Analysis

  • max time kernel
    120s
  • max time network
    104s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/07/2024, 03:07

General

  • Target

    6140c7f846ce3d26fd7c9bf35e242b30N.exe

  • Size

    2.7MB

  • MD5

    6140c7f846ce3d26fd7c9bf35e242b30

  • SHA1

    e3953079c5524ac7ee63085c7d28a1aa85e5da1b

  • SHA256

    4edf81120eee938419743e7fabeef884408c56b575231358d613b75386258866

  • SHA512

    835e0ebc86a2b39ee2c7f9af23319b923846beacfe49b65a19444e02ef633680beb01a98fd20ca92ec3df60e56aaa804c0bf4f380b206a4e78c1ed2e540f5fc0

  • SSDEEP

    49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBv9w4S+:+R0pI/IQlUoMPdmpSpL4X

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6140c7f846ce3d26fd7c9bf35e242b30N.exe
    "C:\Users\Admin\AppData\Local\Temp\6140c7f846ce3d26fd7c9bf35e242b30N.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4192
    • C:\UserDotWP\xoptiloc.exe
      C:\UserDotWP\xoptiloc.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:4836

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\UserDotWP\xoptiloc.exe

          Filesize

          2.7MB

          MD5

          175e845175827528bf9eb9f4743d2055

          SHA1

          0a3bfb8a5398228ed4172eb3cc56169c6eb81f66

          SHA256

          b5ad999de3c12dc9ef97b70e2cf4e1a5f716be72f333be79647c264d121cab8a

          SHA512

          7411d0d475f04c18cdfa3030f09f5246be969bb656cca3b957893605219aa750fa5c5503efc39181625503645dd166c1e069a7c835878d408f511e75e8eaa668

        • C:\Users\Admin\253086396416_10.0_Admin.ini

          Filesize

          204B

          MD5

          f7c2e6c9dec7bc1d5c3dadef1c54a585

          SHA1

          5c38ecd139b1a164d5cd0a4b309414ecca5c8de6

          SHA256

          1a58c2c8a4ebe2830388c9ac3b6883a6b65d5dd98a76fb0409f0cb591adef91a

          SHA512

          d2427a1c74742207390359caa60ef44c722f14c14b4d54476b7bb2536c7949eb8656bd551f3acc4762deff547ed2c8a6bfa55efd92f0ec7c3d88070ae5fe4f76

        • C:\Vid8O\dobaloc.exe

          Filesize

          2.7MB

          MD5

          e6184ad6094ba119015cb40402676f4c

          SHA1

          e058d133842b58458891a049c0f3fbe9a26f3a43

          SHA256

          6a4dce71b1c8cc53a55bd6b385a00abb3b79e0d2b3edae9e9c227d860337bfab

          SHA512

          e2602e90eef7ec106fcaa4966b23c51052cb9ac9da921bac254e0e1786042cab869d6c1fe8ff6f9ad29a0a3d82752aaa72603b5de60c5c2f9f49fe0206772217