Analysis
-
max time kernel
141s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2024 01:03
Static task
static1
Behavioral task
behavioral1
Sample
079db6e08e1b4dc90b17bb25ed3d71b15c4cfc2c1e482237a8710ae011b16231.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
079db6e08e1b4dc90b17bb25ed3d71b15c4cfc2c1e482237a8710ae011b16231.exe
Resource
win10v2004-20241007-en
General
-
Target
079db6e08e1b4dc90b17bb25ed3d71b15c4cfc2c1e482237a8710ae011b16231.exe
-
Size
3.8MB
-
MD5
0279b7ad297ac56109237dce5f180c05
-
SHA1
e5f3d0b6b14f8c6e81fdd651ae5ab36c5af12df7
-
SHA256
079db6e08e1b4dc90b17bb25ed3d71b15c4cfc2c1e482237a8710ae011b16231
-
SHA512
b0d0cba1e340b43dc245acd31d4e9282a528db6843c418a7430956cc04fb2a3b27ae960762ae1f34f2da3e8f8e87c105d4368f9343823ddffd53ae3039879938
-
SSDEEP
98304:NGS3IR02udFS/Yyj9Sb0ss8EbvJ7wXDOEkBBidXOpkvV:wTRHufUj9x8IvBwXDOEUgdAkvV
Malware Config
Signatures
-
Detect Socks5Systemz Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/956-73-0x0000000000B10000-0x0000000000BB2000-memory.dmp family_socks5systemz behavioral2/memory/956-105-0x0000000000B10000-0x0000000000BB2000-memory.dmp family_socks5systemz behavioral2/memory/956-104-0x0000000000B10000-0x0000000000BB2000-memory.dmp family_socks5systemz -
Socks5Systemz
Socks5Systemz is a botnet written in C++.
-
Socks5systemz family
-
Executes dropped EXE 2 IoCs
Processes:
079db6e08e1b4dc90b17bb25ed3d71b15c4cfc2c1e482237a8710ae011b16231.tmpcapturn32_64.exepid Process 2004 079db6e08e1b4dc90b17bb25ed3d71b15c4cfc2c1e482237a8710ae011b16231.tmp 956 capturn32_64.exe -
Loads dropped DLL 2 IoCs
Processes:
079db6e08e1b4dc90b17bb25ed3d71b15c4cfc2c1e482237a8710ae011b16231.tmpcapturn32_64.exepid Process 2004 079db6e08e1b4dc90b17bb25ed3d71b15c4cfc2c1e482237a8710ae011b16231.tmp 956 capturn32_64.exe -
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
Processes:
description ioc Destination IP 141.98.234.31 -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
capturn32_64.exe079db6e08e1b4dc90b17bb25ed3d71b15c4cfc2c1e482237a8710ae011b16231.exe079db6e08e1b4dc90b17bb25ed3d71b15c4cfc2c1e482237a8710ae011b16231.tmpnet.exenet1.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language capturn32_64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 079db6e08e1b4dc90b17bb25ed3d71b15c4cfc2c1e482237a8710ae011b16231.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 079db6e08e1b4dc90b17bb25ed3d71b15c4cfc2c1e482237a8710ae011b16231.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
079db6e08e1b4dc90b17bb25ed3d71b15c4cfc2c1e482237a8710ae011b16231.tmppid Process 2004 079db6e08e1b4dc90b17bb25ed3d71b15c4cfc2c1e482237a8710ae011b16231.tmp 2004 079db6e08e1b4dc90b17bb25ed3d71b15c4cfc2c1e482237a8710ae011b16231.tmp -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
079db6e08e1b4dc90b17bb25ed3d71b15c4cfc2c1e482237a8710ae011b16231.tmppid Process 2004 079db6e08e1b4dc90b17bb25ed3d71b15c4cfc2c1e482237a8710ae011b16231.tmp -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
