Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
28/06/2024, 22:30
Static task
static1
Behavioral task
behavioral1
Sample
ce34435bf933ee44e1976fee196b78fb8ef1abd6dc1a7159016b8417e3b0cc11.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral2
Sample
ce34435bf933ee44e1976fee196b78fb8ef1abd6dc1a7159016b8417e3b0cc11.exe
Resource
win11-20240508-en
General
-
Target
ce34435bf933ee44e1976fee196b78fb8ef1abd6dc1a7159016b8417e3b0cc11.exe
-
Size
5.1MB
-
MD5
cf00c83a68ee9108f32cbf084b225404
-
SHA1
722633eb9793d8a629c76dc497b0ae2c9807676d
-
SHA256
ce34435bf933ee44e1976fee196b78fb8ef1abd6dc1a7159016b8417e3b0cc11
-
SHA512
a4ff2800a53b2740a37013b006c40d7e253a7a8a0efa1f527dda56f213b08a337f90e0f01f7ee5d86b217aace7a1dec7f054c56d3fae55a792237721ed4d1245
-
SSDEEP
98304:CCGTIeuarSo3xO/ZL0T7MGdrQlKhe/q2FiCQU4ctKwL5BG1d8iXeBZQxg:LGTIYR3cKPhaKgViCwcdBGsiXiZQC
Malware Config
Signatures
-
Detect Socks5Systemz Payload 1 IoCs
resource yara_rule behavioral2/memory/3848-85-0x0000000000980000-0x0000000000A21000-memory.dmp family_socks5systemz -
Socks5Systemz
Socks5Systemz is a botnet written in C++.
-
Executes dropped EXE 3 IoCs
pid Process 3572 ce34435bf933ee44e1976fee196b78fb8ef1abd6dc1a7159016b8417e3b0cc11.tmp 424 totalrecorderfree32_64.exe 3848 totalrecorderfree32_64.exe -
Loads dropped DLL 1 IoCs
pid Process 3572 ce34435bf933ee44e1976fee196b78fb8ef1abd6dc1a7159016b8417e3b0cc11.tmp -
Unexpected DNS network traffic destination 3 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 141.98.234.31 Destination IP 91.211.247.248 Destination IP 152.89.198.214 -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3572 ce34435bf933ee44e1976fee196b78fb8ef1abd6dc1a7159016b8417e3b0cc11.tmp -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4372 wrote to memory of 3572 4372 ce34435bf933ee44e1976fee196b78fb8ef1abd6dc1a7159016b8417e3b0cc11.exe 77 PID 4372 wrote to memory of 3572 4372 ce34435bf933ee44e1976fee196b78fb8ef1abd6dc1a7159016b8417e3b0cc11.exe 77 PID 4372 wrote to memory of 3572 4372 ce34435bf933ee44e1976fee196b78fb8ef1abd6dc1a7159016b8417e3b0cc11.exe 77 PID 3572 wrote to memory of 424 3572 ce34435bf933ee44e1976fee196b78fb8ef1abd6dc1a7159016b8417e3b0cc11.tmp 78 PID 3572 wrote to memory of 424 3572 ce34435bf933ee44e1976fee196b78fb8ef1abd6dc1a7159016b8417e3b0cc11.tmp 78 PID 3572 wrote to memory of 424 3572 ce34435bf933ee44e1976fee196b78fb8ef1abd6dc1a7159016b8417e3b0cc11.tmp 78 PID 3572 wrote to memory of 3848 3572 ce34435bf933ee44e1976fee196b78fb8ef1abd6dc1a7159016b8417e3b0cc11.tmp 79 PID 3572 wrote to memory of 3848 3572 ce34435bf933ee44e1976fee196b78fb8ef1abd6dc1a7159016b8417e3b0cc11.tmp 79 PID 3572 wrote to memory of 3848 3572 ce34435bf933ee44e1976fee196b78fb8ef1abd6dc1a7159016b8417e3b0cc11.tmp 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\ce34435bf933ee44e1976fee196b78fb8ef1abd6dc1a7159016b8417e3b0cc11.exe"C:\Users\Admin\AppData\Local\Temp\ce34435bf933ee44e1976fee196b78fb8ef1abd6dc1a7159016b8417e3b0cc11.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4372 -
C:\Users\Admin\AppData\Local\Temp\is-5522T.tmp\ce34435bf933ee44e1976fee196b78fb8ef1abd6dc1a7159016b8417e3b0cc11.tmp"C:\Users\Admin\AppData\Local\Temp\is-5522T.tmp\ce34435bf933ee44e1976fee196b78fb8ef1abd6dc1a7159016b8417e3b0cc11.tmp" /SL5="$60060,5112432,54272,C:\Users\Admin\AppData\Local\Temp\ce34435bf933ee44e1976fee196b78fb8ef1abd6dc1a7159016b8417e3b0cc11.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3572 -
C:\Users\Admin\AppData\Local\Total Recorder Free\totalrecorderfree32_64.exe"C:\Users\Admin\AppData\Local\Total Recorder Free\totalrecorderfree32_64.exe" -i3⤵
- Executes dropped EXE
PID:424
-
-
C:\Users\Admin\AppData\Local\Total Recorder Free\totalrecorderfree32_64.exe"C:\Users\Admin\AppData\Local\Total Recorder Free\totalrecorderfree32_64.exe" -s3⤵
- Executes dropped EXE
PID:3848
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\is-5522T.tmp\ce34435bf933ee44e1976fee196b78fb8ef1abd6dc1a7159016b8417e3b0cc11.tmp
Filesize680KB
MD532f6596e136f3f8cfa1fbfd85acef958
SHA144411edb185b448613ac7dcfc24a6e2c0da382a3
SHA256cd40719fec44d56ec09eeabfd56896f6bc80d4cd982f042068baca42141b4713
SHA512e75005af4acd5ec4f53d584da8fbb2a72358af818dd6643e7eb5b862b3be582ed9cc8c8fb205b04ac2356da87826ab088c0ec658ee890a7605fd32be9b01d626
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
3.3MB
MD5d367059924889eea5391183656962d93
SHA120835707cf60f85fd15c03765e20ab1e4df79a8d
SHA2568d6669cd366c05f4c5b28e867abf61964023b9f138c8e8d1ca761ed32a2a5e6c
SHA51254e6ee38e4b59ce49649db2f181a8c57fd995f92d07de73e08580610517f3a7ccdd1f54a277456b7cc11d245e7ff029bdcc8d36f9a67b74e28da4e8dd8713d32