Analysis
-
max time kernel
141s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-11-2024 16:17
Static task
static1
Behavioral task
behavioral1
Sample
1d6297e72e48f115dd6a639b2311f688cc931982cfa569d2e05c301c4188c63b.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1d6297e72e48f115dd6a639b2311f688cc931982cfa569d2e05c301c4188c63b.exe
Resource
win10v2004-20241007-en
General
-
Target
1d6297e72e48f115dd6a639b2311f688cc931982cfa569d2e05c301c4188c63b.exe
-
Size
3.4MB
-
MD5
3be5f85f734034f7434b81d0ffa30642
-
SHA1
dd5e6fcf19f1b857ce759f244b63779d01d0be01
-
SHA256
1d6297e72e48f115dd6a639b2311f688cc931982cfa569d2e05c301c4188c63b
-
SHA512
7b5967f8c066033734e35a48a08d09315e12b91de68237816ee8342281401da4bcfeb9dd8f73fbb8acbf074a89a91beb99c0b09964e84099d107e9d41cf96d61
-
SSDEEP
98304:NQd+2EUCV8h7uA6ywMQXP09P2uL955W7tML1hc:OMjUCK6ywMQ/0dNLZc
Malware Config
Signatures
-
Detect Socks5Systemz Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/956-73-0x0000000000AA0000-0x0000000000B42000-memory.dmp family_socks5systemz behavioral2/memory/956-103-0x0000000000AA0000-0x0000000000B42000-memory.dmp family_socks5systemz behavioral2/memory/956-104-0x0000000000AA0000-0x0000000000B42000-memory.dmp family_socks5systemz -
Socks5Systemz
Socks5Systemz is a botnet written in C++.
-
Socks5systemz family
-
Executes dropped EXE 2 IoCs
Processes:
1d6297e72e48f115dd6a639b2311f688cc931982cfa569d2e05c301c4188c63b.tmpberryplayer3.exepid Process 3232 1d6297e72e48f115dd6a639b2311f688cc931982cfa569d2e05c301c4188c63b.tmp 956 berryplayer3.exe -
Loads dropped DLL 2 IoCs
Processes:
1d6297e72e48f115dd6a639b2311f688cc931982cfa569d2e05c301c4188c63b.tmpberryplayer3.exepid Process 3232 1d6297e72e48f115dd6a639b2311f688cc931982cfa569d2e05c301c4188c63b.tmp 956 berryplayer3.exe -
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
Processes:
description ioc Destination IP 152.89.198.214 -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
berryplayer3.exenet.exenet1.exe1d6297e72e48f115dd6a639b2311f688cc931982cfa569d2e05c301c4188c63b.exe1d6297e72e48f115dd6a639b2311f688cc931982cfa569d2e05c301c4188c63b.tmpdescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language berryplayer3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1d6297e72e48f115dd6a639b2311f688cc931982cfa569d2e05c301c4188c63b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1d6297e72e48f115dd6a639b2311f688cc931982cfa569d2e05c301c4188c63b.tmp -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
1d6297e72e48f115dd6a639b2311f688cc931982cfa569d2e05c301c4188c63b.tmppid Process 3232 1d6297e72e48f115dd6a639b2311f688cc931982cfa569d2e05c301c4188c63b.tmp 3232 1d6297e72e48f115dd6a639b2311f688cc931982cfa569d2e05c301c4188c63b.tmp -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
1d6297e72e48f115dd6a639b2311f688cc931982cfa569d2e05c301c4188c63b.tmppid Process 3232 1d6297e72e48f115dd6a639b2311f688cc931982cfa569d2e05c301c4188c63b.tmp -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
