Analysis
-
max time kernel
119s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06-08-2024 19:34
Static task
static1
Behavioral task
behavioral1
Sample
dd30e0feeb5acb0763ad4d2db3df8000N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
dd30e0feeb5acb0763ad4d2db3df8000N.exe
Resource
win10v2004-20240802-en
General
-
Target
dd30e0feeb5acb0763ad4d2db3df8000N.exe
-
Size
3.1MB
-
MD5
dd30e0feeb5acb0763ad4d2db3df8000
-
SHA1
05805e6cd559f767cc932171720b37efc7c15df2
-
SHA256
1e7b7a115a3537640c95fcbbe239c0b43c991144bf41867e487ace1fbafcebd3
-
SHA512
713330ba87cc364db2eb4ef8a3376e49ce30e869618f9b3de790ccf788d8a6cc946fb2bc7bc60b56554df511dfc1211bd2d7a737cf003aee50d2456197414931
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LB/9w4Su+LNfej:+R0pI/IQlUoMPdmpSpL4JkNfej
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1596 aoptisys.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\UserDotXZ\\aoptisys.exe" dd30e0feeb5acb0763ad4d2db3df8000N.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\LabZN2\\bodxsys.exe" dd30e0feeb5acb0763ad4d2db3df8000N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dd30e0feeb5acb0763ad4d2db3df8000N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aoptisys.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1220 dd30e0feeb5acb0763ad4d2db3df8000N.exe 1220 dd30e0feeb5acb0763ad4d2db3df8000N.exe 1220 dd30e0feeb5acb0763ad4d2db3df8000N.exe 1220 dd30e0feeb5acb0763ad4d2db3df8000N.exe 1596 aoptisys.exe 1596 aoptisys.exe 1220 dd30e0feeb5acb0763ad4d2db3df8000N.exe 1220 dd30e0feeb5acb0763ad4d2db3df8000N.exe 1596 aoptisys.exe 1596 aoptisys.exe 1220 dd30e0feeb5acb0763ad4d2db3df8000N.exe 1220 dd30e0feeb5acb0763ad4d2db3df8000N.exe 1596 aoptisys.exe 1596 aoptisys.exe 1220 dd30e0feeb5acb0763ad4d2db3df8000N.exe 1220 dd30e0feeb5acb0763ad4d2db3df8000N.exe 1596 aoptisys.exe 1596 aoptisys.exe 1220 dd30e0feeb5acb0763ad4d2db3df8000N.exe 1220 dd30e0feeb5acb0763ad4d2db3df8000N.exe 1596 aoptisys.exe 1596 aoptisys.exe 1220 dd30e0feeb5acb0763ad4d2db3df8000N.exe 1220 dd30e0feeb5acb0763ad4d2db3df8000N.exe 1596 aoptisys.exe 1596 aoptisys.exe 1220 dd30e0feeb5acb0763ad4d2db3df8000N.exe 1220 dd30e0feeb5acb0763ad4d2db3df8000N.exe 1596 aoptisys.exe 1596 aoptisys.exe 1220 dd30e0feeb5acb0763ad4d2db3df8000N.exe 1220 dd30e0feeb5acb0763ad4d2db3df8000N.exe 1596 aoptisys.exe 1596 aoptisys.exe 1220 dd30e0feeb5acb0763ad4d2db3df8000N.exe 1220 dd30e0feeb5acb0763ad4d2db3df8000N.exe 1596 aoptisys.exe 1596 aoptisys.exe 1220 dd30e0feeb5acb0763ad4d2db3df8000N.exe 1220 dd30e0feeb5acb0763ad4d2db3df8000N.exe 1596 aoptisys.exe 1596 aoptisys.exe 1220 dd30e0feeb5acb0763ad4d2db3df8000N.exe 1220 dd30e0feeb5acb0763ad4d2db3df8000N.exe 1596 aoptisys.exe 1596 aoptisys.exe 1220 dd30e0feeb5acb0763ad4d2db3df8000N.exe 1220 dd30e0feeb5acb0763ad4d2db3df8000N.exe 1596 aoptisys.exe 1596 aoptisys.exe 1220 dd30e0feeb5acb0763ad4d2db3df8000N.exe 1220 dd30e0feeb5acb0763ad4d2db3df8000N.exe 1596 aoptisys.exe 1596 aoptisys.exe 1220 dd30e0feeb5acb0763ad4d2db3df8000N.exe 1220 dd30e0feeb5acb0763ad4d2db3df8000N.exe 1596 aoptisys.exe 1596 aoptisys.exe 1220 dd30e0feeb5acb0763ad4d2db3df8000N.exe 1220 dd30e0feeb5acb0763ad4d2db3df8000N.exe 1596 aoptisys.exe 1596 aoptisys.exe 1220 dd30e0feeb5acb0763ad4d2db3df8000N.exe 1220 dd30e0feeb5acb0763ad4d2db3df8000N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1220 wrote to memory of 1596 1220 dd30e0feeb5acb0763ad4d2db3df8000N.exe 86 PID 1220 wrote to memory of 1596 1220 dd30e0feeb5acb0763ad4d2db3df8000N.exe 86 PID 1220 wrote to memory of 1596 1220 dd30e0feeb5acb0763ad4d2db3df8000N.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\dd30e0feeb5acb0763ad4d2db3df8000N.exe"C:\Users\Admin\AppData\Local\Temp\dd30e0feeb5acb0763ad4d2db3df8000N.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\UserDotXZ\aoptisys.exeC:\UserDotXZ\aoptisys.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1596
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD539ae478e12a6da9374114c132682ea8d
SHA1204754f87920abeee666de75463cce362b7e8319
SHA2564dc6bd368ce8733decda17fd4dd578d40e9c212a1e5f180229e75c9044001b6f
SHA512fc2268bb006f94d53b4b0d5c202c8eb52e080db4850d05adfb02090cf80dbfd378e642b1714dddc101263741844d052d7ca7aa8c6a20714f3ddaee1601f68fdf
-
Filesize
3.1MB
MD55b5acbfaba463176237b50c1e69bd8b5
SHA15d9f56c61bd18f212f8340e72019bf6568eebdfd
SHA2569c530a689dc9c7177243258fc52452bd142e08e6af39abf395770c7de6309575
SHA512d9ad72b00d2d933508665626426561fe8bf1c52aa79fde29fffe0cab40be8cb2857cd596e10e0bb1118db1832a7420f1e8fda4011c16a5849a0f118918ced4b4
-
Filesize
206B
MD577264d9d687b0cf824daeb1cecbf7593
SHA14a67ffe6284fbcfaf5d4ab26d592ae8c500997d5
SHA25658db858638eb0368647c82c7b271b4f7618b43ebbfce2f190b631a2a92a0dca6
SHA512b468f77587a71057b1f7a3273e17421dee7e2927f9b3cd01ad73b02efa44f032ca345ea01aa55c209394e57c05a081569a3b816cca8c9c864faa005a1c0a65b0