Analysis
-
max time kernel
119s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
02/08/2024, 01:54
Static task
static1
Behavioral task
behavioral1
Sample
37c5030647510da50883105fa2cfb5f0N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
37c5030647510da50883105fa2cfb5f0N.exe
Resource
win10v2004-20240730-en
General
-
Target
37c5030647510da50883105fa2cfb5f0N.exe
-
Size
2.7MB
-
MD5
37c5030647510da50883105fa2cfb5f0
-
SHA1
9ccf0b487ca3f41ffd55324d8345ed957b3a2103
-
SHA256
c21e1eacf186a304d30ee5193e13f5787b5068eabd8f8986a1fc1af460620236
-
SHA512
ca4466e68f13769993ff26b5ac57631f1d0b6194202fc933e6fe8275b6150b9d3c7e019ae1915446f12a7e6ad4272ccbb023d604c65213a8915e409310aa5e03
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBb9w4Sx:+R0pI/IQlUoMPdmpSpX4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2952 xoptiloc.exe -
Loads dropped DLL 1 IoCs
pid Process 2604 37c5030647510da50883105fa2cfb5f0N.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\FilesYV\\xoptiloc.exe" 37c5030647510da50883105fa2cfb5f0N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\LabZR1\\optixec.exe" 37c5030647510da50883105fa2cfb5f0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 37c5030647510da50883105fa2cfb5f0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xoptiloc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2604 37c5030647510da50883105fa2cfb5f0N.exe 2604 37c5030647510da50883105fa2cfb5f0N.exe 2952 xoptiloc.exe 2604 37c5030647510da50883105fa2cfb5f0N.exe 2952 xoptiloc.exe 2604 37c5030647510da50883105fa2cfb5f0N.exe 2952 xoptiloc.exe 2604 37c5030647510da50883105fa2cfb5f0N.exe 2952 xoptiloc.exe 2604 37c5030647510da50883105fa2cfb5f0N.exe 2952 xoptiloc.exe 2604 37c5030647510da50883105fa2cfb5f0N.exe 2952 xoptiloc.exe 2604 37c5030647510da50883105fa2cfb5f0N.exe 2952 xoptiloc.exe 2604 37c5030647510da50883105fa2cfb5f0N.exe 2952 xoptiloc.exe 2604 37c5030647510da50883105fa2cfb5f0N.exe 2952 xoptiloc.exe 2604 37c5030647510da50883105fa2cfb5f0N.exe 2952 xoptiloc.exe 2604 37c5030647510da50883105fa2cfb5f0N.exe 2952 xoptiloc.exe 2604 37c5030647510da50883105fa2cfb5f0N.exe 2952 xoptiloc.exe 2604 37c5030647510da50883105fa2cfb5f0N.exe 2952 xoptiloc.exe 2604 37c5030647510da50883105fa2cfb5f0N.exe 2952 xoptiloc.exe 2604 37c5030647510da50883105fa2cfb5f0N.exe 2952 xoptiloc.exe 2604 37c5030647510da50883105fa2cfb5f0N.exe 2952 xoptiloc.exe 2604 37c5030647510da50883105fa2cfb5f0N.exe 2952 xoptiloc.exe 2604 37c5030647510da50883105fa2cfb5f0N.exe 2952 xoptiloc.exe 2604 37c5030647510da50883105fa2cfb5f0N.exe 2952 xoptiloc.exe 2604 37c5030647510da50883105fa2cfb5f0N.exe 2952 xoptiloc.exe 2604 37c5030647510da50883105fa2cfb5f0N.exe 2952 xoptiloc.exe 2604 37c5030647510da50883105fa2cfb5f0N.exe 2952 xoptiloc.exe 2604 37c5030647510da50883105fa2cfb5f0N.exe 2952 xoptiloc.exe 2604 37c5030647510da50883105fa2cfb5f0N.exe 2952 xoptiloc.exe 2604 37c5030647510da50883105fa2cfb5f0N.exe 2952 xoptiloc.exe 2604 37c5030647510da50883105fa2cfb5f0N.exe 2952 xoptiloc.exe 2604 37c5030647510da50883105fa2cfb5f0N.exe 2952 xoptiloc.exe 2604 37c5030647510da50883105fa2cfb5f0N.exe 2952 xoptiloc.exe 2604 37c5030647510da50883105fa2cfb5f0N.exe 2952 xoptiloc.exe 2604 37c5030647510da50883105fa2cfb5f0N.exe 2952 xoptiloc.exe 2604 37c5030647510da50883105fa2cfb5f0N.exe 2952 xoptiloc.exe 2604 37c5030647510da50883105fa2cfb5f0N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2604 wrote to memory of 2952 2604 37c5030647510da50883105fa2cfb5f0N.exe 29 PID 2604 wrote to memory of 2952 2604 37c5030647510da50883105fa2cfb5f0N.exe 29 PID 2604 wrote to memory of 2952 2604 37c5030647510da50883105fa2cfb5f0N.exe 29 PID 2604 wrote to memory of 2952 2604 37c5030647510da50883105fa2cfb5f0N.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\37c5030647510da50883105fa2cfb5f0N.exe"C:\Users\Admin\AppData\Local\Temp\37c5030647510da50883105fa2cfb5f0N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\FilesYV\xoptiloc.exeC:\FilesYV\xoptiloc.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2952
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD5c57a18267e9d89a9f44997f1f25262e2
SHA1c60caad236576fe51a9ca30ea5239bd6779f8d9e
SHA256f847caa1210bfcf0563890988fca71c7309190618f0a3475b95ab1315d4a8fd0
SHA512a3ee255d43c48bea8b7b7d73ada1f71010496265e00a9d3cf3cf365a739523032db8945ce401022b03832294e7b6e5a59ea87841e0805b4933eb26f7a9b8054f
-
Filesize
200B
MD57115244b408ab73f5450f06ac06cfb31
SHA137650d1ad8d74bbe56ac22372dfd2e67cf293c28
SHA2568abe2c7f6777c3025b89677df5213052c8a90b1ec94583c7c40aed894e37073e
SHA51211033d1aa362c990c491a3b36dbb50da3ded953866ce8e8d59914642d8565002f12f53ded91c8f90cd7aa1d1a8703b41d131dba723ed44e854305149966d0c95
-
Filesize
2.7MB
MD5165669e9112054e07192f3e98a2e7953
SHA1df995a6dab69da53cc0c8aa0f37567d0a5db19dc
SHA256555201c7f79a0c7d4a85d8d80db3fb48115e31e1f6997abe74de0408e62f94ca
SHA512e2ca39ef3655e1ebb2241f65fc920406e7d6abbcfb2146c4837b294dbb285103933fcae28a3db44065a7bed31272a02f5ed622ffd43a6b9114acfa52a04ab3f7