1d6297e72e48f115dd6a639b2311f688cc931982cfa569d2e05c301c4188c63b.exe1d6297e72e48f115dd6a639b2311f688cc931982cfa569d2e05c301c4188c63b.tmpnet.exedescription pid Process procid_target PID 1240 wrote to memory of 3232 1240 1d6297e72e48f115dd6a639b2311f688cc931982cfa569d2e05c301c4188c63b.exe 82 PID 1240 wrote to memory of 3232 1240 1d6297e72e48f115dd6a639b2311f688cc931982cfa569d2e05c301c4188c63b.exe 82 PID 1240 wrote to memory of 3232 1240 1d6297e72e48f115dd6a639b2311f688cc931982cfa569d2e05c301c4188c63b.exe 82 PID 3232 wrote to memory of 2248 3232 1d6297e72e48f115dd6a639b2311f688cc931982cfa569d2e05c301c4188c63b.tmp 83 PID 3232 wrote to memory of 2248 3232 1d6297e72e48f115dd6a639b2311f688cc931982cfa569d2e05c301c4188c63b.tmp 83 PID 3232 wrote to memory of 2248 3232 1d6297e72e48f115dd6a639b2311f688cc931982cfa569d2e05c301c4188c63b.tmp 83 PID 3232 wrote to memory of 956 3232 1d6297e72e48f115dd6a639b2311f688cc931982cfa569d2e05c301c4188c63b.tmp 85 PID 3232 wrote to memory of 956 3232 1d6297e72e48f115dd6a639b2311f688cc931982cfa569d2e05c301c4188c63b.tmp 85 PID 3232 wrote to memory of 956 3232 1d6297e72e48f115dd6a639b2311f688cc931982cfa569d2e05c301c4188c63b.tmp 85 PID 2248 wrote to memory of 4848 2248 net.exe 86 PID 2248 wrote to memory of 4848 2248 net.exe 86 PID 2248 wrote to memory of 4848 2248 net.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\1d6297e72e48f115dd6a639b2311f688cc931982cfa569d2e05c301c4188c63b.exe"C:\Users\Admin\AppData\Local\Temp\1d6297e72e48f115dd6a639b2311f688cc931982cfa569d2e05c301c4188c63b.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Users\Admin\AppData\Local\Temp\is-TBFB7.tmp\1d6297e72e48f115dd6a639b2311f688cc931982cfa569d2e05c301c4188c63b.tmp"C:\Users\Admin\AppData\Local\Temp\is-TBFB7.tmp\1d6297e72e48f115dd6a639b2311f688cc931982cfa569d2e05c301c4188c63b.tmp" /SL5="$502C6,3353882,54272,C:\Users\Admin\AppData\Local\Temp\1d6297e72e48f115dd6a639b2311f688cc931982cfa569d2e05c301c4188c63b.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3232 -
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" pause berry_player_112743⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 pause berry_player_112744⤵
- System Location Discovery: System Language Discovery
PID:4848
-
-
-
C:\Users\Admin\AppData\Local\Berry Player 3.3.8\berryplayer3.exe"C:\Users\Admin\AppData\Local\Berry Player 3.3.8\berryplayer3.exe" -i3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:956
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD5e874874d2e080d632b75e3f2ccedcaf9
SHA1fa126eb9ba82135b31592f65cbd7e579d45e7301
SHA256ded59e16595635d08a7f7cb5dcc05683cb5adac4871f70fd6fe4a87f417ed7ee
SHA512a85cfd9db35ab5474ed33f03805feaf3e14c81414a977525e2c6eaa28fcbf48bce5594ecc38d46b904a5e7ca26c40134e4cfcd796ec5487a0ccc046d7db327e6
-
Filesize
630KB
MD5e477a96c8f2b18d6b5c27bde49c990bf
SHA1e980c9bf41330d1e5bd04556db4646a0210f7409
SHA25616574f51785b0e2fc29c2c61477eb47bb39f714829999511dc8952b43ab17660
SHA512335a86268e7c0e568b1c30981ec644e6cd332e66f96d2551b58a82515316693c1859d87b4f4b7310cf1ac386cee671580fdd999c3bcb23acf2c2282c01c8798c
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
C:\Users\Admin\AppData\Local\Temp\is-TBFB7.tmp\1d6297e72e48f115dd6a639b2311f688cc931982cfa569d2e05c301c4188c63b.tmp
Filesize687KB
MD529c9287b148cf645d20c59abfe564143
SHA1f24c87d9ba5c8d8c28d2d5be9e6e8bd48b7901da
SHA256c15b52dc2fae5d1906c13ad63b1810ac0701516a4db91f39b7cf4e20a7d7a3ba
SHA512d88055e757f8eea5e542a8e4176c384eab8bfcb05da2239d69b7061119bcc8a1d882ef5ccc27f68039d21fb884d8b45c62be03ca0afddd8c551ae2f4624ca1e1