Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
08/07/2024, 21:18
Static task
static1
Behavioral task
behavioral1
Sample
378127f5c347ce87c82e26403f7322d223f0a1d760367f55914dc241397097a5.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
378127f5c347ce87c82e26403f7322d223f0a1d760367f55914dc241397097a5.exe
Resource
win10v2004-20240704-en
General
-
Target
378127f5c347ce87c82e26403f7322d223f0a1d760367f55914dc241397097a5.exe
-
Size
4.1MB
-
MD5
8a9141d99ba70b99f25e700ef8050c3b
-
SHA1
d7cb89540e488c97903babaa7f48dae5380dbb81
-
SHA256
378127f5c347ce87c82e26403f7322d223f0a1d760367f55914dc241397097a5
-
SHA512
a3ad059774b029aa75e6b4d0902154e45b860915889d9822160a177e7598c92df9d7f4d2b07107649866c3169fb912d45002076a29e7f1fff4be722720ee99a8
-
SSDEEP
98304:+R0pI/IQlUoMPdmpSpL4ADtnkgvNWlw6aTfN41v:+R0pIAQhMPdm05n9klRKN41v
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1620 xoptisys.exe -
Loads dropped DLL 1 IoCs
pid Process 1704 378127f5c347ce87c82e26403f7322d223f0a1d760367f55914dc241397097a5.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\SysDrvYN\\xoptisys.exe" 378127f5c347ce87c82e26403f7322d223f0a1d760367f55914dc241397097a5.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\Vid3D\\bodxec.exe" 378127f5c347ce87c82e26403f7322d223f0a1d760367f55914dc241397097a5.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1704 378127f5c347ce87c82e26403f7322d223f0a1d760367f55914dc241397097a5.exe 1704 378127f5c347ce87c82e26403f7322d223f0a1d760367f55914dc241397097a5.exe 1620 xoptisys.exe 1704 378127f5c347ce87c82e26403f7322d223f0a1d760367f55914dc241397097a5.exe 1620 xoptisys.exe 1704 378127f5c347ce87c82e26403f7322d223f0a1d760367f55914dc241397097a5.exe 1620 xoptisys.exe 1704 378127f5c347ce87c82e26403f7322d223f0a1d760367f55914dc241397097a5.exe 1620 xoptisys.exe 1704 378127f5c347ce87c82e26403f7322d223f0a1d760367f55914dc241397097a5.exe 1620 xoptisys.exe 1704 378127f5c347ce87c82e26403f7322d223f0a1d760367f55914dc241397097a5.exe 1620 xoptisys.exe 1704 378127f5c347ce87c82e26403f7322d223f0a1d760367f55914dc241397097a5.exe 1620 xoptisys.exe 1704 378127f5c347ce87c82e26403f7322d223f0a1d760367f55914dc241397097a5.exe 1620 xoptisys.exe 1704 378127f5c347ce87c82e26403f7322d223f0a1d760367f55914dc241397097a5.exe 1620 xoptisys.exe 1704 378127f5c347ce87c82e26403f7322d223f0a1d760367f55914dc241397097a5.exe 1620 xoptisys.exe 1704 378127f5c347ce87c82e26403f7322d223f0a1d760367f55914dc241397097a5.exe 1620 xoptisys.exe 1704 378127f5c347ce87c82e26403f7322d223f0a1d760367f55914dc241397097a5.exe 1620 xoptisys.exe 1704 378127f5c347ce87c82e26403f7322d223f0a1d760367f55914dc241397097a5.exe 1620 xoptisys.exe 1704 378127f5c347ce87c82e26403f7322d223f0a1d760367f55914dc241397097a5.exe 1620 xoptisys.exe 1704 378127f5c347ce87c82e26403f7322d223f0a1d760367f55914dc241397097a5.exe 1620 xoptisys.exe 1704 378127f5c347ce87c82e26403f7322d223f0a1d760367f55914dc241397097a5.exe 1620 xoptisys.exe 1704 378127f5c347ce87c82e26403f7322d223f0a1d760367f55914dc241397097a5.exe 1620 xoptisys.exe 1704 378127f5c347ce87c82e26403f7322d223f0a1d760367f55914dc241397097a5.exe 1620 xoptisys.exe 1704 