Analysis
-
max time kernel
292s -
max time network
247s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
20-06-2024 23:09
Static task
static1
Behavioral task
behavioral1
Sample
bb3095d5b8b59d58ff10d4202d77713c9e76e78a048fc378b4c1aed9e3e1ab27.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
bb3095d5b8b59d58ff10d4202d77713c9e76e78a048fc378b4c1aed9e3e1ab27.exe
Resource
win10-20240404-en
General
-
Target
bb3095d5b8b59d58ff10d4202d77713c9e76e78a048fc378b4c1aed9e3e1ab27.exe
-
Size
4.4MB
-
MD5
5b16619b3b35341918d658ce2aa8c2b5
-
SHA1
17b5642fdd851cade939d743748179f5f80cbc83
-
SHA256
bb3095d5b8b59d58ff10d4202d77713c9e76e78a048fc378b4c1aed9e3e1ab27
-
SHA512
a5775f3ca64f594db2dd98d0881f3f7dd72049edd320d499b471b30d817f65159af86bea1923d86821b80b76cd47f0d245c225b556583f7481634b88c705d8ad
-
SSDEEP
98304:m4wBmwG8fGIGKIU6bMjY9jlUXOvyfTVZ9rko:fKImIU6eYLUrVko
Malware Config
Extracted
socks5systemz
bubsudj.com
http://bubsudj.com/search/?q=67e28dd8655bf57a4609f84c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa48e8889b5e4fa9281ae978ff71ea771795af8e05c645db22f31dfe339426fa11a366c350adb719a9577e55b8603e983a608ff718c2ea959b32
Signatures
-
Detect Socks5Systemz Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4652-81-0x00000000008C0000-0x0000000000962000-memory.dmp family_socks5systemz -
Socks5Systemz
Socks5Systemz is a botnet written in C++.
-
Executes dropped EXE 3 IoCs
Processes:
bb3095d5b8b59d58ff10d4202d77713c9e76e78a048fc378b4c1aed9e3e1ab27.tmpfanplayercloudfree.exefanplayercloudfree.exepid process 1096 bb3095d5b8b59d58ff10d4202d77713c9e76e78a048fc378b4c1aed9e3e1ab27.tmp 1704 fanplayercloudfree.exe 4652 fanplayercloudfree.exe -
Loads dropped DLL 1 IoCs
Processes:
bb3095d5b8b59d58ff10d4202d77713c9e76e78a048fc378b4c1aed9e3e1ab27.tmppid process 1096 bb3095d5b8b59d58ff10d4202d77713c9e76e78a048fc378b4c1aed9e3e1ab27.tmp -
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
Processes:
description ioc Destination IP 152.89.198.214 -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
bb3095d5b8b59d58ff10d4202d77713c9e76e78a048fc378b4c1aed9e3e1ab27.tmppid process 1096 bb3095d5b8b59d58ff10d4202d77713c9e76e78a048fc378b4c1aed9e3e1ab27.tmp -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
bb3095d5b8b59d58ff10d4202d77713c9e76e78a048fc378b4c1aed9e3e1ab27.exebb3095d5b8b59d58ff10d4202d77713c9e76e78a048fc378b4c1aed9e3e1ab27.tmpdescription pid process target process PID 4920 wrote to memory of 1096 4920 bb3095d5b8b59d58ff10d4202d77713c9e76e78a048fc378b4c1aed9e3e1ab27.exe bb3095d5b8b59d58ff10d4202d77713c9e76e78a048fc378b4c1aed9e3e1ab27.tmp PID 4920 wrote to memory of 1096 4920 bb3095d5b8b59d58ff10d4202d77713c9e76e78a048fc378b4c1aed9e3e1ab27.exe bb3095d5b8b59d58ff10d4202d77713c9e76e78a048fc378b4c1aed9e3e1ab27.tmp PID 4920 wrote to memory of 1096 4920 