Overview
overview
10Static
static
100c5b00311b...5e.exe
windows10-2004-x64
71618780b85...13.vbs
windows7-x64
81618780b85...13.vbs
windows10-2004-x64
831d2bac123...c0.exe
windows7-x64
1031d2bac123...c0.exe
windows10-2004-x64
103e0a6e80d4...1c.xls
windows7-x64
33e0a6e80d4...1c.xls
windows10-2004-x64
15489a717a2...f8.exe
windows7-x64
105489a717a2...f8.exe
windows10-2004-x64
1063f2e49bd1...c6.msi
windows7-x64
1063f2e49bd1...c6.msi
windows10-2004-x64
10719d53c106...d2.exe
windows7-x64
10719d53c106...d2.exe
windows10-2004-x64
108411add8ba...e8.dll
windows7-x64
18411add8ba...e8.dll
windows10-2004-x64
188b0765750...b0.exe
windows7-x64
1088b0765750...b0.exe
windows10-2004-x64
109cb1756afd...71.exe
windows7-x64
39cb1756afd...71.exe
windows10-2004-x64
3REP_894198...17.doc
windows7-x64
10REP_894198...17.doc
windows10-2004-x64
10d472c89510...54.xls
windows7-x64
3d472c89510...54.xls
windows10-2004-x64
1dcc72f90c1...21.exe
windows7-x64
10dcc72f90c1...21.exe
windows10-2004-x64
3file.exe
windows7-x64
10file.exe
windows10-2004-x64
10Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02-12-2024 16:25
Behavioral task
behavioral1
Sample
0c5b00311b9e7f3e749e8f2c2bb639ee32f2de89bedf1c572391dedcdd10765e.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
1618780b8570f9b44fdd73513c6aa8069eb8a9151a22d83b178c5be6eb125013.vbs
Resource
win7-20240903-en
Behavioral task
behavioral3
Sample
1618780b8570f9b44fdd73513c6aa8069eb8a9151a22d83b178c5be6eb125013.vbs
Resource
win10v2004-20241007-en
Behavioral task
behavioral4
Sample
31d2bac123d451caed79ced03b80592dacc3499f6c91a9e32630d3590d52a6c0.exe
Resource
win7-20240903-en
Behavioral task
behavioral5
Sample
31d2bac123d451caed79ced03b80592dacc3499f6c91a9e32630d3590d52a6c0.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral6
Sample
3e0a6e80d4427d22bc807628032ba1e1fbf9b733a8b5db26f5c2cc2bae55bb1c.xls
Resource
win7-20240903-en
Behavioral task
behavioral7
Sample
3e0a6e80d4427d22bc807628032ba1e1fbf9b733a8b5db26f5c2cc2bae55bb1c.xls
Resource
win10v2004-20241007-en
Behavioral task
behavioral8
Sample
5489a717a23f4b7e2f250429554bd8a3d744970e1bfabe2162c9eb2fa8c04df8.exe
Resource
win7-20240708-en
Behavioral task
behavioral9
Sample
5489a717a23f4b7e2f250429554bd8a3d744970e1bfabe2162c9eb2fa8c04df8.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral10
Sample
63f2e49bd14880bed0033cbf0878ee50f18555432d3ad1439b304e6a2dc00fc6.msi
Resource
win7-20240903-en
Behavioral task
behavioral11
Sample
63f2e49bd14880bed0033cbf0878ee50f18555432d3ad1439b304e6a2dc00fc6.msi
Resource
win10v2004-20241007-en
Behavioral task
behavioral12
Sample
719d53c1064f54fd79ea4a7844f079d2.exe
Resource
win7-20240903-en
Behavioral task
behavioral13
Sample
719d53c1064f54fd79ea4a7844f079d2.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral14
Sample
8411add8ba814509886e7ce5baee8e338f5955037623c768747cbc1b7ecc1de8.dll
Resource
win7-20240903-en
Behavioral task
behavioral15
Sample
8411add8ba814509886e7ce5baee8e338f5955037623c768747cbc1b7ecc1de8.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral16
Sample
88b07657500a548ed8476fa415896d2179c307d4751917ca892119c3fff120b0.exe
Resource
win7-20241010-en
Behavioral task
behavioral17
Sample
88b07657500a548ed8476fa415896d2179c307d4751917ca892119c3fff120b0.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral18
