General
-
Target
https://cloudsaze.com/file/fd592a
-
Sample
250408-p9gwqsvjt9
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cloudsaze.com/file/fd592a
Resource
win11-20250313-uk
Malware Config
Targets
-
-
Target
https://cloudsaze.com/file/fd592a
-
Detect Socks5Systemz Payload
-
Socks5systemz family
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Indirect Command Execution
Adversaries may abuse utilities that allow for command execution to bypass security restrictions that limit the use of command-line interpreters.
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v16
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Indirect Command Execution
1Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1