Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-11-2024 13:33
Static task
static1
Behavioral task
behavioral1
Sample
552ba3c58745e2081f0c1ba4e1d2e4cb9307b32e2597af12a00ed2564770d0a2.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
552ba3c58745e2081f0c1ba4e1d2e4cb9307b32e2597af12a00ed2564770d0a2.exe
Resource
win10v2004-20241007-en
General
-
Target
552ba3c58745e2081f0c1ba4e1d2e4cb9307b32e2597af12a00ed2564770d0a2.exe
-
Size
3.6MB
-
MD5
2f11b4e0bb032bc6c5d5ef54ae17217b
-
SHA1
182b1e9513092d3bb84674c70a6c2672a591274b
-
SHA256
552ba3c58745e2081f0c1ba4e1d2e4cb9307b32e2597af12a00ed2564770d0a2
-
SHA512
83999d1bd49825e7baabdde3d1db47b115c7787d95805384aa0e84fbdfb3c80e2e8a93fe6b8680e9cdde675bcc864dd97ec8d95ab0922c78e4e661f470191b02
-
SSDEEP
98304:N4cortCC2zgXq3xX2BuTrMgLupxHpaJbjFCwtToEpI7xZVXRq6P1ge1dhQy:+hCQq3xIyReJaJbjFCwtZ679XnPug3Qy
Malware Config
Signatures
-
Detect Socks5Systemz Payload 3 IoCs
resource yara_rule behavioral2/memory/3544-73-0x0000000000A70000-0x0000000000B12000-memory.dmp family_socks5systemz behavioral2/memory/3544-104-0x0000000000A70000-0x0000000000B12000-memory.dmp family_socks5systemz behavioral2/memory/3544-105-0x0000000000A70000-0x0000000000B12000-memory.dmp family_socks5systemz -
Socks5Systemz
Socks5Systemz is a botnet written in C++.
-
Socks5systemz family
-
Executes dropped EXE 2 IoCs
pid Process 3144 552ba3c58745e2081f0c1ba4e1d2e4cb9307b32e2597af12a00ed2564770d0a2.tmp 3544 berryplayer3.exe -
Loads dropped DLL 2 IoCs
pid Process 3144 552ba3c58745e2081f0c1ba4e1d2e4cb9307b32e2597af12a00ed2564770d0a2.tmp 3544 berryplayer3.exe -
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 141.98.234.31 -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 552ba3c58745e2081f0c1ba4e1d2e4cb9307b32e2597af12a00ed2564770d0a2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 552ba3c58745e2081f0c1ba4e1d2e4cb9307b32e2597af12a00ed2564770d0a2.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language berryplayer3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3144 552ba3c58745e2081f0c1ba4e1d2e4cb9307b32e2597af12a00ed2564770d0a2.tmp 3144 552ba3c58745e2081f0c1ba4e1d2e4cb9307b32e2597af12a00ed2564770d0a2.tmp -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3144 552ba3c58745e2081f0c1ba4e1d2e4cb9307b32e2597af12a00ed2564770d0a2.tmp -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 384 wrote to memory of 3144 384 552ba3c58745e2081f0c1ba4e1d2e4cb9307b32e2597af12a00ed2564770d0a2.exe 83 PID 384 wrote to memory of 3144 384 552ba3c58745e2081f0c1ba4e1d2e4cb9307b32e2597af12a00ed2564770d0a2.exe 83 PID 384 wrote to memory of 3144 384 552ba3c58745e2081f0c1ba4e1d2e4cb9307b32e2597af12a00ed2564770d0a2.exe 83 PID 3144 wrote to memory of 3644 3144 552ba3c58745e2081f0c1ba4e1d2e4cb9307b32e2597af12a00ed2564770d0a2.tmp 84 PID 3144 wrote to memory of 3644 3144 552ba3c58745e2081f0c1ba4e1d2e4cb9307b32e2597af12a00ed2564770d0a2.tmp 