Analysis
-
max time kernel
149s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
02/05/2024, 03:21
Static task
static1
Behavioral task
behavioral1
Sample
c4c9d72ab3d449194f95ae658cadfeb7c9910ef83c51fb6f2da28f551f49c65a.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
c4c9d72ab3d449194f95ae658cadfeb7c9910ef83c51fb6f2da28f551f49c65a.exe
Resource
win10v2004-20240419-en
General
-
Target
c4c9d72ab3d449194f95ae658cadfeb7c9910ef83c51fb6f2da28f551f49c65a.exe
-
Size
2.7MB
-
MD5
5159bdf8ccd13037964397a7131eeb1d
-
SHA1
1106e872428ce3fd3a0fc6998daaedb3d6e23971
-
SHA256
c4c9d72ab3d449194f95ae658cadfeb7c9910ef83c51fb6f2da28f551f49c65a
-
SHA512
a6fc43e0faf5e4df022f1bee6d75d8236ea19d872be7ccf29f23438a76c89f34461f8e166b0a2269b5d41b0f6570ea03105628563644a36ccebbb709c7625ba6
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBS9w4Sx:+R0pI/IQlUoMPdmpSpM4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 5100 aoptiloc.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\Intelproc4O\\aoptiloc.exe" c4c9d72ab3d449194f95ae658cadfeb7c9910ef83c51fb6f2da28f551f49c65a.exe Set value (str) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\VidQF\\bodasys.exe" c4c9d72ab3d449194f95ae658cadfeb7c9910ef83c51fb6f2da28f551f49c65a.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 768 c4c9d72ab3d449194f95ae658cadfeb7c9910ef83c51fb6f2da28f551f49c65a.exe 768 c4c9d72ab3d449194f95ae658cadfeb7c9910ef83c51fb6f2da28f551f49c65a.exe 768 c4c9d72ab3d449194f95ae658cadfeb7c9910ef83c51fb6f2da28f551f49c65a.exe 768 c4c9d72ab3d449194f95ae658cadfeb7c9910ef83c51fb6f2da28f551f49c65a.exe 5100 aoptiloc.exe 5100 aoptiloc.exe 768 c4c9d72ab3d449194f95ae658cadfeb7c9910ef83c51fb6f2da28f551f49c65a.exe 768 c4c9d72ab3d449194f95ae658cadfeb7c9910ef83c51fb6f2da28f551f49c65a.exe 5100 aoptiloc.exe 5100 aoptiloc.exe 768 c4c9d72ab3d449194f95ae658cadfeb7c9910ef83c51fb6f2da28f551f49c65a.exe 768 c4c9d72ab3d449194f95ae658cadfeb7c9910ef83c51fb6f2da28f551f49c65a.exe 5100 aoptiloc.exe 5100 aoptiloc.exe 768 c4c9d72ab3d449194f95ae658cadfeb7c9910ef83c51fb6f2da28f551f49c65a.exe 768 c4c9d72ab3d449194f95ae658cadfeb7c9910ef83c51fb6f2da28f551f49c65a.exe 5100 aoptiloc.exe 5100 aoptiloc.exe 768 c4c9d72ab3d449194f95ae658cadfeb7c9910ef83c51fb6f2da28f551f49c65a.exe 768 c4c9d72ab3d449194f95ae658cadfeb7c9910ef83c51fb6f2da28f551f49c65a.exe 5100 aoptiloc.exe 5100 aoptiloc.exe 768 c4c9d72ab3d449194f95ae658cadfeb7c9910ef83c51fb6f2da28f551f49c65a.exe 768 c4c9d72ab3d449194f95ae658cadfeb7c9910ef83c51fb6f2da28f551f49c65a.exe 5100 aoptiloc.exe 5100 aoptiloc.exe 768 c4c9d72ab3d449194f95ae658cadfeb7c9910ef83c51fb6f2da28f551f49c65a.exe 768 c4c9d72ab3d449194f95ae658cadfeb7c9910ef83c51fb6f2da28f551f49c65a.exe 5100 aoptiloc.exe 5100 aoptiloc.exe 768 c4c9d72ab3d449194f95ae658cadfeb7c9910ef83c51fb6f2da28f551f49c65a.exe 768 c4c9d72ab3d449194f95ae658cadfeb7c9910ef83c51fb6f2da28f551f49c65a.exe 5100 aoptiloc.exe 5100 aoptiloc.exe 768 c4c9d72ab3d449194f95ae658cadfeb7c9910ef83c51fb6f2da28f551f49c65a.exe 768 c4c9d72ab3d449194f95ae658cadfeb7c9910ef83c51fb6f2da28f551f49c65a.exe 5100 aoptiloc.exe 5100 aoptiloc.exe 768 c4c9d72ab3d449194f95ae658cadfeb7c9910ef83c51fb6f2da28f551f49c65a.exe 768 