Analysis
-
max time kernel
141s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07-11-2024 07:08
Static task
static1
Behavioral task
behavioral1
Sample
241466b63ab01b9a6c10c1fde82c6a7f7f1ae2f9c68e8af25348c66bf5f96112.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
241466b63ab01b9a6c10c1fde82c6a7f7f1ae2f9c68e8af25348c66bf5f96112.exe
Resource
win10v2004-20241007-en
General
-
Target
241466b63ab01b9a6c10c1fde82c6a7f7f1ae2f9c68e8af25348c66bf5f96112.exe
-
Size
5.9MB
-
MD5
f2896362fb9a2f03fbb894e0276bb89b
-
SHA1
85300510ce9fc73113c64e758d21dd94da4b07d5
-
SHA256
241466b63ab01b9a6c10c1fde82c6a7f7f1ae2f9c68e8af25348c66bf5f96112
-
SHA512
e07bc5f0ab42a81af9b619b628fd71e71caa1a9b50c6771af0a858fb9740d339e59bb635cbb70371b66efd10d6894cce8cc2dd8a6d57402992849b920c025cdf
-
SSDEEP
98304:4bVxpMF785lmwqiuwJl2P9f/IP+Kn4gGVXxZJ/UlDFeyORDWG+nwmJ41RPsoW4I:c085kwqU/E/qpG9xv/UlMyORSGjSWRG
Malware Config
Signatures
-
Detect Socks5Systemz Payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2896-113-0x0000000002B90000-0x0000000002C32000-memory.dmp family_socks5systemz -
Socks5Systemz
Socks5Systemz is a botnet written in C++.
-
Socks5systemz family
-
Executes dropped EXE 2 IoCs
Processes:
241466b63ab01b9a6c10c1fde82c6a7f7f1ae2f9c68e8af25348c66bf5f96112.tmpcutmovie.exepid Process 2796 241466b63ab01b9a6c10c1fde82c6a7f7f1ae2f9c68e8af25348c66bf5f96112.tmp 2896 cutmovie.exe -
Loads dropped DLL 5 IoCs
Processes:
241466b63ab01b9a6c10c1fde82c6a7f7f1ae2f9c68e8af25348c66bf5f96112.exe241466b63ab01b9a6c10c1fde82c6a7f7f1ae2f9c68e8af25348c66bf5f96112.tmppid Process 2692 241466b63ab01b9a6c10c1fde82c6a7f7f1ae2f9c68e8af25348c66bf5f96112.exe 2796 241466b63ab01b9a6c10c1fde82c6a7f7f1ae2f9c68e8af25348c66bf5f96112.tmp 2796 241466b63ab01b9a6c10c1fde82c6a7f7f1ae2f9c68e8af25348c66bf5f96112.tmp 2796 241466b63ab01b9a6c10c1fde82c6a7f7f1ae2f9c68e8af25348c66bf5f96112.tmp 2796 241466b63ab01b9a6c10c1fde82c6a7f7f1ae2f9c68e8af25348c66bf5f96112.tmp -
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
Processes:
description ioc Destination IP 152.89.198.214 -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
241466b63ab01b9a6c10c1fde82c6a7f7f1ae2f9c68e8af25348c66bf5f96112.exe241466b63ab01b9a6c10c1fde82c6a7f7f1ae2f9c68e8af25348c66bf5f96112.tmpnet.executmovie.exenet1.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 241466b63ab01b9a6c10c1fde82c6a7f7f1ae2f9c68e8af25348c66bf5f96112.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 241466b63ab01b9a6c10c1fde82c6a7f7f1ae2f9c68e8af25348c66bf5f96112.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cutmovie.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
241466b63ab01b9a6c10c1fde82c6a7f7f1ae2f9c68e8af25348c66bf5f96112.tmppid Process 2796 241466b63ab01b9a6c10c1fde82c6a7f7f1ae2f9c68e8af25348c66bf5f96112.tmp 2796 241466b63ab01b9a6c10c1fde82c6a7f7f1ae2f9c68e8af25348c66bf5f96112.tmp -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
241466b63ab01b9a6c10c1fde82c6a7f7f1ae2f9c68e8af25348c66bf5f96112.tmppid Process 2796 241466b63ab01b9a6c10c1fde82c6a7f7f1ae2f9c68e8af25348c66bf5f96112.tmp -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
