Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
08-06-2024 14:49
Static task
static1
Behavioral task
behavioral1
Sample
14d9c7104152321929616c70a9d09b824e9e54c1fa8b7fc13575b470f318cd81.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
14d9c7104152321929616c70a9d09b824e9e54c1fa8b7fc13575b470f318cd81.exe
Resource
win11-20240508-en
General
-
Target
14d9c7104152321929616c70a9d09b824e9e54c1fa8b7fc13575b470f318cd81.exe
-
Size
4.6MB
-
MD5
9befea491a6642516e2efdcd8fd5e82a
-
SHA1
9ae58193f8a8b8e09c55b1fe6999a0c4df46af0c
-
SHA256
14d9c7104152321929616c70a9d09b824e9e54c1fa8b7fc13575b470f318cd81
-
SHA512
06c99eee494edb424d65bb6449bd1e1f77ded526a340f8888dfde9862499354d1c7671c848fb65473a756f6b44b122509e0b51f1abe9024a87b8257cd0822db4
-
SSDEEP
98304:m1BCbHJREd+cEIvb7GhOZTQSjHaos5VhCdoCxOVcqscxZ:SBCbJREd+gv3Ggx6v5VWsbhZ
Malware Config
Extracted
socks5systemz
dtgbfqs.info
http://dtgbfqs.info/search/?q=67e28dd86e54a179130af94d7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa49e8889b5e4fa9281ae978a371ea771795af8e05c645db22f31dfe339426fa11af66c152adb719a9577e55b8603e983a608ff819c5e7979b3f
Signatures
-
Detect Socks5Systemz Payload 1 IoCs
resource yara_rule behavioral1/memory/408-86-0x00000000024A0000-0x0000000002542000-memory.dmp family_socks5systemz -
Socks5Systemz
Socks5Systemz is a botnet written in C++.
-
Executes dropped EXE 3 IoCs
pid Process 2368 14d9c7104152321929616c70a9d09b824e9e54c1fa8b7fc13575b470f318cd81.tmp 2852 lesserextent32.exe 408 lesserextent32.exe -
Loads dropped DLL 1 IoCs
pid Process 2368 14d9c7104152321929616c70a9d09b824e9e54c1fa8b7fc13575b470f318cd81.tmp -
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 91.211.247.248 -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2368 14d9c7104152321929616c70a9d09b824e9e54c1fa8b7fc13575b470f318cd81.tmp -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3968 wrote to memory of 2368 3968 14d9c7104152321929616c70a9d09b824e9e54c1fa8b7fc13575b470f318cd81.exe 82 PID 3968 wrote to memory of 2368 3968 14d9c7104152321929616c70a9d09b824e9e54c1fa8b7fc13575b470f318cd81.exe 82 PID 3968 wrote to memory of 2368 3968 14d9c7104152321929616c70a9d09b824e9e54c1fa8b7fc13575b470f318cd81.exe 82 PID 2368 wrote to memory of 2852 2368 14d9c7104152321929616c70a9d09b824e9e54c1fa8b7fc13575b470f318cd81.tmp 86 PID 2368 wrote to memory of 2852 2368 14d9c7104152321929616c70a9d09b824e9e54c1fa8b7fc13575b470f318cd81.tmp 86 PID 2368 wrote to memory of 2852 2368 14d9c7104152321929616c70a9d09b824e9e54c1fa8b7fc13575b470f318cd81.tmp 86 PID 2368 wrote to memory of 408 2368 14d9c7104152321929616c70a9d09b824e9e54c1fa8b7fc13575b470f318cd81.tmp 87 PID 2368 wrote to memory of 408 2368 14d9c7104152321929616c70a9d09b824e9e54c1fa8b7fc13575b470f318cd81.tmp 87 PID 2368 wrote to memory of 408 2368 14d9c7104152321929616c70a9d09b824e9e54c1fa8b7fc13575b470f318cd81.tmp 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\14d9c7104152321929616c70a9d09b824e9e54c1fa8b7fc13575b470f318cd81.exe"C:\Users\Admin\AppData\Local\Temp\14d9c7104152321929616c70a9d09b824e9e54c1fa8b7fc13575b470f318cd81.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Users\Admin\AppData\Local\Temp\is-UUAQD.tmp\14d9c7104152321929616c70a9d09b824e9e54c1fa8b7fc13575b470f318cd81.tmp"C:\Users\Admin\AppData\Local\Temp\is-UUAQD.tmp\14d9c7104152321929616c70a9d09b824e9e54c1fa8b7fc13575b470f318cd81.tmp" /SL5="$C00F6,4583943,54272,C:\Users\Admin\AppData\Local\Temp\14d9c7104152321929616c70a9d09b824e9e54c1fa8b7fc13575b470f318cd81.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Users\Admin\AppData\Local\Lesser Extent\lesserextent32.exe"C:\Users\Admin\AppData\Local\Lesser Extent\lesserextent32.exe" -i3⤵
- Executes dropped EXE
PID:2852
-
-
C:\Users\Admin\AppData\Local\Lesser Extent\lesserextent32.exe"C:\Users\Admin\AppData\Local\Lesser Extent\lesserextent32.exe" -s3⤵
- Executes dropped EXE
PID:408
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD57d77b2468570586fcb81e49052082c57
SHA169918bc873214a55fa258c21d596ec763e9a751e
SHA2567c326777e015508740be05d14cde60da4139ed92df40cc3b65171be70333397c
SHA512dde35ca5a9d72c098b2549b77a24133b4e61188be20cedad47ef6d73c5fd1924e786a7488f95bc18d12e3bda7514dc4c9f4d4d7bbf2cab5829fa37509dfc4f6e
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
C:\Users\Admin\AppData\Local\Temp\is-UUAQD.tmp\14d9c7104152321929616c70a9d09b824e9e54c1fa8b7fc13575b470f318cd81.tmp
Filesize680KB
MD589c430db291d24fe3fda4257669944ce
SHA1de7f2ad7a2bebd845e5ed619756fdd53f5a2aed4
SHA25654289dc8aea767883f8a78b2ec1dc54c9ab1d4081c0f931ddececd50ce320cc6
SHA5128b5ad69b61d6e52e7db16daf65ec4ccbcb6b307ea680cda03c0bf5cbf1dde81d80b842a0c80d0d80d56c713db26d78fb0e46fcc4eac981972adff4e87dd9e58b