Analysis
-
max time kernel
141s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 20:19
Static task
static1
Behavioral task
behavioral1
Sample
9fe2d1d950d88363f29163aa78274b7f7eee55ae391a04bb60d1c0b86932e92b.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9fe2d1d950d88363f29163aa78274b7f7eee55ae391a04bb60d1c0b86932e92b.exe
Resource
win10v2004-20241007-en
General
-
Target
9fe2d1d950d88363f29163aa78274b7f7eee55ae391a04bb60d1c0b86932e92b.exe
-
Size
5.8MB
-
MD5
93ea518fd199f3a1ac7cf8a1895dcf26
-
SHA1
a9da3b66865d5d4e6e6d3ee30bd2acb70e91935f
-
SHA256
9fe2d1d950d88363f29163aa78274b7f7eee55ae391a04bb60d1c0b86932e92b
-
SHA512
c0a2129cb8ce0c08b364b271ddb435456b1a7a96b81db7be700e851646e8287b36ad509644611563bb46e42da1693c59d45ee9c50aef8e921d90977e68b87aee
-
SSDEEP
98304:4s6GDoQ8zhfw1/4UPvqEQCSzw9k442uZSc6EYuhvvEwGuDbgSTfJI:lzh1hPvqRbzBKiYuh3E1ugMfe
Malware Config
Signatures
-
Detect Socks5Systemz Payload 3 IoCs
resource yara_rule behavioral2/memory/2624-98-0x00000000009C0000-0x0000000000A62000-memory.dmp family_socks5systemz behavioral2/memory/2624-123-0x00000000009C0000-0x0000000000A62000-memory.dmp family_socks5systemz behavioral2/memory/2624-124-0x00000000009C0000-0x0000000000A62000-memory.dmp family_socks5systemz -
Socks5Systemz
Socks5Systemz is a botnet written in C++.
-
Socks5systemz family
-
Executes dropped EXE 2 IoCs
pid Process 1492 9fe2d1d950d88363f29163aa78274b7f7eee55ae391a04bb60d1c0b86932e92b.tmp 2624 camcontrol32.exe -
Loads dropped DLL 1 IoCs
pid Process 1492 9fe2d1d950d88363f29163aa78274b7f7eee55ae391a04bb60d1c0b86932e92b.tmp -
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 91.211.247.248 -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9fe2d1d950d88363f29163aa78274b7f7eee55ae391a04bb60d1c0b86932e92b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9fe2d1d950d88363f29163aa78274b7f7eee55ae391a04bb60d1c0b86932e92b.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language camcontrol32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1492 9fe2d1d950d88363f29163aa78274b7f7eee55ae391a04bb60d1c0b86932e92b.tmp 1492 9fe2d1d950d88363f29163aa78274b7f7eee55ae391a04bb60d1c0b86932e92b.tmp -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1492 9fe2d1d950d88363f29163aa78274b7f7eee55ae391a04bb60d1c0b86932e92b.tmp -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 840 wrote to memory of 1492 840 9fe2d1d950d88363f29163aa78274b7f7eee55ae391a04bb60d1c0b86932e92b.exe 85 PID 840 wrote to memory of 1492 840 9fe2d1d950d88363f29163aa78274b7f7eee55ae391a04bb60d1c0b86932e92b.exe 85 PID 840 wrote to memory of 1492 840 9fe2d1d950d88363f29163aa78274b7f7eee55ae391a04bb60d1c0b86932e92b.exe 85 PID 1492 wrote to memory of 4428 1492 9fe2d1d950d88363f29163aa78274b7f7eee55ae391a04bb60d1c0b86932e92b.tmp 87 PID 1492 wrote to memory of 4428 1492 9fe2d1d950d88363f29163aa78274b7f7eee55ae391a04bb60d1c0b86932e92b.tmp 87 PID 1492 wrote to memory of 4428 1492 9fe2d1d950d88363f29163aa78274b7f7eee55ae391a04bb60d1c0b86932e92b.tmp 87 PID 1492 wrote to memory of 2624 1492 9fe2d1d950d88363f29163aa78274b7f7eee55ae391a04bb60d1c0b86932e92b.tmp 89 PID 1492 wrote to memory of 2624 1492 9fe2d1d950d88363f29163aa78274b7f7eee55ae391a04bb60d1c0b86932e92b.tmp 89 PID 1492 wrote to memory of 2624 1492 9fe2d1d950d88363f29163aa78274b7f7eee55ae391a04bb60d1c0b86932e92b.tmp 89 PID 4428 wrote to memory of 1920 4428 net.exe 90 PID 4428 wrote to memory of 1920 4428 net.exe 90 PID 4428 wrote to memory of 1920 4428 net.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\9fe2d1d950d88363f29163aa78274b7f7eee55ae391a04bb60d1c0b86932e92b.exe"C:\Users\Admin\AppData\Local\Temp\9fe2d1d950d88363f29163aa78274b7f7eee55ae391a04bb60d1c0b86932e92b.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Users\Admin\AppData\Local\Temp\is-JSSVI.tmp\9fe2d1d950d88363f29163aa78274b7f7eee55ae391a04bb60d1c0b86932e92b.tmp"C:\Users\Admin\AppData\Local\Temp\is-JSSVI.tmp\9fe2d1d950d88363f29163aa78274b7f7eee55ae391a04bb60d1c0b86932e92b.tmp" /SL5="$501E4,5786444,56832,C:\Users\Admin\AppData\Local\Temp\9fe2d1d950d88363f29163aa78274b7f7eee55ae391a04bb60d1c0b86932e92b.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" pause cam_control_111123⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 pause cam_control_111124⤵
- System Location Discovery: System Language Discovery
PID:1920
-
-
-
C:\Users\Admin\AppData\Local\CamControl 3.0.3.13\camcontrol32.exe"C:\Users\Admin\AppData\Local\CamControl 3.0.3.13\camcontrol32.exe" -i3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2624
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.4MB
MD53aad1d76f95205a29c5634934ab96970
SHA17671b04cf3a5fba3bd1e0ad6c46d8908caf3f9c9
SHA25632c597db3d2d7837f3836867efd019c2f99cd1dfae6a98132c4ee120132c390f
SHA512a9533d0382989784d6208908c746e6ef8c3faf1c7d87f55901a3dde31bfb94383d4c2c4015dd7678560efd25b2f6b7e05cf382f8c5abd8f86a8b3ba777cacff9
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
C:\Users\Admin\AppData\Local\Temp\is-JSSVI.tmp\9fe2d1d950d88363f29163aa78274b7f7eee55ae391a04bb60d1c0b86932e92b.tmp
Filesize692KB
MD552ef0bf493f03037dcdd292ed9cd3a6a
SHA14441b668c9f22aa1b04b8881428f3f9668471500
SHA25648e2bef51b8b3dd9c754fc7e21ea66ef17f469c37b7e5d5030cfaa3eeb8054cb
SHA5123f9169ef26857cf07c0f128fe423c8259fa838fb78443d8cc5c38db1bae8c897d1bc3bfd78c96824c962d988e55ce18e0e0a30eba2d9dc11e194950aa5745ddd