Analysis
-
max time kernel
140s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13-11-2024 03:45
Static task
static1
Behavioral task
behavioral1
Sample
fb73a481b553f79d9fb826a5d973bc84e3905e8cb7da0d34aea8f6c55ac8d381.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
fb73a481b553f79d9fb826a5d973bc84e3905e8cb7da0d34aea8f6c55ac8d381.exe
Resource
win10v2004-20241007-en
General
-
Target
fb73a481b553f79d9fb826a5d973bc84e3905e8cb7da0d34aea8f6c55ac8d381.exe
-
Size
4.6MB
-
MD5
e9cd92888955ec6ca951d1ecd9547247
-
SHA1
4f7e56c3bcadbe17bd81b8fbd47a0dbe53d03308
-
SHA256
fb73a481b553f79d9fb826a5d973bc84e3905e8cb7da0d34aea8f6c55ac8d381
-
SHA512
4d04c1b527021a63503f46585e5358c39a9f8e81453c2586b6399712e5c09d01c93a7dc42f65cb669587d4730c30b4bc247cc760101f03aae6bc35c5d229773b
-
SSDEEP
98304:48mgP/v+pYZF1O+oBWKLt0PG3ehUEtuf5UMv3+GcFKojWvix:28CEjOCpzgf563Zv
Malware Config
Signatures
-
Detect Socks5Systemz Payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2624-97-0x0000000002B30000-0x0000000002BD2000-memory.dmp family_socks5systemz -
Socks5Systemz
Socks5Systemz is a botnet written in C++.
-
Socks5systemz family
-
Executes dropped EXE 2 IoCs
Processes:
fb73a481b553f79d9fb826a5d973bc84e3905e8cb7da0d34aea8f6c55ac8d381.tmpeditresync32_64.exepid process 1772 fb73a481b553f79d9fb826a5d973bc84e3905e8cb7da0d34aea8f6c55ac8d381.tmp 2624 editresync32_64.exe -
Loads dropped DLL 5 IoCs
Processes:
fb73a481b553f79d9fb826a5d973bc84e3905e8cb7da0d34aea8f6c55ac8d381.exefb73a481b553f79d9fb826a5d973bc84e3905e8cb7da0d34aea8f6c55ac8d381.tmppid process 1700 fb73a481b553f79d9fb826a5d973bc84e3905e8cb7da0d34aea8f6c55ac8d381.exe 1772 fb73a481b553f79d9fb826a5d973bc84e3905e8cb7da0d34aea8f6c55ac8d381.tmp 1772 fb73a481b553f79d9fb826a5d973bc84e3905e8cb7da0d34aea8f6c55ac8d381.tmp 1772 fb73a481b553f79d9fb826a5d973bc84e3905e8cb7da0d34aea8f6c55ac8d381.tmp 1772 fb73a481b553f79d9fb826a5d973bc84e3905e8cb7da0d34aea8f6c55ac8d381.tmp -
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
Processes:
description ioc Destination IP 152.89.198.214 -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
fb73a481b553f79d9fb826a5d973bc84e3905e8cb7da0d34aea8f6c55ac8d381.exefb73a481b553f79d9fb826a5d973bc84e3905e8cb7da0d34aea8f6c55ac8d381.tmpnet.exeeditresync32_64.exenet1.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fb73a481b553f79d9fb826a5d973bc84e3905e8cb7da0d34aea8f6c55ac8d381.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fb73a481b553f79d9fb826a5d973bc84e3905e8cb7da0d34aea8f6c55ac8d381.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language editresync32_64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
fb73a481b553f79d9fb826a5d973bc84e3905e8cb7da0d34aea8f6c55ac8d381.tmppid process 1772 fb73a481b553f79d9fb826a5d973bc84e3905e8cb7da0d34aea8f6c55ac8d381.tmp 1772 fb73a481b553f79d9fb826a5d973bc84e3905e8cb7da0d34aea8f6c55ac8d381.tmp -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
fb73a481b553f79d9fb826a5d973bc84e3905e8cb7da0d34aea8f6c55ac8d381.tmppid process 1772 fb73a481b553f79d9fb826a5d973bc84e3905e8cb7da0d34aea8f6c55ac8d381.tmp -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
fb73a481b553f79d9fb826a5d973bc84e3905e8cb7da0d34aea8f6c55ac8d381.exefb73a481b553f79d9fb826a5d973bc84e3905e8cb7da0d34aea8f6c55ac8d381.tmpnet.exedescription pid process target process PID 1700 wrote to memory of 1772 1700 fb73a481b553f79d9fb826a5d973bc84e3905e8cb7da0d34aea8f6c55ac8d381.exe fb73a481b553f79d9fb826a5d973bc84e3905e8cb7da0d34aea8f6c55ac8d381.tmp PID 1700 wrote to memory of 1772 1700 fb73a481b553f79d9fb826a5d973bc84e3905e8cb7da0d34aea8f6c55ac8d381.exe fb73a481b553f79d9fb826a5d973bc84e3905e8cb7da0d34aea8f6c55ac8d381.tmp PID 1700 wrote to memory of 1772 1700 fb73a481b553f79d9fb826a5d973bc84e3905e8cb7da0d34aea8f6c55ac8d381.exe fb73a481b553f79d9fb826a5d973bc84e3905e8cb7da0d34aea8f6c55ac8d381.tmp