Analysis
-
max time kernel
292s -
max time network
308s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
07/06/2024, 01:44
Static task
static1
Behavioral task
behavioral1
Sample
d19259f947fa51897af848841af56cac8195b66d1c23db23347936248a5071c8.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d19259f947fa51897af848841af56cac8195b66d1c23db23347936248a5071c8.exe
Resource
win10-20240404-en
General
-
Target
d19259f947fa51897af848841af56cac8195b66d1c23db23347936248a5071c8.exe
-
Size
4.8MB
-
MD5
95cdd4acc94a2a915f3cff3e07aa9491
-
SHA1
b54601f39978e3428ec7daece9245c2c2a2e5726
-
SHA256
d19259f947fa51897af848841af56cac8195b66d1c23db23347936248a5071c8
-
SHA512
16ef5330ba1175d01e7c9182287463b35abc265150fe93e1ee2cbac3ee0f84ef991a8cf90fe173194cb7222a10843135f6d236f6e8eb25ae338e11311f487c79
-
SSDEEP
98304:mzraY+eARtaMWM0Q2wqzQ+7VK42UqtjC76b5uBwWI2Jmt0K0RIV5N:WvzA3hWQ2w6B/2rtjXbctg0KQ6N
Malware Config
Signatures
-
Detect Socks5Systemz Payload 3 IoCs
resource yara_rule behavioral2/memory/4424-85-0x0000000000930000-0x00000000009D2000-memory.dmp family_socks5systemz behavioral2/memory/4424-109-0x0000000000930000-0x00000000009D2000-memory.dmp family_socks5systemz behavioral2/memory/4424-108-0x0000000000930000-0x00000000009D2000-memory.dmp family_socks5systemz -
Socks5Systemz
Socks5Systemz is a botnet written in C++.
-
Executes dropped EXE 3 IoCs
pid Process 1320 d19259f947fa51897af848841af56cac8195b66d1c23db23347936248a5071c8.tmp 1328 ddsoundrecorder.exe 4424 ddsoundrecorder.exe -
Loads dropped DLL 1 IoCs
pid Process 1320 d19259f947fa51897af848841af56cac8195b66d1c23db23347936248a5071c8.tmp -
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 152.89.198.214 -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1320 d19259f947fa51897af848841af56cac8195b66d1c23db23347936248a5071c8.tmp -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2424 wrote to memory of 1320 2424 d19259f947fa51897af848841af56cac8195b66d1c23db23347936248a5071c8.exe 74 PID 2424 wrote to memory of 1320 2424 d19259f947fa51897af848841af56cac8195b66d1c23db23347936248a5071c8.exe 74 PID 2424 wrote to memory of 1320 2424 d19259f947fa51897af848841af56cac8195b66d1c23db23347936248a5071c8.exe 74 PID 1320 wrote to memory of 1328 1320 d19259f947fa51897af848841af56cac8195b66d1c23db23347936248a5071c8.tmp 75 PID 1320 wrote to memory of 1328 1320 d19259f947fa51897af848841af56cac8195b66d1c23db23347936248a5071c8.tmp 75 PID 1320 wrote to memory of 1328 1320 d19259f947fa51897af848841af56cac8195b66d1c23db23347936248a5071c8.tmp 75 PID 1320 wrote to memory of 4424 1320 d19259f947fa51897af848841af56cac8195b66d1c23db23347936248a5071c8.tmp 76 PID 1320 wrote to memory of 4424 1320 d19259f947fa51897af848841af56cac8195b66d1c23db23347936248a5071c8.tmp 76 PID 1320 wrote to memory of 4424 1320 d19259f947fa51897af848841af56cac8195b66d1c23db23347936248a5071c8.tmp 76
Processes
-
C:\Users\Admin\AppData\Local\Temp\d19259f947fa51897af848841af56cac8195b66d1c23db23347936248a5071c8.exe"C:\Users\Admin\AppData\Local\Temp\d19259f947fa51897af848841af56cac8195b66d1c23db23347936248a5071c8.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Users\Admin\AppData\Local\Temp\is-G1RMB.tmp\d19259f947fa51897af848841af56cac8195b66d1c23db23347936248a5071c8.tmp"C:\Users\Admin\AppData\Local\Temp\is-G1RMB.tmp\d19259f947fa51897af848841af56cac8195b66d1c23db23347936248a5071c8.tmp" /SL5="$901EC,4762220,54272,C:\Users\Admin\AppData\Local\Temp\d19259f947fa51897af848841af56cac8195b66d1c23db23347936248a5071c8.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Users\Admin\AppData\Local\DD Sound Recorder\ddsoundrecorder.exe"C:\Users\Admin\AppData\Local\DD Sound Recorder\ddsoundrecorder.exe" -i3⤵
- Executes dropped EXE
PID:1328
-
-
C:\Users\Admin\AppData\Local\DD Sound Recorder\ddsoundrecorder.exe"C:\Users\Admin\AppData\Local\DD Sound Recorder\ddsoundrecorder.exe" -s3⤵
- Executes dropped EXE
PID:4424
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.1MB
MD57794b34b9d9ed70b05e78008a3feac2e
SHA1d343c608ec31463c40d3e8517c5a74b8eb20df1c
SHA256f3730659276da0f354310ed3fd32d4b7dcb779c4e266d583c27acdd8f226217a
SHA512511cbb0779a4696f8169cb0976adede40b908ad69361cab493628116b04182ec35b2f1c60f86cc55ac3194c1f8f73a4b508e13df5240d75fad0d05356879ca88
-
Filesize
448KB
MD5cf7cf2f9e8fd3c057f2017d89267c585
SHA1546d070f7eaab446df69c9688b185d1dadc1bb92
SHA2562bbc6a98f02c33ec9771183723d3cef9a358f200e61519ce57fd8a13cd6f73ba
SHA5128c8b32522487f5773f9951138b2c8784ac7ae710faadc505e3f13e71792f9582e74baaee9094f21be929d4efd2f20ab3301ba761ac65b34184f20f3dfd15e3fb
-
Filesize
512KB
MD59a38a43454131a0517128eebe73b719c
SHA1c1f08273a8c312faa95917c109b9260003e7f403
SHA256fea2ba2a4bc338b673ffe97878803035d4343da0ed6d2adc18710d70fd399343
SHA5120672bbcd81a3d2d92c3ac8d72a619833d8b41038268d714e581da46ac6dee5577a0e1f87e1c50f094de9f3d9e3ab82efe251e64da7597e1b4e39a30ea674cd1a
-
C:\Users\Admin\AppData\Local\Temp\is-G1RMB.tmp\d19259f947fa51897af848841af56cac8195b66d1c23db23347936248a5071c8.tmp
Filesize680KB
MD52c4a8f1ff8f10954432c5f20acfdea93
SHA1f936bd942225d6581916ab90083175d65fa4224a
SHA2561544806eea6eb81034b3d569e90aa4ac8482d2d3794095fbef882c00e1ea2969
SHA512eec4cd2db771aaada05facf1d6d486952894ca8dcdf02428dd3d1817ba78ddac01688c4b2d8a48b49dff2d7b81389ce8460c7b05bb5830d6394fe34bc5b6bca6
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63