Analysis
-
max time kernel
150s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
12-08-2024 02:49
Static task
static1
Behavioral task
behavioral1
Sample
d62fec072cbf4e1b69e229d744dd27c456fba36e4885d7ed8c8624e60605b1bc.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
d62fec072cbf4e1b69e229d744dd27c456fba36e4885d7ed8c8624e60605b1bc.exe
Resource
win10v2004-20240802-en
General
-
Target
d62fec072cbf4e1b69e229d744dd27c456fba36e4885d7ed8c8624e60605b1bc.exe
-
Size
2.7MB
-
MD5
17335fd3780df5075953e9e1bf3ab118
-
SHA1
6ac5101a407e5f82cef7f8ea0ff4397b9ffe7c1e
-
SHA256
d62fec072cbf4e1b69e229d744dd27c456fba36e4885d7ed8c8624e60605b1bc
-
SHA512
8f54b131dc3191de78443fcf129b26d4ff6a9a663161a929d806f47fd5960e7656d261c0c14cb777f7bc2a1ff299f84cc9653c3ec01bf79cfd711519b4a20aee
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBY9w4Sx:+R0pI/IQlUoMPdmpSp64
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 556 aoptiloc.exe -
Loads dropped DLL 1 IoCs
pid Process 2532 d62fec072cbf4e1b69e229d744dd27c456fba36e4885d7ed8c8624e60605b1bc.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\UserDotSO\\aoptiloc.exe" d62fec072cbf4e1b69e229d744dd27c456fba36e4885d7ed8c8624e60605b1bc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\GalaxEQ\\optiasys.exe" d62fec072cbf4e1b69e229d744dd27c456fba36e4885d7ed8c8624e60605b1bc.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d62fec072cbf4e1b69e229d744dd27c456fba36e4885d7ed8c8624e60605b1bc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aoptiloc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2532 d62fec072cbf4e1b69e229d744dd27c456fba36e4885d7ed8c8624e60605b1bc.exe 2532 d62fec072cbf4e1b69e229d744dd27c456fba36e4885d7ed8c8624e60605b1bc.exe 556 aoptiloc.exe 2532 d62fec072cbf4e1b69e229d744dd27c456fba36e4885d7ed8c8624e60605b1bc.exe 556 aoptiloc.exe 2532 d62fec072cbf4e1b69e229d744dd27c456fba36e4885d7ed8c8624e60605b1bc.exe 556 aoptiloc.exe 2532 d62fec072cbf4e1b69e229d744dd27c456fba36e4885d7ed8c8624e60605b1bc.exe 556 aoptiloc.exe 2532 d62fec072cbf4e1b69e229d744dd27c456fba36e4885d7ed8c8624e60605b1bc.exe 556 aoptiloc.exe 2532 d62fec072cbf4e1b69e229d744dd27c456fba36e4885d7ed8c8624e60605b1bc.exe 556 aoptiloc.exe 2532 d62fec072cbf4e1b69e229d744dd27c456fba36e4885d7ed8c8624e60605b1bc.exe 556 aoptiloc.exe 2532 d62fec072cbf4e1b69e229d744dd27c456fba36e4885d7ed8c8624e60605b1bc.exe 556 aoptiloc.exe 2532 d62fec072cbf4e1b69e229d744dd27c456fba36e4885d7ed8c8624e60605b1bc.exe 556 aoptiloc.exe 2532 d62fec072cbf4e1b69e229d744dd27c456fba36e4885d7ed8c8624e60605b1bc.exe 556 aoptiloc.exe 2532 d62fec072cbf4e1b69e229d744dd27c456fba36e4885d7ed8c8624e60605b1bc.exe 556 aoptiloc.exe 2532 d62fec072cbf4e1b69e229d744dd27c456fba36e4885d7ed8c8624e60605b1bc.exe 556 aoptiloc.exe 2532 d62fec072cbf4e1b69e229d744dd27c456fba36e4885d7ed8c8624e60605b1bc.exe 556 aoptiloc.exe 2532 d62fec072cbf4e1b69e229d744dd27c456fba36e4885d7ed8c8624e60605b1bc.exe 556 aoptiloc.exe 2532 d62fec072cbf4e1b69e229d744dd27c456fba36e4885d7ed8c8624e60605b1bc.exe 556 aoptiloc.exe 2532 d62fec072cbf4e1b69e229d744dd27c456fba36e4885d7ed8c8624e60605b1bc.exe 556 aoptiloc.exe 2532 d62fec072cbf4e1b69e229d744dd27c456fba36e4885d7ed8c8624e60605b1bc.exe 556 