Analysis
-
max time kernel
119s -
max time network
112s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
15-07-2024 01:02
Static task
static1
Behavioral task
behavioral1
Sample
52651501c0616f78ba07fb2ae0227520N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
52651501c0616f78ba07fb2ae0227520N.exe
Resource
win10v2004-20240709-en
General
-
Target
52651501c0616f78ba07fb2ae0227520N.exe
-
Size
2.7MB
-
MD5
52651501c0616f78ba07fb2ae0227520
-
SHA1
022d99693bccacab214c286836da586412b01e7f
-
SHA256
39f034d4dd9ca8d367d061d3a1270ef826791a667290fd655ff95a2796f5c02c
-
SHA512
3733d71c205c53947e39ad6a31314709708f96e78eba43f01b1736db2844c268bc5dbf422b19ef40089266ef57834151ae598dd43294d8fd040bc6ff09bc7dca
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LB79w4S+:+R0pI/IQlUoMPdmpSpP4X
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1748 aoptiec.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\Intelproc97\\aoptiec.exe" 52651501c0616f78ba07fb2ae0227520N.exe Set value (str) \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\GalaxLB\\optixloc.exe" 52651501c0616f78ba07fb2ae0227520N.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2880 52651501c0616f78ba07fb2ae0227520N.exe 2880 52651501c0616f78ba07fb2ae0227520N.exe 2880 52651501c0616f78ba07fb2ae0227520N.exe 2880 52651501c0616f78ba07fb2ae0227520N.exe 1748 aoptiec.exe 1748 aoptiec.exe 2880 52651501c0616f78ba07fb2ae0227520N.exe 2880 52651501c0616f78ba07fb2ae0227520N.exe 1748 aoptiec.exe 1748 aoptiec.exe 2880 52651501c0616f78ba07fb2ae0227520N.exe 2880 52651501c0616f78ba07fb2ae0227520N.exe 1748 aoptiec.exe 1748 aoptiec.exe 2880 52651501c0616f78ba07fb2ae0227520N.exe 2880 52651501c0616f78ba07fb2ae0227520N.exe 1748 aoptiec.exe 1748 aoptiec.exe 2880 52651501c0616f78ba07fb2ae0227520N.exe 2880 52651501c0616f78ba07fb2ae0227520N.exe 1748 aoptiec.exe 1748 aoptiec.exe 2880 52651501c0616f78ba07fb2ae0227520N.exe 2880 52651501c0616f78ba07fb2ae0227520N.exe 1748 aoptiec.exe 1748 aoptiec.exe 2880 52651501c0616f78ba07fb2ae0227520N.exe 2880 52651501c0616f78ba07fb2ae0227520N.exe 1748 aoptiec.exe 1748 aoptiec.exe 2880 52651501c0616f78ba07fb2ae0227520N.exe 2880 52651501c0616f78ba07fb2ae0227520N.exe 1748 aoptiec.exe 1748 aoptiec.exe 2880 52651501c0616f78ba07fb2ae0227520N.exe 2880 52651501c0616f78ba07fb2ae0227520N.exe 1748 aoptiec.exe 1748 aoptiec.exe 2880 52651501c0616f78ba07fb2ae0227520N.exe 2880 52651501c0616f78ba07fb2ae0227520N.exe 1748 aoptiec.exe 1748 aoptiec.exe 2880 52651501c0616f78ba07fb2ae0227520N.exe 2880 52651501c0616f78ba07fb2ae0227520N.exe 1748 aoptiec.exe 1748 aoptiec.exe 2880 52651501c0616f78ba07fb2ae0227520N.exe 2880 52651501c0616f78ba07fb2ae0227520N.exe 1748 aoptiec.exe 1748 aoptiec.exe 2880 52651501c0616f78ba07fb2ae0227520N.exe 2880 52651501c0616f78ba07fb2ae0227520N.exe 1748 aoptiec.exe 1748 aoptiec.exe 2880 52651501c0616f78ba07fb2ae0227520N.exe 2880 52651501c0616f78ba07fb2ae0227520N.exe 1748 aoptiec.exe 1748 aoptiec.exe 2880 52651501c0616f78ba07fb2ae0227520N.exe 2880 52651501c0616f78ba07fb2ae0227520N.exe 1748 aoptiec.exe 1748 aoptiec.exe 2880 52651501c0616f78ba07fb2ae0227520N.exe 2880 52651501c0616f78ba07fb2ae0227520N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2880 wrote to memory of 1748 2880 52651501c0616f78ba07fb2ae0227520N.exe 88 PID 2880 wrote to memory of 1748 2880 52651501c0616f78ba07fb2ae0227520N.exe 88 PID 2880 wrote to memory of 1748 2880 52651501c0616f78ba07fb2ae0227520N.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\52651501c0616f78ba07fb2ae0227520N.exe"C:\Users\Admin\AppData\Local\Temp\52651501c0616f78ba07fb2ae0227520N.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Intelproc97\aoptiec.exeC:\Intelproc97\aoptiec.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD5deff111b352730847833cc20dd3e1844
SHA15fd141c1143f18954bcd299c0b396205356270ad
SHA25633be405ba94ea79c29f4f188efc67c45d51294372dbe6af269bac814c117873b
SHA512eaeac7f71f700553c852b96cf31259bd183eeeed591ce93dfa32fc5152490b7faab49730df3a711a9642f8af650207683d1c66e77534d8d17aa1fb85c7e0666f
-
Filesize
2.7MB
MD5a331f3336c7c75a5a979ebbd041a5ab3
SHA1a88ed320507c4411ff47218a034b1f1819442852
SHA256044803add99497ccb9cab6a23ef57eb47355b4afee6ab5882923b385b60ed191
SHA512826d47eab98074ef9d9ab98d7519dc98aa5e1c422579ad07a38cea02f10fad403d691837c15dd5e69936ea3af215f1eaf1838363ac0f03367b49e3e8f5ff5252
-
Filesize
208B
MD5138ce38352482e3589677c83f75959f1
SHA18e2399e3dba1312ed2a7402d21c83585dfbd6aa1
SHA2564302f9d4cfefc6b701957b582c69ea938cb850d0e2243148466eb4f6dc445f6d
SHA512bf8adf58a0191250b70158b16b12aea917e4c25d5eac7034c67070aba94a51a7fc9e124ce909bb37d6408a4c1a15ae591f3adc684b5f1a1298ad2999fe4c4dac