Analysis
-
max time kernel
292s -
max time network
299s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
24/06/2024, 05:13
Static task
static1
Behavioral task
behavioral1
Sample
2faf264c85a6b48958e0e5366b7fe2d2f98f30ac7b12a74c811afe20052be06b.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2faf264c85a6b48958e0e5366b7fe2d2f98f30ac7b12a74c811afe20052be06b.exe
Resource
win10-20240404-en
General
-
Target
2faf264c85a6b48958e0e5366b7fe2d2f98f30ac7b12a74c811afe20052be06b.exe
-
Size
4.7MB
-
MD5
994514b71eedc26a1d4e6dfc572f3ada
-
SHA1
272ee3e93aeb8f77a6a3e4cddb872e4db6f8fe9d
-
SHA256
2faf264c85a6b48958e0e5366b7fe2d2f98f30ac7b12a74c811afe20052be06b
-
SHA512
d0ee3157e0ebebb4d47ead0470c4abba5cffbe7e51c5a0d10491e1a18cc2a9c4279d6997d4cb891dece30664b4821abd40f24e6d84484d31e2e9128d506a1b96
-
SSDEEP
98304:mTXL0KRQVwC27bXncQ70+G94suUbcOsVGLGwfd0FAon/YH:u1R9p7rU3xbJsZq0FAo/YH
Malware Config
Extracted
socks5systemz
ebnnece.ua
http://ebnnece.ua/search/?q=67e28dd86809f27b415ba51b7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa1de8889b5e4fa9281ae978a771ea771795af8e05c645db22f31dfe339426fa11a366c350adb719a9577e55b8603e983a608ff613c0e9959c38
Signatures
-
Detect Socks5Systemz Payload 1 IoCs
resource yara_rule behavioral2/memory/2368-84-0x00000000023D0000-0x0000000002472000-memory.dmp family_socks5systemz -
Socks5Systemz
Socks5Systemz is a botnet written in C++.
-
Executes dropped EXE 3 IoCs
pid Process 4064 2faf264c85a6b48958e0e5366b7fe2d2f98f30ac7b12a74c811afe20052be06b.tmp 228 freeaudioextractor32.exe 2368 freeaudioextractor32.exe -
Loads dropped DLL 1 IoCs
pid Process 4064 2faf264c85a6b48958e0e5366b7fe2d2f98f30ac7b12a74c811afe20052be06b.tmp -
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 45.155.250.90 -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4064 2faf264c85a6b48958e0e5366b7fe2d2f98f30ac7b12a74c811afe20052be06b.tmp -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3796 wrote to memory of 4064 3796 2faf264c85a6b48958e0e5366b7fe2d2f98f30ac7b12a74c811afe20052be06b.exe 74 PID 3796 wrote to memory of 4064 3796 2faf264c85a6b48958e0e5366b7fe2d2f98f30ac7b12a74c811afe20052be06b.exe 74 PID 3796 wrote to memory of 4064 3796 2faf264c85a6b48958e0e5366b7fe2d2f98f30ac7b12a74c811afe20052be06b.exe 74 PID 4064 wrote to memory of 228 4064 2faf264c85a6b48958e0e5366b7fe2d2f98f30ac7b12a74c811afe20052be06b.tmp 75 PID 4064 wrote to memory of 228 4064 2faf264c85a6b48958e0e5366b7fe2d2f98f30ac7b12a74c811afe20052be06b.tmp 75 PID 4064 wrote to memory of 228 4064 2faf264c85a6b48958e0e5366b7fe2d2f98f30ac7b12a74c811afe20052be06b.tmp 75 PID 4064 wrote to memory of 2368 4064 2faf264c85a6b48958e0e5366b7fe2d2f98f30ac7b12a74c811afe20052be06b.tmp 76 PID 4064 wrote to memory of 2368 4064 2faf264c85a6b48958e0e5366b7fe2d2f98f30ac7b12a74c811afe20052be06b.tmp 76 PID 4064 wrote to memory of 2368 4064 2faf264c85a6b48958e0e5366b7fe2d2f98f30ac7b12a74c811afe20052be06b.tmp 76
Processes
-
C:\Users\Admin\AppData\Local\Temp\2faf264c85a6b48958e0e5366b7fe2d2f98f30ac7b12a74c811afe20052be06b.exe"C:\Users\Admin\AppData\Local\Temp\2faf264c85a6b48958e0e5366b7fe2d2f98f30ac7b12a74c811afe20052be06b.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3796 -
C:\Users\Admin\AppData\Local\Temp\is-BLV9M.tmp\2faf264c85a6b48958e0e5366b7fe2d2f98f30ac7b12a74c811afe20052be06b.tmp"C:\Users\Admin\AppData\Local\Temp\is-BLV9M.tmp\2faf264c85a6b48958e0e5366b7fe2d2f98f30ac7b12a74c811afe20052be06b.tmp" /SL5="$601FE,4647501,54272,C:\Users\Admin\AppData\Local\Temp\2faf264c85a6b48958e0e5366b7fe2d2f98f30ac7b12a74c811afe20052be06b.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Users\Admin\AppData\Local\Free Audio Extractor\freeaudioextractor32.exe"C:\Users\Admin\AppData\Local\Free Audio Extractor\freeaudioextractor32.exe" -i3⤵
- Executes dropped EXE
PID:228
-
-
C:\Users\Admin\AppData\Local\Free Audio Extractor\freeaudioextractor32.exe"C:\Users\Admin\AppData\Local\Free Audio Extractor\freeaudioextractor32.exe" -s3⤵
- Executes dropped EXE
PID:2368
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.8MB
MD56cddcec247be097ae97031655707c348
SHA11b8c58995fa3f33929d73d5a880f576dfb2513a4
SHA256b9d9b39f885087fced475dc45e07ffd7545a4571ed129785c562cf491f8d59c0
SHA512fea7057544af9883efb5d531cb3e2ac91fe47913c4a97423be1a0cde0e2e5fa2022560d1d0efb7ab195c9f169ef060cbe4fa9a9ccc6a7d0f79a78708d16318a9
-
C:\Users\Admin\AppData\Local\Temp\is-BLV9M.tmp\2faf264c85a6b48958e0e5366b7fe2d2f98f30ac7b12a74c811afe20052be06b.tmp
Filesize680KB
MD578ec448a3bcfd314f65986059ce6d9d0
SHA18d55d1b45ecaaa22fb0b85d856282d2e7cae362a
SHA256d4eb11254fd6b7b40802bb7b680f38955c9931c7a83a8a055d54a9f9046bb0c9
SHA512b4f6f2abb1916663a566dd8d86c0f030573ad04b323f100b85e87637cc82a3ca32a2df32dbee5be26ee7a2644059dd292dd82f19f64f3dec44b4fee6e458ee1c
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63