Analysis
-
max time kernel
291s -
max time network
269s -
platform
windows10-2004_x64 -
resource
win10v2004-20250313-en -
resource tags
arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system -
submitted
18/03/2025, 22:33
Static task
static1
Behavioral task
behavioral1
Sample
420937a5f19ae02fc11ba9407ba4560e2298131fafbc3d19e5267e9a67630365.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
420937a5f19ae02fc11ba9407ba4560e2298131fafbc3d19e5267e9a67630365.exe
Resource
win10v2004-20250313-en
General
-
Target
420937a5f19ae02fc11ba9407ba4560e2298131fafbc3d19e5267e9a67630365.exe
-
Size
5.2MB
-
MD5
253e324d58c3a337d3e4eb594debc611
-
SHA1
462c847edc0d7b2f9a2a4bb352e31c09c6658521
-
SHA256
420937a5f19ae02fc11ba9407ba4560e2298131fafbc3d19e5267e9a67630365
-
SHA512
152fa74ce37f89aa2710aaf45a19cfc330336ca0c6c5a5bc27a27719a5291099817995cdd044c620b724e430ede031fdc1c1bfa31a803f672cb92e8234b717d4
-
SSDEEP
98304:+P6cR94aMSjhhZ2GVx+DUU4sSWUz5b3rHhmGfSkXHo8OKGUGBAUCWXadwU9XZUfL:+j6ahtJVwUMUdfHht9OKGjt0wUdm1X9
Malware Config
Extracted
socks5systemz
butlwul.com
http://butlwul.com/search/?q=67e28dd83a09f729130ead4a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978a271ea771795af8e05c645db22f31dfe339426fa11af66c152adb719a9577e55b8603e983a608afd12c3e897933a
Signatures
-
Detect Socks5Systemz Payload 1 IoCs
resource yara_rule behavioral2/memory/4432-96-0x0000000000950000-0x00000000009F2000-memory.dmp family_socks5systemz -
Socks5Systemz
Socks5Systemz is a botnet written in C++.
-
Socks5systemz family
-
Executes dropped EXE 3 IoCs
pid Process 5216 420937a5f19ae02fc11ba9407ba4560e2298131fafbc3d19e5267e9a67630365.tmp 5308 tunejenimmusicconverter.exe 4432 tunejenimmusicconverter.exe -
Loads dropped DLL 3 IoCs
pid Process 5216 420937a5f19ae02fc11ba9407ba4560e2298131fafbc3d19e5267e9a67630365.tmp 5216 420937a5f19ae02fc11ba9407ba4560e2298131fafbc3d19e5267e9a67630365.tmp 5216 420937a5f19ae02fc11ba9407ba4560e2298131fafbc3d19e5267e9a67630365.tmp -
Unexpected DNS network traffic destination 3 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description flow ioc pid Process Destination IP 43 152.89.198.214 4432 tunejenimmusicconverter.exe Destination IP 45 91.211.247.248 4432 tunejenimmusicconverter.exe Destination IP 41 141.98.234.31 4432 tunejenimmusicconverter.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 420937a5f19ae02fc11ba9407ba4560e2298131fafbc3d19e5267e9a67630365.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 420937a5f19ae02fc11ba9407ba4560e2298131fafbc3d19e5267e9a67630365.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tunejenimmusicconverter.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tunejenimmusicconverter.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1036 wrote to memory of 5216 1036 420937a5f19ae02fc11ba9407ba4560e2298131fafbc3d19e5267e9a67630365.exe 88 PID 1036 wrote to memory of 5216 1036 420937a5f19ae02fc11ba9407ba4560e2298131fafbc3d19e5267e9a67630365.exe 88 PID 1036 wrote to memory of 5216 1036 420937a5f19ae02fc11ba9407ba4560e2298131fafbc3d19e5267e9a67630365.exe 88 PID 5216 wrote to memory of 5308 5216 420937a5f19ae02fc11ba9407ba4560e2298131fafbc3d19e5267e9a67630365.tmp 90 PID 