Analysis
-
max time kernel
113s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
26-07-2024 07:38
Static task
static1
Behavioral task
behavioral1
Sample
a25de2538bd5a59746da0afe352adb20N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a25de2538bd5a59746da0afe352adb20N.exe
Resource
win10v2004-20240709-en
General
-
Target
a25de2538bd5a59746da0afe352adb20N.exe
-
Size
5.0MB
-
MD5
a25de2538bd5a59746da0afe352adb20
-
SHA1
f48d92b78877470d6470c42a101a367bbe235794
-
SHA256
2046d240ddf0aeca0d9e9bd3346807bd5209397877f273fae9cf6e4bbb34a560
-
SHA512
23ac1c2c88ef186b97953e3a3751d4b7b93e29479b611016ab24c6857ca9ea94b3577a93f7cbaceda857f44936d0bc8c88240c81241d0666763d567148bfedf3
-
SSDEEP
98304:CJVvuD4V1Z9ahCdSBHjYVLLVoC2eGzPreJFwEUHNJEi6S47vYZdPsQxi/:eAgrahC4WVAJzqJFmfEinMvYHkQq
Malware Config
Signatures
-
Detect Socks5Systemz Payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2972-93-0x00000000026C0000-0x0000000002762000-memory.dmp family_socks5systemz -
Socks5Systemz
Socks5Systemz is a botnet written in C++.
-
Executes dropped EXE 3 IoCs
Processes:
a25de2538bd5a59746da0afe352adb20N.tmpcleopatra32.execleopatra32.exepid process 2780 a25de2538bd5a59746da0afe352adb20N.tmp 2148 cleopatra32.exe 2972 cleopatra32.exe -
Loads dropped DLL 5 IoCs
Processes:
a25de2538bd5a59746da0afe352adb20N.exea25de2538bd5a59746da0afe352adb20N.tmppid process 2704 a25de2538bd5a59746da0afe352adb20N.exe 2780 a25de2538bd5a59746da0afe352adb20N.tmp 2780 a25de2538bd5a59746da0afe352adb20N.tmp 2780 a25de2538bd5a59746da0afe352adb20N.tmp 2780 a25de2538bd5a59746da0afe352adb20N.tmp -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
a25de2538bd5a59746da0afe352adb20N.exea25de2538bd5a59746da0afe352adb20N.tmpcleopatra32.execleopatra32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a25de2538bd5a59746da0afe352adb20N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a25de2538bd5a59746da0afe352adb20N.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cleopatra32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cleopatra32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
a25de2538bd5a59746da0afe352adb20N.tmppid process 2780 a25de2538bd5a59746da0afe352adb20N.tmp -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
a25de2538bd5a59746da0afe352adb20N.exea25de2538bd5a59746da0afe352adb20N.tmpdescription pid process target process PID 2704 wrote to memory of 2780 2704 a25de2538bd5a59746da0afe352adb20N.exe a25de2538bd5a59746da0afe352adb20N.tmp PID 2704 wrote to memory of 2780 2704 a25de2538bd5a59746da0afe352adb20N.exe a25de2538bd5a59746da0afe352adb20N.tmp PID 2704 wrote to memory of 2780 2704 a25de2538bd5a59746da0afe352adb20N.exe a25de2538bd5a59746da0afe352adb20N.tmp PID 2704 wrote to memory of 2780 2704 a25de2538bd5a59746da0afe352adb20N.exe a25de2538bd5a59746da0afe352adb20N.tmp PID 2704 wrote to memory of 2780 2704 a25de2538bd5a59746da0afe352adb20N.exe a25de2538bd5a59746da0afe352adb20N.tmp PID 2704 wrote to memory of 2780 2704 a25de2538bd5a59746da0afe352adb20N.exe a25de2538bd5a59746da0afe352adb20N.tmp PID 2704 wrote to memory of 2780 2704 a25de2538bd5a59746da0afe352adb20N.exe a25de2538bd5a59746da0afe352adb20N.tmp PID 2780 wrote to memory of 2148 2780 a25de2538bd5a59746da0afe352adb20N.tmp cleopatra32.exe PID 2780 wrote to memory of 2148 2780 a25de2538bd5a59746da0afe352adb20N.tmp cleopatra32.exe PID 2780 wrote to memory of 2148 2780 a25de2538bd5a59746da0afe352adb20N.tmp cleopatra32.exe PID 2780 wrote to memory of 2148 2780 a25de2538bd5a59746da0afe352adb20N.tmp cleopatra32.exe PID 2780 wrote to memory of 2972 2780 a25de2538bd5a59746da0afe352adb20N.tmp cleopatra32.exe PID 2780 wrote to memory of 2972 2780 a25de2538bd5a59746da0afe352adb20N.tmp cleopatra32.exe PID 2780 wrote to memory of 2972 2780 a25de2538bd5a59746da0afe352adb20N.tmp cleopatra32.exe PID 2780 wrote to memory of 2972 2780 a25de2538bd5a59746da0afe352adb20N.tmp cleopatra32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a25de2538bd5a59746da0afe352adb20N.exe"C:\Users\Admin\AppData\Local\Temp\a25de2538bd5a59746da0afe352adb20N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Users\Admin\AppData\Local\Temp\is-3A4N8.tmp\a25de2538bd5a59746da0afe352adb20N.tmp"C:\Users\Admin\AppData\Local\Temp\is-3A4N8.tmp\a25de2538bd5a59746da0afe352adb20N.tmp" /SL5="$50150,4972648,54272,C:\Users\Admin\AppData\Local\Temp\a25de2538bd5a59746da0afe352adb20N.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Users\Admin\AppData\Local\Cleopatra\cleopatra32.exe"C:\Users\Admin\AppData\Local\Cleopatra\cleopatra32.exe" -i3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2148 -
C:\Users\Admin\AppData\Local\Cleopatra\cleopatra32.exe"C:\Users\Admin\AppData\Local\Cleopatra\cleopatra32.exe" -s3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2972
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.5MB
MD5dc930c982b4b5471dc491bd2352f770e
SHA17d8256a38747a79e8de6b1459c97e21fa54f7345
SHA25620a2d6a274872d9ca8cd47a779356a93ccb11c15a70209df591ee73417cc1557
SHA512acf238704e19c40d671f13443a81ee3a850e049ec43dd0f01c27d0a8777e478ffb7db184e9da19e1c371c768303fef68bfd45e75b34be4efdea4df0369843cfc
-
Filesize
680KB
MD59bef8ba411b0afc07e76da4d36ec15d6
SHA16bfc7b89330be138a9d7c3e05e20c21aa0e7ec36
SHA25652172fcbdbdbc8a8c7bd85fce9cda0202b686b9f7d746d5324513c10d99afa79
SHA5121cfed5014a589791240de8cd98584751dcd3b2de6c437ae2a79c0a73e13c501f64810526e4f2fdb5747d27d2afaf36e341f3c8a51631cc7271890148d4f34d04
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3