Analysis
-
max time kernel
150s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
07-07-2024 20:50
Static task
static1
Behavioral task
behavioral1
Sample
830b07c65965309d93c2275e670e790c4f11e4ac29c2e60f4f9c94ffb2213ac1.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral2
Sample
830b07c65965309d93c2275e670e790c4f11e4ac29c2e60f4f9c94ffb2213ac1.exe
Resource
win11-20240704-en
General
-
Target
830b07c65965309d93c2275e670e790c4f11e4ac29c2e60f4f9c94ffb2213ac1.exe
-
Size
4.9MB
-
MD5
0535ff5693c005e3477f56e2e40af06a
-
SHA1
8d8c7a5de465b4fa7bc0f585f03dfb2f1a2c1e92
-
SHA256
830b07c65965309d93c2275e670e790c4f11e4ac29c2e60f4f9c94ffb2213ac1
-
SHA512
778e401a4499d0a2852bc20b039ae3295ddfece3d49bea452489c495fbf38b877a0d95137aa60a982b76248f1d6927d23d96117854c901bc4e053d6b22185deb
-
SSDEEP
98304:CbEGKiABmNB3qozE5XBpKl8WRWaDHmO8eNBVvDCOMF2d1qM0jRzOqb/uoRFQxP:48Pmj3qozoRpKl8sWaDGOrZ+OiRjRzDy
Malware Config
Signatures
-
Detect Socks5Systemz Payload 3 IoCs
resource yara_rule behavioral1/memory/2072-87-0x00000000008C0000-0x0000000000962000-memory.dmp family_socks5systemz behavioral1/memory/2072-110-0x00000000008C0000-0x0000000000962000-memory.dmp family_socks5systemz behavioral1/memory/2072-109-0x00000000008C0000-0x0000000000962000-memory.dmp family_socks5systemz -
Socks5Systemz
Socks5Systemz is a botnet written in C++.
-
Executes dropped EXE 3 IoCs
pid Process 5048 830b07c65965309d93c2275e670e790c4f11e4ac29c2e60f4f9c94ffb2213ac1.tmp 4740 bossplayaudio32_64.exe 2072 bossplayaudio32_64.exe -
Loads dropped DLL 1 IoCs
pid Process 5048 830b07c65965309d93c2275e670e790c4f11e4ac29c2e60f4f9c94ffb2213ac1.tmp -
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 141.98.234.31 -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 5048 830b07c65965309d93c2275e670e790c4f11e4ac29c2e60f4f9c94ffb2213ac1.tmp -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 392 wrote to memory of 5048 392 830b07c65965309d93c2275e670e790c4f11e4ac29c2e60f4f9c94ffb2213ac1.exe 85 PID 392 wrote to memory of 5048 392 830b07c65965309d93c2275e670e790c4f11e4ac29c2e60f4f9c94ffb2213ac1.exe 85 PID 392 wrote to memory of 5048 392 830b07c65965309d93c2275e670e790c4f11e4ac29c2e60f4f9c94ffb2213ac1.exe 85 PID 5048 wrote to memory of 4740 5048 830b07c65965309d93c2275e670e790c4f11e4ac29c2e60f4f9c94ffb2213ac1.tmp 86 PID 5048 wrote to memory of 4740 5048 830b07c65965309d93c2275e670e790c4f11e4ac29c2e60f4f9c94ffb2213ac1.tmp 86 PID 5048 wrote to memory of 4740 5048 830b07c65965309d93c2275e670e790c4f11e4ac29c2e60f4f9c94ffb2213ac1.tmp 86 PID 5048 wrote to memory of 2072 5048 830b07c65965309d93c2275e670e790c4f11e4ac29c2e60f4f9c94ffb2213ac1.tmp 87 PID 5048 wrote to memory of 2072 5048 830b07c65965309d93c2275e670e790c4f11e4ac29c2e60f4f9c94ffb2213ac1.tmp 87 PID 5048 wrote to memory of 2072 5048 830b07c65965309d93c2275e670e790c4f11e4ac29c2e60f4f9c94ffb2213ac1.tmp 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\830b07c65965309d93c2275e670e790c4f11e4ac29c2e60f4f9c94ffb2213ac1.exe"C:\Users\Admin\AppData\Local\Temp\830b07c65965309d93c2275e670e790c4f11e4ac29c2e60f4f9c94ffb2213ac1.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:392 -
C:\Users\Admin\AppData\Local\Temp\is-N1LQD.tmp\830b07c65965309d93c2275e670e790c4f11e4ac29c2e60f4f9c94ffb2213ac1.tmp"C:\Users\Admin\AppData\Local\Temp\is-N1LQD.tmp\830b07c65965309d93c2275e670e790c4f11e4ac29c2e60f4f9c94ffb2213ac1.tmp" /SL5="$702C2,4927196,54272,C:\Users\Admin\AppData\Local\Temp\830b07c65965309d93c2275e670e790c4f11e4ac29c2e60f4f9c94ffb2213ac1.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Users\Admin\AppData\Local\BossPlayAudio\bossplayaudio32_64.exe"C:\Users\Admin\AppData\Local\BossPlayAudio\bossplayaudio32_64.exe" -i3⤵
- Executes dropped EXE
PID:4740
-
-
C:\Users\Admin\AppData\Local\BossPlayAudio\bossplayaudio32_64.exe"C:\Users\Admin\AppData\Local\BossPlayAudio\bossplayaudio32_64.exe" -s3⤵
- Executes dropped EXE
PID:2072
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.4MB
MD5117633ace67ce4560ac21d123373d717
SHA12dbf717714fe14e980571e67d6cb2ff04e340c41
SHA2560be0d5b6f2f865d76adfedae2ddee8103958ecf84fac5138f199282160e17c58
SHA5126814b542e5abf9e8f49646e358a7b4c62cbff637415fcd0cc28b2c1d06837eb5aa72a1bab705350d5830f108938a318e1a14f52eea3f8a4c763402c3a8b9b72e
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
C:\Users\Admin\AppData\Local\Temp\is-N1LQD.tmp\830b07c65965309d93c2275e670e790c4f11e4ac29c2e60f4f9c94ffb2213ac1.tmp
Filesize680KB
MD5202952f3cd7f95acddbb84d4700b3d6a
SHA1a65fab8a0b90538cc03f27813336be7e7d056cb2
SHA2564fbcf9198ace2f5e26d8c481d3e2090ac59e1f309b3631d68738d7cc07220d98
SHA512a22de6ff0ea7c26973f6196c1d80c4fc79a73853a174d8a13f5b522c3254b44202973659e67cb09449280a29dac849dc8b5b76650ecf33d5bc688417e8ed2387