Analysis

  • max time kernel
    143s
  • max time network
    136s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-08-2024 21:57

General

  • Target

    eee46402524c8dbd931bddb821397a185c59f58c784c1aaaac54800b34a80e50.exe

  • Size

    4.4MB

  • MD5

    4496e25f3a901c91b874c5a7ef38fa4c

  • SHA1

    cd063de83ae85b354e30b413dbd047ad9eeea168

  • SHA256

    eee46402524c8dbd931bddb821397a185c59f58c784c1aaaac54800b34a80e50

  • SHA512

    a7ce54bcbf060029273dbd08c34b509fc4b5b4c403acc62121a6e2ac3383ddcac60b3a1a79dbee1803603a68952064795d3493947eab7b4908f417f11e14ce3b

  • SSDEEP

    98304:NW3bTee0iF6T7FQxj+dgjjTgoBuzLyHTMntHFjFHDHMBjZdJ:GbT8i6FQxjoOjUmuzQT4l92jZD

Malware Config

Signatures

  • Detect Socks5Systemz Payload 3 IoCs
  • Socks5Systemz

    Socks5Systemz is a botnet written in C++.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Unexpected DNS network traffic destination 1 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eee46402524c8dbd931bddb821397a185c59f58c784c1aaaac54800b34a80e50.exe
    "C:\Users\Admin\AppData\Local\Temp\eee46402524c8dbd931bddb821397a185c59f58c784c1aaaac54800b34a80e50.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1856
    • C:\Users\Admin\AppData\Local\Temp\is-41QJN.tmp\eee46402524c8dbd931bddb821397a185c59f58c784c1aaaac54800b34a80e50.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-41QJN.tmp\eee46402524c8dbd931bddb821397a185c59f58c784c1aaaac54800b34a80e50.tmp" /SL5="$80052,4377396,54272,C:\Users\Admin\AppData\Local\Temp\eee46402524c8dbd931bddb821397a185c59f58c784c1aaaac54800b34a80e50.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:536
      • C:\Users\Admin\AppData\Local\AVI Codec\avicodec32_64.exe
        "C:\Users\Admin\AppData\Local\AVI Codec\avicodec32_64.exe" -i
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:1752
      • C:\Users\Admin\AppData\Local\AVI Codec\avicodec32_64.exe
        "C:\Users\Admin\AppData\Local\AVI Codec\avicodec32_64.exe" -s
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:4332

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\AVI Codec\avicodec32_64.exe

    Filesize

    4.1MB

    MD5

    11487bcbd676fc23a176d15cdc5dbd07

    SHA1

    38c6440e4f9bbd4cb388ddfed70ff4bec2ac8eb9

    SHA256

    477ce71049f9fbe5d96a6f5f01cd5b75ab98debf8222b5dcf5df610058f821bf

    SHA512

    1db5227ff6ac0ba8329f4529bc2d161673581206ad370da387b5cbbca755a4a2819f5b01ba08b348c8e4491e6a36dbf6b13865a41498c23170f1a9d7683cd50e

  • C:\Users\Admin\AppData\Local\Temp\is-41QJN.tmp\eee46402524c8dbd931bddb821397a185c59f58c784c1aaaac54800b34a80e50.tmp

    Filesize

    692KB

    MD5

    85fc5b8836d8625fbfa40a092386e645

    SHA1

    a90bb83f5d8d024bb357a44682267a50406071d6

    SHA256

    6dda4c9c34d1898b592ebeccee9f4b2a2bffefd68296da6310435e13fb63d950

    SHA512

    c50e53c2c695c7ba24b4cc2c2f958e1e9ce4eea9b541684ea41c7cae513919bb80171dcaaf1c18a8f37221737e6a1f8ba0881a224abd3dd09407d0c4edb96aae