079db6e08e1b4dc90b17bb25ed3d71b15c4cfc2c1e482237a8710ae011b16231.exe079db6e08e1b4dc90b17bb25ed3d71b15c4cfc2c1e482237a8710ae011b16231.tmpnet.exedescription pid Process procid_target PID 3508 wrote to memory of 2004 3508 079db6e08e1b4dc90b17bb25ed3d71b15c4cfc2c1e482237a8710ae011b16231.exe 82 PID 3508 wrote to memory of 2004 3508 079db6e08e1b4dc90b17bb25ed3d71b15c4cfc2c1e482237a8710ae011b16231.exe 82 PID 3508 wrote to memory of 2004 3508 079db6e08e1b4dc90b17bb25ed3d71b15c4cfc2c1e482237a8710ae011b16231.exe 82 PID 2004 wrote to memory of 4568 2004 079db6e08e1b4dc90b17bb25ed3d71b15c4cfc2c1e482237a8710ae011b16231.tmp 83 PID 2004 wrote to memory of 4568 2004 079db6e08e1b4dc90b17bb25ed3d71b15c4cfc2c1e482237a8710ae011b16231.tmp 83 PID 2004 wrote to memory of 4568 2004 079db6e08e1b4dc90b17bb25ed3d71b15c4cfc2c1e482237a8710ae011b16231.tmp 83 PID 2004 wrote to memory of 956 2004 079db6e08e1b4dc90b17bb25ed3d71b15c4cfc2c1e482237a8710ae011b16231.tmp 85 PID 2004 wrote to memory of 956 2004 079db6e08e1b4dc90b17bb25ed3d71b15c4cfc2c1e482237a8710ae011b16231.tmp 85 PID 2004 wrote to memory of 956 2004 079db6e08e1b4dc90b17bb25ed3d71b15c4cfc2c1e482237a8710ae011b16231.tmp 85 PID 4568 wrote to memory of 3316 4568 net.exe 86 PID 4568 wrote to memory of 3316 4568 net.exe 86 PID 4568 wrote to memory of 3316 4568 net.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\079db6e08e1b4dc90b17bb25ed3d71b15c4cfc2c1e482237a8710ae011b16231.exe"C:\Users\Admin\AppData\Local\Temp\079db6e08e1b4dc90b17bb25ed3d71b15c4cfc2c1e482237a8710ae011b16231.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3508 -
C:\Users\Admin\AppData\Local\Temp\is-C0SDE.tmp\079db6e08e1b4dc90b17bb25ed3d71b15c4cfc2c1e482237a8710ae011b16231.tmp"C:\Users\Admin\AppData\Local\Temp\is-C0SDE.tmp\079db6e08e1b4dc90b17bb25ed3d71b15c4cfc2c1e482237a8710ae011b16231.tmp" /SL5="$50238,3750879,54272,C:\Users\Admin\AppData\Local\Temp\079db6e08e1b4dc90b17bb25ed3d71b15c4cfc2c1e482237a8710ae011b16231.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" pause capturn_112433⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4568 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 pause capturn_112434⤵
- System Location Discovery: System Language Discovery
PID:3316
-
-
-
C:\Users\Admin\AppData\Local\Capturn 2.3.7\capturn32_64.exe"C:\Users\Admin\AppData\Local\Capturn 2.3.7\capturn32_64.exe" -i3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:956
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.4MB
MD57186566bd5e3669be880908c88cac8a9
SHA1f0d799ce58893cc660bfa78872603caaad09283d
SHA25654a08ea73c85106ff3ccfeefee5934f9954f17f90f227a6fa673a3153f783a6b
SHA51221b229afdda74880daf924b0440efa22770e8679a74208db779827b7eeeadd77cefeef882b661fea4f7f3d6de0d7b71425c03801e4e23acb3f84ff16773bb6c0
-
Filesize
630KB
MD5e477a96c8f2b18d6b5c27bde49c990bf
SHA1e980c9bf41330d1e5bd04556db4646a0210f7409
SHA25616574f51785b0e2fc29c2c61477eb47bb39f714829999511dc8952b43ab17660
SHA512335a86268e7c0e568b1c30981ec644e6cd332e66f96d2551b58a82515316693c1859d87b4f4b7310cf1ac386cee671580fdd999c3bcb23acf2c2282c01c8798c
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
C:\Users\Admin\AppData\Local\Temp\is-C0SDE.tmp\079db6e08e1b4dc90b17bb25ed3d71b15c4cfc2c1e482237a8710ae011b16231.tmp
Filesize687KB
MD5632e69db901b5b463f56f3a095a233ed
SHA1a272bf59a84d9e7e72df20314e2fb30a614bea45
SHA25623e67ea287e9eb6708aa981fd214bebebf8a9b1dc5daf8ed5046538114a5c5ed
SHA512d4fca2a254b443aba276374a99486fbd22bc98d65f0022921efa8b5f4b91d17aeda7927f5cc3ef85467b473b0afb0748d0d3781463e0f0f63d43b3645540af51