Sample
9cb1756afd35b77acc762f550857e271.exe
Resource
win7-20241023-en
Behavioral task
behavioral19
Sample
9cb1756afd35b77acc762f550857e271.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral20
Sample
REP_89419812646634117.doc
Resource
win7-20241010-en
Behavioral task
behavioral21
Sample
REP_89419812646634117.doc
Resource
win10v2004-20241007-en
Behavioral task
behavioral22
Sample
d472c895106cfebcb6eea8701416aed96b9770c256432ee7ee7a9b8a60a6d254.xls
Resource
win7-20240729-en
Behavioral task
behavioral23
Sample
d472c895106cfebcb6eea8701416aed96b9770c256432ee7ee7a9b8a60a6d254.xls
Resource
win10v2004-20241007-en
Behavioral task
behavioral24
Sample
dcc72f90c1d3aac382ba8965c68109986771562f49d4112c5be1a0e9b645f621.exe
Resource
win7-20240903-en
Behavioral task
behavioral25
Sample
dcc72f90c1d3aac382ba8965c68109986771562f49d4112c5be1a0e9b645f621.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral26
Sample
file.exe
Resource
win7-20240903-en
General
-
Target
31d2bac123d451caed79ced03b80592dacc3499f6c91a9e32630d3590d52a6c0.exe
-
Size
7.9MB
-
MD5
0396163369529cd5b010e3c35a2066c5
-
SHA1
c3f58efd6dc957d0baf6eb71e0f6539e5eb3d596
-
SHA256
31d2bac123d451caed79ced03b80592dacc3499f6c91a9e32630d3590d52a6c0
-
SHA512
6805f80c0979432ff1e3adfed34fd8a30d8a79b839796dc94329b409892e4a5809df9728158dc782c78417badabbf20a058949814b37fc4f99a53c293d68e968
-
SSDEEP
196608:dhd3YhVbbGfzH8dFXKH3ARHMjDB5braO5F5KMA7z0fCnIRBR:dnYTbuzH8dFaHfjVxronSCIPR
Malware Config
Signatures
-
Detect Socks5Systemz Payload 3 IoCs
Processes:
resource yara_rule behavioral5/memory/1628-194-0x0000000000970000-0x0000000000A12000-memory.dmp family_socks5systemz behavioral5/memory/1628-220-0x0000000000970000-0x0000000000A12000-memory.dmp family_socks5systemz behavioral5/memory/1628-219-0x0000000000970000-0x0000000000A12000-memory.dmp family_socks5systemz -
Socks5Systemz
Socks5Systemz is a botnet written in C++.
-
Socks5systemz family
-
Executes dropped EXE 2 IoCs
Processes:
31d2bac123d451caed79ced03b80592dacc3499f6c91a9e32630d3590d52a6c0.tmpzextervideocodec32_64.exepid Process 3064 31d2bac123d451caed79ced03b80592dacc3499f6c91a9e32630d3590d52a6c0.tmp 1628 zextervideocodec32_64.exe -
Loads dropped DLL 3 IoCs
Processes:
31d2bac123d451caed79ced03b80592dacc3499f6c91a9e32630d3590d52a6c0.tmppid Process 3064 31d2bac123d451caed79ced03b80592dacc3499f6c91a9e32630d3590d52a6c0.tmp 3064 31d2bac123d451caed79ced03b80592dacc3499f6c91a9e32630d3590d52a6c0.tmp 3064 31d2bac123d451caed79ced03b80592dacc3499f6c91a9e32630d3590d52a6c0.tmp -
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
Processes:
description ioc Destination IP 152.89.198.214 -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
31d2bac123d451caed79ced03b80592dacc3499f6c91a9e32630d3590d52a6c0.exe31d2bac123d451caed79ced03b80592dacc3499f6c91a9e32630d3590d52a6c0.tmpzextervideocodec32_64.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 31d2bac123d451caed79ced03b80592dacc3499f6c91a9e32630d3590d52a6c0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 31d2bac123d451caed79ced03b80592dacc3499f6c91a9e32630d3590d52a6c0.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zextervideocodec32_64.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
