Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/07/2024, 02:55

General

  • Target

    275c6aabe5b320cc88136bd6e04eb7a0613eceb74c9ef2a1177d5f8413cecf07.exe

  • Size

    6.5MB

  • MD5

    7e08a9a10271accd6b96bc1438a8f638

  • SHA1

    e12ca579fa30bfc8b1325afacd945b0a8bbd8832

  • SHA256

    275c6aabe5b320cc88136bd6e04eb7a0613eceb74c9ef2a1177d5f8413cecf07

  • SHA512

    099375bb0ae1c6bef9271ec4cd5877a089ef4a56b7d0fa4c6fc0a5ff2be1219bbf75b173dccf73db3b63d8e55b8aa2925e7548fbfd7905f0ea6d8aaffdf9edfb

  • SSDEEP

    196608:HEuZX/0UocGXOydma86CALudt4wtqySzc6K3w:HEuZX/0Ud2V+daUY8w

Malware Config

Signatures

  • Detect Socks5Systemz Payload 3 IoCs
  • Socks5Systemz

    Socks5Systemz is a botnet written in C++.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 1 IoCs
  • Unexpected DNS network traffic destination 1 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\275c6aabe5b320cc88136bd6e04eb7a0613eceb74c9ef2a1177d5f8413cecf07.exe
    "C:\Users\Admin\AppData\Local\Temp\275c6aabe5b320cc88136bd6e04eb7a0613eceb74c9ef2a1177d5f8413cecf07.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4864
    • C:\Users\Admin\AppData\Local\Temp\is-RMNFR.tmp\is-L4PGL.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-RMNFR.tmp\is-L4PGL.tmp" /SL4 $70046 "C:\Users\Admin\AppData\Local\Temp\275c6aabe5b320cc88136bd6e04eb7a0613eceb74c9ef2a1177d5f8413cecf07.exe" 6509512 52224
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1768
      • C:\Users\Admin\AppData\Local\Total Video Player\totalvideoplayer32_64.exe
        "C:\Users\Admin\AppData\Local\Total Video Player\totalvideoplayer32_64.exe" -i
        3⤵
        • Executes dropped EXE
        PID:1396
      • C:\Users\Admin\AppData\Local\Total Video Player\totalvideoplayer32_64.exe
        "C:\Users\Admin\AppData\Local\Total Video Player\totalvideoplayer32_64.exe" -s
        3⤵
        • Executes dropped EXE
        PID:2872

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\is-7M02S.tmp\_iscrypt.dll

    Filesize

    2KB

    MD5

    a69559718ab506675e907fe49deb71e9

    SHA1

    bc8f404ffdb1960b50c12ff9413c893b56f2e36f

    SHA256

    2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

    SHA512

    e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

  • C:\Users\Admin\AppData\Local\Temp\is-RMNFR.tmp\is-L4PGL.tmp

    Filesize

    642KB

    MD5

    e4f203bdb1990fb662b78636bf3f09dc

    SHA1

    a8f3ca823cb1c238b912fed70f46542a8266aa0f

    SHA256

    5d11e9591891aced587eb75cd3c448ebcb819c3e27300d209953b687a728c555

    SHA512

    e2596ad2d8c15366d262769b0ed0770a8a792f211b4e79cceafb9a17e3e55eea38face7e12347e95ff9442e2e89b7ec1e5dcc89caadad7b321781adadcb526db

  • C:\Users\Admin\AppData\Local\Total Video Player\totalvideoplayer32_64.exe

    Filesize

    3.0MB

    MD5

    4c41b3637e7c63c9aa617ef05d529c47

    SHA1

    0064463147643e1dd4ca7baa96acf12f6ac85f33

    SHA256

    5312c63609d20b338b40a31826daffb1032b2992475df2a01ef4d15cea699cdd

    SHA512

    3622538febd5824800a851ac9527b7e725c77a2b35678c9d3cc04735a51f917fadd7713193b46bd96d8992fec1d271d1516ac35ce2751077f375c98a9b7cb594

  • memory/1396-61-0x0000000000400000-0x0000000000706000-memory.dmp

    Filesize

    3.0MB

  • memory/1396-57-0x0000000000400000-0x0000000000706000-memory.dmp

    Filesize

    3.0MB

  • memory/1396-59-0x0000000000400000-0x0000000000706000-memory.dmp

    Filesize

    3.0MB

  • memory/1768-66-0x0000000000400000-0x00000000004CF000-memory.dmp

    Filesize

    828KB

  • memory/1768-9-0x0000000000400000-0x00000000004CF000-memory.dmp

    Filesize

    828KB

  • memory/2872-73-0x0000000000400000-0x0000000000706000-memory.dmp

    Filesize

    3.0MB

  • memory/2872-104-0x0000000000400000-0x0000000000706000-memory.dmp

    Filesize

    3.0MB

  • memory/2872-113-0x0000000000400000-0x0000000000706000-memory.dmp

    Filesize

    3.0MB

  • memory/2872-110-0x0000000000400000-0x0000000000706000-memory.dmp

    Filesize

    3.0MB

  • memory/2872-67-0x0000000000400000-0x0000000000706000-memory.dmp

    Filesize

    3.0MB

  • memory/2872-70-0x0000000000400000-0x0000000000706000-memory.dmp

    Filesize

    3.0MB

  • memory/2872-106-0x0000000000980000-0x0000000000A22000-memory.dmp

    Filesize

    648KB

  • memory/2872-76-0x0000000000400000-0x0000000000706000-memory.dmp

    Filesize

    3.0MB

  • memory/2872-79-0x0000000000400000-0x0000000000706000-memory.dmp

    Filesize

    3.0MB

  • memory/2872-82-0x0000000000400000-0x0000000000706000-memory.dmp

    Filesize

    3.0MB

  • memory/2872-83-0x0000000000980000-0x0000000000A22000-memory.dmp

    Filesize

    648KB

  • memory/2872-89-0x0000000000400000-0x0000000000706000-memory.dmp

    Filesize

    3.0MB

  • memory/2872-92-0x0000000000400000-0x0000000000706000-memory.dmp

    Filesize

    3.0MB

  • memory/2872-95-0x0000000000400000-0x0000000000706000-memory.dmp

    Filesize

    3.0MB

  • memory/2872-98-0x0000000000400000-0x0000000000706000-memory.dmp

    Filesize

    3.0MB

  • memory/2872-101-0x0000000000400000-0x0000000000706000-memory.dmp

    Filesize

    3.0MB

  • memory/2872-64-0x0000000000400000-0x0000000000706000-memory.dmp

    Filesize

    3.0MB

  • memory/2872-105-0x0000000000980000-0x0000000000A22000-memory.dmp

    Filesize

    648KB

  • memory/4864-0-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/4864-2-0x0000000000401000-0x000000000040A000-memory.dmp

    Filesize

    36KB

  • memory/4864-65-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB