Analysis
-
max time kernel
119s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
25/07/2024, 18:50
Static task
static1
Behavioral task
behavioral1
Sample
ec319982eb02bae8ba38c0af430da0b0N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
ec319982eb02bae8ba38c0af430da0b0N.exe
Resource
win10v2004-20240709-en
General
-
Target
ec319982eb02bae8ba38c0af430da0b0N.exe
-
Size
2.7MB
-
MD5
ec319982eb02bae8ba38c0af430da0b0
-
SHA1
97099985de358bb4a3eac82a8d2166c33e06b846
-
SHA256
f6da5406b878b27f0d265b7b819fd1f027caea8c57a06e4b7fe673339019cc5c
-
SHA512
c6a2249bc9b33ed73b08e7f5a6ce1bf70cb16bda395919882248cfbbfb91bf1b08a74b2623d6ba0890ff6466b21490d3c92352273f56d653fcc6ab04ec4ec61e
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LB29w4Sx:+R0pI/IQlUoMPdmpSpg4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2520 xoptiec.exe -
Loads dropped DLL 1 IoCs
pid Process 3048 ec319982eb02bae8ba38c0af430da0b0N.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\Adobe9Y\\xoptiec.exe" ec319982eb02bae8ba38c0af430da0b0N.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\KaVBGV\\optixloc.exe" ec319982eb02bae8ba38c0af430da0b0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ec319982eb02bae8ba38c0af430da0b0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xoptiec.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3048 ec319982eb02bae8ba38c0af430da0b0N.exe 3048 ec319982eb02bae8ba38c0af430da0b0N.exe 2520 xoptiec.exe 3048 ec319982eb02bae8ba38c0af430da0b0N.exe 2520 xoptiec.exe 3048 ec319982eb02bae8ba38c0af430da0b0N.exe 2520 xoptiec.exe 3048 ec319982eb02bae8ba38c0af430da0b0N.exe 2520 xoptiec.exe 3048 ec319982eb02bae8ba38c0af430da0b0N.exe 2520 xoptiec.exe 3048 ec319982eb02bae8ba38c0af430da0b0N.exe 2520 xoptiec.exe 3048 ec319982eb02bae8ba38c0af430da0b0N.exe 2520 xoptiec.exe 3048 ec319982eb02bae8ba38c0af430da0b0N.exe 2520 xoptiec.exe 3048 ec319982eb02bae8ba38c0af430da0b0N.exe 2520 xoptiec.exe 3048 ec319982eb02bae8ba38c0af430da0b0N.exe 2520 xoptiec.exe 3048 ec319982eb02bae8ba38c0af430da0b0N.exe 2520 xoptiec.exe 3048 ec319982eb02bae8ba38c0af430da0b0N.exe 2520 xoptiec.exe 3048 ec319982eb02bae8ba38c0af430da0b0N.exe 2520 xoptiec.exe 3048 ec319982eb02bae8ba38c0af430da0b0N.exe 2520 xoptiec.exe 3048 ec319982eb02bae8ba38c0af430da0b0N.exe 2520 xoptiec.exe 3048 ec319982eb02bae8ba38c0af430da0b0N.exe 2520 xoptiec.exe 3048 ec319982eb02bae8ba38c0af430da0b0N.exe 2520 xoptiec.exe 3048 ec319982eb02bae8ba38c0af430da0b0N.exe 2520 xoptiec.exe 3048 ec319982eb02bae8ba38c0af430da0b0N.exe 2520 xoptiec.exe 3048 ec319982eb02bae8ba38c0af430da0b0N.exe 2520 xoptiec.exe 3048 ec319982eb02bae8ba38c0af430da0b0N.exe 2520 xoptiec.exe 3048 ec319982eb02bae8ba38c0af430da0b0N.exe 2520 xoptiec.exe 3048 ec319982eb02bae8ba38c0af430da0b0N.exe 2520 xoptiec.exe 3048 ec319982eb02bae8ba38c0af430da0b0N.exe 2520 xoptiec.exe 3048 ec319982eb02bae8ba38c0af430da0b0N.exe 2520 xoptiec.exe 3048 ec319982eb02bae8ba38c0af430da0b0N.exe 2520 xoptiec.exe 3048 ec319982eb02bae8ba38c0af430da0b0N.exe 2520 xoptiec.exe 3048 ec319982eb02bae8ba38c0af430da0b0N.exe 2520 xoptiec.exe 3048 ec319982eb02bae8ba38c0af430da0b0N.exe 2520 xoptiec.exe 3048 ec319982eb02bae8ba38c0af430da0b0N.exe 2520 xoptiec.exe 3048 ec319982eb02bae8ba38c0af430da0b0N.exe 2520 xoptiec.exe 3048 ec319982eb02bae8ba38c0af430da0b0N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3048 wrote to memory of 2520 3048 ec319982eb02bae8ba38c0af430da0b0N.exe 31 PID 3048 wrote to memory of 2520 3048 ec319982eb02bae8ba38c0af430da0b0N.exe 31 PID 3048 wrote to memory of 2520 3048 ec319982eb02bae8ba38c0af430da0b0N.exe 31 PID 3048 wrote to memory of 2520 3048 ec319982eb02bae8ba38c0af430da0b0N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\ec319982eb02bae8ba38c0af430da0b0N.exe"C:\Users\Admin\AppData\Local\Temp\ec319982eb02bae8ba38c0af430da0b0N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Adobe9Y\xoptiec.exeC:\Adobe9Y\xoptiec.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2520
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD5a68aa3b74572f37a81a2d6e37e4149c4
SHA170a8a52b0c4886c627220556adf79e59dd57a83c
SHA256bd3bbdba449e3cae12269a97aaa71f822520c398a48cad1babd99064bf6f6007
SHA5127cee29d64c5cfddf6c71bf89903d0703b17fc5b266782061363481bfdab3e4bbee23701ff93f4b0528574ded4a3c6711b07370f37d9100fc8deacd05dd35ce18
-
Filesize
202B
MD54e85b38b7edac77574094411ff6e44c0
SHA18402566a5cd4d9d09993e27f601030d22a9891a2
SHA256ddffc98a0afa322d82e2abedd00a2c9eb983ba36c697b8e3604753c5b64e35a3
SHA5124529bcc33ed4cc8025a3aa4c062c3f5e1c9115d1044ff01280302b5e300dfab105dba9ea4269313c2966f1d005003825c23dd73d9a89e9d37b2bbf128724cc25
-
Filesize
2.7MB
MD5cbc6762b972fcb7f066f5e3eecca98b1
SHA1c903e802f54693cc82c98321f4877f7bc93c08d6
SHA256b432de9802f35eac646a0516731c188ec2f61f1f376568b09c32ad393b40d141
SHA512d8b7310693c36a9796f63119c7d37d86df88b6570805af9308c4400972d3b7885868cea4099d071af42ca62293d9a33e6b8ec7d36da12f192248610792d6341b