Analysis
-
max time kernel
141s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-11-2024 20:19
Static task
static1
Behavioral task
behavioral1
Sample
9fe2d1d950d88363f29163aa78274b7f7eee55ae391a04bb60d1c0b86932e92b.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9fe2d1d950d88363f29163aa78274b7f7eee55ae391a04bb60d1c0b86932e92b.exe
Resource
win10v2004-20241007-en
General
-
Target
9fe2d1d950d88363f29163aa78274b7f7eee55ae391a04bb60d1c0b86932e92b.exe
-
Size
5.8MB
-
MD5
93ea518fd199f3a1ac7cf8a1895dcf26
-
SHA1
a9da3b66865d5d4e6e6d3ee30bd2acb70e91935f
-
SHA256
9fe2d1d950d88363f29163aa78274b7f7eee55ae391a04bb60d1c0b86932e92b
-
SHA512
c0a2129cb8ce0c08b364b271ddb435456b1a7a96b81db7be700e851646e8287b36ad509644611563bb46e42da1693c59d45ee9c50aef8e921d90977e68b87aee
-
SSDEEP
98304:4s6GDoQ8zhfw1/4UPvqEQCSzw9k442uZSc6EYuhvvEwGuDbgSTfJI:lzh1hPvqRbzBKiYuh3E1ugMfe
Malware Config
Signatures
-
Detect Socks5Systemz Payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2612-103-0x0000000002A20000-0x0000000002AC2000-memory.dmp family_socks5systemz -
Socks5Systemz
Socks5Systemz is a botnet written in C++.
-
Socks5systemz family
-
Executes dropped EXE 2 IoCs
Processes:
9fe2d1d950d88363f29163aa78274b7f7eee55ae391a04bb60d1c0b86932e92b.tmpcamcontrol32.exepid Process 2668 9fe2d1d950d88363f29163aa78274b7f7eee55ae391a04bb60d1c0b86932e92b.tmp 2612 camcontrol32.exe -
Loads dropped DLL 5 IoCs
Processes:
9fe2d1d950d88363f29163aa78274b7f7eee55ae391a04bb60d1c0b86932e92b.exe9fe2d1d950d88363f29163aa78274b7f7eee55ae391a04bb60d1c0b86932e92b.tmppid Process 2972 9fe2d1d950d88363f29163aa78274b7f7eee55ae391a04bb60d1c0b86932e92b.exe 2668 9fe2d1d950d88363f29163aa78274b7f7eee55ae391a04bb60d1c0b86932e92b.tmp 2668 9fe2d1d950d88363f29163aa78274b7f7eee55ae391a04bb60d1c0b86932e92b.tmp 2668 9fe2d1d950d88363f29163aa78274b7f7eee55ae391a04bb60d1c0b86932e92b.tmp 2668 9fe2d1d950d88363f29163aa78274b7f7eee55ae391a04bb60d1c0b86932e92b.tmp -
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
Processes:
description ioc Destination IP 152.89.198.214 -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
net1.exe9fe2d1d950d88363f29163aa78274b7f7eee55ae391a04bb60d1c0b86932e92b.exe9fe2d1d950d88363f29163aa78274b7f7eee55ae391a04bb60d1c0b86932e92b.tmpcamcontrol32.exenet.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9fe2d1d950d88363f29163aa78274b7f7eee55ae391a04bb60d1c0b86932e92b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9fe2d1d950d88363f29163aa78274b7f7eee55ae391a04bb60d1c0b86932e92b.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language camcontrol32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
9fe2d1d950d88363f29163aa78274b7f7eee55ae391a04bb60d1c0b86932e92b.tmppid Process 2668 9fe2d1d950d88363f29163aa78274b7f7eee55ae391a04bb60d1c0b86932e92b.tmp 2668 9fe2d1d950d88363f29163aa78274b7f7eee55ae391a04bb60d1c0b86932e92b.tmp -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
9fe2d1d950d88363f29163aa78274b7f7eee55ae391a04bb60d1c0b86932e92b.tmppid Process 2668 9fe2d1d950d88363f29163aa78274b7f7eee55ae391a04bb60d1c0b86932e92b.tmp -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
