Analysis
-
max time kernel
292s -
max time network
298s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
20-06-2024 23:32
Static task
static1
Behavioral task
behavioral1
Sample
dfc906c74d04b9f9cdb78da50502d4802d23eae870e293f3f7e28b6a55295f98.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
dfc906c74d04b9f9cdb78da50502d4802d23eae870e293f3f7e28b6a55295f98.exe
Resource
win10-20240404-en
General
-
Target
dfc906c74d04b9f9cdb78da50502d4802d23eae870e293f3f7e28b6a55295f98.exe
-
Size
5.6MB
-
MD5
450bd2a19af0ddd008b1691b62067938
-
SHA1
7bec9e214ee7c82a6c464690233abeb1d6bd859b
-
SHA256
dfc906c74d04b9f9cdb78da50502d4802d23eae870e293f3f7e28b6a55295f98
-
SHA512
251abc87b8f7c3a4b2360f145213566b2fda19b14e1ded4ab7ee16be357563d692229dc9ded434ce0ebeab6315c2a2efe2d2486c5d138b9b5446241c82645291
-
SSDEEP
98304:mgqfve2AJ3qG0q3WQWhFRhGRMcwK4vR6omvX/i3mBXEPfeKSiQ1hq3FpetVb5VWd:yvvAVZmzRkecbYcomvjSZQ1hwFKVb529
Malware Config
Extracted
socks5systemz
boewdgd.com
kbubqdm.ua
Signatures
-
Detect Socks5Systemz Payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2956-95-0x0000000002380000-0x0000000002422000-memory.dmp family_socks5systemz -
Socks5Systemz
Socks5Systemz is a botnet written in C++.
-
Executes dropped EXE 3 IoCs
Processes:
dfc906c74d04b9f9cdb78da50502d4802d23eae870e293f3f7e28b6a55295f98.tmplampungsoundstage.exelampungsoundstage.exepid process 2316 dfc906c74d04b9f9cdb78da50502d4802d23eae870e293f3f7e28b6a55295f98.tmp 2556 lampungsoundstage.exe 2956 lampungsoundstage.exe -
Loads dropped DLL 6 IoCs
Processes:
dfc906c74d04b9f9cdb78da50502d4802d23eae870e293f3f7e28b6a55295f98.exedfc906c74d04b9f9cdb78da50502d4802d23eae870e293f3f7e28b6a55295f98.tmppid process 1368 dfc906c74d04b9f9cdb78da50502d4802d23eae870e293f3f7e28b6a55295f98.exe 2316 dfc906c74d04b9f9cdb78da50502d4802d23eae870e293f3f7e28b6a55295f98.tmp 2316 dfc906c74d04b9f9cdb78da50502d4802d23eae870e293f3f7e28b6a55295f98.tmp 2316 dfc906c74d04b9f9cdb78da50502d4802d23eae870e293f3f7e28b6a55295f98.tmp 2316 dfc906c74d04b9f9cdb78da50502d4802d23eae870e293f3f7e28b6a55295f98.tmp 2316 dfc906c74d04b9f9cdb78da50502d4802d23eae870e293f3f7e28b6a55295f98.tmp -
Unexpected DNS network traffic destination 13 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
Processes:
description ioc Destination IP 141.98.234.31 Destination IP 91.211.247.248 Destination IP 152.89.198.214 Destination IP 141.98.234.31 Destination IP 91.211.247.248 Destination IP 91.211.247.248 Destination IP 141.98.234.31 Destination IP 45.155.250.90 Destination IP 81.31.197.38 Destination IP 152.89.198.214 Destination IP 45.155.250.90 Destination IP 81.31.197.38 Destination IP 152.89.198.214 -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
dfc906c74d04b9f9cdb78da50502d4802d23eae870e293f3f7e28b6a55295f98.tmppid process 2316 dfc906c74d04b9f9cdb78da50502d4802d23eae870e293f3f7e28b6a55295f98.tmp -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
dfc906c74d04b9f9cdb78da50502d4802d23eae870e293f3f7e28b6a55295f98.exedfc906c74d04b9f9cdb78da50502d4802d23eae870e293f3f7e28b6a55295f98.tmpdescription pid process target process PID 1368 wrote to memory of 2316 1368 dfc906c74d04b9f9cdb78da50502d4802d23eae870e293f3f7e28b6a55295f98.exe dfc906c74d04b9f9cdb78da50502d4802d23eae870e293f3f7e28b6a55295f98.tmp PID 1368 wrote to memory of 2316 1368 dfc906c74d04b9f9cdb78da50502d4802d23eae870e293f3f7e28b6a55295f98.exe dfc906c74d04b9f9cdb78da50502d4802d23eae870e293f3f7e28b6a55295f98.tmp PID 1368 wrote to memory of 2316 1368 dfc906c74d04b9f9cdb78da50502d4802d23eae870e293f3f7e28b6a55295f98.exe dfc906c74d04b9f9cdb78da50502d4802d23eae870e293f3f7e28b6a55295f98.tmp PID 1368 wrote to memory of 2316 1368 dfc906c74d04b9f9cdb78da50502d4802d23eae870e293f3f7e28b6a55295f98.exe dfc906c74d04b9f9cdb78da50502d4802d23eae870e293f3f7e28b6a55295f98.tmp