Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
27/07/2024, 23:15
Static task
static1
Behavioral task
behavioral1
Sample
68aebb5bb47e253631d2905d3f042978b0fc2fe0dd44bc2a3d0ae74fab939440.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
68aebb5bb47e253631d2905d3f042978b0fc2fe0dd44bc2a3d0ae74fab939440.exe
Resource
win10v2004-20240709-en
General
-
Target
68aebb5bb47e253631d2905d3f042978b0fc2fe0dd44bc2a3d0ae74fab939440.exe
-
Size
2.7MB
-
MD5
5741f4dd4c1625eb2212cda03aa8de10
-
SHA1
5d7b6f0dd2bb4694b130404009c85566c061ff75
-
SHA256
68aebb5bb47e253631d2905d3f042978b0fc2fe0dd44bc2a3d0ae74fab939440
-
SHA512
58493915ef3f4d3b704690bf6e53b6d76ca4a1dee3279319297bf3487c06ae3b3e1eec4da7d0879889205f3c1b3d27f954088cae9e9f3979492af4a89c04c97e
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBF9w4Sx:+R0pI/IQlUoMPdmpSpd4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2976 xoptiloc.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\FilesCJ\\xoptiloc.exe" 68aebb5bb47e253631d2905d3f042978b0fc2fe0dd44bc2a3d0ae74fab939440.exe Set value (str) \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\MintUD\\optiaec.exe" 68aebb5bb47e253631d2905d3f042978b0fc2fe0dd44bc2a3d0ae74fab939440.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 68aebb5bb47e253631d2905d3f042978b0fc2fe0dd44bc2a3d0ae74fab939440.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xoptiloc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2900 68aebb5bb47e253631d2905d3f042978b0fc2fe0dd44bc2a3d0ae74fab939440.exe 2900 68aebb5bb47e253631d2905d3f042978b0fc2fe0dd44bc2a3d0ae74fab939440.exe 2900 68aebb5bb47e253631d2905d3f042978b0fc2fe0dd44bc2a3d0ae74fab939440.exe 2900 68aebb5bb47e253631d2905d3f042978b0fc2fe0dd44bc2a3d0ae74fab939440.exe 2976 xoptiloc.exe 2976 xoptiloc.exe 2900 68aebb5bb47e253631d2905d3f042978b0fc2fe0dd44bc2a3d0ae74fab939440.exe 2900 68aebb5bb47e253631d2905d3f042978b0fc2fe0dd44bc2a3d0ae74fab939440.exe 2976 xoptiloc.exe 2976 xoptiloc.exe 2900 68aebb5bb47e253631d2905d3f042978b0fc2fe0dd44bc2a3d0ae74fab939440.exe 2900 68aebb5bb47e253631d2905d3f042978b0fc2fe0dd44bc2a3d0ae74fab939440.exe 2976 xoptiloc.exe 2976 xoptiloc.exe 2900 68aebb5bb47e253631d2905d3f042978b0fc2fe0dd44bc2a3d0ae74fab939440.exe 2900 68aebb5bb47e253631d2905d3f042978b0fc2fe0dd44bc2a3d0ae74fab939440.exe 2976 xoptiloc.exe 2976 xoptiloc.exe 2900 68aebb5bb47e253631d2905d3f042978b0fc2fe0dd44bc2a3d0ae74fab939440.exe 2900 68aebb5bb47e253631d2905d3f042978b0fc2fe0dd44bc2a3d0ae74fab939440.exe 2976 xoptiloc.exe 2976 xoptiloc.exe 2900 68aebb5bb47e253631d2905d3f042978b0fc2fe0dd44bc2a3d0ae74fab939440.exe 2900 68aebb5bb47e253631d2905d3f042978b0fc2fe0dd44bc2a3d0ae74fab939440.exe 2976 xoptiloc.exe 2976 xoptiloc.exe 2900 68aebb5bb47e253631d2905d3f042978b0fc2fe0dd44bc2a3d0ae74fab939440.exe 2900 68aebb5bb47e253631d2905d3f042978b0fc2fe0dd44bc2a3d0ae74fab939440.exe 2976 xoptiloc.exe 2976 xoptiloc.exe 2900 68aebb5bb47e253631d2905d3f042978b0fc2fe0dd44bc2a3d0ae74fab939440.exe 2900 68aebb5bb47e253631d2905d3f042978b0fc2fe0dd44bc2a3d0ae74fab939440.exe 2976 xoptiloc.exe 2976 xoptiloc.exe 2900 