9fe2d1d950d88363f29163aa78274b7f7eee55ae391a04bb60d1c0b86932e92b.exe9fe2d1d950d88363f29163aa78274b7f7eee55ae391a04bb60d1c0b86932e92b.tmpnet.exedescription pid Process procid_target PID 2972 wrote to memory of 2668 2972 9fe2d1d950d88363f29163aa78274b7f7eee55ae391a04bb60d1c0b86932e92b.exe 30 PID 2972 wrote to memory of 2668 2972 9fe2d1d950d88363f29163aa78274b7f7eee55ae391a04bb60d1c0b86932e92b.exe 30 PID 2972 wrote to memory of 2668 2972 9fe2d1d950d88363f29163aa78274b7f7eee55ae391a04bb60d1c0b86932e92b.exe 30 PID 2972 wrote to memory of 2668 2972 9fe2d1d950d88363f29163aa78274b7f7eee55ae391a04bb60d1c0b86932e92b.exe 30 PID 2972 wrote to memory of 2668 2972 9fe2d1d950d88363f29163aa78274b7f7eee55ae391a04bb60d1c0b86932e92b.exe 30 PID 2972 wrote to memory of 2668 2972 9fe2d1d950d88363f29163aa78274b7f7eee55ae391a04bb60d1c0b86932e92b.exe 30 PID 2972 wrote to memory of 2668 2972 9fe2d1d950d88363f29163aa78274b7f7eee55ae391a04bb60d1c0b86932e92b.exe 30 PID 2668 wrote to memory of 2784 2668 9fe2d1d950d88363f29163aa78274b7f7eee55ae391a04bb60d1c0b86932e92b.tmp 31 PID 2668 wrote to memory of 2784 2668 9fe2d1d950d88363f29163aa78274b7f7eee55ae391a04bb60d1c0b86932e92b.tmp 31 PID 2668 wrote to memory of 2784 2668 9fe2d1d950d88363f29163aa78274b7f7eee55ae391a04bb60d1c0b86932e92b.tmp 31 PID 2668 wrote to memory of 2784 2668 9fe2d1d950d88363f29163aa78274b7f7eee55ae391a04bb60d1c0b86932e92b.tmp 31 PID 2668 wrote to memory of 2612 2668 9fe2d1d950d88363f29163aa78274b7f7eee55ae391a04bb60d1c0b86932e92b.tmp 33 PID 2668 wrote to memory of 2612 2668 9fe2d1d950d88363f29163aa78274b7f7eee55ae391a04bb60d1c0b86932e92b.tmp 33 PID 2668 wrote to memory of 2612 2668 9fe2d1d950d88363f29163aa78274b7f7eee55ae391a04bb60d1c0b86932e92b.tmp 33 PID 2668 wrote to memory of 2612 2668 9fe2d1d950d88363f29163aa78274b7f7eee55ae391a04bb60d1c0b86932e92b.tmp 33 PID 2784 wrote to memory of 1700 2784 net.exe 34 PID 2784 wrote to memory of 1700 2784 net.exe 34 PID 2784 wrote to memory of 1700 2784 net.exe 34 PID 2784 wrote to memory of 1700 2784 net.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\9fe2d1d950d88363f29163aa78274b7f7eee55ae391a04bb60d1c0b86932e92b.exe"C:\Users\Admin\AppData\Local\Temp\9fe2d1d950d88363f29163aa78274b7f7eee55ae391a04bb60d1c0b86932e92b.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Users\Admin\AppData\Local\Temp\is-T4M1R.tmp\9fe2d1d950d88363f29163aa78274b7f7eee55ae391a04bb60d1c0b86932e92b.tmp"C:\Users\Admin\AppData\Local\Temp\is-T4M1R.tmp\9fe2d1d950d88363f29163aa78274b7f7eee55ae391a04bb60d1c0b86932e92b.tmp" /SL5="$400F4,5786444,56832,C:\Users\Admin\AppData\Local\Temp\9fe2d1d950d88363f29163aa78274b7f7eee55ae391a04bb60d1c0b86932e92b.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" pause cam_control_111123⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 pause cam_control_111124⤵
- System Location Discovery: System Language Discovery
PID:1700
-
-
-
C:\Users\Admin\AppData\Local\CamControl 3.0.3.13\camcontrol32.exe"C:\Users\Admin\AppData\Local\CamControl 3.0.3.13\camcontrol32.exe" -i3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2612
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.4MB
MD53aad1d76f95205a29c5634934ab96970
SHA17671b04cf3a5fba3bd1e0ad6c46d8908caf3f9c9
SHA25632c597db3d2d7837f3836867efd019c2f99cd1dfae6a98132c4ee120132c390f
SHA512a9533d0382989784d6208908c746e6ef8c3faf1c7d87f55901a3dde31bfb94383d4c2c4015dd7678560efd25b2f6b7e05cf382f8c5abd8f86a8b3ba777cacff9
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
\Users\Admin\AppData\Local\Temp\is-T4M1R.tmp\9fe2d1d950d88363f29163aa78274b7f7eee55ae391a04bb60d1c0b86932e92b.tmp
Filesize692KB
MD552ef0bf493f03037dcdd292ed9cd3a6a
SHA14441b668c9f22aa1b04b8881428f3f9668471500
SHA25648e2bef51b8b3dd9c754fc7e21ea66ef17f469c37b7e5d5030cfaa3eeb8054cb
SHA5123f9169ef26857cf07c0f128fe423c8259fa838fb78443d8cc5c38db1bae8c897d1bc3bfd78c96824c962d988e55ce18e0e0a30eba2d9dc11e194950aa5745ddd