Analysis
-
max time kernel
141s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2024 07:08
Static task
static1
Behavioral task
behavioral1
Sample
241466b63ab01b9a6c10c1fde82c6a7f7f1ae2f9c68e8af25348c66bf5f96112.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
241466b63ab01b9a6c10c1fde82c6a7f7f1ae2f9c68e8af25348c66bf5f96112.exe
Resource
win10v2004-20241007-en
General
-
Target
241466b63ab01b9a6c10c1fde82c6a7f7f1ae2f9c68e8af25348c66bf5f96112.exe
-
Size
5.9MB
-
MD5
f2896362fb9a2f03fbb894e0276bb89b
-
SHA1
85300510ce9fc73113c64e758d21dd94da4b07d5
-
SHA256
241466b63ab01b9a6c10c1fde82c6a7f7f1ae2f9c68e8af25348c66bf5f96112
-
SHA512
e07bc5f0ab42a81af9b619b628fd71e71caa1a9b50c6771af0a858fb9740d339e59bb635cbb70371b66efd10d6894cce8cc2dd8a6d57402992849b920c025cdf
-
SSDEEP
98304:4bVxpMF785lmwqiuwJl2P9f/IP+Kn4gGVXxZJ/UlDFeyORDWG+nwmJ41RPsoW4I:c085kwqU/E/qpG9xv/UlMyORSGjSWRG
Malware Config
Signatures
-
Detect Socks5Systemz Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/2668-107-0x0000000000AB0000-0x0000000000B52000-memory.dmp family_socks5systemz behavioral2/memory/2668-134-0x0000000000AB0000-0x0000000000B52000-memory.dmp family_socks5systemz behavioral2/memory/2668-133-0x0000000000AB0000-0x0000000000B52000-memory.dmp family_socks5systemz -
Socks5Systemz
Socks5Systemz is a botnet written in C++.
-
Socks5systemz family
-
Executes dropped EXE 2 IoCs
Processes:
241466b63ab01b9a6c10c1fde82c6a7f7f1ae2f9c68e8af25348c66bf5f96112.tmpcutmovie.exepid process 3712 241466b63ab01b9a6c10c1fde82c6a7f7f1ae2f9c68e8af25348c66bf5f96112.tmp 2668 cutmovie.exe -
Loads dropped DLL 1 IoCs
Processes:
241466b63ab01b9a6c10c1fde82c6a7f7f1ae2f9c68e8af25348c66bf5f96112.tmppid process 3712 241466b63ab01b9a6c10c1fde82c6a7f7f1ae2f9c68e8af25348c66bf5f96112.tmp -
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
Processes:
description ioc Destination IP 45.155.250.90 -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
241466b63ab01b9a6c10c1fde82c6a7f7f1ae2f9c68e8af25348c66bf5f96112.exe241466b63ab01b9a6c10c1fde82c6a7f7f1ae2f9c68e8af25348c66bf5f96112.tmpcutmovie.exenet.exenet1.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 241466b63ab01b9a6c10c1fde82c6a7f7f1ae2f9c68e8af25348c66bf5f96112.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 241466b63ab01b9a6c10c1fde82c6a7f7f1ae2f9c68e8af25348c66bf5f96112.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cutmovie.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
241466b63ab01b9a6c10c1fde82c6a7f7f1ae2f9c68e8af25348c66bf5f96112.tmppid process 3712 241466b63ab01b9a6c10c1fde82c6a7f7f1ae2f9c68e8af25348c66bf5f96112.tmp 3712 241466b63ab01b9a6c10c1fde82c6a7f7f1ae2f9c68e8af25348c66bf5f96112.tmp -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
241466b63ab01b9a6c10c1fde82c6a7f7f1ae2f9c68e8af25348c66bf5f96112.tmppid process 3712 241466b63ab01b9a6c10c1fde82c6a7f7f1ae2f9c68e8af25348c66bf5f96112.tmp -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
