Analysis
-
max time kernel
119s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
27-07-2024 04:21
Static task
static1
Behavioral task
behavioral1
Sample
8fc01923e273e72a72cb87ab9c4b29e0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8fc01923e273e72a72cb87ab9c4b29e0N.exe
Resource
win10v2004-20240709-en
General
-
Target
8fc01923e273e72a72cb87ab9c4b29e0N.exe
-
Size
2.7MB
-
MD5
8fc01923e273e72a72cb87ab9c4b29e0
-
SHA1
96b0d9a09722d6256a6f32340f6c1b46211dac61
-
SHA256
af35df04391306ea1f53827b0a680ba69f279c7402a6057a6aa6984cd90ed0fb
-
SHA512
e283bdbb51fe48bd18773337c624e81a6ca1aeb40e09a3b0cce851da0fc01b413ff784736e92f4f184a4763b6b7b1fa520674ad53bd35c0724fdb10ab1f20769
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBW9w4Sx:+R0pI/IQlUoMPdmpSpA4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4612 xoptiec.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\FilesZW\\xoptiec.exe" 8fc01923e273e72a72cb87ab9c4b29e0N.exe Set value (str) \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\Vid35\\dobasys.exe" 8fc01923e273e72a72cb87ab9c4b29e0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8fc01923e273e72a72cb87ab9c4b29e0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xoptiec.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4744 8fc01923e273e72a72cb87ab9c4b29e0N.exe 4744 8fc01923e273e72a72cb87ab9c4b29e0N.exe 4744 8fc01923e273e72a72cb87ab9c4b29e0N.exe 4744 8fc01923e273e72a72cb87ab9c4b29e0N.exe 4612 xoptiec.exe 4612 xoptiec.exe 4744 8fc01923e273e72a72cb87ab9c4b29e0N.exe 4744 8fc01923e273e72a72cb87ab9c4b29e0N.exe 4612 xoptiec.exe 4612 xoptiec.exe 4744 8fc01923e273e72a72cb87ab9c4b29e0N.exe 4744 8fc01923e273e72a72cb87ab9c4b29e0N.exe 4612 xoptiec.exe 4612 xoptiec.exe 4744 8fc01923e273e72a72cb87ab9c4b29e0N.exe 4744 8fc01923e273e72a72cb87ab9c4b29e0N.exe 4612 xoptiec.exe 4612 xoptiec.exe 4744 8fc01923e273e72a72cb87ab9c4b29e0N.exe 4744 8fc01923e273e72a72cb87ab9c4b29e0N.exe 4612 xoptiec.exe 4612 xoptiec.exe 4744 8fc01923e273e72a72cb87ab9c4b29e0N.exe 4744 8fc01923e273e72a72cb87ab9c4b29e0N.exe 4612 xoptiec.exe 4612 xoptiec.exe 4744 8fc01923e273e72a72cb87ab9c4b29e0N.exe 4744 8fc01923e273e72a72cb87ab9c4b29e0N.exe 4612 xoptiec.exe 4612 xoptiec.exe 4744 8fc01923e273e72a72cb87ab9c4b29e0N.exe 4744 8fc01923e273e72a72cb87ab9c4b29e0N.exe 4612 xoptiec.exe 4612 xoptiec.exe 4744 8fc01923e273e72a72cb87ab9c4b29e0N.exe 4744 8fc01923e273e72a72cb87ab9c4b29e0N.exe 4612 xoptiec.exe 4612 xoptiec.exe 4744 8fc01923e273e72a72cb87ab9c4b29e0N.exe 4744 8fc01923e273e72a72cb87ab9c4b29e0N.exe 4612 xoptiec.exe 4612 xoptiec.exe 4744 8fc01923e273e72a72cb87ab9c4b29e0N.exe 4744 8fc01923e273e72a72cb87ab9c4b29e0N.exe 4612 xoptiec.exe 4612 xoptiec.exe 4744 8fc01923e273e72a72cb87ab9c4b29e0N.exe 4744 8fc01923e273e72a72cb87ab9c4b29e0N.exe 4612 xoptiec.exe 4612 xoptiec.exe 4744 8fc01923e273e72a72cb87ab9c4b29e0N.exe 4744 8fc01923e273e72a72cb87ab9c4b29e0N.exe 4612 xoptiec.exe 4612 xoptiec.exe 4744 8fc01923e273e72a72cb87ab9c4b29e0N.exe 4744 8fc01923e273e72a72cb87ab9c4b29e0N.exe 4612 xoptiec.exe 4612 xoptiec.exe 4744 8fc01923e273e72a72cb87ab9c4b29e0N.exe 4744 8fc01923e273e72a72cb87ab9c4b29e0N.exe 4612 xoptiec.exe 4612 xoptiec.exe 4744 8fc01923e273e72a72cb87ab9c4b29e0N.exe 4744 8fc01923e273e72a72cb87ab9c4b29e0N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4744 wrote to memory of 4612 4744 8fc01923e273e72a72cb87ab9c4b29e0N.exe 89 PID 4744 wrote to memory of 4612 4744 8fc01923e273e72a72cb87ab9c4b29e0N.exe 89 PID 4744 wrote to memory of 4612 4744 8fc01923e273e72a72cb87ab9c4b29e0N.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\8fc01923e273e72a72cb87ab9c4b29e0N.exe"C:\Users\Admin\AppData\Local\Temp\8fc01923e273e72a72cb87ab9c4b29e0N.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\FilesZW\xoptiec.exeC:\FilesZW\xoptiec.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4612
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD5eb0e7fd9a0371c160d89c2f2b94a7d7b
SHA150f680e11157ff723d60a9e0e08bfa857d18b622
SHA25650cccd1ac8a5da738821088d7adb14b81d1edde5ef9395277a12ee95191f11ef
SHA512c3c52fd2a556f94514b3b7058d16efcf9037f464981c938c15fcf7a3b5ee63a19ce3f243e3631c0457d397d525504b49ef59d099be3e70bee43ecc8dbe57543e
-
Filesize
200B
MD5058c726e8a9ce7165eab19583e88f038
SHA12f0b713f6639eef57f62373e248109cd7008a897
SHA25655bc89dbf7f6db3789e854b7a9a2ec56240bf711e339286bd7ac97e7de0af50e
SHA512a7e499be06e6789567aba0e576b5a7ab9e48c434ff2ae0559119bc4246203aa6f6281fd23a59c76a7aa2e91a7ef25ce6cfeb4d65bbfab91cbf8bbcea63bc04f9
-
Filesize
1.1MB
MD56fe910de7bfd12f67e509257305ea4e5
SHA1a33b72d6aff7fbb5096d33efa8c513f219235411
SHA25683506f61c92ec934a077ab28eb1820a3d970067a9f0f289a887af424dc9691e4
SHA512dfa40fc430a47016c105b01f69220d6b180706f8760096135f7b8a8976cd15be1a9c3a710c293a7b6b8803969fee9d445b72a15e4ddf9c387464c0e0bee8df16
-
Filesize
2.7MB
MD5c808457fe1b7e70c8f6a1fd2e8c48cbc
SHA123b9e835910a734cf77a3d28814775e1fd88abbe
SHA25608f04758eea38c776948a37d3ab56ba5c8cd948cbb494e1417d155abb8818b92
SHA5127d65fee2a8fe18d66707f472bdf679ba3807e0139b4943aa93da1ff4066c1cf4bcabd10ec8c76ac2313cf20bff77fef45cb2fd8c276f46a2aaf696409ee479c0