c4c9d72ab3d449194f95ae658cadfeb7c9910ef83c51fb6f2da28f551f49c65a.exe 5100 aoptiloc.exe 5100 aoptiloc.exe 768 c4c9d72ab3d449194f95ae658cadfeb7c9910ef83c51fb6f2da28f551f49c65a.exe 768 c4c9d72ab3d449194f95ae658cadfeb7c9910ef83c51fb6f2da28f551f49c65a.exe 5100 aoptiloc.exe 5100 aoptiloc.exe 768 c4c9d72ab3d449194f95ae658cadfeb7c9910ef83c51fb6f2da28f551f49c65a.exe 768 c4c9d72ab3d449194f95ae658cadfeb7c9910ef83c51fb6f2da28f551f49c65a.exe 5100 aoptiloc.exe 5100 aoptiloc.exe 768 c4c9d72ab3d449194f95ae658cadfeb7c9910ef83c51fb6f2da28f551f49c65a.exe 768 c4c9d72ab3d449194f95ae658cadfeb7c9910ef83c51fb6f2da28f551f49c65a.exe 5100 aoptiloc.exe 5100 aoptiloc.exe 768 c4c9d72ab3d449194f95ae658cadfeb7c9910ef83c51fb6f2da28f551f49c65a.exe 768 c4c9d72ab3d449194f95ae658cadfeb7c9910ef83c51fb6f2da28f551f49c65a.exe 5100 aoptiloc.exe 5100 aoptiloc.exe 768 c4c9d72ab3d449194f95ae658cadfeb7c9910ef83c51fb6f2da28f551f49c65a.exe 768 c4c9d72ab3d449194f95ae658cadfeb7c9910ef83c51fb6f2da28f551f49c65a.exe 5100 aoptiloc.exe 5100 aoptiloc.exe 768 c4c9d72ab3d449194f95ae658cadfeb7c9910ef83c51fb6f2da28f551f49c65a.exe 768 c4c9d72ab3d449194f95ae658cadfeb7c9910ef83c51fb6f2da28f551f49c65a.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 768 wrote to memory of 5100 768 c4c9d72ab3d449194f95ae658cadfeb7c9910ef83c51fb6f2da28f551f49c65a.exe 93 PID 768 wrote to memory of 5100 768 c4c9d72ab3d449194f95ae658cadfeb7c9910ef83c51fb6f2da28f551f49c65a.exe 93 PID 768 wrote to memory of 5100 768 c4c9d72ab3d449194f95ae658cadfeb7c9910ef83c51fb6f2da28f551f49c65a.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\c4c9d72ab3d449194f95ae658cadfeb7c9910ef83c51fb6f2da28f551f49c65a.exe"C:\Users\Admin\AppData\Local\Temp\c4c9d72ab3d449194f95ae658cadfeb7c9910ef83c51fb6f2da28f551f49c65a.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Intelproc4O\aoptiloc.exeC:\Intelproc4O\aoptiloc.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:5100
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD5fc3ca7a49e853c95e31447c1f90cb9af
SHA16573821615c28758ded88c749c2125f5fc024c05
SHA256361c57ac2f569e2ad9181de64d27c0adb45d5d607cfac4332c8df539ddcdce6f
SHA5122d8e57469fceb844a368df476790657aa45f275d0327b4123e8cd55a56a337d3ad82f430d41ab1d3b5dcd7a19d04918b90accc62de2c099c34e8995532c138cf
-
Filesize
205B
MD5473eae303efede9495ba329f450f9d6a
SHA13f3870b31d1c46e9f487614a5b777b306c6979e6
SHA256b50bc2e77a78a9079a4470f973961f48e1aa3e3b98eaeabe48fa87731cadd4f6
SHA51247a7b6771809491051b0afd8d8d1f509e354b51b03bc5dd677444c80bdabba1ca3b6d129b00821ba25f9c817b94c872af947afda0e9c0e104dfdebbd71bb1b12
-
Filesize
93KB
MD5e4f4079f6e68b8e7472dcb811d870b59
SHA11876edef1fe5b77e492efd084ebef284cf4e02f6
SHA25635ae9b4b4c5e6fcf12e2b050bbad48d212048c79647a7d1a1dd76775b5e010ae
SHA5123c0017a74188a95ee68509b96a1f19bbb19f8b7edf63b0d199b3c476e89367f6e6655fc6d3c37f7fddfe1f1a7852e55d7b995371b3aab0ec57d27f456dc52f52
-
Filesize
2.7MB
MD5bbb5842d357fb0466c3819049fe3a3cc
SHA11024a05dd4d011dba8863ed2c934a3fc4dca7353
SHA2562a67338eed487106162c082c1529c4328d2aa4189ca1a5b0670359c3d5640b0c
SHA512a72e4ff4bb514e90480da2a6548ebb73150bc94ad946c4f66314720763d2a0d1e26421c5c8c31c79d06d797562deb82132c009a2dfa8a6ffb26a74bc167fa953