aoptiloc.exe 2532 d62fec072cbf4e1b69e229d744dd27c456fba36e4885d7ed8c8624e60605b1bc.exe 556 aoptiloc.exe 2532 d62fec072cbf4e1b69e229d744dd27c456fba36e4885d7ed8c8624e60605b1bc.exe 556 aoptiloc.exe 2532 d62fec072cbf4e1b69e229d744dd27c456fba36e4885d7ed8c8624e60605b1bc.exe 556 aoptiloc.exe 2532 d62fec072cbf4e1b69e229d744dd27c456fba36e4885d7ed8c8624e60605b1bc.exe 556 aoptiloc.exe 2532 d62fec072cbf4e1b69e229d744dd27c456fba36e4885d7ed8c8624e60605b1bc.exe 556 aoptiloc.exe 2532 d62fec072cbf4e1b69e229d744dd27c456fba36e4885d7ed8c8624e60605b1bc.exe 556 aoptiloc.exe 2532 d62fec072cbf4e1b69e229d744dd27c456fba36e4885d7ed8c8624e60605b1bc.exe 556 aoptiloc.exe 2532 d62fec072cbf4e1b69e229d744dd27c456fba36e4885d7ed8c8624e60605b1bc.exe 556 aoptiloc.exe 2532 d62fec072cbf4e1b69e229d744dd27c456fba36e4885d7ed8c8624e60605b1bc.exe 556 aoptiloc.exe 2532 d62fec072cbf4e1b69e229d744dd27c456fba36e4885d7ed8c8624e60605b1bc.exe 556 aoptiloc.exe 2532 d62fec072cbf4e1b69e229d744dd27c456fba36e4885d7ed8c8624e60605b1bc.exe 556 aoptiloc.exe 2532 d62fec072cbf4e1b69e229d744dd27c456fba36e4885d7ed8c8624e60605b1bc.exe 556 aoptiloc.exe 2532 d62fec072cbf4e1b69e229d744dd27c456fba36e4885d7ed8c8624e60605b1bc.exe 556 aoptiloc.exe 2532 d62fec072cbf4e1b69e229d744dd27c456fba36e4885d7ed8c8624e60605b1bc.exe 556 aoptiloc.exe 2532 d62fec072cbf4e1b69e229d744dd27c456fba36e4885d7ed8c8624e60605b1bc.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2532 wrote to memory of 556 2532 d62fec072cbf4e1b69e229d744dd27c456fba36e4885d7ed8c8624e60605b1bc.exe 29 PID 2532 wrote to memory of 556 2532 d62fec072cbf4e1b69e229d744dd27c456fba36e4885d7ed8c8624e60605b1bc.exe 29 PID 2532 wrote to memory of 556 2532 d62fec072cbf4e1b69e229d744dd27c456fba36e4885d7ed8c8624e60605b1bc.exe 29 PID 2532 wrote to memory of 556 2532 d62fec072cbf4e1b69e229d744dd27c456fba36e4885d7ed8c8624e60605b1bc.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\d62fec072cbf4e1b69e229d744dd27c456fba36e4885d7ed8c8624e60605b1bc.exe"C:\Users\Admin\AppData\Local\Temp\d62fec072cbf4e1b69e229d744dd27c456fba36e4885d7ed8c8624e60605b1bc.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\UserDotSO\aoptiloc.exeC:\UserDotSO\aoptiloc.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:556
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD5247b0ef43e317bf1fe2dd83088e8e80d
SHA1d15b5bcb8d17b806ca2753939e4f890faee78ad9
SHA2567ba4a84d890cf8a6e74d0028511bc2f9ce092c2e02b7663499d11488180d6f2a
SHA51202bf89b87dbdd4e78e8253b4930bac2bb6ae78f35815d77ca72b21552807c944b4a06b2dc2fd419039f62df972362ac6eca0038863fe20a08d09bd904720dcd0
-
Filesize
205B
MD5b08ede3d5863d1adbb2a73ded516817b
SHA179a5126a0c02bd65899aac3522c9920c3803b807
SHA2564ca8181903ade4758bdb6e8c7a963c0d78d702d76aaad0c3a6ae9f00156b2b36
SHA512dae5d0513af4e9255560bba0ed8bfe72cd2bfa12df45f5902ab2236e7accb263c19486a6ace8cab6b42cf502704f6fcdf5d2c55ec9e400486ea4cb7457e69699
-
Filesize
2.7MB
MD5c4091d23757533d11a88cc5893621826
SHA16a1299437045e9e893a974fdc88c6284f22476b7
SHA25618d08955df7b4af614e85979237c10f239f772f7352f507259b8d534980e1fce
SHA5123060cd472a6b95c56d25cd63314df3b8bdfce95442872b4215d70844037272b02ef07103bf6cdbb3845d8c1cfe2cb6d20aa85a46bdfadc2c97e2585dd98f21c3