Analysis
-
max time kernel
120s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26/07/2024, 03:07
Static task
static1
Behavioral task
behavioral1
Sample
6140c7f846ce3d26fd7c9bf35e242b30N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6140c7f846ce3d26fd7c9bf35e242b30N.exe
Resource
win10v2004-20240709-en
General
-
Target
6140c7f846ce3d26fd7c9bf35e242b30N.exe
-
Size
2.7MB
-
MD5
6140c7f846ce3d26fd7c9bf35e242b30
-
SHA1
e3953079c5524ac7ee63085c7d28a1aa85e5da1b
-
SHA256
4edf81120eee938419743e7fabeef884408c56b575231358d613b75386258866
-
SHA512
835e0ebc86a2b39ee2c7f9af23319b923846beacfe49b65a19444e02ef633680beb01a98fd20ca92ec3df60e56aaa804c0bf4f380b206a4e78c1ed2e540f5fc0
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBv9w4S+:+R0pI/IQlUoMPdmpSpL4X
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4836 xoptiloc.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\UserDotWP\\xoptiloc.exe" 6140c7f846ce3d26fd7c9bf35e242b30N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\Vid8O\\dobaloc.exe" 6140c7f846ce3d26fd7c9bf35e242b30N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6140c7f846ce3d26fd7c9bf35e242b30N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xoptiloc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4192 6140c7f846ce3d26fd7c9bf35e242b30N.exe 4192 6140c7f846ce3d26fd7c9bf35e242b30N.exe 4192 6140c7f846ce3d26fd7c9bf35e242b30N.exe 4192 6140c7f846ce3d26fd7c9bf35e242b30N.exe 4836 xoptiloc.exe 4836 xoptiloc.exe 4192 6140c7f846ce3d26fd7c9bf35e242b30N.exe 4192 6140c7f846ce3d26fd7c9bf35e242b30N.exe 4836 xoptiloc.exe 4836 xoptiloc.exe 4192 6140c7f846ce3d26fd7c9bf35e242b30N.exe 4192 6140c7f846ce3d26fd7c9bf35e242b30N.exe 4836 xoptiloc.exe 4836 xoptiloc.exe 4192 6140c7f846ce3d26fd7c9bf35e242b30N.exe 4192 6140c7f846ce3d26fd7c9bf35e242b30N.exe 4836 xoptiloc.exe 4836 xoptiloc.exe 4192 6140c7f846ce3d26fd7c9bf35e242b30N.exe 4192 6140c7f846ce3d26fd7c9bf35e242b30N.exe 4836 xoptiloc.exe 4836 xoptiloc.exe 4192 6140c7f846ce3d26fd7c9bf35e242b30N.exe 4192 6140c7f846ce3d26fd7c9bf35e242b30N.exe 4836 xoptiloc.exe 4836 xoptiloc.exe 4192 6140c7f846ce3d26fd7c9bf35e242b30N.exe 4192 6140c7f846ce3d26fd7c9bf35e242b30N.exe 4836 xoptiloc.exe 4836 xoptiloc.exe 4192 6140c7f846ce3d26fd7c9bf35e242b30N.exe 4192 6140c7f846ce3d26fd7c9bf35e242b30N.exe 4836 xoptiloc.exe 4836 xoptiloc.exe 4192 6140c7f846ce3d26fd7c9bf35e242b30N.exe 4192 6140c7f846ce3d26fd7c9bf35e242b30N.exe 4836 xoptiloc.exe 4836 xoptiloc.exe 4192 6140c7f846ce3d26fd7c9bf35e242b30N.exe 4192 6140c7f846ce3d26fd7c9bf35e242b30N.exe 4836 xoptiloc.exe 4836 xoptiloc.exe 4192 6140c7f846ce3d26fd7c9bf35e242b30N.exe 4192 6140c7f846ce3d26fd7c9bf35e242b30N.exe 4836 xoptiloc.exe 4836 xoptiloc.exe 4192 6140c7f846ce3d26fd7c9bf35e242b30N.exe 4192 6140c7f846ce3d26fd7c9bf35e242b30N.exe 4836 xoptiloc.exe 4836 xoptiloc.exe 4192 6140c7f846ce3d26fd7c9bf35e242b30N.exe 4192 6140c7f846ce3d26fd7c9bf35e242b30N.exe 4836 xoptiloc.exe 4836 xoptiloc.exe 4192 6140c7f846ce3d26fd7c9bf35e242b30N.exe 4192 6140c7f846ce3d26fd7c9bf35e242b30N.exe 4836 xoptiloc.exe 4836 xoptiloc.exe 4192 6140c7f846ce3d26fd7c9bf35e242b30N.exe 4192 6140c7f846ce3d26fd7c9bf35e242b30N.exe 4836 xoptiloc.exe 4836 xoptiloc.exe 4192 6140c7f846ce3d26fd7c9bf35e242b30N.exe 4192 6140c7f846ce3d26fd7c9bf35e242b30N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4192 wrote to memory of 4836 4192 6140c7f846ce3d26fd7c9bf35e242b30N.exe 91 PID 4192 wrote to memory of 4836 4192 6140c7f846ce3d26fd7c9bf35e242b30N.exe 91 PID 4192 wrote to memory of 4836 4192 6140c7f846ce3d26fd7c9bf35e242b30N.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\6140c7f846ce3d26fd7c9bf35e242b30N.exe"C:\Users\Admin\AppData\Local\Temp\6140c7f846ce3d26fd7c9bf35e242b30N.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\UserDotWP\xoptiloc.exeC:\UserDotWP\xoptiloc.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4836
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD5175e845175827528bf9eb9f4743d2055
SHA10a3bfb8a5398228ed4172eb3cc56169c6eb81f66
SHA256b5ad999de3c12dc9ef97b70e2cf4e1a5f716be72f333be79647c264d121cab8a
SHA5127411d0d475f04c18cdfa3030f09f5246be969bb656cca3b957893605219aa750fa5c5503efc39181625503645dd166c1e069a7c835878d408f511e75e8eaa668
-
Filesize
204B
MD5f7c2e6c9dec7bc1d5c3dadef1c54a585
SHA15c38ecd139b1a164d5cd0a4b309414ecca5c8de6
SHA2561a58c2c8a4ebe2830388c9ac3b6883a6b65d5dd98a76fb0409f0cb591adef91a
SHA512d2427a1c74742207390359caa60ef44c722f14c14b4d54476b7bb2536c7949eb8656bd551f3acc4762deff547ed2c8a6bfa55efd92f0ec7c3d88070ae5fe4f76
-
Filesize
2.7MB
MD5e6184ad6094ba119015cb40402676f4c
SHA1e058d133842b58458891a049c0f3fbe9a26f3a43
SHA2566a4dce71b1c8cc53a55bd6b385a00abb3b79e0d2b3edae9e9c227d860337bfab
SHA512e2602e90eef7ec106fcaa4966b23c51052cb9ac9da921bac254e0e1786042cab869d6c1fe8ff6f9ad29a0a3d82752aaa72603b5de60c5c2f9f49fe0206772217