Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
31/05/2024, 14:18
Static task
static1
Behavioral task
behavioral1
Sample
d0def0491d9aae6922fa2d6389a2c93d8fe5863b6559912df9628153474cd4b9.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
d0def0491d9aae6922fa2d6389a2c93d8fe5863b6559912df9628153474cd4b9.exe
Resource
win10v2004-20240508-en
General
-
Target
d0def0491d9aae6922fa2d6389a2c93d8fe5863b6559912df9628153474cd4b9.exe
-
Size
4.9MB
-
MD5
a38cd912033bfa30896e0877a2ad31c0
-
SHA1
7a18139ff0c9ab1a8c570e47e9c1db98bcf526c3
-
SHA256
d0def0491d9aae6922fa2d6389a2c93d8fe5863b6559912df9628153474cd4b9
-
SHA512
b166084a0ac085520482bae79b011befb8f12dc62a901302edea8994babb0800521ca871a044f1c0968b932a77ecfc56db300a0f46cb858e263f17869e125ff0
-
SSDEEP
98304:m7D/RL+V5xCyjWydeuerhhbffe+sWj5OTnTIxLYlOcQc5NuIKCDzEO:8L+fxCgZef7XsNTusnYIHnP
Malware Config
Signatures
-
Detect Socks5Systemz Payload 1 IoCs
resource yara_rule behavioral1/memory/2508-92-0x0000000002630000-0x00000000026D2000-memory.dmp family_socks5systemz -
Socks5Systemz
Socks5Systemz is a botnet written in C++.
-
Executes dropped EXE 3 IoCs
pid Process 2928 d0def0491d9aae6922fa2d6389a2c93d8fe5863b6559912df9628153474cd4b9.tmp 2780 ddsoundrecorder.exe 2508 ddsoundrecorder.exe -
Loads dropped DLL 5 IoCs
pid Process 3044 d0def0491d9aae6922fa2d6389a2c93d8fe5863b6559912df9628153474cd4b9.exe 2928 d0def0491d9aae6922fa2d6389a2c93d8fe5863b6559912df9628153474cd4b9.tmp 2928 d0def0491d9aae6922fa2d6389a2c93d8fe5863b6559912df9628153474cd4b9.tmp 2928 d0def0491d9aae6922fa2d6389a2c93d8fe5863b6559912df9628153474cd4b9.tmp 2928 d0def0491d9aae6922fa2d6389a2c93d8fe5863b6559912df9628153474cd4b9.tmp -
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 141.98.234.31 -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2928 d0def0491d9aae6922fa2d6389a2c93d8fe5863b6559912df9628153474cd4b9.tmp -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3044 wrote to memory of 2928 3044 d0def0491d9aae6922fa2d6389a2c93d8fe5863b6559912df9628153474cd4b9.exe 28 PID 3044 wrote to memory of 2928 3044 d0def0491d9aae6922fa2d6389a2c93d8fe5863b6559912df9628153474cd4b9.exe 28 PID 3044 wrote to memory of 2928 3044 d0def0491d9aae6922fa2d6389a2c93d8fe5863b6559912df9628153474cd4b9.exe 28 PID 3044 wrote to memory of 2928 3044 d0def0491d9aae6922fa2d6389a2c93d8fe5863b6559912df9628153474cd4b9.exe 28 PID 3044 wrote to memory of 2928 3044 d0def0491d9aae6922fa2d6389a2c93d8fe5863b6559912df9628153474cd4b9.exe 28 PID 3044 wrote to memory of 2928 3044 d0def0491d9aae6922fa2d6389a2c93d8fe5863b6559912df9628153474cd4b9.exe 28 PID 3044 wrote to memory of 2928 3044 d0def0491d9aae6922fa2d6389a2c93d8fe5863b6559912df9628153474cd4b9.exe 28 PID 2928 wrote to memory