Analysis

  • max time kernel
    144s
  • max time network
    146s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240611-en
  • resource tags

    arch:x64arch:x86image:win11-20240611-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    02-07-2024 05:12

General

  • Target

    30f6999fb82fccc6017db7575b25bbfaa81e0ea6ff37d5ef8fa85d8d037ac207.exe

  • Size

    5.1MB

  • MD5

    0439dff733712dc6266cd0bee492a8da

  • SHA1

    6aef2e9e3770c508a32d6b8ab1fd15aefbab6578

  • SHA256

    30f6999fb82fccc6017db7575b25bbfaa81e0ea6ff37d5ef8fa85d8d037ac207

  • SHA512

    01db6efb4a65133f286c7cddef674260ec3bad8a5b17cc36bac3ef148e6ef46c438158d79098cffc8f9117b7ae00ecf55d1f48ac3fcb5ee5460fc88d63a990f8

  • SSDEEP

    98304:C19lCMBfqel/cZAlhvK1KTSLgzJkSy9U/t5m0nh8f6UQx9I:u9Xgel/mOKQ65zU/t5NI6UQ4

Malware Config

Signatures

  • Detect Socks5Systemz Payload 4 IoCs
  • Socks5Systemz

    Socks5Systemz is a botnet written in C++.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 1 IoCs
  • Unexpected DNS network traffic destination 1 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\30f6999fb82fccc6017db7575b25bbfaa81e0ea6ff37d5ef8fa85d8d037ac207.exe
    "C:\Users\Admin\AppData\Local\Temp\30f6999fb82fccc6017db7575b25bbfaa81e0ea6ff37d5ef8fa85d8d037ac207.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3532
    • C:\Users\Admin\AppData\Local\Temp\is-LANMH.tmp\30f6999fb82fccc6017db7575b25bbfaa81e0ea6ff37d5ef8fa85d8d037ac207.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-LANMH.tmp\30f6999fb82fccc6017db7575b25bbfaa81e0ea6ff37d5ef8fa85d8d037ac207.tmp" /SL5="$40202,5115559,54272,C:\Users\Admin\AppData\Local\Temp\30f6999fb82fccc6017db7575b25bbfaa81e0ea6ff37d5ef8fa85d8d037ac207.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:2736
      • C:\Users\Admin\AppData\Local\UDA DVD Free Ripper\udadvdfreeripper.exe
        "C:\Users\Admin\AppData\Local\UDA DVD Free Ripper\udadvdfreeripper.exe" -i
        3⤵
        • Executes dropped EXE
        PID:1612
      • C:\Users\Admin\AppData\Local\UDA DVD Free Ripper\udadvdfreeripper.exe
        "C:\Users\Admin\AppData\Local\UDA DVD Free Ripper\udadvdfreeripper.exe" -s
        3⤵
        • Executes dropped EXE
        PID:1572

Network

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\is-LANMH.tmp\30f6999fb82fccc6017db7575b25bbfaa81e0ea6ff37d5ef8fa85d8d037ac207.tmp
    Filesize

    680KB

    MD5

    ca8ed135446b70ab219c8d807f6cc434

    SHA1

    4e78609b18f2fe91dea92c1fb8af9b222e69f10e

    SHA256

    fbde576b174cce9d137bb91e765bfcd06bcb45c6b9548d66e8b9c33954c5574b

    SHA512

    39231e4c8cb242d6286e55dee7d72e477725215c62f03b8ad91d15e9c5af7a3044bfe60a79728db3fb8459df99ea29c6d5968a42986f2fac68d19ce40caa010d

  • C:\Users\Admin\AppData\Local\Temp\is-P4LVH.tmp\_isetup\_iscrypt.dll
    Filesize

    2KB

    MD5

    a69559718ab506675e907fe49deb71e9

    SHA1

    bc8f404ffdb1960b50c12ff9413c893b56f2e36f

    SHA256

    2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

    SHA512

    e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

  • C:\Users\Admin\AppData\Local\UDA DVD Free Ripper\udadvdfreeripper.exe
    Filesize