bb3095d5b8b59d58ff10d4202d77713c9e76e78a048fc378b4c1aed9e3e1ab27.exe bb3095d5b8b59d58ff10d4202d77713c9e76e78a048fc378b4c1aed9e3e1ab27.tmp PID 1096 wrote to memory of 1704 1096 bb3095d5b8b59d58ff10d4202d77713c9e76e78a048fc378b4c1aed9e3e1ab27.tmp fanplayercloudfree.exe PID 1096 wrote to memory of 1704 1096 bb3095d5b8b59d58ff10d4202d77713c9e76e78a048fc378b4c1aed9e3e1ab27.tmp fanplayercloudfree.exe PID 1096 wrote to memory of 1704 1096 bb3095d5b8b59d58ff10d4202d77713c9e76e78a048fc378b4c1aed9e3e1ab27.tmp fanplayercloudfree.exe PID 1096 wrote to memory of 4652 1096 bb3095d5b8b59d58ff10d4202d77713c9e76e78a048fc378b4c1aed9e3e1ab27.tmp fanplayercloudfree.exe PID 1096 wrote to memory of 4652 1096 bb3095d5b8b59d58ff10d4202d77713c9e76e78a048fc378b4c1aed9e3e1ab27.tmp fanplayercloudfree.exe PID 1096 wrote to memory of 4652 1096 bb3095d5b8b59d58ff10d4202d77713c9e76e78a048fc378b4c1aed9e3e1ab27.tmp fanplayercloudfree.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bb3095d5b8b59d58ff10d4202d77713c9e76e78a048fc378b4c1aed9e3e1ab27.exe"C:\Users\Admin\AppData\Local\Temp\bb3095d5b8b59d58ff10d4202d77713c9e76e78a048fc378b4c1aed9e3e1ab27.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Users\Admin\AppData\Local\Temp\is-N7DLD.tmp\bb3095d5b8b59d58ff10d4202d77713c9e76e78a048fc378b4c1aed9e3e1ab27.tmp"C:\Users\Admin\AppData\Local\Temp\is-N7DLD.tmp\bb3095d5b8b59d58ff10d4202d77713c9e76e78a048fc378b4c1aed9e3e1ab27.tmp" /SL5="$A0084,4381089,54272,C:\Users\Admin\AppData\Local\Temp\bb3095d5b8b59d58ff10d4202d77713c9e76e78a048fc378b4c1aed9e3e1ab27.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Users\Admin\AppData\Local\FanPlayer Cloud Free\fanplayercloudfree.exe"C:\Users\Admin\AppData\Local\FanPlayer Cloud Free\fanplayercloudfree.exe" -i3⤵
- Executes dropped EXE
PID:1704 -
C:\Users\Admin\AppData\Local\FanPlayer Cloud Free\fanplayercloudfree.exe"C:\Users\Admin\AppData\Local\FanPlayer Cloud Free\fanplayercloudfree.exe" -s3⤵
- Executes dropped EXE
PID:4652
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.3MB
MD5cb6634b29a8e16c9f459a5b469c280b0
SHA10ba0d5dadbf249dff8b3da81281f1bd2b59af5dc
SHA2567468ef7c78dcbd5d23534f6f4db6f5717c6ae8319bcab6675c9173316e72b859
SHA512176758e486c43c119cec057a058687bbeee4ec2778f94f6015d8641ee35b5781474132d973c0a370a3fa1327c01a6c9b70971a35f3ac6cc2b0b92c995a4ee134
-
C:\Users\Admin\AppData\Local\Temp\is-N7DLD.tmp\bb3095d5b8b59d58ff10d4202d77713c9e76e78a048fc378b4c1aed9e3e1ab27.tmp
Filesize680KB
MD52154bbdc6c2dbb50a3cb91c53dfe890c
SHA17dc893259f9ff4792ae127ae06bd231638464001
SHA256e5259ed1134d255d778da9b2748841a47e6dc6949f6e3e6dc53f0ed114ea20d4
SHA5124bbb22ef4d80c5b0df178da5d1794ed7f7909cc2abdc511314d3c1d9e8a412fbddf7407536d1d98affc16d089cbcb15b3e8f8c264f99607c554e1627beaea45f
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63