5216 wrote to memory of 5308 5216 420937a5f19ae02fc11ba9407ba4560e2298131fafbc3d19e5267e9a67630365.tmp 90 PID 5216 wrote to memory of 5308 5216 420937a5f19ae02fc11ba9407ba4560e2298131fafbc3d19e5267e9a67630365.tmp 90 PID 5216 wrote to memory of 4432 5216 420937a5f19ae02fc11ba9407ba4560e2298131fafbc3d19e5267e9a67630365.tmp 91 PID 5216 wrote to memory of 4432 5216 420937a5f19ae02fc11ba9407ba4560e2298131fafbc3d19e5267e9a67630365.tmp 91 PID 5216 wrote to memory of 4432 5216 420937a5f19ae02fc11ba9407ba4560e2298131fafbc3d19e5267e9a67630365.tmp 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\420937a5f19ae02fc11ba9407ba4560e2298131fafbc3d19e5267e9a67630365.exe"C:\Users\Admin\AppData\Local\Temp\420937a5f19ae02fc11ba9407ba4560e2298131fafbc3d19e5267e9a67630365.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Users\Admin\AppData\Local\Temp\is-2DGMF.tmp\420937a5f19ae02fc11ba9407ba4560e2298131fafbc3d19e5267e9a67630365.tmp"C:\Users\Admin\AppData\Local\Temp\is-2DGMF.tmp\420937a5f19ae02fc11ba9407ba4560e2298131fafbc3d19e5267e9a67630365.tmp" /SL5="$50182,5237355,54272,C:\Users\Admin\AppData\Local\Temp\420937a5f19ae02fc11ba9407ba4560e2298131fafbc3d19e5267e9a67630365.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5216 -
C:\Users\Admin\AppData\Local\Tune Jenim Music Converter\tunejenimmusicconverter.exe"C:\Users\Admin\AppData\Local\Tune Jenim Music Converter\tunejenimmusicconverter.exe" -i3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5308
-
-
C:\Users\Admin\AppData\Local\Tune Jenim Music Converter\tunejenimmusicconverter.exe"C:\Users\Admin\AppData\Local\Tune Jenim Music Converter\tunejenimmusicconverter.exe" -s3⤵
- Executes dropped EXE
- Unexpected DNS network traffic destination
- System Location Discovery: System Language Discovery
PID:4432
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\is-2DGMF.tmp\420937a5f19ae02fc11ba9407ba4560e2298131fafbc3d19e5267e9a67630365.tmp
Filesize695KB
MD5192d1bbcb8a9057a375c9dead4ea259e
SHA124b743484e1c8d6d88c4b5a9ab01e6e722d4344d
SHA256e39119fddd878b2c0652bc52a65ce8cfc21bde1fe7b4556948a5030446a3c86a
SHA512926daf8b618a2374e527735c67e0e233486bba236de5ac2d231b3427b841a97600b1b846df2c1749c988814a1e045099dbe26a1937a9d2291c9d5ef8746b0d44
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
32KB
MD5b6f11a0ab7715f570f45900a1fe84732
SHA177b1201e535445af5ea94c1b03c0a1c34d67a77b
SHA256e47dd306a9854599f02bc1b07ca6dfbd5220f8a1352faa9616d1a327de0bbf67
SHA51278a757e67d21eb7cc95954df15e3eeff56113d6b40fb73f0c5f53304265cc52c79125d6f1b3655b64f9a411711b5b70f746080d708d7c222f4e65bad64b1b771
-
Filesize
2.3MB
MD55afad5dd0bae7f01c2be79f9f168c9e8
SHA1553fe32e9cc002b3357c11de74478b85b04657bc
SHA2564c5c6debe9453f0343f163aa72b7049f3167bc08d3b2d549fcabc4ee6bfbafcd
SHA5123f78196965db2fa5f6a13fecd9d93abbbaafaa52a6b43e8bd957d3b1e52bc3930db2d72e79cd34315f56b9758ed37a5d6b122533351d90296abfe8ca7f62fb3f
-
Filesize
2.7MB
MD5b09197c9294a53e5d6fcb4eab3a8e5d6
SHA1b55819aeaed90230b8de465ea3f8a30c23cb8079
SHA25608bc72989be9f1b6167d7990f049d687086822d78f57483301d553f812b9f946
SHA51219a7209cc05de7840416f41d018bdba3e64a347fc860c6fed063120a52685df52e122a1a173e25441cae719576b1b2781313175dcf8bafab8255abe957240fec