    4.0MB

    MD5

    f4563d7046a7328cb08e2be604c0bf3f

    SHA1

    4e49cd8770b4cd5817859563ebf32319f1f088b3

    SHA256

    78cee657adc3223d9b9aed76040aae66e869a966eb2580557367c55c800e5879

    SHA512

    7592a042340a714a01e86f299c01ed93f213dc589d6cfe3bccd9bb9a147cb3a00666e4b6494e8fb4eeb9cfbac1c86e65e645c79356259ff66407f9b49ef92734

  • memory/1572-96-0x0000000000400000-0x000000000080B000-memory.dmp
    Filesize

    4.0MB

  • memory/1572-99-0x0000000000400000-0x000000000080B000-memory.dmp
    Filesize

    4.0MB

  • memory/1572-117-0x0000000000400000-0x000000000080B000-memory.dmp
    Filesize

    4.0MB

  • memory/1572-114-0x0000000000400000-0x000000000080B000-memory.dmp
    Filesize

    4.0MB

  • memory/1572-112-0x0000000000A20000-0x0000000000AC2000-memory.dmp
    Filesize

    648KB

  • memory/1572-110-0x0000000000A20000-0x0000000000AC2000-memory.dmp
    Filesize

    648KB

  • memory/1572-67-0x0000000000400000-0x000000000080B000-memory.dmp
    Filesize

    4.0MB

  • memory/1572-111-0x0000000000A20000-0x0000000000AC2000-memory.dmp
    Filesize

    648KB

  • memory/1572-108-0x0000000000400000-0x000000000080B000-memory.dmp
    Filesize

    4.0MB

  • memory/1572-105-0x0000000000400000-0x000000000080B000-memory.dmp
    Filesize

    4.0MB

  • memory/1572-70-0x0000000000400000-0x000000000080B000-memory.dmp
    Filesize

    4.0MB

  • memory/1572-73-0x0000000000400000-0x000000000080B000-memory.dmp
    Filesize

    4.0MB

  • memory/1572-76-0x0000000000400000-0x000000000080B000-memory.dmp
    Filesize

    4.0MB

  • memory/1572-79-0x0000000000400000-0x000000000080B000-memory.dmp
    Filesize

    4.0MB

  • memory/1572-82-0x0000000000400000-0x000000000080B000-memory.dmp
    Filesize

    4.0MB

  • memory/1572-85-0x0000000000A20000-0x0000000000AC2000-memory.dmp
    Filesize

    648KB

  • memory/1572-87-0x0000000000400000-0x000000000080B000-memory.dmp
    Filesize

    4.0MB

  • memory/1572-93-0x0000000000400000-0x000000000080B000-memory.dmp
    Filesize

    4.0MB

  • memory/1572-102-0x0000000000400000-0x000000000080B000-memory.dmp
    Filesize

    4.0MB

  • memory/1612-59-0x0000000000400000-0x000000000080B000-memory.dmp
    Filesize

    4.0MB

  • memory/1612-62-0x0000000000400000-0x000000000080B000-memory.dmp
    Filesize

    4.0MB

  • memory/1612-63-0x0000000000400000-0x000000000080B000-memory.dmp
    Filesize

    4.0MB

  • memory/1612-64-0x0000000000400000-0x000000000047F000-memory.dmp
    Filesize

    508KB

  • memory/2736-16-0x0000000000400000-0x00000000004BA000-memory.dmp
    Filesize

    744KB

  • memory/2736-69-0x0000000000400000-0x00000000004BA000-memory.dmp
    Filesize

    744KB

  • memory/3532-0-0x0000000000400000-0x0000000000414000-memory.dmp
    Filesize

    80KB

  • memory/3532-68-0x0000000000400000-0x0000000000414000-memory.dmp
    Filesize

    80KB

  • memory/3532-2-0x0000000000401000-0x000000000040B000-memory.dmp
    Filesize

    40KB