of 2780 2928 d0def0491d9aae6922fa2d6389a2c93d8fe5863b6559912df9628153474cd4b9.tmp 29 PID 2928 wrote to memory of 2780 2928 d0def0491d9aae6922fa2d6389a2c93d8fe5863b6559912df9628153474cd4b9.tmp 29 PID 2928 wrote to memory of 2780 2928 d0def0491d9aae6922fa2d6389a2c93d8fe5863b6559912df9628153474cd4b9.tmp 29 PID 2928 wrote to memory of 2780 2928 d0def0491d9aae6922fa2d6389a2c93d8fe5863b6559912df9628153474cd4b9.tmp 29 PID 2928 wrote to memory of 2508 2928 d0def0491d9aae6922fa2d6389a2c93d8fe5863b6559912df9628153474cd4b9.tmp 30 PID 2928 wrote to memory of 2508 2928 d0def0491d9aae6922fa2d6389a2c93d8fe5863b6559912df9628153474cd4b9.tmp 30 PID 2928 wrote to memory of 2508 2928 d0def0491d9aae6922fa2d6389a2c93d8fe5863b6559912df9628153474cd4b9.tmp 30 PID 2928 wrote to memory of 2508 2928 d0def0491d9aae6922fa2d6389a2c93d8fe5863b6559912df9628153474cd4b9.tmp 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\d0def0491d9aae6922fa2d6389a2c93d8fe5863b6559912df9628153474cd4b9.exe"C:\Users\Admin\AppData\Local\Temp\d0def0491d9aae6922fa2d6389a2c93d8fe5863b6559912df9628153474cd4b9.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Users\Admin\AppData\Local\Temp\is-IKMAM.tmp\d0def0491d9aae6922fa2d6389a2c93d8fe5863b6559912df9628153474cd4b9.tmp"C:\Users\Admin\AppData\Local\Temp\is-IKMAM.tmp\d0def0491d9aae6922fa2d6389a2c93d8fe5863b6559912df9628153474cd4b9.tmp" /SL5="$30098,4871470,54272,C:\Users\Admin\AppData\Local\Temp\d0def0491d9aae6922fa2d6389a2c93d8fe5863b6559912df9628153474cd4b9.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Users\Admin\AppData\Local\DD Sound Recorder\ddsoundrecorder.exe"C:\Users\Admin\AppData\Local\DD Sound Recorder\ddsoundrecorder.exe" -i3⤵
- Executes dropped EXE
PID:2780
-
-
C:\Users\Admin\AppData\Local\DD Sound Recorder\ddsoundrecorder.exe"C:\Users\Admin\AppData\Local\DD Sound Recorder\ddsoundrecorder.exe" -s3⤵
- Executes dropped EXE
PID:2508
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.4MB
MD52ecfffe908dd9d123727e908d8db0f5a
SHA17e98823dfa418f932bf81c2c9e3579f3032264b4
SHA25607bff68d5de8499243115d088a885c204c6e7ae26c1d9fbd739ccc53a16fedb5
SHA5128bedeb3bbeaf261fa2d30a078afd0671106a4ef8d6db5e3f3b439636597a4bf8acbc9ac2b3745f06452e423eefc6a42795fd3c6852385f4ef9ad82a93cf4183f
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
\Users\Admin\AppData\Local\Temp\is-IKMAM.tmp\d0def0491d9aae6922fa2d6389a2c93d8fe5863b6559912df9628153474cd4b9.tmp
Filesize680KB
MD570fd6deadd1960b2ff7b8af1130115a5
SHA13910f645f5f3a50f13246b63945faa38fef17df2
SHA256851e14a559110237fc543724e581da0098f4f52e10045cb4d97a6fed1923b361
SHA512784830b1b2dc3b89d6aaa3276578fb8ec07edfcfc288659e59b92c5d012b7791d6bfbd95570652e993ec041a51a156b31a7ba962dc3dcb5e064faa04f3de180e