68aebb5bb47e253631d2905d3f042978b0fc2fe0dd44bc2a3d0ae74fab939440.exe 2900 68aebb5bb47e253631d2905d3f042978b0fc2fe0dd44bc2a3d0ae74fab939440.exe 2976 xoptiloc.exe 2976 xoptiloc.exe 2900 68aebb5bb47e253631d2905d3f042978b0fc2fe0dd44bc2a3d0ae74fab939440.exe 2900 68aebb5bb47e253631d2905d3f042978b0fc2fe0dd44bc2a3d0ae74fab939440.exe 2976 xoptiloc.exe 2976 xoptiloc.exe 2900 68aebb5bb47e253631d2905d3f042978b0fc2fe0dd44bc2a3d0ae74fab939440.exe 2900 68aebb5bb47e253631d2905d3f042978b0fc2fe0dd44bc2a3d0ae74fab939440.exe 2976 xoptiloc.exe 2976 xoptiloc.exe 2900 68aebb5bb47e253631d2905d3f042978b0fc2fe0dd44bc2a3d0ae74fab939440.exe 2900 68aebb5bb47e253631d2905d3f042978b0fc2fe0dd44bc2a3d0ae74fab939440.exe 2976 xoptiloc.exe 2976 xoptiloc.exe 2900 68aebb5bb47e253631d2905d3f042978b0fc2fe0dd44bc2a3d0ae74fab939440.exe 2900 68aebb5bb47e253631d2905d3f042978b0fc2fe0dd44bc2a3d0ae74fab939440.exe 2976 xoptiloc.exe 2976 xoptiloc.exe 2900 68aebb5bb47e253631d2905d3f042978b0fc2fe0dd44bc2a3d0ae74fab939440.exe 2900 68aebb5bb47e253631d2905d3f042978b0fc2fe0dd44bc2a3d0ae74fab939440.exe 2976 xoptiloc.exe 2976 xoptiloc.exe 2900 68aebb5bb47e253631d2905d3f042978b0fc2fe0dd44bc2a3d0ae74fab939440.exe 2900 68aebb5bb47e253631d2905d3f042978b0fc2fe0dd44bc2a3d0ae74fab939440.exe 2976 xoptiloc.exe 2976 xoptiloc.exe 2900 68aebb5bb47e253631d2905d3f042978b0fc2fe0dd44bc2a3d0ae74fab939440.exe 2900 68aebb5bb47e253631d2905d3f042978b0fc2fe0dd44bc2a3d0ae74fab939440.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2900 wrote to memory of 2976 2900 68aebb5bb47e253631d2905d3f042978b0fc2fe0dd44bc2a3d0ae74fab939440.exe 87 PID 2900 wrote to memory of 2976 2900 68aebb5bb47e253631d2905d3f042978b0fc2fe0dd44bc2a3d0ae74fab939440.exe 87 PID 2900 wrote to memory of 2976 2900 68aebb5bb47e253631d2905d3f042978b0fc2fe0dd44bc2a3d0ae74fab939440.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\68aebb5bb47e253631d2905d3f042978b0fc2fe0dd44bc2a3d0ae74fab939440.exe"C:\Users\Admin\AppData\Local\Temp\68aebb5bb47e253631d2905d3f042978b0fc2fe0dd44bc2a3d0ae74fab939440.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\FilesCJ\xoptiloc.exeC:\FilesCJ\xoptiloc.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2976
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD54aff38e35447e2ca9057d2c66c23ae8c
SHA1efb5bc89736395cbb94521e476acb83629cddc3d
SHA256c0424716bae9f395a84557f3eaf0c31c7eb4663718e1c318b743e378abea95b2
SHA512e32efdba9b96cb07409d6e9c154a0cb4907cd7f22d381e95fee7cb3bffd804ad6c050bf340991a4d9fc35cdf38ad508689570034829b4422f73e72e253def03a
-
Filesize
2.7MB
MD5b86d2d00a008cf8ed0155d3fb4d823f0
SHA105b9d20438226f097916228261b5eb186c19def9
SHA256d91394d3fd2e3acca07a8b22cc8ed5944891bdb56cba58c873122130af113d8c
SHA51234f5ea546f96344892166cde628aeaaab10a1697c99ce526047b1db40279656b5e74f870fecb7a02c378f81a524b4e63bb289e2d1b3c8d3a2a78838d37ff7c4c
-
Filesize
200B
MD5ef615edad9ee41fb2c0a375806cf059e
SHA1acd343cb33bfff083bfb8c948f59a656367b5cbe
SHA256a40ee6d71e05f20a278e04c3a631503628c2322fdafb56e83247ad25aea2fed3
SHA512f3170f1860d76ef813e5d2f54bd770c7ee5e8373dfde1dd57bc20cf69afff4a3f80a54bb432849598b716d32bb1bc314dd3488c57481fb5fc08eb95c1ac3205c