Analysis
-
max time kernel
150s -
max time network
138s -
platform
windows11-21h2_x64 -
resource
win11-20240704-en -
resource tags
arch:x64arch:x86image:win11-20240704-enlocale:en-usos:windows11-21h2-x64system -
submitted
07-07-2024 20:50
Static task
static1
Behavioral task
behavioral1
Sample
830b07c65965309d93c2275e670e790c4f11e4ac29c2e60f4f9c94ffb2213ac1.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral2
Sample
830b07c65965309d93c2275e670e790c4f11e4ac29c2e60f4f9c94ffb2213ac1.exe
Resource
win11-20240704-en
General
-
Target
830b07c65965309d93c2275e670e790c4f11e4ac29c2e60f4f9c94ffb2213ac1.exe
-
Size
4.9MB
-
MD5
0535ff5693c005e3477f56e2e40af06a
-
SHA1
8d8c7a5de465b4fa7bc0f585f03dfb2f1a2c1e92
-
SHA256
830b07c65965309d93c2275e670e790c4f11e4ac29c2e60f4f9c94ffb2213ac1
-
SHA512
778e401a4499d0a2852bc20b039ae3295ddfece3d49bea452489c495fbf38b877a0d95137aa60a982b76248f1d6927d23d96117854c901bc4e053d6b22185deb
-
SSDEEP
98304:CbEGKiABmNB3qozE5XBpKl8WRWaDHmO8eNBVvDCOMF2d1qM0jRzOqb/uoRFQxP:48Pmj3qozoRpKl8sWaDGOrZ+OiRjRzDy
Malware Config
Signatures
-
Detect Socks5Systemz Payload 1 IoCs
resource yara_rule behavioral2/memory/2348-87-0x0000000000AF0000-0x0000000000B92000-memory.dmp family_socks5systemz -
Socks5Systemz
Socks5Systemz is a botnet written in C++.
-
Executes dropped EXE 3 IoCs
pid Process 3344 830b07c65965309d93c2275e670e790c4f11e4ac29c2e60f4f9c94ffb2213ac1.tmp 4052 bossplayaudio32_64.exe 2348 bossplayaudio32_64.exe -
Loads dropped DLL 1 IoCs
pid Process 3344 830b07c65965309d93c2275e670e790c4f11e4ac29c2e60f4f9c94ffb2213ac1.tmp -
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 45.155.250.90 -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3344 830b07c65965309d93c2275e670e790c4f11e4ac29c2e60f4f9c94ffb2213ac1.tmp -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1004 wrote to memory of 3344 1004 830b07c65965309d93c2275e670e790c4f11e4ac29c2e60f4f9c94ffb2213ac1.exe 80 PID 1004 wrote to memory of 3344 1004 830b07c65965309d93c2275e670e790c4f11e4ac29c2e60f4f9c94ffb2213ac1.exe 80 PID 1004 wrote to memory of 3344 1004 830b07c65965309d93c2275e670e790c4f11e4ac29c2e60f4f9c94ffb2213ac1.exe 80 PID 3344 wrote to memory of 4052 3344 830b07c65965309d93c2275e670e790c4f11e4ac29c2e60f4f9c94ffb2213ac1.tmp 82 PID 3344 wrote to memory of 4052 3344 830b07c65965309d93c2275e670e790c4f11e4ac29c2e60f4f9c94ffb2213ac1.tmp 82 PID 3344 wrote to memory of 4052 3344 830b07c65965309d93c2275e670e790c4f11e4ac29c2e60f4f9c94ffb2213ac1.tmp 82 PID 3344 wrote to memory of 2348 3344 830b07c65965309d93c2275e670e790c4f11e4ac29c2e60f4f9c94ffb2213ac1.tmp 83 PID 3344 wrote to memory of 2348 3344 830b07c65965309d93c2275e670e790c4f11e4ac29c2e60f4f9c94ffb2213ac1.tmp 83 PID 3344 wrote to memory of 2348 3344 830b07c65965309d93c2275e670e790c4f11e4ac29c2e60f4f9c94ffb2213ac1.tmp 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\830b07c65965309d93c2275e670e790c4f11e4ac29c2e60f4f9c94ffb2213ac1.exe"C:\Users\Admin\AppData\Local\Temp\830b07c65965309d93c2275e670e790c4f11e4ac29c2e60f4f9c94ffb2213ac1.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1004 -
C:\Users\Admin\AppData\Local\Temp\is-6UP1B.tmp\830b07c65965309d93c2275e670e790c4f11e4ac29c2e60f4f9c94ffb2213ac1.tmp"C:\Users\Admin\AppData\Local\Temp\is-6UP1B.tmp\830b07c65965309d93c2275e670e790c4f11e4ac29c2e60f4f9c94ffb2213ac1.tmp" /SL5="$30178,4927196,54272,C:\Users\Admin\AppData\Local\Temp\830b07c65965309d93c2275e670e790c4f11e4ac29c2e60f4f9c94ffb2213ac1.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3344 -
C:\Users\Admin\AppData\Local\BossPlayAudio\bossplayaudio32_64.exe"C:\Users\Admin\AppData\Local\BossPlayAudio\bossplayaudio32_64.exe" -i3⤵
- Executes dropped EXE
PID:4052
-
-
C:\Users\Admin\AppData\Local\BossPlayAudio\bossplayaudio32_64.exe"C:\Users\Admin\AppData\Local\BossPlayAudio\bossplayaudio32_64.exe" -s3⤵
- Executes dropped EXE
PID:2348
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.4MB
MD5117633ace67ce4560ac21d123373d717
SHA12dbf717714fe14e980571e67d6cb2ff04e340c41
SHA2560be0d5b6f2f865d76adfedae2ddee8103958ecf84fac5138f199282160e17c58
SHA5126814b542e5abf9e8f49646e358a7b4c62cbff637415fcd0cc28b2c1d06837eb5aa72a1bab705350d5830f108938a318e1a14f52eea3f8a4c763402c3a8b9b72e
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
C:\Users\Admin\AppData\Local\Temp\is-6UP1B.tmp\830b07c65965309d93c2275e670e790c4f11e4ac29c2e60f4f9c94ffb2213ac1.tmp
Filesize680KB
MD5202952f3cd7f95acddbb84d4700b3d6a
SHA1a65fab8a0b90538cc03f27813336be7e7d056cb2
SHA2564fbcf9198ace2f5e26d8c481d3e2090ac59e1f309b3631d68738d7cc07220d98
SHA512a22de6ff0ea7c26973f6196c1d80c4fc79a73853a174d8a13f5b522c3254b44202973659e67cb09449280a29dac849dc8b5b76650ecf33d5bc688417e8ed2387