241466b63ab01b9a6c10c1fde82c6a7f7f1ae2f9c68e8af25348c66bf5f96112.exe241466b63ab01b9a6c10c1fde82c6a7f7f1ae2f9c68e8af25348c66bf5f96112.tmpnet.exedescription pid process target process PID 5064 wrote to memory of 3712 5064 241466b63ab01b9a6c10c1fde82c6a7f7f1ae2f9c68e8af25348c66bf5f96112.exe 241466b63ab01b9a6c10c1fde82c6a7f7f1ae2f9c68e8af25348c66bf5f96112.tmp PID 5064 wrote to memory of 3712 5064 241466b63ab01b9a6c10c1fde82c6a7f7f1ae2f9c68e8af25348c66bf5f96112.exe 241466b63ab01b9a6c10c1fde82c6a7f7f1ae2f9c68e8af25348c66bf5f96112.tmp PID 5064 wrote to memory of 3712 5064 241466b63ab01b9a6c10c1fde82c6a7f7f1ae2f9c68e8af25348c66bf5f96112.exe 241466b63ab01b9a6c10c1fde82c6a7f7f1ae2f9c68e8af25348c66bf5f96112.tmp PID 3712 wrote to memory of 2852 3712 241466b63ab01b9a6c10c1fde82c6a7f7f1ae2f9c68e8af25348c66bf5f96112.tmp net.exe PID 3712 wrote to memory of 2852 3712 241466b63ab01b9a6c10c1fde82c6a7f7f1ae2f9c68e8af25348c66bf5f96112.tmp net.exe PID 3712 wrote to memory of 2852 3712 241466b63ab01b9a6c10c1fde82c6a7f7f1ae2f9c68e8af25348c66bf5f96112.tmp net.exe PID 3712 wrote to memory of 2668 3712 241466b63ab01b9a6c10c1fde82c6a7f7f1ae2f9c68e8af25348c66bf5f96112.tmp cutmovie.exe PID 3712 wrote to memory of 2668 3712 241466b63ab01b9a6c10c1fde82c6a7f7f1ae2f9c68e8af25348c66bf5f96112.tmp cutmovie.exe PID 3712 wrote to memory of 2668 3712 241466b63ab01b9a6c10c1fde82c6a7f7f1ae2f9c68e8af25348c66bf5f96112.tmp cutmovie.exe PID 2852 wrote to memory of 4380 2852 net.exe net1.exe PID 2852 wrote to memory of 4380 2852 net.exe net1.exe PID 2852 wrote to memory of 4380 2852 net.exe net1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\241466b63ab01b9a6c10c1fde82c6a7f7f1ae2f9c68e8af25348c66bf5f96112.exe"C:\Users\Admin\AppData\Local\Temp\241466b63ab01b9a6c10c1fde82c6a7f7f1ae2f9c68e8af25348c66bf5f96112.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Users\Admin\AppData\Local\Temp\is-4Q5FF.tmp\241466b63ab01b9a6c10c1fde82c6a7f7f1ae2f9c68e8af25348c66bf5f96112.tmp"C:\Users\Admin\AppData\Local\Temp\is-4Q5FF.tmp\241466b63ab01b9a6c10c1fde82c6a7f7f1ae2f9c68e8af25348c66bf5f96112.tmp" /SL5="$7002C,5931969,56832,C:\Users\Admin\AppData\Local\Temp\241466b63ab01b9a6c10c1fde82c6a7f7f1ae2f9c68e8af25348c66bf5f96112.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3712 -
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" pause cut_movie_11713⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 pause cut_movie_11714⤵
- System Location Discovery: System Language Discovery
PID:4380
-
-
-
C:\Users\Admin\AppData\Local\Cut Movie 2022.2.01\cutmovie.exe"C:\Users\Admin\AppData\Local\Cut Movie 2022.2.01\cutmovie.exe" -i3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2668
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.8MB
MD5bacc26ea743c929fdaf5b5c3491d0ef7
SHA113c4e0bbfa1c0af18ae68489b302bcf8b03b7cc0
SHA2565891b24cbf18f179c695f556cb6bb1b0ca7900a7034d122a0d31ef68c6bd51fd
SHA512515d370eabc17bebf04702a543bcaf37aee8ea8e8a014e161ed333caa52dc76c9befe6c03179a648b7e1c40e978c595999216b8cdee0e79e87a06f176a50f165
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
C:\Users\Admin\AppData\Local\Temp\is-4Q5FF.tmp\241466b63ab01b9a6c10c1fde82c6a7f7f1ae2f9c68e8af25348c66bf5f96112.tmp
Filesize692KB
MD5388c5898ce35cc9ea89c115945dab8f3
SHA1ea70b5cb999b43b844b3a546314a0c77017495f2
SHA2568572edfda675c907e1bb2aa182ec700e82871879a2c92c28f556587f98016b26
SHA512a28be14bbc4a6a499e646619250b8bbc7daa0848d04666df2e3bcba6f2227009ab356115bcafc8383bc160bd8e43fc843077beaa24c967ead9d585b0014db072