Analysis
-
max time kernel
119s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
25-07-2024 22:34
Static task
static1
Behavioral task
behavioral1
Sample
1f0b3254ef78851d65b3023b32ac32b0N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
1f0b3254ef78851d65b3023b32ac32b0N.exe
Resource
win10v2004-20240709-en
General
-
Target
1f0b3254ef78851d65b3023b32ac32b0N.exe
-
Size
2.7MB
-
MD5
1f0b3254ef78851d65b3023b32ac32b0
-
SHA1
1a8265528d78276f2d54036738b960bba196d452
-
SHA256
69b337a45dd92c9746ccbd7dfd0989640aaeb75050705e2d8a8d8519d015222a
-
SHA512
63790c038bcdc2d9e19a4cc88986b4dd45b157b9bfab52b347f1b1542780366005430b07731f87febb4e40db2ca52cb1445c710b1770cc96684e468f4956e12e
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBr9w4Sx:+R0pI/IQlUoMPdmpSpL4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1892 xoptiloc.exe -
Loads dropped DLL 1 IoCs
pid Process 3032 1f0b3254ef78851d65b3023b32ac32b0N.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\UserDot5V\\xoptiloc.exe" 1f0b3254ef78851d65b3023b32ac32b0N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\MintBY\\boddevloc.exe" 1f0b3254ef78851d65b3023b32ac32b0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1f0b3254ef78851d65b3023b32ac32b0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xoptiloc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3032 1f0b3254ef78851d65b3023b32ac32b0N.exe 3032 1f0b3254ef78851d65b3023b32ac32b0N.exe 1892 xoptiloc.exe 3032 1f0b3254ef78851d65b3023b32ac32b0N.exe 1892 xoptiloc.exe 3032 1f0b3254ef78851d65b3023b32ac32b0N.exe 1892 xoptiloc.exe 3032 1f0b3254ef78851d65b3023b32ac32b0N.exe 1892 xoptiloc.exe 3032 1f0b3254ef78851d65b3023b32ac32b0N.exe 1892 xoptiloc.exe 3032 1f0b3254ef78851d65b3023b32ac32b0N.exe 1892 xoptiloc.exe 3032 1f0b3254ef78851d65b3023b32ac32b0N.exe 1892 xoptiloc.exe 3032 1f0b3254ef78851d65b3023b32ac32b0N.exe 1892 xoptiloc.exe 3032 1f0b3254ef78851d65b3023b32ac32b0N.exe 1892 xoptiloc.exe 3032 1f0b3254ef78851d65b3023b32ac32b0N.exe 1892 xoptiloc.exe 3032 1f0b3254ef78851d65b3023b32ac32b0N.exe 1892 xoptiloc.exe 3032 1f0b3254ef78851d65b3023b32ac32b0N.exe 1892 xoptiloc.exe 3032 1f0b3254ef78851d65b3023b32ac32b0N.exe 1892 xoptiloc.exe 3032 1f0b3254ef78851d65b3023b32ac32b0N.exe 1892 xoptiloc.exe 3032 1f0b3254ef78851d65b3023b32ac32b0N.exe 1892 xoptiloc.exe 3032 1f0b3254ef78851d65b3023b32ac32b0N.exe 1892 xoptiloc.exe 3032 1f0b3254ef78851d65b3023b32ac32b0N.exe 1892 xoptiloc.exe 3032 1f0b3254ef78851d65b3023b32ac32b0N.exe 1892 xoptiloc.exe 3032 1f0b3254ef78851d65b3023b32ac32b0N.exe 1892 xoptiloc.exe 3032 1f0b3254ef78851d65b3023b32ac32b0N.exe 1892 xoptiloc.exe 3032 1f0b3254ef78851d65b3023b32ac32b0N.exe 1892 xoptiloc.exe 3032 1f0b3254ef78851d65b3023b32ac32b0N.exe 1892 xoptiloc.exe 3032 1f0b3254ef78851d65b3023b32ac32b0N.exe 1892 xoptiloc.exe 3032 1f0b3254ef78851d65b3023b32ac32b0N.exe 1892 xoptiloc.exe 3032 1f0b3254ef78851d65b3023b32ac32b0N.exe 1892 xoptiloc.exe 3032 1f0b3254ef78851d65b3023b32ac32b0N.exe 1892 xoptiloc.exe 3032 1f0b3254ef78851d65b3023b32ac32b0N.exe 1892 xoptiloc.exe 3032 1f0b3254ef78851d65b3023b32ac32b0N.exe 1892 xoptiloc.exe 3032 1f0b3254ef78851d65b3023b32ac32b0N.exe 1892 xoptiloc.exe 3032 1f0b3254ef78851d65b3023b32ac32b0N.exe 1892 xoptiloc.exe 3032 1f0b3254ef78851d65b3023b32ac32b0N.exe 1892 xoptiloc.exe 3032 1f0b3254ef78851d65b3023b32ac32b0N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3032 wrote to memory of 1892 3032 1f0b3254ef78851d65b3023b32ac32b0N.exe 30 PID 3032 wrote to memory of 1892 3032 1f0b3254ef78851d65b3023b32ac32b0N.exe 30 PID 3032 wrote to memory of 1892 3032 1f0b3254ef78851d65b3023b32ac32b0N.exe 30 PID 3032 wrote to memory of 1892 3032 1f0b3254ef78851d65b3023b32ac32b0N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\1f0b3254ef78851d65b3023b32ac32b0N.exe"C:\Users\Admin\AppData\Local\Temp\1f0b3254ef78851d65b3023b32ac32b0N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\UserDot5V\xoptiloc.exeC:\UserDot5V\xoptiloc.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1892
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD52f33137dc42225c7295edfe2aa4cfc1b
SHA1a436de7e7ec5f7bb972b304067ddec0ed649a2a8
SHA256063fdffc171626fc750ad03da6be8952a4a47db6b835fea61c62123d81385af9
SHA5121d4175d1a5260afc87bf7a0b3ead2c7f7d6db6a19e6d65657dd7e6af8ec0e68ff6717095cd9262a823009081498c6e50cb08ea6cdd7e4f33456a938ab969c408
-
Filesize
206B
MD51e6048bda873d8171a4cd7134d299918
SHA19f03b6f4e2461d03a93292cb45f21e6250ee31b7
SHA2562a66b1cedc4a61c3b9885b0b1ff2c41276bf76412eb3ac6bbcd80261ad36bce7
SHA512e282863a77ad7cb1496872019991a112e78c1dde9d6bec7884809e115e8441bca426a61dc1bcb5880d100a57e7f61831b5ac2f7fb7df970a58ce2dba3a5fd2a0
-
Filesize
2.7MB
MD53d74d8955887ab8b43a93ca6413a90f7
SHA12081ca35f82152b757ddba97dd67dc50db1059b4
SHA256f505766aa9f43797d7864a12317b8b375882d3df45502b975cd1f53ae0a7ddd9
SHA5123d85f7df014883ac012b15747d19a88fcc8d3a6353ad24bd101b3900d97d760be7976b8210aa4e38c8da98b22a948fdbdd26326ee30f007d2afa11d9c301360b