Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
85s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18/08/2024, 02:18
Static task
static1
Behavioral task
behavioral1
Sample
4a0d6ec6b2bdd3f6fc81cc158f0342d0N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
4a0d6ec6b2bdd3f6fc81cc158f0342d0N.exe
Resource
win10v2004-20240802-en
General
-
Target
4a0d6ec6b2bdd3f6fc81cc158f0342d0N.exe
-
Size
2.7MB
-
MD5
4a0d6ec6b2bdd3f6fc81cc158f0342d0
-
SHA1
ddd6340d156b0a61f38336ce4c951c383ef3ab0a
-
SHA256
d5b53869944308d199558c0f07b9a665d1bd4cdaac3816abc8c7db2c5ebf8a2d
-
SHA512
0f6f312158598afa4039d109463d56334beeab66222006ba1653cd1e514da29eb9e383aa0126188b6d194c26affdc760624b1c35ced876bcf70407d5b2092ffd
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBL9w4S+:+R0pI/IQlUoMPdmpSpv4X
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2604 xoptisys.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\FilesLL\\xoptisys.exe" 4a0d6ec6b2bdd3f6fc81cc158f0342d0N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\Vid7I\\optidevec.exe" 4a0d6ec6b2bdd3f6fc81cc158f0342d0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4a0d6ec6b2bdd3f6fc81cc158f0342d0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xoptisys.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4556 4a0d6ec6b2bdd3f6fc81cc158f0342d0N.exe 4556 4a0d6ec6b2bdd3f6fc81cc158f0342d0N.exe 4556 4a0d6ec6b2bdd3f6fc81cc158f0342d0N.exe 4556 4a0d6ec6b2bdd3f6fc81cc158f0342d0N.exe 2604 xoptisys.exe 2604 xoptisys.exe 4556 4a0d6ec6b2bdd3f6fc81cc158f0342d0N.exe 4556 4a0d6ec6b2bdd3f6fc81cc158f0342d0N.exe 2604 xoptisys.exe 2604 xoptisys.exe 4556 4a0d6ec6b2bdd3f6fc81cc158f0342d0N.exe 4556 4a0d6ec6b2bdd3f6fc81cc158f0342d0N.exe 2604 xoptisys.exe 2604 xoptisys.exe 4556 4a0d6ec6b2bdd3f6fc81cc158f0342d0N.exe 4556 4a0d6ec6b2bdd3f6fc81cc158f0342d0N.exe 2604 xoptisys.exe 2604 xoptisys.exe 4556 4a0d6ec6b2bdd3f6fc81cc158f0342d0N.exe 4556 4a0d6ec6b2bdd3f6fc81cc158f0342d0N.exe 2604 xoptisys.exe 2604 xoptisys.exe 4556 4a0d6ec6b2bdd3f6fc81cc158f0342d0N.exe 4556 4a0d6ec6b2bdd3f6fc81cc158f0342d0N.exe 2604 xoptisys.exe 2604 xoptisys.exe 4556 4a0d6ec6b2bdd3f6fc81cc158f0342d0N.exe 4556 4a0d6ec6b2bdd3f6fc81cc158f0342d0N.exe 2604 xoptisys.exe 2604 xoptisys.exe 4556 4a0d6ec6b2bdd3f6fc81cc158f0342d0N.exe 4556 4a0d6ec6b2bdd3f6fc81cc158f0342d0N.exe 2604 xoptisys.exe 2604 xoptisys.exe 4556 4a0d6ec6b2bdd3f6fc81cc158f0342d0N.exe 4556 4a0d6ec6b2bdd3f6fc81cc158f0342d0N.exe 2604 xoptisys.exe 2604 xoptisys.exe 4556 4a0d6ec6b2bdd3f6fc81cc158f0342d0N.exe 4556 4a0d6ec6b2bdd3f6fc81cc158f0342d0N.exe 2604 xoptisys.exe 2604 xoptisys.exe 4556 4a0d6ec6b2bdd3f6fc81cc158f0342d0N.exe 4556 4a0d6ec6b2bdd3f6fc81cc158f0342d0N.exe 2604 xoptisys.exe 2604 xoptisys.exe 4556 4a0d6ec6b2bdd3f6fc81cc158f0342d0N.exe 4556 4a0d6ec6b2bdd3f6fc81cc158f0342d0N.exe 2604 xoptisys.exe 2604 xoptisys.exe 4556 4a0d6ec6b2bdd3f6fc81cc158f0342d0N.exe 4556 4a0d6ec6b2bdd3f6fc81cc158f0342d0N.exe 2604 xoptisys.exe 2604 xoptisys.exe 4556 4a0d6ec6b2bdd3f6fc81cc158f0342d0N.exe 4556 4a0d6ec6b2bdd3f6fc81cc158f0342d0N.exe 2604 xoptisys.exe 2604 xoptisys.exe 4556 4a0d6ec6b2bdd3f6fc81cc158f0342d0N.exe 4556 4a0d6ec6b2bdd3f6fc81cc158f0342d0N.exe 2604 xoptisys.exe 2604 xoptisys.exe 4556 4a0d6ec6b2bdd3f6fc81cc158f0342d0N.exe 4556 4a0d6ec6b2bdd3f6fc81cc158f0342d0N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4556 wrote to memory of 2604 4556 4a0d6ec6b2bdd3f6fc81cc158f0342d0N.exe 90 PID 4556 wrote to memory of 2604 4556 4a0d6ec6b2bdd3f6fc81cc158f0342d0N.exe 90 PID 4556 wrote to memory of 2604 4556 4a0d6ec6b2bdd3f6fc81cc158f0342d0N.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\4a0d6ec6b2bdd3f6fc81cc158f0342d0N.exe"C:\Users\Admin\AppData\Local\Temp\4a0d6ec6b2bdd3f6fc81cc158f0342d0N.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\FilesLL\xoptisys.exeC:\FilesLL\xoptisys.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2604
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD5d2b7bb80b3f23b712d257830bdd98444
SHA1118da259c209639ecb3efdf53693e8fe6c52c75c
SHA25651526164a5789153ae9b1ec85902492701f252ca794500906a195b1de00ca8db
SHA512229a670455ad5f859648a19a32b0b616cc59c8450f796e2c69567ad13ffa70c7c55a7072a262ad0a9caf00d54f4b0a45d979d1534b1b4d6863a4b54349a37c24
-
Filesize
204B
MD5ae17c9aa564ee1fcad9dee5de7791ce9
SHA148243ab02fa4d2323e10378481c58716ec654295
SHA256dd13b6456dafbdc9f2a4f058175111fb50b156d0fa81b11e2b0dc391d2c19dbd
SHA5127715b83e1a16dd046d79572290fe540f799a6582e983bce3170a4ab366674c05f753ad4065fb533b81134f2792b2a4bec5795c79b9acfe526ad7d1df6144efd5
-
Filesize
2.7MB
MD5ce611ab52f2eb30a24ce6c7eb9034631
SHA1552d3e59650baee7e4b67f03beb2cfcabefbe3a3
SHA256d73a75768a619a1f4e46daee3ac41795f24277e843fbce6d814c2d75697b219a
SHA512bb7987e351fe64356d62fea6a1b488c6d2195d3cd9a8e8cf05150718519ae46812f86cf4b39a12314db63a71169448f2096c28123c1063656538788121f1d200