Analysis

  • max time kernel
    119s
  • max time network
    111s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/07/2024, 17:52

General

  • Target

    3a584152bddb4726eb8840feb7ec0fe0N.exe

  • Size

    2.7MB

  • MD5

    3a584152bddb4726eb8840feb7ec0fe0

  • SHA1

    5f6a37246986f21d6a2b7e5f67ef83b105a07821

  • SHA256

    56fa95326b6ca5ba909148bbbf78bd3e8c999169c6ee97e103eb9a14adcdd3b5

  • SHA512

    572e69c637b89351d756b9a7c1e657123f469bdaf6663b9e6de912a15ecd311fa0da5e022cece1ebc02314dc7b6cd60c51871d3b429d8e80de47e2433f1438fa

  • SSDEEP

    49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBV9w4Sx:+R0pI/IQlUoMPdmpSpp4

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3a584152bddb4726eb8840feb7ec0fe0N.exe
    "C:\Users\Admin\AppData\Local\Temp\3a584152bddb4726eb8840feb7ec0fe0N.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4084
    • C:\SysDrvBP\xoptiec.exe
      C:\SysDrvBP\xoptiec.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:4324

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\LabZ94\dobaloc.exe

          Filesize

          2.7MB

          MD5

          7adf4ec322fcce499aa4e6bc12bca602

          SHA1

          ee8c1b42d1500b259d65f144bc79e02bfb566f72

          SHA256

          831a2b6c9e03d64849d8cde7b802841cbf55bbd5e0acc59a30726c7090b82ee9

          SHA512

          f4f5b28707e585568e018582fe5b6044c96f03addebe1b2cfe7fb95cb933753d97a8128ed28b74852ba13a0d64f6a7067968c5c037d9ca86f197050c358ab784

        • C:\SysDrvBP\xoptiec.exe

          Filesize

          2.7MB

          MD5

          8d7ffc660f6b88d658fd1b7faa23749e

          SHA1

          9c32ce4e098f868c60c8cd30e1bc4aca586f3ee8

          SHA256

          1a7cfd52b9a12cd1893ab5ed502548de58d2e78df71461fe0f114c6cf495d346

          SHA512

          aef4c51ac9165aad5fc998a48581ccd505ea9192b42929ba2efd0e6a902d6ced6ae8d211d326e98da6748cc4db9fa6304f4a245257e3353c6c8fc55c89b6f845

        • C:\Users\Admin\253086396416_10.0_Admin.ini

          Filesize

          203B

          MD5

          13ce43499d84e872342b9c0158bf89d6

          SHA1

          a43daf14629d22a0e9b3d5d6ee20692eb8fe43f9

          SHA256

          38b56e4a2858517867331837be58679ee4d2bb5e7f47dd0b82951adf04ea7712

          SHA512

          e4ec9c29dd48e2c5f967f8730af2644d3089337a2067e74dfd4b5ec557b1160bf5f82060e5ff85d57a40c338bbd26706ced554af01c76b338d4eb545ac552ed3