Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-11-2024 17:56
Static task
static1
Behavioral task
behavioral1
Sample
8f41c5ec731573cefbd685b32c7715cf9872aff51d1e2d454c838956bf5aff50.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
8f41c5ec731573cefbd685b32c7715cf9872aff51d1e2d454c838956bf5aff50.exe
Resource
win10v2004-20241007-en
General
-
Target
8f41c5ec731573cefbd685b32c7715cf9872aff51d1e2d454c838956bf5aff50.exe
-
Size
3.6MB
-
MD5
be822430f7d5c3b0a25dc7fddf6f8094
-
SHA1
6b1d3d132b5fbebb97591f6b37d244a7a39384da
-
SHA256
8f41c5ec731573cefbd685b32c7715cf9872aff51d1e2d454c838956bf5aff50
-
SHA512
c5982796cffee0938a8277c8126950a5fc7f024959b445d960daf02efa82b27c92b509050353e31ea929f0accbe9730f3e5e174e89fff307ad9db5d3fff64cea
-
SSDEEP
98304:N++1gkUAfhgpMB5vT6rW59EKT2iSpNIxwXI9d6k:E+1DfhVrjEREG4L3
Malware Config
Signatures
-
Detect Socks5Systemz Payload 1 IoCs
resource yara_rule behavioral2/memory/1680-75-0x0000000000A20000-0x0000000000AC2000-memory.dmp family_socks5systemz -
Socks5Systemz
Socks5Systemz is a botnet written in C++.
-
Socks5systemz family
-
Executes dropped EXE 2 IoCs
pid Process 3500 8f41c5ec731573cefbd685b32c7715cf9872aff51d1e2d454c838956bf5aff50.tmp 1680 altergame32.exe -
Loads dropped DLL 2 IoCs
pid Process 3500 8f41c5ec731573cefbd685b32c7715cf9872aff51d1e2d454c838956bf5aff50.tmp 1680 altergame32.exe -
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 141.98.234.31 -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8f41c5ec731573cefbd685b32c7715cf9872aff51d1e2d454c838956bf5aff50.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8f41c5ec731573cefbd685b32c7715cf9872aff51d1e2d454c838956bf5aff50.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language altergame32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3500 8f41c5ec731573cefbd685b32c7715cf9872aff51d1e2d454c838956bf5aff50.tmp 3500 8f41c5ec731573cefbd685b32c7715cf9872aff51d1e2d454c838956bf5aff50.tmp -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3500 8f41c5ec731573cefbd685b32c7715cf9872aff51d1e2d454c838956bf5aff50.tmp -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2788 wrote to memory of 3500 2788 8f41c5ec731573cefbd685b32c7715cf9872aff51d1e2d454c838956bf5aff50.exe 83 PID 2788 wrote to memory of 3500 2788 8f41c5ec731573cefbd685b32c7715cf9872aff51d1e2d454c838956bf5aff50.exe 83 PID 2788 wrote to memory of 3500 2788 8f41c5ec731573cefbd685b32c7715cf9872aff51d1e2d454c838956bf5aff50.exe 83 PID 3500 wrote to memory of 1672 3500 8f41c5ec731573cefbd685b32c7715cf9872aff51d1e2d454c838956bf5aff50.tmp 85 PID 3500 wrote to memory of 1672 3500 8f41c5ec731573cefbd685b32c7715cf9872aff51d1e2d454c838956bf5aff50.tmp 85 PID 3500 wrote to memory of 1672 3500 8f41c5ec731573cefbd685b32c7715cf9872aff51d1e2d454c838956bf5aff50.tmp 85 PID 3500 wrote to memory of 1680 3500 8f41c5ec731573cefbd685b32c7715cf9872aff51d1e2d454c838956bf5aff50.tmp 87 PID 3500 wrote to memory of 1680 3500 8f41c5ec731573cefbd685b32c7715cf9872aff51d1e2d454c838956bf5aff50.tmp 87 PID 3500 wrote to memory of 1680 3500 8f41c5ec731573cefbd685b32c7715cf9872aff51d1e2d454c838956bf5aff50.tmp 87 PID 1672 wrote to memory of 1488 1672 net.exe 88 PID 1672 wrote to memory of 1488 1672 net.exe 88 PID 1672 wrote to memory of 1488 1672 net.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\8f41c5ec731573cefbd685b32c7715cf9872aff51d1e2d454c838956bf5aff50.exe"C:\Users\Admin\AppData\Local\Temp\8f41c5ec731573cefbd685b32c7715cf9872aff51d1e2d454c838956bf5aff50.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Users\Admin\AppData\Local\Temp\is-DRK3F.tmp\8f41c5ec731573cefbd685b32c7715cf9872aff51d1e2d454c838956bf5aff50.tmp"C:\Users\Admin\AppData\Local\Temp\is-DRK3F.tmp\8f41c5ec731573cefbd685b32c7715cf9872aff51d1e2d454c838956bf5aff50.tmp" /SL5="$80050,3476222,54272,C:\Users\Admin\AppData\Local\Temp\8f41c5ec731573cefbd685b32c7715cf9872aff51d1e2d454c838956bf5aff50.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3500 -
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" pause alter_game_111963⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 pause alter_game_111964⤵
- System Location Discovery: System Language Discovery
PID:1488
-
-
-
C:\Users\Admin\AppData\Local\AlterGame 1.12\altergame32.exe"C:\Users\Admin\AppData\Local\AlterGame 1.12\altergame32.exe" -i3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1680
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.0MB
MD5696a30b5346dc1bd63ad63fc4c609ede
SHA115768f7632793dcba0f7ca2f160dc154b55a1ba1
SHA25624cd5097991f28d8f3ec267650a5f052345d2621f5ba4394c881b8a6a264c59b
SHA5123e4181adc4ce0813829f3d4c78b8a2393332c8ab9300c3f5e57454b31170e892e1a2eaa4caea384a3058c34ab27edbddc937946005b9b807b0226c27d74716ca
-
Filesize
630KB
MD5e477a96c8f2b18d6b5c27bde49c990bf
SHA1e980c9bf41330d1e5bd04556db4646a0210f7409
SHA25616574f51785b0e2fc29c2c61477eb47bb39f714829999511dc8952b43ab17660
SHA512335a86268e7c0e568b1c30981ec644e6cd332e66f96d2551b58a82515316693c1859d87b4f4b7310cf1ac386cee671580fdd999c3bcb23acf2c2282c01c8798c
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
C:\Users\Admin\AppData\Local\Temp\is-DRK3F.tmp\8f41c5ec731573cefbd685b32c7715cf9872aff51d1e2d454c838956bf5aff50.tmp
Filesize687KB
MD5a370643b8ab4f8d43d04ec21d5c5279b
SHA1a6826280e5f049fb53d616b901500a44ac8d3fe3
SHA2562d214663ebd4ce3be4759317a0e387782bdd2237baa2a689cf0c615c26a57218
SHA51233720c687759c209e88200d300bbfc34f35cbb6a48ac80a57daa068f8f626b733ac3686ef07a4c7f14dd8e40f07779e8fe75acdf80e80a1b35ada9f7fc20d4b4