PID 1368 wrote to memory of 2316 1368 dfc906c74d04b9f9cdb78da50502d4802d23eae870e293f3f7e28b6a55295f98.exe dfc906c74d04b9f9cdb78da50502d4802d23eae870e293f3f7e28b6a55295f98.tmp PID 1368 wrote to memory of 2316 1368 dfc906c74d04b9f9cdb78da50502d4802d23eae870e293f3f7e28b6a55295f98.exe dfc906c74d04b9f9cdb78da50502d4802d23eae870e293f3f7e28b6a55295f98.tmp PID 1368 wrote to memory of 2316 1368 dfc906c74d04b9f9cdb78da50502d4802d23eae870e293f3f7e28b6a55295f98.exe dfc906c74d04b9f9cdb78da50502d4802d23eae870e293f3f7e28b6a55295f98.tmp PID 2316 wrote to memory of 2556 2316 dfc906c74d04b9f9cdb78da50502d4802d23eae870e293f3f7e28b6a55295f98.tmp lampungsoundstage.exe PID 2316 wrote to memory of 2556 2316 dfc906c74d04b9f9cdb78da50502d4802d23eae870e293f3f7e28b6a55295f98.tmp lampungsoundstage.exe PID 2316 wrote to memory of 2556 2316 dfc906c74d04b9f9cdb78da50502d4802d23eae870e293f3f7e28b6a55295f98.tmp lampungsoundstage.exe PID 2316 wrote to memory of 2556 2316 dfc906c74d04b9f9cdb78da50502d4802d23eae870e293f3f7e28b6a55295f98.tmp lampungsoundstage.exe PID 2316 wrote to memory of 2956 2316 dfc906c74d04b9f9cdb78da50502d4802d23eae870e293f3f7e28b6a55295f98.tmp lampungsoundstage.exe PID 2316 wrote to memory of 2956 2316 dfc906c74d04b9f9cdb78da50502d4802d23eae870e293f3f7e28b6a55295f98.tmp lampungsoundstage.exe PID 2316 wrote to memory of 2956 2316 dfc906c74d04b9f9cdb78da50502d4802d23eae870e293f3f7e28b6a55295f98.tmp lampungsoundstage.exe PID 2316 wrote to memory of 2956 2316 dfc906c74d04b9f9cdb78da50502d4802d23eae870e293f3f7e28b6a55295f98.tmp lampungsoundstage.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\dfc906c74d04b9f9cdb78da50502d4802d23eae870e293f3f7e28b6a55295f98.exe"C:\Users\Admin\AppData\Local\Temp\dfc906c74d04b9f9cdb78da50502d4802d23eae870e293f3f7e28b6a55295f98.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Users\Admin\AppData\Local\Temp\is-O8UV0.tmp\dfc906c74d04b9f9cdb78da50502d4802d23eae870e293f3f7e28b6a55295f98.tmp"C:\Users\Admin\AppData\Local\Temp\is-O8UV0.tmp\dfc906c74d04b9f9cdb78da50502d4802d23eae870e293f3f7e28b6a55295f98.tmp" /SL5="$5014E,5654933,54272,C:\Users\Admin\AppData\Local\Temp\dfc906c74d04b9f9cdb78da50502d4802d23eae870e293f3f7e28b6a55295f98.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Users\Admin\AppData\Local\Lampung Soundstage\lampungsoundstage.exe"C:\Users\Admin\AppData\Local\Lampung Soundstage\lampungsoundstage.exe" -i3⤵
- Executes dropped EXE
PID:2556 -
C:\Users\Admin\AppData\Local\Lampung Soundstage\lampungsoundstage.exe"C:\Users\Admin\AppData\Local\Lampung Soundstage\lampungsoundstage.exe" -s3⤵
- Executes dropped EXE
PID:2956
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.2MB
MD57b72981a1e7381d726d50da78a296cc5
SHA1aa4d87a34c0b105161be24fdd30b30bcdf04b71e
SHA256e2c03a0522b8baa92a2ea43e229398a2333aa585d9353bd5d45072268357da39
SHA51263316e8703b0305e8f606fadd58e8fc19f064b021b6ebd5b727126f06e42cedea460e1abead15fdb75ae2ec3dfc59e967714be2ead0c5ba03313cc8e2757acbe
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
13KB
MD5a813d18268affd4763dde940246dc7e5
SHA1c7366e1fd925c17cc6068001bd38eaef5b42852f
SHA256e19781aabe466dd8779cb9c8fa41bbb73375447066bb34e876cf388a6ed63c64
SHA512b310ed4cd2e94381c00a6a370fcb7cc867ebe425d705b69caaaaffdafbab91f72d357966916053e72e68ecf712f2af7585500c58bb53ec3e1d539179fcb45fb4
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
\Users\Admin\AppData\Local\Temp\is-O8UV0.tmp\dfc906c74d04b9f9cdb78da50502d4802d23eae870e293f3f7e28b6a55295f98.tmp
Filesize680KB
MD5a53cd7f9f154eefaf6ff191bb4d65be5
SHA1f9f4f828e214a3f0b086dd4c96a23c0b45d3b4ff
SHA2564b70003d8cca9ebf285e0eaa03e24dd7cfd43370452dda6047654cca899dfb35
SHA512327c5dbb5a3971d578aba98e76ac176a7afe3cb6f6767b6791b67e7a37ed558c0e8d31e20f17721766a3de83896b01681f1564ce55a020c70543359b75f1e88d