Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
292s -
max time network
301s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
24/06/2024, 05:03
Static task
static1
Behavioral task
behavioral1
Sample
0c52f90830cb918ef112f9aa79d7737871d73785f207c35df19905bc91f91b8b.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0c52f90830cb918ef112f9aa79d7737871d73785f207c35df19905bc91f91b8b.exe
Resource
win10-20240404-en
General
-
Target
0c52f90830cb918ef112f9aa79d7737871d73785f207c35df19905bc91f91b8b.exe
-
Size
4.5MB
-
MD5
6fa8e5a9a19d422bdbf6a903599245dc
-
SHA1
91f466b0cdf818b6496a74ddef252bff25228ea1
-
SHA256
0c52f90830cb918ef112f9aa79d7737871d73785f207c35df19905bc91f91b8b
-
SHA512
2acd1a13dd49b53a94bf3e688a78099a7f10efebfde30c8865f3db967d8872c737a19c0d81e3f0c58bacbdda77419436d08c5523da2baf8df3221a221c1547bb
-
SSDEEP
98304:mkNLNdvxtsqhqUbfePSKcYFLseNdGw+TE0/SiLdl+8LA+14n6:3BdvxtsiqGOFLRuE0/SAd5546
Malware Config
Extracted
socks5systemz
bnuuieg.com
http://bnuuieg.com/search/?q=67e28dd86d5ff028450dff177c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f571ea771795af8e05c645db22f31dfe339426fa11a366c350adb719a9577e55b8603e983a608ff613c0ea919333
Signatures
-
Detect Socks5Systemz Payload 1 IoCs
resource yara_rule behavioral2/memory/4228-82-0x00000000028B0000-0x0000000002952000-memory.dmp family_socks5systemz -
Socks5Systemz
Socks5Systemz is a botnet written in C++.
-
Executes dropped EXE 3 IoCs
pid Process 1316 0c52f90830cb918ef112f9aa79d7737871d73785f207c35df19905bc91f91b8b.tmp 2824 freeaudioextractor32.exe 4228 freeaudioextractor32.exe -
Loads dropped DLL 1 IoCs
pid Process 1316 0c52f90830cb918ef112f9aa79d7737871d73785f207c35df19905bc91f91b8b.tmp -
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 91.211.247.248 -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1316 0c52f90830cb918ef112f9aa79d7737871d73785f207c35df19905bc91f91b8b.tmp -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4892 wrote to memory of 1316 4892 0c52f90830cb918ef112f9aa79d7737871d73785f207c35df19905bc91f91b8b.exe 73 PID 4892 wrote to memory of 1316 4892 0c52f90830cb918ef112f9aa79d7737871d73785f207c35df19905bc91f91b8b.exe 73 PID 4892 wrote to memory of 1316 4892 0c52f90830cb918ef112f9aa79d7737871d73785f207c35df19905bc91f91b8b.exe 73 PID 1316 wrote to memory of 2824 1316 0c52f90830cb918ef112f9aa79d7737871d73785f207c35df19905bc91f91b8b.tmp 74 PID 1316 wrote to memory of 2824 1316 0c52f90830cb918ef112f9aa79d7737871d73785f207c35df19905bc91f91b8b.tmp 74 PID 1316 wrote to memory of 2824 1316 0c52f90830cb918ef112f9aa79d7737871d73785f207c35df19905bc91f91b8b.tmp 74 PID 1316 wrote to memory of 4228 1316 0c52f90830cb918ef112f9aa79d7737871d73785f207c35df19905bc91f91b8b.tmp 75 PID 1316 wrote to memory of 4228 1316 0c52f90830cb918ef112f9aa79d7737871d73785f207c35df19905bc91f91b8b.tmp 75 PID 1316 wrote to memory of 4228 1316 0c52f90830cb918ef112f9aa79d7737871d73785f207c35df19905bc91f91b8b.tmp 75
Processes
-
C:\Users\Admin\AppData\Local\Temp\0c52f90830cb918ef112f9aa79d7737871d73785f207c35df19905bc91f91b8b.exe"C:\Users\Admin\AppData\Local\Temp\0c52f90830cb918ef112f9aa79d7737871d73785f207c35df19905bc91f91b8b.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Users\Admin\AppData\Local\Temp\is-VDG08.tmp\0c52f90830cb918ef112f9aa79d7737871d73785f207c35df19905bc91f91b8b.tmp"C:\Users\Admin\AppData\Local\Temp\is-VDG08.tmp\0c52f90830cb918ef112f9aa79d7737871d73785f207c35df19905bc91f91b8b.tmp" /SL5="$70232,4470656,54272,C:\Users\Admin\AppData\Local\Temp\0c52f90830cb918ef112f9aa79d7737871d73785f207c35df19905bc91f91b8b.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Users\Admin\AppData\Local\Free Audio Extractor\freeaudioextractor32.exe"C:\Users\Admin\AppData\Local\Free Audio Extractor\freeaudioextractor32.exe" -i3⤵
- Executes dropped EXE
PID:2824
-
-
C:\Users\Admin\AppData\Local\Free Audio Extractor\freeaudioextractor32.exe"C:\Users\Admin\AppData\Local\Free Audio Extractor\freeaudioextractor32.exe" -s3⤵
- Executes dropped EXE
PID:4228
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD52163374e0f8a793fc02c4669173be198
SHA1a31156ca663956a5ce32834fd1a80935d4c3d66b
SHA25635ea091b35d4c50c4cf9f5b8e311f25648fd161ef50beee615fdbff0a905617b
SHA512fcd552e9b91e825e01ae9305f565b25c0a7e93adf13217b22c82344601f8d4c078fffb8ee39211e83084c241cf9b42244242273ada3077a00e8460f2022ceb8d
-
C:\Users\Admin\AppData\Local\Temp\is-VDG08.tmp\0c52f90830cb918ef112f9aa79d7737871d73785f207c35df19905bc91f91b8b.tmp
Filesize680KB
MD5be751b14a5f1bea2d2b2563a6b5d43e2
SHA1c8e6aab342703f3c0cb5f2d346ec02e7fb217443
SHA25659b3ba9039a9452887e018b15872a8a82971bd2c27b2987fb093e5057f1600fb
SHA51242545220bfefeba930e6c6f843e6bdcd7a78d157f4e419221a7914d429d402bb740760c83b4a636011fe1d30666b9d8354dca4f899dcaf035602d884509a8f94
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63