Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
11/07/2024, 08:30
Static task
static1
Behavioral task
behavioral1
Sample
6a50e80e12190c101015a6be216e9a76ac8687ad0ba1b5cfb66dcb6d36442e43.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral2
Sample
6a50e80e12190c101015a6be216e9a76ac8687ad0ba1b5cfb66dcb6d36442e43.exe
Resource
win11-20240709-en
General
-
Target
6a50e80e12190c101015a6be216e9a76ac8687ad0ba1b5cfb66dcb6d36442e43.exe
-
Size
5.0MB
-
MD5
35b92d030e262bef50485db59c86b7c3
-
SHA1
6f781c15ddc5881ae447fa95713ee1675d911695
-
SHA256
6a50e80e12190c101015a6be216e9a76ac8687ad0ba1b5cfb66dcb6d36442e43
-
SHA512
99afcb79411d8796c8d57dad73b64a181436cba4a6493fbb6633a1fb1ca2d5b412b7fd1b615d7daf6484167985e191ca024e552eea4e8a352714d89c9f98f7a0
-
SSDEEP
98304:CChJV3EdXD/IGm3j9yK3mUs6SjvNb1+7r80Hc/w+2dQxeE:Lh33EdXD/43j9yK37Z24r8rD2dQF
Malware Config
Signatures
-
Detect Socks5Systemz Payload 1 IoCs
resource yara_rule behavioral1/memory/1228-85-0x0000000000A10000-0x0000000000AB2000-memory.dmp family_socks5systemz -
Socks5Systemz
Socks5Systemz is a botnet written in C++.
-
Executes dropped EXE 3 IoCs
pid Process 1996 6a50e80e12190c101015a6be216e9a76ac8687ad0ba1b5cfb66dcb6d36442e43.tmp 320 playpadmediaplayer.exe 1228 playpadmediaplayer.exe -
Loads dropped DLL 1 IoCs
pid Process 1996 6a50e80e12190c101015a6be216e9a76ac8687ad0ba1b5cfb66dcb6d36442e43.tmp -
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 45.155.250.90 -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1996 6a50e80e12190c101015a6be216e9a76ac8687ad0ba1b5cfb66dcb6d36442e43.tmp -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2748 wrote to memory of 1996 2748 6a50e80e12190c101015a6be216e9a76ac8687ad0ba1b5cfb66dcb6d36442e43.exe 85 PID 2748 wrote to memory of 1996 2748 6a50e80e12190c101015a6be216e9a76ac8687ad0ba1b5cfb66dcb6d36442e43.exe 85 PID 2748 wrote to memory of 1996 2748 6a50e80e12190c101015a6be216e9a76ac8687ad0ba1b5cfb66dcb6d36442e43.exe 85 PID 1996 wrote to memory of 320 1996 6a50e80e12190c101015a6be216e9a76ac8687ad0ba1b5cfb66dcb6d36442e43.tmp 87 PID 1996 wrote to memory of 320 1996 6a50e80e12190c101015a6be216e9a76ac8687ad0ba1b5cfb66dcb6d36442e43.tmp 87 PID 1996 wrote to memory of 320 1996 6a50e80e12190c101015a6be216e9a76ac8687ad0ba1b5cfb66dcb6d36442e43.tmp 87 PID 1996 wrote to memory of 1228 1996 6a50e80e12190c101015a6be216e9a76ac8687ad0ba1b5cfb66dcb6d36442e43.tmp 88 PID 1996 wrote to memory of 1228 1996 6a50e80e12190c101015a6be216e9a76ac8687ad0ba1b5cfb66dcb6d36442e43.tmp 88 PID 1996 wrote to memory of 1228 1996 6a50e80e12190c101015a6be216e9a76ac8687ad0ba1b5cfb66dcb6d36442e43.tmp 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\6a50e80e12190c101015a6be216e9a76ac8687ad0ba1b5cfb66dcb6d36442e43.exe"C:\Users\Admin\AppData\Local\Temp\6a50e80e12190c101015a6be216e9a76ac8687ad0ba1b5cfb66dcb6d36442e43.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Users\Admin\AppData\Local\Temp\is-012SQ.tmp\6a50e80e12190c101015a6be216e9a76ac8687ad0ba1b5cfb66dcb6d36442e43.tmp"C:\Users\Admin\AppData\Local\Temp\is-012SQ.tmp\6a50e80e12190c101015a6be216e9a76ac8687ad0ba1b5cfb66dcb6d36442e43.tmp" /SL5="$A0046,4964786,54272,C:\Users\Admin\AppData\Local\Temp\6a50e80e12190c101015a6be216e9a76ac8687ad0ba1b5cfb66dcb6d36442e43.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Users\Admin\AppData\Local\PlayPad Media Player\playpadmediaplayer.exe"C:\Users\Admin\AppData\Local\PlayPad Media Player\playpadmediaplayer.exe" -i3⤵
- Executes dropped EXE
PID:320
-
-
C:\Users\Admin\AppData\Local\PlayPad Media Player\playpadmediaplayer.exe"C:\Users\Admin\AppData\Local\PlayPad Media Player\playpadmediaplayer.exe" -s3⤵
- Executes dropped EXE
PID:1228
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.7MB
MD5276978ad74e352e5e8603f77b87a6af2
SHA15a6f7d8974f4087069680d867926ccb017a22d14
SHA256c72f3607f5659d42ec720f40bfb6a39dd6842564935b5554ccce811e016959ff
SHA512027b68f450d4fc6b19bac39bf8da8762a8e06a32c3688e30ea2f50a72c22f19a4e0b126ded70bc22ffa8bec58dfd41c71f91d877db4f2a3387be7501150333fa
-
C:\Users\Admin\AppData\Local\Temp\is-012SQ.tmp\6a50e80e12190c101015a6be216e9a76ac8687ad0ba1b5cfb66dcb6d36442e43.tmp
Filesize680KB
MD5524137d28ae971e15c538e096dd46657
SHA1bd795a9007b3d9cb71f87d6208d1a68d63b5b84e
SHA256a407389e9b69b8051bc927eb77e815adee175247d905554cb1f25694157dc8b7
SHA512b0da8c4453e4943c53bec6799b85320eb847c117a38e601ff1c73382e5bfa665e3d423ece69951cecd112c1ed9dca7250924860377ccd422c53f890d90ee4ac2
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63