Analysis

  • max time kernel
    149s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    08/07/2024, 21:18

General

  • Target

    378127f5c347ce87c82e26403f7322d223f0a1d760367f55914dc241397097a5.exe

  • Size

    4.1MB

  • MD5

    8a9141d99ba70b99f25e700ef8050c3b

  • SHA1

    d7cb89540e488c97903babaa7f48dae5380dbb81

  • SHA256

    378127f5c347ce87c82e26403f7322d223f0a1d760367f55914dc241397097a5

  • SHA512

    a3ad059774b029aa75e6b4d0902154e45b860915889d9822160a177e7598c92df9d7f4d2b07107649866c3169fb912d45002076a29e7f1fff4be722720ee99a8

  • SSDEEP

    98304:+R0pI/IQlUoMPdmpSpL4ADtnkgvNWlw6aTfN41v:+R0pIAQhMPdm05n9klRKN41v

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\378127f5c347ce87c82e26403f7322d223f0a1d760367f55914dc241397097a5.exe
    "C:\Users\Admin\AppData\Local\Temp\378127f5c347ce87c82e26403f7322d223f0a1d760367f55914dc241397097a5.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1704
    • C:\SysDrvYN\xoptisys.exe
      C:\SysDrvYN\xoptisys.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:1620

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\253086396416_6.1_Admin.ini

          Filesize

          202B

          MD5

          e397cab9e3dbb03d74aa7c32b2b47ab0

          SHA1

          fef7146dcd4cac0b0cca348238e9de2b18303e96

          SHA256

          5c4b3aee87be5843c42c7c401423e68be2bfff03c3d4e9ff1f352815c9134070

          SHA512

          bd25a5e5e1541b1f9df156af60e753445de990284c98200a7ecd6b67c5ea7aa33b5206607fc998f4e2f4fec05fab07685124f70bf12411c030c1eb7435d1e5b9

        • C:\Vid3D\bodxec.exe

          Filesize

          4.1MB

          MD5

          3d34768cbd9119dafeb4f58bb5a71f3a

          SHA1

          450bdef694e92770a97849c8bbdbe9ad1ea3b77b

          SHA256

          0b2d6c1a007ed4ba1cfe9aacc73863ecc736c11bfd34777fcc68f501c190f9c6

          SHA512

          b591c6147affb89252efba9405940b90d147eb4e2a731d88b594319cce111eb3d83d38d472b6e7327a7f880567492524c0d235a46156233d35e993d55996eb1c

        • \SysDrvYN\xoptisys.exe

          Filesize

          4.1MB

          MD5

          e7e1650468d4d96955d1c45713a1b0ed

          SHA1

          ea85a53071bddbea6e992faf86e6e7eb501dc9a3

          SHA256

          44f7f0fc63da6f0ba63e35ff54fdbb64af828c809598958bb533b67dd79d0c67

          SHA512

          4810dd7da89e42e7dd63ed3040b058658c1f053a3091067db37cf51d25fa540867729e80d24f19c7ef5741bfc42ee6c26d7cb1384b72985d6b55c9e8f384b4dc