Analysis
-
max time kernel
150s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
17/04/2024, 06:34
Static task
static1
Behavioral task
behavioral1
Sample
fc11d70259730c33bc40397241af7509e6a784ed5cc144428626300310ca87b0.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fc11d70259730c33bc40397241af7509e6a784ed5cc144428626300310ca87b0.exe
Resource
win10v2004-20240412-en
General
-
Target
fc11d70259730c33bc40397241af7509e6a784ed5cc144428626300310ca87b0.exe
-
Size
3.1MB
-
MD5
4b0fd7f1f83364b5982979d896097f42
-
SHA1
8cc746c1d1685897375b4045e95707dfa0d4117d
-
SHA256
fc11d70259730c33bc40397241af7509e6a784ed5cc144428626300310ca87b0
-
SHA512
d6c0354a28134668e1b29ebf133831711bc1ff67fb01571b3083189f46bfcfa62061870dfbeb93deaf363d4eca0d7fa34c9f813427241f0aca8ed91585503665
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LB3B/bSqz8b6LNXJqI:sxX7QnxrloE5dpUpUbVz8eLFc
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecxopti.exe fc11d70259730c33bc40397241af7509e6a784ed5cc144428626300310ca87b0.exe -
Executes dropped EXE 2 IoCs
pid Process 4912 ecxopti.exe 3624 aoptisys.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\FilesUE\\aoptisys.exe" fc11d70259730c33bc40397241af7509e6a784ed5cc144428626300310ca87b0.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\Galax4E\\dobxec.exe" fc11d70259730c33bc40397241af7509e6a784ed5cc144428626300310ca87b0.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4004 fc11d70259730c33bc40397241af7509e6a784ed5cc144428626300310ca87b0.exe 4004 fc11d70259730c33bc40397241af7509e6a784ed5cc144428626300310ca87b0.exe 4004 fc11d70259730c33bc40397241af7509e6a784ed5cc144428626300310ca87b0.exe 4004 fc11d70259730c33bc40397241af7509e6a784ed5cc144428626300310ca87b0.exe 4912 ecxopti.exe 4912 ecxopti.exe 3624 aoptisys.exe 3624 aoptisys.exe 4912 ecxopti.exe 4912 ecxopti.exe 3624 aoptisys.exe 3624 aoptisys.exe 4912 ecxopti.exe 4912 ecxopti.exe 3624 aoptisys.exe 3624 aoptisys.exe 4912 ecxopti.exe 4912 ecxopti.exe 3624 aoptisys.exe 3624 aoptisys.exe 4912 ecxopti.exe 4912 ecxopti.exe 3624 aoptisys.exe 3624 aoptisys.exe 4912 ecxopti.exe 4912 ecxopti.exe 3624 aoptisys.exe 3624 aoptisys.exe 4912 ecxopti.exe 4912 ecxopti.exe 3624 aoptisys.exe 3624 aoptisys.exe 4912 ecxopti.exe 4912 ecxopti.exe 3624 aoptisys.exe 3624 aoptisys.exe 4912 ecxopti.exe 4912 ecxopti.exe 3624 aoptisys.exe 3624 aoptisys.exe 4912 ecxopti.exe 4912 ecxopti.exe 3624 aoptisys.exe 3624 aoptisys.exe 4912 ecxopti.exe 4912 ecxopti.exe 3624 aoptisys.exe 3624 aoptisys.exe 4912 ecxopti.exe 4912 ecxopti.exe 3624 aoptisys.exe 3624 aoptisys.exe 4912 ecxopti.exe 4912 ecxopti.exe 3624 aoptisys.exe 3624 aoptisys.exe 4912 ecxopti.exe 4912 ecxopti.exe 3624 aoptisys.exe 3624 aoptisys.exe 4912 ecxopti.exe 4912 ecxopti.exe 3624 aoptisys.exe 3624 aoptisys.