Analysis
-
max time kernel
111s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 23:50
Static task
static1
Behavioral task
behavioral1
Sample
1db923d92258d09980de5d454b997bf8f1eb86cc66ff86f1228dfc6001a6e2caN.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
1db923d92258d09980de5d454b997bf8f1eb86cc66ff86f1228dfc6001a6e2caN.exe
Resource
win10v2004-20241007-en
General
-
Target
1db923d92258d09980de5d454b997bf8f1eb86cc66ff86f1228dfc6001a6e2caN.exe
-
Size
4.2MB
-
MD5
520032826525047277dbe788c71522a0
-
SHA1
464f3a511b62da428fa823f0ea5b162fda063f08
-
SHA256
1db923d92258d09980de5d454b997bf8f1eb86cc66ff86f1228dfc6001a6e2ca
-
SHA512
0255324d69eab8b2b2ae1d44dca60a12bac386cc4c3a931f77a0e187c31772abce983054dbafd57927d7b8d39ba333efe54ffb513b59a66b8ef6efbcdba81af2
-
SSDEEP
98304:IkOxuz5BpTrVqEpwuA2ONMy1TAWmTnv19ZKH5xQ:xOkzBTr1wuA2OF1TAWWv19kHbQ
Malware Config
Signatures
-
Detect Socks5Systemz Payload 1 IoCs
resource yara_rule behavioral2/memory/320-101-0x00000000008A0000-0x0000000000942000-memory.dmp family_socks5systemz -
Socks5Systemz
Socks5Systemz is a botnet written in C++.
-
Socks5systemz family
-
Executes dropped EXE 2 IoCs
pid Process 4284 1db923d92258d09980de5d454b997bf8f1eb86cc66ff86f1228dfc6001a6e2caN.tmp 320 ascreenrecorder32.exe -
Loads dropped DLL 1 IoCs
pid Process 4284 1db923d92258d09980de5d454b997bf8f1eb86cc66ff86f1228dfc6001a6e2caN.tmp -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1db923d92258d09980de5d454b997bf8f1eb86cc66ff86f1228dfc6001a6e2caN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1db923d92258d09980de5d454b997bf8f1eb86cc66ff86f1228dfc6001a6e2caN.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ascreenrecorder32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4284 1db923d92258d09980de5d454b997bf8f1eb86cc66ff86f1228dfc6001a6e2caN.tmp 4284 1db923d92258d09980de5d454b997bf8f1eb86cc66ff86f1228dfc6001a6e2caN.tmp -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4284 1db923d92258d09980de5d454b997bf8f1eb86cc66ff86f1228dfc6001a6e2caN.tmp -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4676 wrote to memory of 4284 4676 1db923d92258d09980de5d454b997bf8f1eb86cc66ff86f1228dfc6001a6e2caN.exe 84 PID 4676 wrote to memory of 4284 4676 1db923d92258d09980de5d454b997bf8f1eb86cc66ff86f1228dfc6001a6e2caN.exe 84 PID 4676 wrote to memory of 4284 4676 1db923d92258d09980de5d454b997bf8f1eb86cc66ff86f1228dfc6001a6e2caN.exe 84 PID 4284 wrote to memory of 320 4284 1db923d92258d09980de5d454b997bf8f1eb86cc66ff86f1228dfc6001a6e2caN.tmp 87 PID 4284 wrote to memory of 320 4284 1db923d92258d09980de5d454b997bf8f1eb86cc66ff86f1228dfc6001a6e2caN.tmp 87 PID 4284 wrote to memory of 320 4284 1db923d92258d09980de5d454b997bf8f1eb86cc66ff86f1228dfc6001a6e2caN.tmp 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\1db923d92258d09980de5d454b997bf8f1eb86cc66ff86f1228dfc6001a6e2caN.exe"C:\Users\Admin\AppData\Local\Temp\1db923d92258d09980de5d454b997bf8f1eb86cc66ff86f1228dfc6001a6e2caN.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\Users\Admin\AppData\Local\Temp\is-5MURM.tmp\1db923d92258d09980de5d454b997bf8f1eb86cc66ff86f1228dfc6001a6e2caN.tmp"C:\Users\Admin\AppData\Local\Temp\is-5MURM.tmp\1db923d92258d09980de5d454b997bf8f1eb86cc66ff86f1228dfc6001a6e2caN.tmp" /SL5="$601C0,4075624,54272,C:\Users\Admin\AppData\Local\Temp\1db923d92258d09980de5d454b997bf8f1eb86cc66ff86f1228dfc6001a6e2caN.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4284 -
C:\Users\Admin\AppData\Local\AScreenRecorder\ascreenrecorder32.exe"C:\Users\Admin\AppData\Local\AScreenRecorder\ascreenrecorder32.exe" -i3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:320
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD5238fc4c63ada0c3ab8e0037ec9209792
SHA19bffc7f3fc7da93bc5b7e26d5a2216ebbc17ce1a
SHA2566d12fc8deac20d6b6a08cf2d520f4b0f81313690a4484cc7c47f346f7d5e2f62
SHA51266c3d58044e48dca5781d80e756fb26e992a243e8106c99464dd673578a6663c359f9bcfda66924ad73994986a8ed59fbc243aea5033e417c0aeca7cc8515a21
-
C:\Users\Admin\AppData\Local\Temp\is-5MURM.tmp\1db923d92258d09980de5d454b997bf8f1eb86cc66ff86f1228dfc6001a6e2caN.tmp
Filesize689KB
MD59779b65b55f2dc6173e7b853fb6800f6
SHA154c55beba837b7c7cd8353246b25da7620c73609
SHA256ab7eb19eb483355bb9180b738d8d2d95763bc17f0e6bd68f4dca14414e7782d5
SHA512017fc5de8d64633bb02352ed0de073ef05b5033a675fb477ec49b3187808f1fbd95e8735b5fc718115bf37ba716796c5978a3681d9b3b88402627ba1ebeef388
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63