Analysis
-
max time kernel
95s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14-12-2024 23:41
Behavioral task
behavioral1
Sample
76436512E3E3A9DCA38F5EAF312FE323.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
76436512E3E3A9DCA38F5EAF312FE323.dll
Resource
win10v2004-20241007-en
General
-
Target
76436512E3E3A9DCA38F5EAF312FE323.dll
-
Size
660KB
-
MD5
76436512e3e3a9dca38f5eaf312fe323
-
SHA1
503af6ad7617f847abbe509a907944f0e9213505
-
SHA256
7d4ea4e69143df3f0f8fb9e4dee13c5251c4b1810d6b3a8626195906f00c0a49
-
SHA512
aab595de7a3af9a3e7c480f953b392f42965348ffcda6a410eb990ae2c11c5a87f975b2ad2c34a147767b14325c60117af64f2bcea2813a7fbcee94ddfc951d9
-
SSDEEP
12288:oIsMQVdsxSoqFsUzAbRb7aZJhztomX9mFu4Ou1GN3/k3jQlVUihjxWBZlUAxwqwX:nDQVdsxSoqFsGA6rX9mFujeMwQljhjxb
Malware Config
Extracted
socks5systemz
-
rc4_key
i4hiea56#7b&dfw3
Signatures
-
Detect Socks5Systemz Payload 2 IoCs
resource yara_rule behavioral2/memory/4432-0-0x00000000749F0000-0x0000000074A9D000-memory.dmp family_socks5systemz behavioral2/memory/4432-3-0x00000000749F0000-0x0000000074A9D000-memory.dmp family_socks5systemz -
Socks5Systemz
Socks5Systemz is a botnet written in C++.
-
Socks5systemz family
-
Program crash 1 IoCs
pid pid_target Process procid_target 4992 4432 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 412 wrote to memory of 4432 412 rundll32.exe 83 PID 412 wrote to memory of 4432 412 rundll32.exe 83 PID 412 wrote to memory of 4432 412 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\76436512E3E3A9DCA38F5EAF312FE323.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:412 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\76436512E3E3A9DCA38F5EAF312FE323.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4432 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4432 -s 8923⤵
- Program crash
PID:4992
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4432 -ip 44321⤵PID:2756