Analysis
-
max time kernel
119s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05/08/2024, 17:58
Static task
static1
Behavioral task
behavioral1
Sample
bb726c099bb776a6e091d9149d3206a0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bb726c099bb776a6e091d9149d3206a0N.exe
Resource
win10v2004-20240802-en
General
-
Target
bb726c099bb776a6e091d9149d3206a0N.exe
-
Size
2.7MB
-
MD5
bb726c099bb776a6e091d9149d3206a0
-
SHA1
bedc97b7d17174d804eb3c0ee3209486905be61a
-
SHA256
7afef8a4758be5c64c1177ed2422b1a7f963a0bbf4ab98d264f1ac521c5681c4
-
SHA512
4a6bccb4581860e98fae0521890440105e33c5d5e186f3affcb2110063527d985374ec6f7710aa3b1a36f1b51dc65078815c0ffc485f29365189fa933c279a52
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBZ9w4Sx:+R0pI/IQlUoMPdmpSp94
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3108 xoptisys.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\FilesZ8\\xoptisys.exe" bb726c099bb776a6e091d9149d3206a0N.exe Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\Mint21\\optixloc.exe" bb726c099bb776a6e091d9149d3206a0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bb726c099bb776a6e091d9149d3206a0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xoptisys.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4536 bb726c099bb776a6e091d9149d3206a0N.exe 4536 bb726c099bb776a6e091d9149d3206a0N.exe 4536 bb726c099bb776a6e091d9149d3206a0N.exe 4536 bb726c099bb776a6e091d9149d3206a0N.exe 3108 xoptisys.exe 3108 xoptisys.exe 4536 bb726c099bb776a6e091d9149d3206a0N.exe 4536 bb726c099bb776a6e091d9149d3206a0N.exe 3108 xoptisys.exe 3108 xoptisys.exe 4536 bb726c099bb776a6e091d9149d3206a0N.exe 4536 bb726c099bb776a6e091d9149d3206a0N.exe 3108 xoptisys.exe 3108 xoptisys.exe 4536 bb726c099bb776a6e091d9149d3206a0N.exe 4536 bb726c099bb776a6e091d9149d3206a0N.exe 3108 xoptisys.exe 3108 xoptisys.exe 4536 bb726c099bb776a6e091d9149d3206a0N.exe 4536 bb726c099bb776a6e091d9149d3206a0N.exe 3108 xoptisys.exe 3108 xoptisys.exe 4536 bb726c099bb776a6e091d9149d3206a0N.exe 4536 bb726c099bb776a6e091d9149d3206a0N.exe 3108 xoptisys.exe 3108 xoptisys.exe 4536 bb726c099bb776a6e091d9149d3206a0N.exe 4536 bb726c099bb776a6e091d9149d3206a0N.exe 3108 xoptisys.exe 3108 xoptisys.exe 4536 bb726c099bb776a6e091d9149d3206a0N.exe 4536 bb726c099bb776a6e091d9149d3206a0N.exe 3108 xoptisys.exe 3108 xoptisys.exe 4536 bb726c099bb776a6e091d9149d3206a0N.exe 4536 bb726c099bb776a6e091d9149d3206a0N.exe 3108 xoptisys.exe 3108 xoptisys.exe 4536 bb726c099bb776a6e091d9149d3206a0N.exe 4536 bb726c099bb776a6e091d9149d3206a0N.exe 3108 xoptisys.exe 3108 xoptisys.exe 4536 bb726c099bb776a6e091d9149d3206a0N.exe 4536 bb726c099bb776a6e091d9149d3206a0N.exe 3108 xoptisys.exe 3108 xoptisys.exe 4536 bb726c099bb776a6e091d9149d3206a0N.exe 4536 bb726c099bb776a6e091d9149d3206a0N.exe 3108 xoptisys.exe 3108 xoptisys.exe 4536 bb726c099bb776a6e091d9149d3206a0N.exe 4536 bb726c099bb776a6e091d9149d3206a0N.exe 3108 xoptisys.exe 3108 xoptisys.exe 4536 bb726c099bb776a6e091d9149d3206a0N.exe 4536 bb726c099bb776a6e091d9149d3206a0N.exe 3108 xoptisys.exe 3108 xoptisys.exe 4536 bb726c099bb776a6e091d9149d3206a0N.exe 4536 bb726c099bb776a6e091d9149d3206a0N.exe 3108 xoptisys.exe 3108 xoptisys.exe 4536 bb726c099bb776a6e091d9149d3206a0N.exe 4536 bb726c099bb776a6e091d9149d3206a0N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4536 wrote to memory of 3108 4536 bb726c099bb776a6e091d9149d3206a0N.exe 86 PID 4536 wrote to memory of 3108 4536 bb726c099bb776a6e091d9149d3206a0N.exe 86 PID 4536 wrote to memory of 3108 4536 bb726c099bb776a6e091d9149d3206a0N.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\bb726c099bb776a6e091d9149d3206a0N.exe"C:\Users\Admin\AppData\Local\Temp\bb726c099bb776a6e091d9149d3206a0N.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4536 -
C:\FilesZ8\xoptisys.exeC:\FilesZ8\xoptisys.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3108
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD583bc82f9699e9a8053b98e38a5b739b9
SHA14b6151e6c3dbaed3634df914e43cb85ba39423dd
SHA256c33d04b38c0b46f9ad6bf3254effc6b4808c32221e733f78f9d28281f1296f65
SHA51209e364d96f14ddbf61f5edc266ce7fa8265ff1f84b0b78ab2720bc98fc7e0850b72b81e72007857d53e88bf893a86654226626c2b8230eac81144c4a43ec070c
-
Filesize
235KB
MD5b35300c5f9a10dcb5add53f2f66c9804
SHA18acdd436182c3feff02d0d438870e3411bace137
SHA256881e1a9bc5414339862c118126f7bfbe52abbddeb5285f0c5dc69ec3fedd7184
SHA512862ae14578ede4439d1260f7460db3aef6abbf3c76eecf1ddb5064f345600fbd6ebdadc413ec05bbdcf33443f18de6c175cc2412adf13a2457516d650d2e07e6
-
Filesize
2.7MB
MD56776ce88dc4f2415e1d03509279c15bf
SHA16d3f39d98e5f88449675357c49f6c34bad9c6248
SHA256b8ebf1ba6c045211290eb25b7a2ed75f08c3da7b538dcba0657ce93d9312981b
SHA512180e44ac188c10b6667a4823e2bd632b49212da02dcd16f335bb4b7a6521f3eb24132f62e9f2df861ffe339f20cba9d80f55f65e32f3028b43331ed97d7f0b63
-
Filesize
203B
MD50cf6775b4fad7cdb8d30f5fb51962514
SHA18833fc43d6938c18a37ab4f3cb976051cb39a8ee
SHA2567214f9bde3dc87c876656757e2c0be27fd08e62d715596180561e510514da3b2
SHA5120e784925fc37098eeaac9840871c50a249c34e921cfee9f98f7f2cd2375ea08af525d25bcb314a695826c3f1ff0df6e77f645ef333d33635f2da0d3d65bf0d4f