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4004 wrote to memory of 4912 4004 fc11d70259730c33bc40397241af7509e6a784ed5cc144428626300310ca87b0.exe 94 PID 4004 wrote to memory of 4912 4004 fc11d70259730c33bc40397241af7509e6a784ed5cc144428626300310ca87b0.exe 94 PID 4004 wrote to memory of 4912 4004 fc11d70259730c33bc40397241af7509e6a784ed5cc144428626300310ca87b0.exe 94 PID 4004 wrote to memory of 3624 4004 fc11d70259730c33bc40397241af7509e6a784ed5cc144428626300310ca87b0.exe 96 PID 4004 wrote to memory of 3624 4004 fc11d70259730c33bc40397241af7509e6a784ed5cc144428626300310ca87b0.exe 96 PID 4004 wrote to memory of 3624 4004 fc11d70259730c33bc40397241af7509e6a784ed5cc144428626300310ca87b0.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\fc11d70259730c33bc40397241af7509e6a784ed5cc144428626300310ca87b0.exe"C:\Users\Admin\AppData\Local\Temp\fc11d70259730c33bc40397241af7509e6a784ed5cc144428626300310ca87b0.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4004 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecxopti.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecxopti.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4912
-
-
C:\FilesUE\aoptisys.exeC:\FilesUE\aoptisys.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3624
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD5dee0a31a26b288737278ccbb47135d69
SHA10844853c2920568c6aa8f3c5e7e5964bf770c150
SHA2560901ca12fd256223b0ef9a3e085e69ceede7e0953a6e8a617614cb988045a915
SHA5128c17a521a8e5307816c726d6b29c2760c09112cf0ea3a134080ad31eb75d1b5e0f7b7f09d890211ca7700946e1039336fc3c99da96eb2f003b1f546ee6a07623
-
Filesize
3.1MB
MD5a8e2d43b2ce26edd20fd3000f27ae7cb
SHA171ef98e7d9d6ab91f49bef9c521fe43658d1568c
SHA25678b13b73cf09e48d5d09899b7783d442f975138089d0e0d2750917928a0af7e0
SHA5129aca6709a9c2b11aba239c16ed158a21e37f3b0bba40da374c89f4482f5f7f5e652357fc135fa559229783c2f657cf7ce8e470f0b72d30c886929b075ea4fefc
-
Filesize
3.1MB
MD5a64135406b9e02474f96970e384e6e2b
SHA1a2ee47dd12061459e403ed6976d7bcb0ac367ec7
SHA25673e1e1b2e8b636a95b1b4fbb02ec3ed674c3110b74d777e87d54cdc10bd27084
SHA5129696f97e969f0c91cc1f4d19d136dee6a871d8521333db78303ea09e89d7375b7c71cfa74114a5a70a95d805a33d7668bbb1b5daaa13e437e98a9184098861ff
-
Filesize
201B
MD5ea58d40845b8e797fb3cbefc4eafbe8a
SHA1a9132e3bc8ea26a19ef423d572440544b47cc593
SHA256268d39212b3b88739db76d2b3d1f92f2b6b92dd92dc7fb6f61f083ab0c81bcb9
SHA5125854d37755e05d76c49faab07c05274589eb8df14dae92aba5c956b1d335d5a201323b0684c3a5a8b654c76200b6865f16cb90eb18969fad1b0e24e587dd2c57
-
Filesize
169B
MD55dfe1a4abc94c3ca155a2cb8a5d4b58b
SHA154adf2acea83fc203ef98cb7df35aa8ee87e83db
SHA2564b8535a48876697c0eafc23ac6c3d04f4888e7dea462cfb4d44dc5eac4a62dca
SHA5123ed3b303fd7644d8f511922b132d29d2e02ecb159ed0eca7ecbe7c2530c965882681ca448e316bae63261972046ec8840d34f347cbcec49da1f85cf4ba1d48bf
-
Filesize
3.1MB
MD52ceb84aacf6600612270c2b0aed3c8d3
SHA1a566af19d60f56d48c259ad92cbd22d588b0bb6e
SHA25682229dd71dbd1384249963a01cbdce9a09074c3b01bbda6eef17e4b006a9f6d8
SHA5120d78d859e8dde37e4267c0305fc2fc6daf4215063f21c48d71d7b5eacb79ee70b105296f73911d9ec3b18c9be5958d6d6df4bf58d992e098f691f7ad8fae67db