84 PID 3144 wrote to memory of 3644 3144 552ba3c58745e2081f0c1ba4e1d2e4cb9307b32e2597af12a00ed2564770d0a2.tmp 84 PID 3144 wrote to memory of 3544 3144 552ba3c58745e2081f0c1ba4e1d2e4cb9307b32e2597af12a00ed2564770d0a2.tmp 86 PID 3144 wrote to memory of 3544 3144 552ba3c58745e2081f0c1ba4e1d2e4cb9307b32e2597af12a00ed2564770d0a2.tmp 86 PID 3144 wrote to memory of 3544 3144 552ba3c58745e2081f0c1ba4e1d2e4cb9307b32e2597af12a00ed2564770d0a2.tmp 86 PID 3644 wrote to memory of 4412 3644 net.exe 87 PID 3644 wrote to memory of 4412 3644 net.exe 87 PID 3644 wrote to memory of 4412 3644 net.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\552ba3c58745e2081f0c1ba4e1d2e4cb9307b32e2597af12a00ed2564770d0a2.exe"C:\Users\Admin\AppData\Local\Temp\552ba3c58745e2081f0c1ba4e1d2e4cb9307b32e2597af12a00ed2564770d0a2.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:384 -
C:\Users\Admin\AppData\Local\Temp\is-54UQA.tmp\552ba3c58745e2081f0c1ba4e1d2e4cb9307b32e2597af12a00ed2564770d0a2.tmp"C:\Users\Admin\AppData\Local\Temp\is-54UQA.tmp\552ba3c58745e2081f0c1ba4e1d2e4cb9307b32e2597af12a00ed2564770d0a2.tmp" /SL5="$70064,3546542,54272,C:\Users\Admin\AppData\Local\Temp\552ba3c58745e2081f0c1ba4e1d2e4cb9307b32e2597af12a00ed2564770d0a2.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3144 -
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" pause berry_player_112743⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3644 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 pause berry_player_112744⤵
- System Location Discovery: System Language Discovery
PID:4412
-
-
-
C:\Users\Admin\AppData\Local\Berry Player 3.3.8\berryplayer3.exe"C:\Users\Admin\AppData\Local\Berry Player 3.3.8\berryplayer3.exe" -i3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3544
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD5240f99540dffc638d21a8ac10ec8741a
SHA1d965ac36a5c97471ff6727143119a140926da41c
SHA256f9c4de004ed3e9cf9613c20e6eadbba8eab0b27b3d297004ef01bc31d3fbb7ab
SHA51259eecbe8ca58a64bc07c39428511f8da4df4ec64d060b50bb9318f887ee81a1606b51b4ef6709f456d98790ef889bb61375acc74ccc3e62e86a152bb923a5434
-
Filesize
630KB
MD5e477a96c8f2b18d6b5c27bde49c990bf
SHA1e980c9bf41330d1e5bd04556db4646a0210f7409
SHA25616574f51785b0e2fc29c2c61477eb47bb39f714829999511dc8952b43ab17660
SHA512335a86268e7c0e568b1c30981ec644e6cd332e66f96d2551b58a82515316693c1859d87b4f4b7310cf1ac386cee671580fdd999c3bcb23acf2c2282c01c8798c
-
C:\Users\Admin\AppData\Local\Temp\is-54UQA.tmp\552ba3c58745e2081f0c1ba4e1d2e4cb9307b32e2597af12a00ed2564770d0a2.tmp
Filesize687KB
MD5aefd6dc44fcb302b92d8dbcf68338392
SHA19546607cfafe24c573d2e4cf46072bc4e85bf43d
SHA2568c25e88f4a9834901aa780f632b1d29c4e6e27942d02eb26d431ae10d02f58eb
SHA512dd6333514694722b4676658290689e18e00fc6efc83fdc705c23b483385eb23a7937083e0ee64b297c091520d0dd3d7b724e94c2a08cd8611d220715dffc712d
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63