Analysis
-
max time kernel
119s -
max time network
111s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26/07/2024, 17:52
Static task
static1
Behavioral task
behavioral1
Sample
3a584152bddb4726eb8840feb7ec0fe0N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3a584152bddb4726eb8840feb7ec0fe0N.exe
Resource
win10v2004-20240709-en
General
-
Target
3a584152bddb4726eb8840feb7ec0fe0N.exe
-
Size
2.7MB
-
MD5
3a584152bddb4726eb8840feb7ec0fe0
-
SHA1
5f6a37246986f21d6a2b7e5f67ef83b105a07821
-
SHA256
56fa95326b6ca5ba909148bbbf78bd3e8c999169c6ee97e103eb9a14adcdd3b5
-
SHA512
572e69c637b89351d756b9a7c1e657123f469bdaf6663b9e6de912a15ecd311fa0da5e022cece1ebc02314dc7b6cd60c51871d3b429d8e80de47e2433f1438fa
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBV9w4Sx:+R0pI/IQlUoMPdmpSpp4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4324 xoptiec.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\SysDrvBP\\xoptiec.exe" 3a584152bddb4726eb8840feb7ec0fe0N.exe Set value (str) \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\LabZ94\\dobaloc.exe" 3a584152bddb4726eb8840feb7ec0fe0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3a584152bddb4726eb8840feb7ec0fe0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xoptiec.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4084 3a584152bddb4726eb8840feb7ec0fe0N.exe 4084 3a584152bddb4726eb8840feb7ec0fe0N.exe 4084 3a584152bddb4726eb8840feb7ec0fe0N.exe 4084 3a584152bddb4726eb8840feb7ec0fe0N.exe 4324 xoptiec.exe 4324 xoptiec.exe 4084 3a584152bddb4726eb8840feb7ec0fe0N.exe 4084 3a584152bddb4726eb8840feb7ec0fe0N.exe 4324 xoptiec.exe 4324 xoptiec.exe 4084 3a584152bddb4726eb8840feb7ec0fe0N.exe 4084 3a584152bddb4726eb8840feb7ec0fe0N.exe 4324 xoptiec.exe 4324 xoptiec.exe 4084 3a584152bddb4726eb8840feb7ec0fe0N.exe 4084 3a584152bddb4726eb8840feb7ec0fe0N.exe 4324 xoptiec.exe 4324 xoptiec.exe 4084 3a584152bddb4726eb8840feb7ec0fe0N.exe 4084 3a584152bddb4726eb8840feb7ec0fe0N.exe 4324 xoptiec.exe 4324 xoptiec.exe 4084 3a584152bddb4726eb8840feb7ec0fe0N.exe 4084 3a584152bddb4726eb8840feb7ec0fe0N.exe 4324 xoptiec.exe 4324 xoptiec.exe 4084 3a584152bddb4726eb8840feb7ec0fe0N.exe 4084 3a584152bddb4726eb8840feb7ec0fe0N.exe 4324 xoptiec.exe 4324 xoptiec.exe 4084 3a584152bddb4726eb8840feb7ec0fe0N.exe 4084 3a584152bddb4726eb8840feb7ec0fe0N.exe 4324 xoptiec.exe 4324 xoptiec.exe 4084 3a584152bddb4726eb8840feb7ec0fe0N.exe 4084 3a584152bddb4726eb8840feb7ec0fe0N.exe 4324 xoptiec.exe 4324 xoptiec.exe 4084 3a584152bddb4726eb8840feb7ec0fe0N.exe 4084 3a584152bddb4726eb8840feb7ec0fe0N.exe 4324 xoptiec.exe 4324 xoptiec.exe 4084 3a584152bddb4726eb8840feb7ec0fe0N.exe 4084 3a584152bddb4726eb8840feb7ec0fe0N.exe 4324 xoptiec.exe 4324 xoptiec.exe 4084 3a584152bddb4726eb8840feb7ec0fe0N.exe 4084 3a584152bddb4726eb8840feb7ec0fe0N.exe 4324 xoptiec.exe 4324 xoptiec.exe 4084 3a584152bddb4726eb8840feb7ec0fe0N.exe 4084 3a584152bddb4726eb8840feb7ec0fe0N.exe 4324 xoptiec.exe 4324 xoptiec.exe 4084 3a584152bddb4726eb8840feb7ec0fe0N.exe 4084 3a584152bddb4726eb8840feb7ec0fe0N.exe 4324 xoptiec.exe 4324 xoptiec.exe 4084 3a584152bddb4726eb8840feb7ec0fe0N.exe 4084 3a584152bddb4726eb8840feb7ec0fe0N.exe 4324 xoptiec.exe 4324 xoptiec.exe 4084 3a584152bddb4726eb8840feb7ec0fe0N.exe 4084 3a584152bddb4726eb8840feb7ec0fe0N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4084 wrote to memory of 4324 4084 3a584152bddb4726eb8840feb7ec0fe0N.exe 89 PID 4084 wrote to memory of 4324 4084 3a584152bddb4726eb8840feb7ec0fe0N.exe 89 PID 4084 wrote to memory of 4324 4084 3a584152bddb4726eb8840feb7ec0fe0N.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\3a584152bddb4726eb8840feb7ec0fe0N.exe"C:\Users\Admin\AppData\Local\Temp\3a584152bddb4726eb8840feb7ec0fe0N.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4084 -
C:\SysDrvBP\xoptiec.exeC:\SysDrvBP\xoptiec.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4324
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD57adf4ec322fcce499aa4e6bc12bca602
SHA1ee8c1b42d1500b259d65f144bc79e02bfb566f72
SHA256831a2b6c9e03d64849d8cde7b802841cbf55bbd5e0acc59a30726c7090b82ee9
SHA512f4f5b28707e585568e018582fe5b6044c96f03addebe1b2cfe7fb95cb933753d97a8128ed28b74852ba13a0d64f6a7067968c5c037d9ca86f197050c358ab784
-
Filesize
2.7MB
MD58d7ffc660f6b88d658fd1b7faa23749e
SHA19c32ce4e098f868c60c8cd30e1bc4aca586f3ee8
SHA2561a7cfd52b9a12cd1893ab5ed502548de58d2e78df71461fe0f114c6cf495d346
SHA512aef4c51ac9165aad5fc998a48581ccd505ea9192b42929ba2efd0e6a902d6ced6ae8d211d326e98da6748cc4db9fa6304f4a245257e3353c6c8fc55c89b6f845
-
Filesize
203B
MD513ce43499d84e872342b9c0158bf89d6
SHA1a43daf14629d22a0e9b3d5d6ee20692eb8fe43f9
SHA25638b56e4a2858517867331837be58679ee4d2bb5e7f47dd0b82951adf04ea7712
SHA512e4ec9c29dd48e2c5f967f8730af2644d3089337a2067e74dfd4b5ec557b1160bf5f82060e5ff85d57a40c338bbd26706ced554af01c76b338d4eb545ac552ed3