Analysis
-
max time kernel
141s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-11-2024 23:21
Static task
static1
Behavioral task
behavioral1
Sample
eb6d02850378e53985bba9d8a61a02adf9a75c8f6f2a11b3f8cfa6200f889371.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
eb6d02850378e53985bba9d8a61a02adf9a75c8f6f2a11b3f8cfa6200f889371.exe
Resource
win10v2004-20241007-en
General
-
Target
eb6d02850378e53985bba9d8a61a02adf9a75c8f6f2a11b3f8cfa6200f889371.exe
-
Size
4.6MB
-
MD5
0e5fcf8057574190c439bb2c61681b30
-
SHA1
cdaedca940a32071b059976f13ad52fd1dcfa2c1
-
SHA256
eb6d02850378e53985bba9d8a61a02adf9a75c8f6f2a11b3f8cfa6200f889371
-
SHA512
09d9ff569ae54054b679ba5b42ca315ae1308f2d9e193b5687d9653654c7bc4f8f6e2977fdb4bf28381ed49a084d9a93f21710e2b8803c8bb2545f5cbfd78607
-
SSDEEP
98304:46ztVOA01pzNh+ipiJ/4c50qayBAW4NlE2rJ7VlIs885:drOpLpi1FRnKlE6JJS8
Malware Config
Signatures
-
Detect Socks5Systemz Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/3992-92-0x0000000000870000-0x0000000000912000-memory.dmp family_socks5systemz behavioral2/memory/3992-117-0x0000000000870000-0x0000000000912000-memory.dmp family_socks5systemz behavioral2/memory/3992-116-0x0000000000870000-0x0000000000912000-memory.dmp family_socks5systemz -
Socks5Systemz
Socks5Systemz is a botnet written in C++.
-
Socks5systemz family
-
Executes dropped EXE 2 IoCs
Processes:
eb6d02850378e53985bba9d8a61a02adf9a75c8f6f2a11b3f8cfa6200f889371.tmpeditresync32_64.exepid process 4500 eb6d02850378e53985bba9d8a61a02adf9a75c8f6f2a11b3f8cfa6200f889371.tmp 3992 editresync32_64.exe -
Loads dropped DLL 1 IoCs
Processes:
eb6d02850378e53985bba9d8a61a02adf9a75c8f6f2a11b3f8cfa6200f889371.tmppid process 4500 eb6d02850378e53985bba9d8a61a02adf9a75c8f6f2a11b3f8cfa6200f889371.tmp -
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
Processes:
description ioc Destination IP 152.89.198.214 -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
net1.exeeb6d02850378e53985bba9d8a61a02adf9a75c8f6f2a11b3f8cfa6200f889371.exeeb6d02850378e53985bba9d8a61a02adf9a75c8f6f2a11b3f8cfa6200f889371.tmpeditresync32_64.exenet.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eb6d02850378e53985bba9d8a61a02adf9a75c8f6f2a11b3f8cfa6200f889371.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eb6d02850378e53985bba9d8a61a02adf9a75c8f6f2a11b3f8cfa6200f889371.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language editresync32_64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
eb6d02850378e53985bba9d8a61a02adf9a75c8f6f2a11b3f8cfa6200f889371.tmppid process 4500 eb6d02850378e53985bba9d8a61a02adf9a75c8f6f2a11b3f8cfa6200f889371.tmp 4500 eb6d02850378e53985bba9d8a61a02adf9a75c8f6f2a11b3f8cfa6200f889371.tmp -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
eb6d02850378e53985bba9d8a61a02adf9a75c8f6f2a11b3f8cfa6200f889371.tmppid process 4500 eb6d02850378e53985bba9d8a61a02adf9a75c8f6f2a11b3f8cfa6200f889371.tmp -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
