Analysis
-
max time kernel
119s -
max time network
106s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
25/07/2024, 23:42
Static task
static1
Behavioral task
behavioral1
Sample
30aed4fdd98c38080e951f65baf19ca0N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
30aed4fdd98c38080e951f65baf19ca0N.exe
Resource
win10v2004-20240709-en
General
-
Target
30aed4fdd98c38080e951f65baf19ca0N.exe
-
Size
2.7MB
-
MD5
30aed4fdd98c38080e951f65baf19ca0
-
SHA1
ccc91aeebac80a7a1fd2d1d7388410c57bf60ccb
-
SHA256
26346d7f4f0a03de6ce65b4c4e9bf5019f30b32f95102c3af2db95e16a08ba6c
-
SHA512
2a4d7cd591ceee2c7bf227972663e13f3e0d3e2cf9abdbb1b37edf50b7aa1ac3eb6f700dcf07847ac63e60e53a80caacd859e01b203dd94eaaafcb34392309f0
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBp9w4S+:+R0pI/IQlUoMPdmpSpp4X
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3452 aoptiloc.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\LabZAG\\dobxsys.exe" 30aed4fdd98c38080e951f65baf19ca0N.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\FilesK9\\aoptiloc.exe" 30aed4fdd98c38080e951f65baf19ca0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aoptiloc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 30aed4fdd98c38080e951f65baf19ca0N.exe -
NTFS ADS 1 IoCs
description ioc Process File created C:\Users\AdminF+ZZ.K^KF<YKWSXQF7SM\Y]YP^FASXNYa]F=^K\^ 7OX_F:\YQ\KW]F=^K\^_ZFlocaopti.exe 30aed4fdd98c38080e951f65baf19ca0N.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 400 30aed4fdd98c38080e951f65baf19ca0N.exe 400 30aed4fdd98c38080e951f65baf19ca0N.exe 400 30aed4fdd98c38080e951f65baf19ca0N.exe 400 30aed4fdd98c38080e951f65baf19ca0N.exe 3452 aoptiloc.exe 3452 aoptiloc.exe 400 30aed4fdd98c38080e951f65baf19ca0N.exe 400 30aed4fdd98c38080e951f65baf19ca0N.exe 3452 aoptiloc.exe 3452 aoptiloc.exe 400 30aed4fdd98c38080e951f65baf19ca0N.exe 400 30aed4fdd98c38080e951f65baf19ca0N.exe 3452 aoptiloc.exe 3452 aoptiloc.exe 400 30aed4fdd98c38080e951f65baf19ca0N.exe 400 30aed4fdd98c38080e951f65baf19ca0N.exe 3452 aoptiloc.exe 3452 aoptiloc.exe 400 30aed4fdd98c38080e951f65baf19ca0N.exe 400 30aed4fdd98c38080e951f65baf19ca0N.exe 3452 aoptiloc.exe 3452 aoptiloc.exe 400 30aed4fdd98c38080e951f65baf19ca0N.exe 400 30aed4fdd98c38080e951f65baf19ca0N.exe 3452 aoptiloc.exe 3452 aoptiloc.exe 400 30aed4fdd98c38080e951f65baf19ca0N.exe 400 30aed4fdd98c38080e951f65baf19ca0N.exe 3452 aoptiloc.exe 3452 aoptiloc.exe 400 30aed4fdd98c38080e951f65baf19ca0N.exe 400 30aed4fdd98c38080e951f65baf19ca0N.exe 3452 aoptiloc.exe 3452 aoptiloc.exe 400 30aed4fdd98c38080e951f65baf19ca0N.exe 400 30aed4fdd98c38080e951f65baf19ca0N.exe 3452 aoptiloc.exe 3452 aoptiloc.exe 400 30aed4fdd98c38080e951f65baf19ca0N.exe 400 30aed4fdd98c38080e951f65baf19ca0N.exe 3452 aoptiloc.exe 3452 aoptiloc.exe 400 30aed4fdd98c38080e951f65baf19ca0N.exe 400 30aed4fdd98c38080e951f65baf19ca0N.exe 3452 aoptiloc.exe 3452 aoptiloc.exe 400 30aed4fdd98c38080e951f65baf19ca0N.exe 400 30aed4fdd98c38080e951f65baf19ca0N.exe 3452 aoptiloc.exe 3452 aoptiloc.exe 400 30aed4fdd98c38080e951f65baf19ca0N.exe 400 30aed4fdd98c38080e951f65baf19ca0N.exe 3452 aoptiloc.exe 3452 aoptiloc.exe 400 30aed4fdd98c38080e951f65baf19ca0N.exe 400 30aed4fdd98c38080e951f65baf19ca0N.exe 3452 aoptiloc.exe 3452 aoptiloc.exe 400 30aed4fdd98c38080e951f65baf19ca0N.exe 400 30aed4fdd98c38080e951f65baf19ca0N.exe 3452 aoptiloc.exe 3452 aoptiloc.exe 400 30aed4fdd98c38080e951f65baf19ca0N.exe 400 30aed4fdd98c38080e951f65baf19ca0N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 400 wrote to memory of 3452 400 30aed4fdd98c38080e951f65baf19ca0N.exe 87 PID 400 wrote to memory of 3452 400 30aed4fdd98c38080e951f65baf19ca0N.exe 87 PID 400 wrote to memory of 3452 400 30aed4fdd98c38080e951f65baf19ca0N.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\30aed4fdd98c38080e951f65baf19ca0N.exe"C:\Users\Admin\AppData\Local\Temp\30aed4fdd98c38080e951f65baf19ca0N.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:400 -
C:\FilesK9\aoptiloc.exeC:\FilesK9\aoptiloc.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3452
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD5889edc502e61b7e3e8fc41ba89871df8
SHA1fc1c9501e75fa8782386ff9abe015fe0d0a965e5
SHA2562b42e06d7af1aa2c193c2cf44f7936cb26a83f4614b78b4ef5f9d3db1dae7f98
SHA5124ebf28f8d2843137d04094e5e19028da73a27a6ed85b3b3d7c529e88557f789e5e467bd5dc3d11baa661f5e3c19d26e6a3494ee8e47dc94e635316c9ba9b6381
-
Filesize
1.6MB
MD5c72ebb13d6647f6ea27a918daa0147c0
SHA1952f3b623531a01a53465b69715853950e834163
SHA25646fb390560c0e60a82c6c9fecf5c656a17ad0816f0c84f4f774f71802d7129ce
SHA512e0b18215a59a8a0ddc64c2612bdb41fd4a901a8648450c06080dc36fcf795e9f36581fb80373b5995cb077811442f68c79c981d8b7f0d7d3d4372492d547d73c
-
Filesize
203B
MD59b62c30f92f56fb829d56585b9b90ebd
SHA1ae191e5b561a70d55d339cfb63fac0dfb84c648e
SHA256bf046b9e28bef053a1a229c638256c1d9386a0e7f852b70b4ddd45bbf64619d8
SHA512f19580a89b55b8707b67156882cc9e1f523c2d85569ee84d900d974f7c87d04d3bbeae5c321f2d3069885fc0cc1739ae3544de5ad176b1d5adfcb6287f84264a