Analysis
-
max time kernel
142s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15-11-2024 10:13
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20241007-en
General
-
Target
file.exe
-
Size
6.0MB
-
MD5
61a258d01ca778d303b44cbbf41becc1
-
SHA1
e2ab78bceb60663da12bd4ce6d827f1533d309be
-
SHA256
eb16b633187ae498fb15ad453e1a4194317a8eda531956da27f2425289f50d1d
-
SHA512
debc59ae8a6303d55995a8ed4a5898af2f5dd870426323e4e3356300fdac311172b4acff71067e1bca5e9e9832c580a51f49194c0f336d593d04dbd46c7e96ea
-
SSDEEP
98304:PX4AHTabXxL1XuXp3buabbtEUq7Q06EjS82psOlM/a+irbKX8M02Yyazx1O:v/HTabBsXp3SabbtjxvKS8d/a+iruXIY
Malware Config
Signatures
-
Detect Socks5Systemz Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/2812-94-0x0000000000A50000-0x0000000000AF2000-memory.dmp family_socks5systemz behavioral2/memory/2812-124-0x0000000000A50000-0x0000000000AF2000-memory.dmp family_socks5systemz behavioral2/memory/2812-125-0x0000000000A50000-0x0000000000AF2000-memory.dmp family_socks5systemz -
Socks5Systemz
Socks5Systemz is a botnet written in C++.
-
Socks5systemz family
-
Executes dropped EXE 2 IoCs
Processes:
file.tmpshineencoder.exepid process 4572 file.tmp 2812 shineencoder.exe -
Loads dropped DLL 2 IoCs
Processes:
file.tmpshineencoder.exepid process 4572 file.tmp 2812 shineencoder.exe -
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
Processes:
description ioc Destination IP 45.155.250.90 -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
net1.exefile.exefile.tmpshineencoder.exenet.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language shineencoder.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
file.tmppid process 4572 file.tmp 4572 file.tmp -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
file.tmppid process 4572 file.tmp -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
file.exefile.tmpnet.exedescription pid process target process PID 764 wrote to memory of 4572 764 file.exe file.tmp PID 764 wrote to memory of 4572 764 file.exe file.tmp PID 764 wrote to memory of 4572 764 file.exe file.tmp PID 4572 wrote to memory of 1036 4572 file.tmp net.exe PID 4572 wrote to memory of 1036 4572 file.tmp net.exe PID 4572 wrote to memory of 1036 4572 file.tmp net.exe PID 4572 wrote to memory of 2812 4572 file.tmp shineencoder.exe PID 4572 wrote to memory of 2812 4572 file.tmp shineencoder.exe PID 4572 wrote to memory of 2812 4572 file.tmp shineencoder.exe PID 1036 wrote to memory of 3540 1036 net.exe net1.exe PID 1036 wrote to memory of 3540 1036 net.exe net1.exe PID 1036 wrote to memory of 3540 1036 net.exe net1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Users\Admin\AppData\Local\Temp\is-TE22I.tmp\file.tmp"C:\Users\Admin\AppData\Local\Temp\is-TE22I.tmp\file.tmp" /SL5="$60068,5587251,721408,C:\Users\Admin\AppData\Local\Temp\file.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" pause shine-encoder_111513⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 pause shine-encoder_111514⤵
- System Location Discovery: System Language Discovery
PID:3540
-
-
-
C:\Users\Admin\AppData\Local\Shine Encoder 3.5.6\shineencoder.exe"C:\Users\Admin\AppData\Local\Shine Encoder 3.5.6\shineencoder.exe" -i3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2812
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.7MB
MD58c19fad6c2c62386207694841a01701d
SHA189125c3593711a8d7f48a131f45c7a31986fc101
SHA25680a0c9d587f09b1180cd9756c741b8b626806c14550c4c8d350fd8cb9c948b87
SHA512224dedb5dc523bd18db4572801c829b013ff0302ee96754fc98bcd72cb2b9990f651b5f3443094e5b8d1070088b7f52be581220e7325f237c0bd6e27563264b9
-
Filesize
630KB
MD5e477a96c8f2b18d6b5c27bde49c990bf
SHA1e980c9bf41330d1e5bd04556db4646a0210f7409
SHA25616574f51785b0e2fc29c2c61477eb47bb39f714829999511dc8952b43ab17660
SHA512335a86268e7c0e568b1c30981ec644e6cd332e66f96d2551b58a82515316693c1859d87b4f4b7310cf1ac386cee671580fdd999c3bcb23acf2c2282c01c8798c
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
2.4MB
MD5e894765ba18048ec8e4beab361ea032f
SHA1349b01bf9b04d9c3b8d5c7793a7469a4e457674d
SHA256944cd134e89cf5f6716d74410651e05129a691f91140f9ace10fe954fa65237b
SHA5127eae30393faa33c9a95452dec22a2abecf1ec805dbd0dad5e17b363daae2f9fb48b4310e6a9b882977e6c80aeeb0c403ade3fab28055092aade7c933745e304e