eb6d02850378e53985bba9d8a61a02adf9a75c8f6f2a11b3f8cfa6200f889371.exeeb6d02850378e53985bba9d8a61a02adf9a75c8f6f2a11b3f8cfa6200f889371.tmpnet.exedescription pid process target process PID 1844 wrote to memory of 4500 1844 eb6d02850378e53985bba9d8a61a02adf9a75c8f6f2a11b3f8cfa6200f889371.exe eb6d02850378e53985bba9d8a61a02adf9a75c8f6f2a11b3f8cfa6200f889371.tmp PID 1844 wrote to memory of 4500 1844 eb6d02850378e53985bba9d8a61a02adf9a75c8f6f2a11b3f8cfa6200f889371.exe eb6d02850378e53985bba9d8a61a02adf9a75c8f6f2a11b3f8cfa6200f889371.tmp PID 1844 wrote to memory of 4500 1844 eb6d02850378e53985bba9d8a61a02adf9a75c8f6f2a11b3f8cfa6200f889371.exe eb6d02850378e53985bba9d8a61a02adf9a75c8f6f2a11b3f8cfa6200f889371.tmp PID 4500 wrote to memory of 5052 4500 eb6d02850378e53985bba9d8a61a02adf9a75c8f6f2a11b3f8cfa6200f889371.tmp net.exe PID 4500 wrote to memory of 5052 4500 eb6d02850378e53985bba9d8a61a02adf9a75c8f6f2a11b3f8cfa6200f889371.tmp net.exe PID 4500 wrote to memory of 5052 4500 eb6d02850378e53985bba9d8a61a02adf9a75c8f6f2a11b3f8cfa6200f889371.tmp net.exe PID 4500 wrote to memory of 3992 4500 eb6d02850378e53985bba9d8a61a02adf9a75c8f6f2a11b3f8cfa6200f889371.tmp editresync32_64.exe PID 4500 wrote to memory of 3992 4500 eb6d02850378e53985bba9d8a61a02adf9a75c8f6f2a11b3f8cfa6200f889371.tmp editresync32_64.exe PID 4500 wrote to memory of 3992 4500 eb6d02850378e53985bba9d8a61a02adf9a75c8f6f2a11b3f8cfa6200f889371.tmp editresync32_64.exe PID 5052 wrote to memory of 4044 5052 net.exe net1.exe PID 5052 wrote to memory of 4044 5052 net.exe net1.exe PID 5052 wrote to memory of 4044 5052 net.exe net1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\eb6d02850378e53985bba9d8a61a02adf9a75c8f6f2a11b3f8cfa6200f889371.exe"C:\Users\Admin\AppData\Local\Temp\eb6d02850378e53985bba9d8a61a02adf9a75c8f6f2a11b3f8cfa6200f889371.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Users\Admin\AppData\Local\Temp\is-4DBHN.tmp\eb6d02850378e53985bba9d8a61a02adf9a75c8f6f2a11b3f8cfa6200f889371.tmp"C:\Users\Admin\AppData\Local\Temp\is-4DBHN.tmp\eb6d02850378e53985bba9d8a61a02adf9a75c8f6f2a11b3f8cfa6200f889371.tmp" /SL5="$D0046,4565828,56832,C:\Users\Admin\AppData\Local\Temp\eb6d02850378e53985bba9d8a61a02adf9a75c8f6f2a11b3f8cfa6200f889371.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" pause edit_resync_111233⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 pause edit_resync_111234⤵
- System Location Discovery: System Language Discovery
PID:4044
-
-
-
C:\Users\Admin\AppData\Local\Edit Resync 0.32\editresync32_64.exe"C:\Users\Admin\AppData\Local\Edit Resync 0.32\editresync32_64.exe" -i3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3992
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.5MB
MD5c6c1d923438828a566c7ca33c603091c
SHA1b2ec81c625b20d8cfc5fb24cfc0ad211d1cf5dd5
SHA256efe8086f830e8ed79d448a13e42414119737bb74c8e2ec65aeec92fe22a64f9b
SHA5123ca8b36f8506186cb5a0ff34d8cc71c49284d65ffc5eb4d9c61affe9f0acd678f3d48fa7b8c0e784f931e2f5d48cd3d94ee5310ad882a50d6b49119bb4e4e400
-
C:\Users\Admin\AppData\Local\Temp\is-4DBHN.tmp\eb6d02850378e53985bba9d8a61a02adf9a75c8f6f2a11b3f8cfa6200f889371.tmp
Filesize692KB
MD59a99589cc16eff1e7398d990c8bcd9f5
SHA1af0c7f22ad249cad5d20dd97e0fe4198e9e3b281
SHA256aa9e35ddeeaf4c667c0cfa9a7dfd185bdaab2322cfcc7bfe95054be4972d408e
SHA51290bb34209386df6bdeffb599bc819158be470e85945ae6a641610d787f5d3eaf3123d5a698f5ee3b59f74864af1fab96accd3de04e3439df1699c39b2748a71d
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63