Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows11-21h2_x64 -
resource
win11-20250410-en -
resource tags
arch:x64arch:x86image:win11-20250410-enlocale:en-usos:windows11-21h2-x64system -
submitted
16/04/2025, 15:28
Static task
static1
Behavioral task
behavioral1
Sample
76435e8885559a7c3ef955de05646970.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral2
Sample
76435e8885559a7c3ef955de05646970.exe
Resource
win11-20250410-en
General
-
Target
76435e8885559a7c3ef955de05646970.exe
-
Size
3.5MB
-
MD5
76435e8885559a7c3ef955de05646970
-
SHA1
9a897889383e55a66c215bbc2b341996a46081b0
-
SHA256
635fac03fcdd04822beb4740cdd544d887cd3039b67009cc90bdacc6c4bcdacb
-
SHA512
713b27c8c593e9f3a02e9b7e183ae0dd6e8b0e44a23b7214e86f2dc91eae60c8c9134e544f076ca12c1fe33ca6057bccd97d019ae840e070839711117a18cc72
-
SSDEEP
49152:1vzosUaPvpjU0FGpOWYALJs7RjYt/brea7XNB3oYxU3uhdSc1ME9XoMYvmVlWRh:NzVP20wpOWS7cbreyLh6KD1MCXdY+jWf
Malware Config
Signatures
-
Detect Socks5Systemz Payload 1 IoCs
resource yara_rule behavioral2/memory/5620-76-0x00000000023B0000-0x0000000002450000-memory.dmp family_socks5systemz -
Socks5Systemz
Socks5Systemz is a botnet written in C++.
-
Socks5systemz family
-
Executes dropped EXE 2 IoCs
pid Process 2788 76435e8885559a7c3ef955de05646970.tmp 5620 ntfs2fat32converter102.exe -
Loads dropped DLL 2 IoCs
pid Process 2788 76435e8885559a7c3ef955de05646970.tmp 5620 ntfs2fat32converter102.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 76435e8885559a7c3ef955de05646970.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 76435e8885559a7c3ef955de05646970.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ntfs2fat32converter102.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2788 76435e8885559a7c3ef955de05646970.tmp 2788 76435e8885559a7c3ef955de05646970.tmp -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2788 76435e8885559a7c3ef955de05646970.tmp -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 5580 wrote to memory of 2788 5580 76435e8885559a7c3ef955de05646970.exe 79 PID 5580 wrote to memory of 2788 5580 76435e8885559a7c3ef955de05646970.exe 79 PID 5580 wrote to memory of 2788 5580 76435e8885559a7c3ef955de05646970.exe 79 PID 2788 wrote to memory of 5620 2788 76435e8885559a7c3ef955de05646970.tmp 80 PID 2788 wrote to memory of 5620 2788 76435e8885559a7c3ef955de05646970.tmp 80 PID 2788 wrote to memory of 5620 2788 76435e8885559a7c3ef955de05646970.tmp 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\76435e8885559a7c3ef955de05646970.exe"C:\Users\Admin\AppData\Local\Temp\76435e8885559a7c3ef955de05646970.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5580 -
C:\Users\Admin\AppData\Local\Temp\is-V81B1.tmp\76435e8885559a7c3ef955de05646970.tmp"C:\Users\Admin\AppData\Local\Temp\is-V81B1.tmp\76435e8885559a7c3ef955de05646970.tmp" /SL5="$70218,3470653,54272,C:\Users\Admin\AppData\Local\Temp\76435e8885559a7c3ef955de05646970.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Users\Admin\AppData\Local\NTFS to FAT32 Converter 1.0.2\ntfs2fat32converter102.exe"C:\Users\Admin\AppData\Local\NTFS to FAT32 Converter 1.0.2\ntfs2fat32converter102.exe" -i3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:5620
-
-
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD56ac5078fc3c5177d6e45251a0e889475
SHA198c4ccf0649dfe9f728baefab8a30db04eeed923
SHA256a582b80bf55b1444f5bf62c25922670f9c4b19b8d6544e804effbda5faf17757
SHA512a7dbf5436b3a48c2f0e7569a7dbd82af7b3ed2786ad5ff79c270eb186ffb7328d3c235d6182cddff6b4de98b8c63c5f3fe3c77c1145571a1b072682e179302ea
-
Filesize
630KB
MD5e477a96c8f2b18d6b5c27bde49c990bf
SHA1e980c9bf41330d1e5bd04556db4646a0210f7409
SHA25616574f51785b0e2fc29c2c61477eb47bb39f714829999511dc8952b43ab17660
SHA512335a86268e7c0e568b1c30981ec644e6cd332e66f96d2551b58a82515316693c1859d87b4f4b7310cf1ac386cee671580fdd999c3bcb23acf2c2282c01c8798c
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
692KB
MD54979d6d3415ef991208e0e4b04c0474d
SHA1e09f89c0f12445498d9be797e1739efab179bef4
SHA2562ee54bea24e54db46dc1f439dc7afb9bd4aa4b9209ed8ad679d1d73c9408f597
SHA51281d7478b362b3e57625cb96e10cf50598694ba77f923f4aa4d324c4c5dd4593a75b14bbfafda152451c7de90890d4d69651ccc835528037375b22b6857345939