Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-12-2024 03:48
Behavioral task
behavioral1
Sample
7d4ea4e69143df3f0f8fb9e4dee13c5251c4b1810d6b3a8626195906f00c0a49.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7d4ea4e69143df3f0f8fb9e4dee13c5251c4b1810d6b3a8626195906f00c0a49.dll
Resource
win10v2004-20241007-en
General
-
Target
7d4ea4e69143df3f0f8fb9e4dee13c5251c4b1810d6b3a8626195906f00c0a49.dll
-
Size
660KB
-
MD5
76436512e3e3a9dca38f5eaf312fe323
-
SHA1
503af6ad7617f847abbe509a907944f0e9213505
-
SHA256
7d4ea4e69143df3f0f8fb9e4dee13c5251c4b1810d6b3a8626195906f00c0a49
-
SHA512
aab595de7a3af9a3e7c480f953b392f42965348ffcda6a410eb990ae2c11c5a87f975b2ad2c34a147767b14325c60117af64f2bcea2813a7fbcee94ddfc951d9
-
SSDEEP
12288:oIsMQVdsxSoqFsUzAbRb7aZJhztomX9mFu4Ou1GN3/k3jQlVUihjxWBZlUAxwqwX:nDQVdsxSoqFsGA6rX9mFujeMwQljhjxb
Malware Config
Extracted
socks5systemz
-
rc4_key
i4hiea56#7b&dfw3
Signatures
-
Detect Socks5Systemz Payload 3 IoCs
resource yara_rule behavioral1/memory/2760-3-0x0000000074C10000-0x0000000074CBD000-memory.dmp family_socks5systemz behavioral1/memory/2760-1-0x0000000074C10000-0x0000000074CBD000-memory.dmp family_socks5systemz behavioral1/memory/2760-6-0x0000000074C10000-0x0000000074CBD000-memory.dmp family_socks5systemz -
Socks5Systemz
Socks5Systemz is a botnet written in C++.
-
Socks5systemz family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2748 wrote to memory of 2760 2748 rundll32.exe 30 PID 2748 wrote to memory of 2760 2748 rundll32.exe 30 PID 2748 wrote to memory of 2760 2748 rundll32.exe 30 PID 2748 wrote to memory of 2760 2748 rundll32.exe 30 PID 2748 wrote to memory of 2760 2748 rundll32.exe 30 PID 2748 wrote to memory of 2760 2748 rundll32.exe 30 PID 2748 wrote to memory of 2760 2748 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7d4ea4e69143df3f0f8fb9e4dee13c5251c4b1810d6b3a8626195906f00c0a49.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7d4ea4e69143df3f0f8fb9e4dee13c5251c4b1810d6b3a8626195906f00c0a49.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2760
-