241466b63ab01b9a6c10c1fde82c6a7f7f1ae2f9c68e8af25348c66bf5f96112.exe241466b63ab01b9a6c10c1fde82c6a7f7f1ae2f9c68e8af25348c66bf5f96112.tmpnet.exedescription pid Process procid_target PID 2692 wrote to memory of 2796 2692 241466b63ab01b9a6c10c1fde82c6a7f7f1ae2f9c68e8af25348c66bf5f96112.exe 30 PID 2692 wrote to memory of 2796 2692 241466b63ab01b9a6c10c1fde82c6a7f7f1ae2f9c68e8af25348c66bf5f96112.exe 30 PID 2692 wrote to memory of 2796 2692 241466b63ab01b9a6c10c1fde82c6a7f7f1ae2f9c68e8af25348c66bf5f96112.exe 30 PID 2692 wrote to memory of 2796 2692 241466b63ab01b9a6c10c1fde82c6a7f7f1ae2f9c68e8af25348c66bf5f96112.exe 30 PID 2692 wrote to memory of 2796 2692 241466b63ab01b9a6c10c1fde82c6a7f7f1ae2f9c68e8af25348c66bf5f96112.exe 30 PID 2692 wrote to memory of 2796 2692 241466b63ab01b9a6c10c1fde82c6a7f7f1ae2f9c68e8af25348c66bf5f96112.exe 30 PID 2692 wrote to memory of 2796 2692 241466b63ab01b9a6c10c1fde82c6a7f7f1ae2f9c68e8af25348c66bf5f96112.exe 30 PID 2796 wrote to memory of 2860 2796 241466b63ab01b9a6c10c1fde82c6a7f7f1ae2f9c68e8af25348c66bf5f96112.tmp 31 PID 2796 wrote to memory of 2860 2796 241466b63ab01b9a6c10c1fde82c6a7f7f1ae2f9c68e8af25348c66bf5f96112.tmp 31 PID 2796 wrote to memory of 2860 2796 241466b63ab01b9a6c10c1fde82c6a7f7f1ae2f9c68e8af25348c66bf5f96112.tmp 31 PID 2796 wrote to memory of 2860 2796 241466b63ab01b9a6c10c1fde82c6a7f7f1ae2f9c68e8af25348c66bf5f96112.tmp 31 PID 2796 wrote to memory of 2896 2796 241466b63ab01b9a6c10c1fde82c6a7f7f1ae2f9c68e8af25348c66bf5f96112.tmp 33 PID 2796 wrote to memory of 2896 2796 241466b63ab01b9a6c10c1fde82c6a7f7f1ae2f9c68e8af25348c66bf5f96112.tmp 33 PID 2796 wrote to memory of 2896 2796 241466b63ab01b9a6c10c1fde82c6a7f7f1ae2f9c68e8af25348c66bf5f96112.tmp 33 PID 2796 wrote to memory of 2896 2796 241466b63ab01b9a6c10c1fde82c6a7f7f1ae2f9c68e8af25348c66bf5f96112.tmp 33 PID 2860 wrote to memory of 2920 2860 net.exe 34 PID 2860 wrote to memory of 2920 2860 net.exe 34 PID 2860 wrote to memory of 2920 2860 net.exe 34 PID 2860 wrote to memory of 2920 2860 net.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\241466b63ab01b9a6c10c1fde82c6a7f7f1ae2f9c68e8af25348c66bf5f96112.exe"C:\Users\Admin\AppData\Local\Temp\241466b63ab01b9a6c10c1fde82c6a7f7f1ae2f9c68e8af25348c66bf5f96112.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\is-VL7U6.tmp\241466b63ab01b9a6c10c1fde82c6a7f7f1ae2f9c68e8af25348c66bf5f96112.tmp"C:\Users\Admin\AppData\Local\Temp\is-VL7U6.tmp\241466b63ab01b9a6c10c1fde82c6a7f7f1ae2f9c68e8af25348c66bf5f96112.tmp" /SL5="$50152,5931969,56832,C:\Users\Admin\AppData\Local\Temp\241466b63ab01b9a6c10c1fde82c6a7f7f1ae2f9c68e8af25348c66bf5f96112.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" pause cut_movie_11713⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 pause cut_movie_11714⤵
- System Location Discovery: System Language Discovery
PID:2920
-
-
-
C:\Users\Admin\AppData\Local\Cut Movie 2022.2.01\cutmovie.exe"C:\Users\Admin\AppData\Local\Cut Movie 2022.2.01\cutmovie.exe" -i3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2896
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.8MB
MD5bacc26ea743c929fdaf5b5c3491d0ef7
SHA113c4e0bbfa1c0af18ae68489b302bcf8b03b7cc0
SHA2565891b24cbf18f179c695f556cb6bb1b0ca7900a7034d122a0d31ef68c6bd51fd
SHA512515d370eabc17bebf04702a543bcaf37aee8ea8e8a014e161ed333caa52dc76c9befe6c03179a648b7e1c40e978c595999216b8cdee0e79e87a06f176a50f165
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
\Users\Admin\AppData\Local\Temp\is-VL7U6.tmp\241466b63ab01b9a6c10c1fde82c6a7f7f1ae2f9c68e8af25348c66bf5f96112.tmp
Filesize692KB
MD5388c5898ce35cc9ea89c115945dab8f3
SHA1ea70b5cb999b43b844b3a546314a0c77017495f2
SHA2568572edfda675c907e1bb2aa182ec700e82871879a2c92c28f556587f98016b26
SHA512a28be14bbc4a6a499e646619250b8bbc7daa0848d04666df2e3bcba6f2227009ab356115bcafc8383bc160bd8e43fc843077beaa24c967ead9d585b0014db072