  • C:\Users\Admin\AppData\Local\Temp\is-VUV2O.tmp\_isetup\_iscrypt.dll

    Filesize

    2KB

    MD5

    a69559718ab506675e907fe49deb71e9

    SHA1

    bc8f404ffdb1960b50c12ff9413c893b56f2e36f

    SHA256

    2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

    SHA512

    e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

  • C:\Users\Admin\AppData\Local\Temp\is-VUV2O.tmp\_isetup\_isdecmp.dll

    Filesize

    13KB

    MD5

    a813d18268affd4763dde940246dc7e5

    SHA1

    c7366e1fd925c17cc6068001bd38eaef5b42852f

    SHA256

    e19781aabe466dd8779cb9c8fa41bbb73375447066bb34e876cf388a6ed63c64

    SHA512

    b310ed4cd2e94381c00a6a370fcb7cc867ebe425d705b69caaaaffdafbab91f72d357966916053e72e68ecf712f2af7585500c58bb53ec3e1d539179fcb45fb4

  • memory/536-13-0x0000000000400000-0x00000000004BD000-memory.dmp

    Filesize

    756KB

  • memory/536-68-0x0000000000400000-0x00000000004BD000-memory.dmp

    Filesize

    756KB

  • memory/1752-57-0x0000000000400000-0x0000000000813000-memory.dmp

    Filesize

    4.1MB

  • memory/1752-59-0x0000000000400000-0x0000000000813000-memory.dmp

    Filesize

    4.1MB

  • memory/1752-63-0x0000000000400000-0x0000000000813000-memory.dmp

    Filesize

    4.1MB

  • memory/1752-61-0x0000000000400000-0x0000000000813000-memory.dmp

    Filesize

    4.1MB

  • memory/1856-2-0x0000000000401000-0x000000000040B000-memory.dmp

    Filesize

    40KB

  • memory/1856-0-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/1856-67-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/4332-69-0x0000000000400000-0x0000000000813000-memory.dmp

    Filesize

    4.1MB

  • memory/4332-94-0x0000000000400000-0x0000000000813000-memory.dmp

    Filesize

    4.1MB

  • memory/4332-72-0x0000000000400000-0x0000000000813000-memory.dmp

    Filesize

    4.1MB

  • memory/4332-75-0x0000000000400000-0x0000000000813000-memory.dmp

    Filesize

    4.1MB

  • memory/4332-78-0x0000000000400000-0x0000000000813000-memory.dmp

    Filesize

    4.1MB

  • memory/4332-81-0x0000000000400000-0x0000000000813000-memory.dmp

    Filesize

    4.1MB

  • memory/4332-84-0x0000000000B40000-0x0000000000BE2000-memory.dmp

    Filesize

    648KB

  • memory/4332-86-0x0000000000400000-0x0000000000813000-memory.dmp

    Filesize

    4.1MB

  • memory/4332-91-0x0000000000400000-0x0000000000813000-memory.dmp

    Filesize

    4.1MB

  • memory/4332-66-0x0000000000400000-0x0000000000813000-memory.dmp

    Filesize

    4.1MB

  • memory/4332-97-0x0000000000400000-0x0000000000813000-memory.dmp

    Filesize

    4.1MB

  • memory/4332-100-0x0000000000400000-0x0000000000813000-memory.dmp

    Filesize

    4.1MB

  • memory/4332-103-0x0000000000400000-0x0000000000813000-memory.dmp

    Filesize

    4.1MB

  • memory/4332-106-0x0000000000400000-0x0000000000813000-memory.dmp

    Filesize

    4.1MB

  • memory/4332-107-0x0000000000B40000-0x0000000000BE2000-memory.dmp

    Filesize

    648KB

  • memory/4332-108-0x0000000000B40000-0x0000000000BE2000-memory.dmp

    Filesize

    648KB

  • memory/4332-112-0x0000000000400000-0x0000000000813000-memory.dmp

    Filesize

    4.1MB

  • memory/4332-115-0x0000000000400000-0x0000000000813000-memory.dmp

    Filesize

    4.1MB