PID 1700 wrote to memory of 1772 1700 fb73a481b553f79d9fb826a5d973bc84e3905e8cb7da0d34aea8f6c55ac8d381.exe fb73a481b553f79d9fb826a5d973bc84e3905e8cb7da0d34aea8f6c55ac8d381.tmp PID 1700 wrote to memory of 1772 1700 fb73a481b553f79d9fb826a5d973bc84e3905e8cb7da0d34aea8f6c55ac8d381.exe fb73a481b553f79d9fb826a5d973bc84e3905e8cb7da0d34aea8f6c55ac8d381.tmp PID 1700 wrote to memory of 1772 1700 fb73a481b553f79d9fb826a5d973bc84e3905e8cb7da0d34aea8f6c55ac8d381.exe fb73a481b553f79d9fb826a5d973bc84e3905e8cb7da0d34aea8f6c55ac8d381.tmp PID 1700 wrote to memory of 1772 1700 fb73a481b553f79d9fb826a5d973bc84e3905e8cb7da0d34aea8f6c55ac8d381.exe fb73a481b553f79d9fb826a5d973bc84e3905e8cb7da0d34aea8f6c55ac8d381.tmp PID 1772 wrote to memory of 2464 1772 fb73a481b553f79d9fb826a5d973bc84e3905e8cb7da0d34aea8f6c55ac8d381.tmp net.exe PID 1772 wrote to memory of 2464 1772 fb73a481b553f79d9fb826a5d973bc84e3905e8cb7da0d34aea8f6c55ac8d381.tmp net.exe PID 1772 wrote to memory of 2464 1772 fb73a481b553f79d9fb826a5d973bc84e3905e8cb7da0d34aea8f6c55ac8d381.tmp net.exe PID 1772 wrote to memory of 2464 1772 fb73a481b553f79d9fb826a5d973bc84e3905e8cb7da0d34aea8f6c55ac8d381.tmp net.exe PID 1772 wrote to memory of 2624 1772 fb73a481b553f79d9fb826a5d973bc84e3905e8cb7da0d34aea8f6c55ac8d381.tmp editresync32_64.exe PID 1772 wrote to memory of 2624 1772 fb73a481b553f79d9fb826a5d973bc84e3905e8cb7da0d34aea8f6c55ac8d381.tmp editresync32_64.exe PID 1772 wrote to memory of 2624 1772 fb73a481b553f79d9fb826a5d973bc84e3905e8cb7da0d34aea8f6c55ac8d381.tmp editresync32_64.exe PID 1772 wrote to memory of 2624 1772 fb73a481b553f79d9fb826a5d973bc84e3905e8cb7da0d34aea8f6c55ac8d381.tmp editresync32_64.exe PID 2464 wrote to memory of 2616 2464 net.exe net1.exe PID 2464 wrote to memory of 2616 2464 net.exe net1.exe PID 2464 wrote to memory of 2616 2464 net.exe net1.exe PID 2464 wrote to memory of 2616 2464 net.exe net1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fb73a481b553f79d9fb826a5d973bc84e3905e8cb7da0d34aea8f6c55ac8d381.exe"C:\Users\Admin\AppData\Local\Temp\fb73a481b553f79d9fb826a5d973bc84e3905e8cb7da0d34aea8f6c55ac8d381.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Users\Admin\AppData\Local\Temp\is-EHQQF.tmp\fb73a481b553f79d9fb826a5d973bc84e3905e8cb7da0d34aea8f6c55ac8d381.tmp"C:\Users\Admin\AppData\Local\Temp\is-EHQQF.tmp\fb73a481b553f79d9fb826a5d973bc84e3905e8cb7da0d34aea8f6c55ac8d381.tmp" /SL5="$40016,4592439,56832,C:\Users\Admin\AppData\Local\Temp\fb73a481b553f79d9fb826a5d973bc84e3905e8cb7da0d34aea8f6c55ac8d381.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" pause edit_resync_111233⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 pause edit_resync_111234⤵
- System Location Discovery: System Language Discovery
PID:2616
-
-
-
C:\Users\Admin\AppData\Local\Edit Resync 0.32\editresync32_64.exe"C:\Users\Admin\AppData\Local\Edit Resync 0.32\editresync32_64.exe" -i3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2624
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.5MB
MD53e5e08e97ff424fe7785b9bc354d7ed2
SHA120be0d4da50bed834bd4dac2e7a6fc351dae00cf
SHA25675792d63606f15b6b79bd27d0d21d91385added17914eb0297cc26d3b0a1a4b2
SHA51297a8ae77fd0896201c38703686616b064a40e482606383aa8ae9492efdad3ca04a8c397c130481407870c7b55b98e45ab05ebaaa21808764a5c8242a4ee2de91
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
\Users\Admin\AppData\Local\Temp\is-EHQQF.tmp\fb73a481b553f79d9fb826a5d973bc84e3905e8cb7da0d34aea8f6c55ac8d381.tmp
Filesize692KB
MD5d57e747bad25a0fec0e55eac48edbb31
SHA1856a43e3f009ef36d5999dfbc70ff169d703fc3a
SHA256386ff218c575b721cd3d44d7b1781a5d6766b438e1317baeb18d34c3f6e99866
SHA512aa5c2a372057ccdcc940ca3c61b4d0d45e684f447435acef477d02aa575956a9e298789921972bc596745a30dff407a20d2752c8104d6d86ee92bbde4d1e8081