Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
23/07/2024, 02:55
Static task
static1
Behavioral task
behavioral1
Sample
275c6aabe5b320cc88136bd6e04eb7a0613eceb74c9ef2a1177d5f8413cecf07.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral2
Sample
275c6aabe5b320cc88136bd6e04eb7a0613eceb74c9ef2a1177d5f8413cecf07.exe
Resource
win11-20240709-en
General
-
Target
275c6aabe5b320cc88136bd6e04eb7a0613eceb74c9ef2a1177d5f8413cecf07.exe
-
Size
6.5MB
-
MD5
7e08a9a10271accd6b96bc1438a8f638
-
SHA1
e12ca579fa30bfc8b1325afacd945b0a8bbd8832
-
SHA256
275c6aabe5b320cc88136bd6e04eb7a0613eceb74c9ef2a1177d5f8413cecf07
-
SHA512
099375bb0ae1c6bef9271ec4cd5877a089ef4a56b7d0fa4c6fc0a5ff2be1219bbf75b173dccf73db3b63d8e55b8aa2925e7548fbfd7905f0ea6d8aaffdf9edfb
-
SSDEEP
196608:HEuZX/0UocGXOydma86CALudt4wtqySzc6K3w:HEuZX/0Ud2V+daUY8w
Malware Config
Signatures
-
Detect Socks5Systemz Payload 3 IoCs
resource yara_rule behavioral1/memory/2872-83-0x0000000000980000-0x0000000000A22000-memory.dmp family_socks5systemz behavioral1/memory/2872-105-0x0000000000980000-0x0000000000A22000-memory.dmp family_socks5systemz behavioral1/memory/2872-106-0x0000000000980000-0x0000000000A22000-memory.dmp family_socks5systemz -
Socks5Systemz
Socks5Systemz is a botnet written in C++.
-
Executes dropped EXE 3 IoCs
pid Process 1768 is-L4PGL.tmp 1396 totalvideoplayer32_64.exe 2872 totalvideoplayer32_64.exe -
Loads dropped DLL 1 IoCs
pid Process 1768 is-L4PGL.tmp -
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 45.155.250.90 -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4864 wrote to memory of 1768 4864 275c6aabe5b320cc88136bd6e04eb7a0613eceb74c9ef2a1177d5f8413cecf07.exe 83 PID 4864 wrote to memory of 1768 4864 275c6aabe5b320cc88136bd6e04eb7a0613eceb74c9ef2a1177d5f8413cecf07.exe 83 PID 4864 wrote to memory of 1768 4864 275c6aabe5b320cc88136bd6e04eb7a0613eceb74c9ef2a1177d5f8413cecf07.exe 83 PID 1768 wrote to memory of 1396 1768 is-L4PGL.tmp 87 PID 1768 wrote to memory of 1396 1768 is-L4PGL.tmp 87 PID 1768 wrote to memory of 1396 1768 is-L4PGL.tmp 87 PID 1768 wrote to memory of 2872 1768 is-L4PGL.tmp 88 PID 1768 wrote to memory of 2872 1768 is-L4PGL.tmp 88 PID 1768 wrote to memory of 2872 1768 is-L4PGL.tmp 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\275c6aabe5b320cc88136bd6e04eb7a0613eceb74c9ef2a1177d5f8413cecf07.exe"C:\Users\Admin\AppData\Local\Temp\275c6aabe5b320cc88136bd6e04eb7a0613eceb74c9ef2a1177d5f8413cecf07.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\Users\Admin\AppData\Local\Temp\is-RMNFR.tmp\is-L4PGL.tmp"C:\Users\Admin\AppData\Local\Temp\is-RMNFR.tmp\is-L4PGL.tmp" /SL4 $70046 "C:\Users\Admin\AppData\Local\Temp\275c6aabe5b320cc88136bd6e04eb7a0613eceb74c9ef2a1177d5f8413cecf07.exe" 6509512 522242⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Users\Admin\AppData\Local\Total Video Player\totalvideoplayer32_64.exe"C:\Users\Admin\AppData\Local\Total Video Player\totalvideoplayer32_64.exe" -i3⤵
- Executes dropped EXE
PID:1396
-
-
C:\Users\Admin\AppData\Local\Total Video Player\totalvideoplayer32_64.exe"C:\Users\Admin\AppData\Local\Total Video Player\totalvideoplayer32_64.exe" -s3⤵
- Executes dropped EXE
PID:2872
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
642KB
MD5e4f203bdb1990fb662b78636bf3f09dc
SHA1a8f3ca823cb1c238b912fed70f46542a8266aa0f
SHA2565d11e9591891aced587eb75cd3c448ebcb819c3e27300d209953b687a728c555
SHA512e2596ad2d8c15366d262769b0ed0770a8a792f211b4e79cceafb9a17e3e55eea38face7e12347e95ff9442e2e89b7ec1e5dcc89caadad7b321781adadcb526db
-
Filesize
3.0MB
MD54c41b3637e7c63c9aa617ef05d529c47
SHA10064463147643e1dd4ca7baa96acf12f6ac85f33
SHA2565312c63609d20b338b40a31826daffb1032b2992475df2a01ef4d15cea699cdd
SHA5123622538febd5824800a851ac9527b7e725c77a2b35678c9d3cc04735a51f917fadd7713193b46bd96d8992fec1d271d1516ac35ce2751077f375c98a9b7cb594