Analysis
-
max time kernel
119s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
06/08/2024, 02:53
Static task
static1
Behavioral task
behavioral1
Sample
4b4bb546dd9ad7f18ceb6c2252e66d10N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4b4bb546dd9ad7f18ceb6c2252e66d10N.exe
Resource
win10v2004-20240802-en
General
-
Target
4b4bb546dd9ad7f18ceb6c2252e66d10N.exe
-
Size
2.7MB
-
MD5
4b4bb546dd9ad7f18ceb6c2252e66d10
-
SHA1
7cbd6b8f616eafb381a701e1bfbd1139b5fc88ad
-
SHA256
21888a0ed3dd718e5413f9dfee4965bd013fe1d4a22b08de092549c71c8feb1e
-
SHA512
93fd0199381d389cd5416cfa48f7d27c3eb60378a050508b3b863f549d3eee77963130a2961c5827956bc5dc64147c53425542be9dad8eb509fd49d48a030c28
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBb9w4S+:+R0pI/IQlUoMPdmpSpn4X
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2800 devoptisys.exe -
Loads dropped DLL 1 IoCs
pid Process 2272 4b4bb546dd9ad7f18ceb6c2252e66d10N.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\FilesTX\\devoptisys.exe" 4b4bb546dd9ad7f18ceb6c2252e66d10N.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\GalaxF3\\boddevec.exe" 4b4bb546dd9ad7f18ceb6c2252e66d10N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4b4bb546dd9ad7f18ceb6c2252e66d10N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language devoptisys.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2272 4b4bb546dd9ad7f18ceb6c2252e66d10N.exe 2272 4b4bb546dd9ad7f18ceb6c2252e66d10N.exe 2800 devoptisys.exe 2272 4b4bb546dd9ad7f18ceb6c2252e66d10N.exe 2800 devoptisys.exe 2272 4b4bb546dd9ad7f18ceb6c2252e66d10N.exe 2800 devoptisys.exe 2272 4b4bb546dd9ad7f18ceb6c2252e66d10N.exe 2800 devoptisys.exe 2272 4b4bb546dd9ad7f18ceb6c2252e66d10N.exe 2800 devoptisys.exe 2272 4b4bb546dd9ad7f18ceb6c2252e66d10N.exe 2800 devoptisys.exe 2272 4b4bb546dd9ad7f18ceb6c2252e66d10N.exe 2800 devoptisys.exe 2272 4b4bb546dd9ad7f18ceb6c2252e66d10N.exe 2800 devoptisys.exe 2272 4b4bb546dd9ad7f18ceb6c2252e66d10N.exe 2800 devoptisys.exe 2272 4b4bb546dd9ad7f18ceb6c2252e66d10N.exe 2800 devoptisys.exe 2272 4b4bb546dd9ad7f18ceb6c2252e66d10N.exe 2800 devoptisys.exe 2272 4b4bb546dd9ad7f18ceb6c2252e66d10N.exe 2800 devoptisys.exe 2272 4b4bb546dd9ad7f18ceb6c2252e66d10N.exe 2800 devoptisys.exe 2272 4b4bb546dd9ad7f18ceb6c2252e66d10N.exe 2800 devoptisys.exe 2272 4b4bb546dd9ad7f18ceb6c2252e66d10N.exe 2800 devoptisys.exe 2272 4b4bb546dd9ad7f18ceb6c2252e66d10N.exe 2800 devoptisys.exe 2272 4b4bb546dd9ad7f18ceb6c2252e66d10N.exe 2800 devoptisys.exe 2272 4b4bb546dd9ad7f18ceb6c2252e66d10N.exe 2800 devoptisys.exe 2272 4b4bb546dd9ad7f18ceb6c2252e66d10N.exe 2800 devoptisys.exe 2272 4b4bb546dd9ad7f18ceb6c2252e66d10N.exe 2800 devoptisys.exe 2272 4b4bb546dd9ad7f18ceb6c2252e66d10N.exe 2800 devoptisys.exe 2272 4b4bb546dd9ad7f18ceb6c2252e66d10N.exe 2800 devoptisys.exe 2272 4b4bb546dd9ad7f18ceb6c2252e66d10N.exe 2800 devoptisys.exe 2272 4b4bb546dd9ad7f18ceb6c2252e66d10N.exe 2800 devoptisys.exe 2272 4b4bb546dd9ad7f18ceb6c2252e66d10N.exe 2800 devoptisys.exe 2272 4b4bb546dd9ad7f18ceb6c2252e66d10N.exe 2800 devoptisys.exe 2272 4b4bb546dd9ad7f18ceb6c2252e66d10N.exe 2800 devoptisys.exe 2272 4b4bb546dd9ad7f18ceb6c2252e66d10N.exe 2800 devoptisys.exe 2272 4b4bb546dd9ad7f18ceb6c2252e66d10N.exe 2800 devoptisys.exe 2272 4b4bb546dd9ad7f18ceb6c2252e66d10N.exe 2800 devoptisys.exe 2272 4b4bb546dd9ad7f18ceb6c2252e66d10N.exe 2800 devoptisys.exe 2272 4b4bb546dd9ad7f18ceb6c2252e66d10N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2272 wrote to memory of 2800 2272 4b4bb546dd9ad7f18ceb6c2252e66d10N.exe 30 PID 2272 wrote to memory of 2800 2272 4b4bb546dd9ad7f18ceb6c2252e66d10N.exe 30 PID 2272 wrote to memory of 2800 2272 4b4bb546dd9ad7f18ceb6c2252e66d10N.exe 30 PID 2272 wrote to memory of 2800 2272 4b4bb546dd9ad7f18ceb6c2252e66d10N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\4b4bb546dd9ad7f18ceb6c2252e66d10N.exe"C:\Users\Admin\AppData\Local\Temp\4b4bb546dd9ad7f18ceb6c2252e66d10N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\FilesTX\devoptisys.exeC:\FilesTX\devoptisys.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2800
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD5ec12dbdcdf0ebf85592432e54f214829
SHA10bd10262ddb4c302ee9bb905c71899684413e116
SHA2564662f3560c5e080777e8b315fe759da76a45ca3df7705254f3d159c4ec01f4fc
SHA51259e9f735fbf754cbbc8c8f2654e0e085299bb094d9b5d283c6f44265effc4ca5abd5c82884df19a4a0ec940cd85f40900d1c95f01a552b4f87f46c8633d3b0ea
-
Filesize
207B
MD527b9b8810637e073938973ae3849db93
SHA19506f9f41bf90cae3652602e3c439c5aaa34efed
SHA2569bc8f980328333fa0cd290cd59a27dea4015cae9a7972ba51dd2010a03b1cdcc
SHA512098271b49d7c858af553ddb565644601b21cc275c392be941cfdc86a4c811d75c798bcf99067ad8f06f2942624ba3b342529f00459e228cbce53d7cf2cc7d6d3
-
Filesize
2.7MB
MD5ea83979dcab7aa8a8e4097e9e0762880
SHA1d4eaef86142991d86dae18b99ba8f87c1c7ab1c9
SHA2568fd8ae0faea8924f537817594de3a2f20680acb7be83c34d020d3036a224624b
SHA51245c5dd6e786a12e1cb5ae115018a1db1dcfdc8bd06623bd5c90f4b842ba25853f6e76d56a6e9584e9875557edd92babb04729387be135eb9bb343c88ad06a789