1564 2020 0df55988c016ca5853fbfe50690be0d80e02ecaf3f19f78a616121c5885ad1ed.tmp 81 PID 2020 wrote to memory of 1564 2020 0df55988c016ca5853fbfe50690be0d80e02ecaf3f19f78a616121c5885ad1ed.tmp 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\0df55988c016ca5853fbfe50690be0d80e02ecaf3f19f78a616121c5885ad1ed.exe"C:\Users\Admin\AppData\Local\Temp\0df55988c016ca5853fbfe50690be0d80e02ecaf3f19f78a616121c5885ad1ed.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Users\Admin\AppData\Local\Temp\is-Q0CJ5.tmp\0df55988c016ca5853fbfe50690be0d80e02ecaf3f19f78a616121c5885ad1ed.tmp"C:\Users\Admin\AppData\Local\Temp\is-Q0CJ5.tmp\0df55988c016ca5853fbfe50690be0d80e02ecaf3f19f78a616121c5885ad1ed.tmp" /SL5="$50066,4670756,54272,C:\Users\Admin\AppData\Local\Temp\0df55988c016ca5853fbfe50690be0d80e02ecaf3f19f78a616121c5885ad1ed.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Users\Admin\AppData\Local\Victoria Pigments\victoriapigments.exe"C:\Users\Admin\AppData\Local\Victoria Pigments\victoriapigments.exe" -i3⤵
- Executes dropped EXE
PID:2820
-
-
C:\Users\Admin\AppData\Local\Victoria Pigments\victoriapigments.exe"C:\Users\Admin\AppData\Local\Victoria Pigments\victoriapigments.exe" -s3⤵
- Executes dropped EXE
PID:1564
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
C:\Users\Admin\AppData\Local\Temp\is-Q0CJ5.tmp\0df55988c016ca5853fbfe50690be0d80e02ecaf3f19f78a616121c5885ad1ed.tmp
Filesize696KB
MD5a547e7640d3d847b900341f379cad3ce
SHA19499a19a148b615bac77469bfa678993a1d6cb24
SHA2566e675a539c582e9aed7a3d88c24018bd75280dd016f3e16e2ada34fe6c92d993
SHA5126cb2fa7dcc6349f941b4545e5f92c07d8c3aaa5b7c12627c57850db6425dc7d5bd51d8a5ed26b0ae8eabd5f11f69bcb431e8961278c7b1ab78dc655f95708b2f
-
Filesize
1.9MB
MD5876a839023b8f962a72d295da7495734
SHA162a7728679bc18784b1fbf1d013f7cece18cbec9
SHA256a757d773da406411fb977761f6e56f016d48d224aedaf3d875ed4d4a9ede6158
SHA512e1b23a2f5ec0100ff874ca075bbd0f90e9065a90fec66861f99df603d7aaa9db8e8ec326710fdc11ad41d01befe4ea3077136127acf613614d0d12ff23bec6c1
-
Filesize
2.7MB
MD572be084b6ef5977e8604331965310390
SHA178bcc34df1433839a0e92f4452eb3aaf4e4353ef
SHA256c4fb183abc51ca11f57a6a192a2992e853c61f387e17371aa65e6f9a1662c5ab
SHA512d6020adb668ed2e4b1799807623383fd3b26de8f00bedaa4836d7dc2e414a7e16d6153d33231d2171a0152ff502b073616ecf489f873a3fa905259333cbb79e2