31d2bac123d451caed79ced03b80592dacc3499f6c91a9e32630d3590d52a6c0.tmppid Process 3064 31d2bac123d451caed79ced03b80592dacc3499f6c91a9e32630d3590d52a6c0.tmp 3064 31d2bac123d451caed79ced03b80592dacc3499f6c91a9e32630d3590d52a6c0.tmp -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
31d2bac123d451caed79ced03b80592dacc3499f6c91a9e32630d3590d52a6c0.tmppid Process 3064 31d2bac123d451caed79ced03b80592dacc3499f6c91a9e32630d3590d52a6c0.tmp -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
31d2bac123d451caed79ced03b80592dacc3499f6c91a9e32630d3590d52a6c0.exe31d2bac123d451caed79ced03b80592dacc3499f6c91a9e32630d3590d52a6c0.tmpdescription pid Process procid_target PID 3348 wrote to memory of 3064 3348 31d2bac123d451caed79ced03b80592dacc3499f6c91a9e32630d3590d52a6c0.exe 81 PID 3348 wrote to memory of 3064 3348 31d2bac123d451caed79ced03b80592dacc3499f6c91a9e32630d3590d52a6c0.exe 81 PID 3348 wrote to memory of 3064 3348 31d2bac123d451caed79ced03b80592dacc3499f6c91a9e32630d3590d52a6c0.exe 81 PID 3064 wrote to memory of 1628 3064 31d2bac123d451caed79ced03b80592dacc3499f6c91a9e32630d3590d52a6c0.tmp 82 PID 3064 wrote to memory of 1628 3064 31d2bac123d451caed79ced03b80592dacc3499f6c91a9e32630d3590d52a6c0.tmp 82 PID 3064 wrote to memory of 1628 3064 31d2bac123d451caed79ced03b80592dacc3499f6c91a9e32630d3590d52a6c0.tmp 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\31d2bac123d451caed79ced03b80592dacc3499f6c91a9e32630d3590d52a6c0.exe"C:\Users\Admin\AppData\Local\Temp\31d2bac123d451caed79ced03b80592dacc3499f6c91a9e32630d3590d52a6c0.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3348 -
C:\Users\Admin\AppData\Local\Temp\is-REC3U.tmp\31d2bac123d451caed79ced03b80592dacc3499f6c91a9e32630d3590d52a6c0.tmp"C:\Users\Admin\AppData\Local\Temp\is-REC3U.tmp\31d2bac123d451caed79ced03b80592dacc3499f6c91a9e32630d3590d52a6c0.tmp" /SL5="$70166,8045603,54272,C:\Users\Admin\AppData\Local\Temp\31d2bac123d451caed79ced03b80592dacc3499f6c91a9e32630d3590d52a6c0.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Users\Admin\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exe"C:\Users\Admin\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exe" -i3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1628
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
13KB
MD5a813d18268affd4763dde940246dc7e5
SHA1c7366e1fd925c17cc6068001bd38eaef5b42852f
SHA256e19781aabe466dd8779cb9c8fa41bbb73375447066bb34e876cf388a6ed63c64
SHA512b310ed4cd2e94381c00a6a370fcb7cc867ebe425d705b69caaaaffdafbab91f72d357966916053e72e68ecf712f2af7585500c58bb53ec3e1d539179fcb45fb4
-
C:\Users\Admin\AppData\Local\Temp\is-REC3U.tmp\31d2bac123d451caed79ced03b80592dacc3499f6c91a9e32630d3590d52a6c0.tmp
Filesize692KB
MD516c9d19ab32c18671706cefee19b6949
SHA1fca23338cb77068e1937df4e59d9c963c5548cf8
SHA256c1769524411682d5a204c8a40f983123c67efeadb721160e42d7bbfe4531eb70
SHA51232b4b0b2fb56a299046ec26fb41569491e8b0cd2f8bec9d57ec0d1ad1a7860eec72044dab2d5044cb452ed46e9f21513eab2171bafa9087af6d2de296455c64b
-
Filesize
2.5MB
MD54ac9b0be70b6e01bfd47ffa47289ded7
SHA1a8e99f68a9dea6f3c0a0767c4341716236d366e9
SHA256a241c183e38754017f08936a0c6e71588eacafc44c656110c071032f5b6fd159
SHA512ba22f267944cb8fcb8729e99e62db7ef27eaf38c2c613cd6c4106250eaabec4546b387f465330410b006535b4dd9226fbda12c22d6ec29795fc296c82e9c52a8