Analysis
-
max time kernel
141s -
max time network
127s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
27-06-2024 22:49
Static task
static1
Behavioral task
behavioral1
Sample
5cdba561b164c4fa4e931cc251a7dcf46c36feb9258e6097c6ec427cea837c6c.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral2
Sample
5cdba561b164c4fa4e931cc251a7dcf46c36feb9258e6097c6ec427cea837c6c.exe
Resource
win11-20240508-en
General
-
Target
5cdba561b164c4fa4e931cc251a7dcf46c36feb9258e6097c6ec427cea837c6c.exe
-
Size
4.9MB
-
MD5
e5367392dcd72e44e6fad7aa7abed64c
-
SHA1
316a7bc9f17bc04bb372e5168f13cc9e411d8361
-
SHA256
5cdba561b164c4fa4e931cc251a7dcf46c36feb9258e6097c6ec427cea837c6c
-
SHA512
813deda97075ed63f6c8d6e227f3458553c5daca41065d293b569674ec661cd2ac139350b87ed9949708127df901588397492224755158fa00fad7ca6557fa8a
-
SSDEEP
98304:CGfMq2ecBZOVd9ovD/59VmvRYpzkPXXNpokg1s4IYnUviFkBCWFrNEyLFQxcMv:fLaBodivxGYpzkvXN2vSgnkiF0NXQW8
Malware Config
Extracted
socks5systemz
bxxidun.com
http://bxxidun.com/search/?q=67e28dd86f59a17b435afa187c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4fe8889b5e4fa9281ae978a271ea771795af8e05c645db22f31dfe339426fa12a466c553adb719a9577e55b8603e983a608ff614c2e7939238
Signatures
-
Detect Socks5Systemz Payload 1 IoCs
resource yara_rule behavioral2/memory/276-84-0x0000000000AA0000-0x0000000000B42000-memory.dmp family_socks5systemz -
Socks5Systemz
Socks5Systemz is a botnet written in C++.
-
Executes dropped EXE 3 IoCs
pid Process 400 5cdba561b164c4fa4e931cc251a7dcf46c36feb9258e6097c6ec427cea837c6c.tmp 3840 wavmp3splitter32.exe 276 wavmp3splitter32.exe -
Loads dropped DLL 1 IoCs
pid Process 400 5cdba561b164c4fa4e931cc251a7dcf46c36feb9258e6097c6ec427cea837c6c.tmp -
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 45.155.250.90 -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 400 5cdba561b164c4fa4e931cc251a7dcf46c36feb9258e6097c6ec427cea837c6c.tmp -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 744 wrote to memory of 400 744 5cdba561b164c4fa4e931cc251a7dcf46c36feb9258e6097c6ec427cea837c6c.exe 77 PID 744 wrote to memory of 400 744 5cdba561b164c4fa4e931cc251a7dcf46c36feb9258e6097c6ec427cea837c6c.exe 77 PID 744 wrote to memory of 400 744 5cdba561b164c4fa4e931cc251a7dcf46c36feb9258e6097c6ec427cea837c6c.exe 77 PID 400 wrote to memory of 3840 400 5cdba561b164c4fa4e931cc251a7dcf46c36feb9258e6097c6ec427cea837c6c.tmp 78 PID 400 wrote to memory of 3840 400 5cdba561b164c4fa4e931cc251a7dcf46c36feb9258e6097c6ec427cea837c6c.tmp 78 PID 400 wrote to memory of 3840 400 5cdba561b164c4fa4e931cc251a7dcf46c36feb9258e6097c6ec427cea837c6c.tmp 78 PID 400 wrote to memory of 276 400 5cdba561b164c4fa4e931cc251a7dcf46c36feb9258e6097c6ec427cea837c6c.tmp 79 PID 400 wrote to memory of 276 400 5cdba561b164c4fa4e931cc251a7dcf46c36feb9258e6097c6ec427cea837c6c.tmp 79 PID 400 wrote to memory of 276 400 5cdba561b164c4fa4e931cc251a7dcf46c36feb9258e6097c6ec427cea837c6c.tmp 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\5cdba561b164c4fa4e931cc251a7dcf46c36feb9258e6097c6ec427cea837c6c.exe"C:\Users\Admin\AppData\Local\Temp\5cdba561b164c4fa4e931cc251a7dcf46c36feb9258e6097c6ec427cea837c6c.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:744 -
C:\Users\Admin\AppData\Local\Temp\is-LSC78.tmp\5cdba561b164c4fa4e931cc251a7dcf46c36feb9258e6097c6ec427cea837c6c.tmp"C:\Users\Admin\AppData\Local\Temp\is-LSC78.tmp\5cdba561b164c4fa4e931cc251a7dcf46c36feb9258e6097c6ec427cea837c6c.tmp" /SL5="$800D8,4931479,54272,C:\Users\Admin\AppData\Local\Temp\5cdba561b164c4fa4e931cc251a7dcf46c36feb9258e6097c6ec427cea837c6c.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:400 -
C:\Users\Admin\AppData\Local\Direct WAV MP3 Splitter\wavmp3splitter32.exe"C:\Users\Admin\AppData\Local\Direct WAV MP3 Splitter\wavmp3splitter32.exe" -i3⤵
- Executes dropped EXE
PID:3840
-
-
C:\Users\Admin\AppData\Local\Direct WAV MP3 Splitter\wavmp3splitter32.exe"C:\Users\Admin\AppData\Local\Direct WAV MP3 Splitter\wavmp3splitter32.exe" -s3⤵
- Executes dropped EXE
PID:276
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.4MB
MD5ca5425428664c81b4873dcf3c9ff31ae
SHA1e1a1ee6e6c83f8d66ca7a421b41632620d60b4a4
SHA25665b7624f9700719b2e1dfd98beb37897ac6d66a9e3fd3955dd4162826171f762
SHA512213d937d901ace1186575d85025dbf7874b430d489c47ae33a7d2e6594df78fc50624835ca4a1b06c6984615b6e785d7f6ac013f2bd740482d4bcee1f825d86c
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
C:\Users\Admin\AppData\Local\Temp\is-LSC78.tmp\5cdba561b164c4fa4e931cc251a7dcf46c36feb9258e6097c6ec427cea837c6c.tmp
Filesize680KB
MD559177ea3e8147d91b694e9949c60d194
SHA15c8cfd3fcccd7be056c7c0e2e4fc063c38dc14bd
SHA2569687ab4b33b1a083194713be5a0f872ebb949773b832a20063a507073859e28c
SHA512a235dab7d5dc6652f5f8256c1e2c19aef2f583ead02a920ee17658eeb64e8a9620767594d7e4b6ca4aa030643821133c1a18823c55ea769d3221383927ea8a08