Analysis

  • max time kernel
    119s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    02/08/2024, 01:54

General

  • Target

    37c5030647510da50883105fa2cfb5f0N.exe

  • Size

    2.7MB

  • MD5

    37c5030647510da50883105fa2cfb5f0

  • SHA1

    9ccf0b487ca3f41ffd55324d8345ed957b3a2103

  • SHA256

    c21e1eacf186a304d30ee5193e13f5787b5068eabd8f8986a1fc1af460620236

  • SHA512

    ca4466e68f13769993ff26b5ac57631f1d0b6194202fc933e6fe8275b6150b9d3c7e019ae1915446f12a7e6ad4272ccbb023d604c65213a8915e409310aa5e03

  • SSDEEP

    49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBb9w4Sx:+R0pI/IQlUoMPdmpSpX4

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\37c5030647510da50883105fa2cfb5f0N.exe
    "C:\Users\Admin\AppData\Local\Temp\37c5030647510da50883105fa2cfb5f0N.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2604
    • C:\FilesYV\xoptiloc.exe
      C:\FilesYV\xoptiloc.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2952

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\LabZR1\optixec.exe

          Filesize

          2.7MB

          MD5

          c57a18267e9d89a9f44997f1f25262e2

          SHA1

          c60caad236576fe51a9ca30ea5239bd6779f8d9e

          SHA256

          f847caa1210bfcf0563890988fca71c7309190618f0a3475b95ab1315d4a8fd0

          SHA512

          a3ee255d43c48bea8b7b7d73ada1f71010496265e00a9d3cf3cf365a739523032db8945ce401022b03832294e7b6e5a59ea87841e0805b4933eb26f7a9b8054f

        • C:\Users\Admin\253086396416_6.1_Admin.ini

          Filesize

          200B

          MD5

          7115244b408ab73f5450f06ac06cfb31

          SHA1

          37650d1ad8d74bbe56ac22372dfd2e67cf293c28

          SHA256

          8abe2c7f6777c3025b89677df5213052c8a90b1ec94583c7c40aed894e37073e

          SHA512

          11033d1aa362c990c491a3b36dbb50da3ded953866ce8e8d59914642d8565002f12f53ded91c8f90cd7aa1d1a8703b41d131dba723ed44e854305149966d0c95

        • \FilesYV\xoptiloc.exe

          Filesize

          2.7MB

          MD5

          165669e9112054e07192f3e98a2e7953

          SHA1

          df995a6dab69da53cc0c8aa0f37567d0a5db19dc

          SHA256

          555201c7f79a0c7d4a85d8d80db3fb48115e31e1f6997abe74de0408e62f94ca

          SHA512

          e2ca39ef3655e1ebb2241f65fc920406e7d6abbcfb2146c4837b294dbb285103933fcae28a3db44065a7bed31272a02f5ed622ffd43a6b9114acfa52a04ab3f7