378127f5c347ce87c82e26403f7322d223f0a1d760367f55914dc241397097a5.exe 1620 xoptisys.exe 1704 378127f5c347ce87c82e26403f7322d223f0a1d760367f55914dc241397097a5.exe 1620 xoptisys.exe 1704 378127f5c347ce87c82e26403f7322d223f0a1d760367f55914dc241397097a5.exe 1620 xoptisys.exe 1704 378127f5c347ce87c82e26403f7322d223f0a1d760367f55914dc241397097a5.exe 1620 xoptisys.exe 1704 378127f5c347ce87c82e26403f7322d223f0a1d760367f55914dc241397097a5.exe 1620 xoptisys.exe 1704 378127f5c347ce87c82e26403f7322d223f0a1d760367f55914dc241397097a5.exe 1620 xoptisys.exe 1704 378127f5c347ce87c82e26403f7322d223f0a1d760367f55914dc241397097a5.exe 1620 xoptisys.exe 1704 378127f5c347ce87c82e26403f7322d223f0a1d760367f55914dc241397097a5.exe 1620 xoptisys.exe 1704 378127f5c347ce87c82e26403f7322d223f0a1d760367f55914dc241397097a5.exe 1620 xoptisys.exe 1704 378127f5c347ce87c82e26403f7322d223f0a1d760367f55914dc241397097a5.exe 1620 xoptisys.exe 1704 378127f5c347ce87c82e26403f7322d223f0a1d760367f55914dc241397097a5.exe 1620 xoptisys.exe 1704 378127f5c347ce87c82e26403f7322d223f0a1d760367f55914dc241397097a5.exe 1620 xoptisys.exe 1704 378127f5c347ce87c82e26403f7322d223f0a1d760367f55914dc241397097a5.exe 1620 xoptisys.exe 1704 378127f5c347ce87c82e26403f7322d223f0a1d760367f55914dc241397097a5.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1704 wrote to memory of 1620 1704 378127f5c347ce87c82e26403f7322d223f0a1d760367f55914dc241397097a5.exe 30 PID 1704 wrote to memory of 1620 1704 378127f5c347ce87c82e26403f7322d223f0a1d760367f55914dc241397097a5.exe 30 PID 1704 wrote to memory of 1620 1704 378127f5c347ce87c82e26403f7322d223f0a1d760367f55914dc241397097a5.exe 30 PID 1704 wrote to memory of 1620 1704 378127f5c347ce87c82e26403f7322d223f0a1d760367f55914dc241397097a5.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\378127f5c347ce87c82e26403f7322d223f0a1d760367f55914dc241397097a5.exe"C:\Users\Admin\AppData\Local\Temp\378127f5c347ce87c82e26403f7322d223f0a1d760367f55914dc241397097a5.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\SysDrvYN\xoptisys.exeC:\SysDrvYN\xoptisys.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1620
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
202B
MD5e397cab9e3dbb03d74aa7c32b2b47ab0
SHA1fef7146dcd4cac0b0cca348238e9de2b18303e96
SHA2565c4b3aee87be5843c42c7c401423e68be2bfff03c3d4e9ff1f352815c9134070
SHA512bd25a5e5e1541b1f9df156af60e753445de990284c98200a7ecd6b67c5ea7aa33b5206607fc998f4e2f4fec05fab07685124f70bf12411c030c1eb7435d1e5b9
-
Filesize
4.1MB
MD53d34768cbd9119dafeb4f58bb5a71f3a
SHA1450bdef694e92770a97849c8bbdbe9ad1ea3b77b
SHA2560b2d6c1a007ed4ba1cfe9aacc73863ecc736c11bfd34777fcc68f501c190f9c6
SHA512b591c6147affb89252efba9405940b90d147eb4e2a731d88b594319cce111eb3d83d38d472b6e7327a7f880567492524c0d235a46156233d35e993d55996eb1c
-
Filesize
4.1MB
MD5e7e1650468d4d96955d1c45713a1b0ed
SHA1ea85a53071bddbea6e992faf86e6e7eb501dc9a3
SHA25644f7f0fc63da6f0ba63e35ff54fdbb64af828c809598958bb533b67dd79d0c67
SHA5124810dd7da89e42e7dd63ed3040b058658c1f053a3091067db37cf51d25fa540867729e80d24f19c7ef5741bfc42ee6c26d7cb1384b72985d6b55c9e8f384b4dc