Analysis
-
max time kernel
119s -
max time network
106s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-08-2024 22:04
Static task
static1
Behavioral task
behavioral1
Sample
3cb43997a527e6cb3589bca1b1809400N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3cb43997a527e6cb3589bca1b1809400N.exe
Resource
win10v2004-20240802-en
General
-
Target
3cb43997a527e6cb3589bca1b1809400N.exe
-
Size
2.7MB
-
MD5
3cb43997a527e6cb3589bca1b1809400
-
SHA1
788fc0a4c924238c58e19dd2cece33b2e6d81f98
-
SHA256
56e8927941d96304755d03dc51c95d52b3f1362bb79813834c65e5a4796ffd09
-
SHA512
5d7256975c0626b0acc001c6d57e996b1ac40e1cdac8880d68634ad364378d47a9697d142e5b7263d32ea38018be58b7cb803d3b812d13f65b6d191aee21d08d
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBW9w4Sx:+R0pI/IQlUoMPdmpSpc4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4108 devoptiloc.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\AdobeZY\\devoptiloc.exe" 3cb43997a527e6cb3589bca1b1809400N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\MintPT\\boddevsys.exe" 3cb43997a527e6cb3589bca1b1809400N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3cb43997a527e6cb3589bca1b1809400N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language devoptiloc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2472 3cb43997a527e6cb3589bca1b1809400N.exe 2472 3cb43997a527e6cb3589bca1b1809400N.exe 2472 3cb43997a527e6cb3589bca1b1809400N.exe 2472 3cb43997a527e6cb3589bca1b1809400N.exe 4108 devoptiloc.exe 4108 devoptiloc.exe 2472 3cb43997a527e6cb3589bca1b1809400N.exe 2472 3cb43997a527e6cb3589bca1b1809400N.exe 4108 devoptiloc.exe 4108 devoptiloc.exe 2472 3cb43997a527e6cb3589bca1b1809400N.exe 2472 3cb43997a527e6cb3589bca1b1809400N.exe 4108 devoptiloc.exe 4108 devoptiloc.exe 2472 3cb43997a527e6cb3589bca1b1809400N.exe 2472 3cb43997a527e6cb3589bca1b1809400N.exe 4108 devoptiloc.exe 4108 devoptiloc.exe 2472 3cb43997a527e6cb3589bca1b1809400N.exe 2472 3cb43997a527e6cb3589bca1b1809400N.exe 4108 devoptiloc.exe 4108 devoptiloc.exe 2472 3cb43997a527e6cb3589bca1b1809400N.exe 2472 3cb43997a527e6cb3589bca1b1809400N.exe 4108 devoptiloc.exe 4108 devoptiloc.exe 2472 3cb43997a527e6cb3589bca1b1809400N.exe 2472 3cb43997a527e6cb3589bca1b1809400N.exe 4108 devoptiloc.exe 4108 devoptiloc.exe 2472 3cb43997a527e6cb3589bca1b1809400N.exe 2472 3cb43997a527e6cb3589bca1b1809400N.exe 4108 devoptiloc.exe 4108 devoptiloc.exe 2472 3cb43997a527e6cb3589bca1b1809400N.exe 2472 3cb43997a527e6cb3589bca1b1809400N.exe 4108 devoptiloc.exe 4108 devoptiloc.exe 2472 3cb43997a527e6cb3589bca1b1809400N.exe 2472 3cb43997a527e6cb3589bca1b1809400N.exe 4108 devoptiloc.exe 4108 devoptiloc.exe 2472 3cb43997a527e6cb3589bca1b1809400N.exe 2472 3cb43997a527e6cb3589bca1b1809400N.exe 4108 devoptiloc.exe 4108 devoptiloc.exe 2472 3cb43997a527e6cb3589bca1b1809400N.exe 2472 3cb43997a527e6cb3589bca1b1809400N.exe 4108 devoptiloc.exe 4108 devoptiloc.exe 2472 3cb43997a527e6cb3589bca1b1809400N.exe 2472 3cb43997a527e6cb3589bca1b1809400N.exe 4108 devoptiloc.exe 4108 devoptiloc.exe 2472 3cb43997a527e6cb3589bca1b1809400N.exe 2472 3cb43997a527e6cb3589bca1b1809400N.exe 4108 devoptiloc.exe 4108 devoptiloc.exe 2472 3cb43997a527e6cb3589bca1b1809400N.exe 2472 3cb43997a527e6cb3589bca1b1809400N.exe 4108 devoptiloc.exe 4108 devoptiloc.exe 2472 3cb43997a527e6cb3589bca1b1809400N.exe 2472 3cb43997a527e6cb3589bca1b1809400N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2472 wrote to memory of 4108 2472 3cb43997a527e6cb3589bca1b1809400N.exe 92 PID 2472 wrote to memory of 4108 2472 3cb43997a527e6cb3589bca1b1809400N.exe 92 PID 2472 wrote to memory of 4108 2472 3cb43997a527e6cb3589bca1b1809400N.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\3cb43997a527e6cb3589bca1b1809400N.exe"C:\Users\Admin\AppData\Local\Temp\3cb43997a527e6cb3589bca1b1809400N.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\AdobeZY\devoptiloc.exeC:\AdobeZY\devoptiloc.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4108
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD5e320c0244aff2d1546e782f4175acf89
SHA1308d66437bf17fd17245041a7db36f669ad45fad
SHA2567df2b020b43d8456660aa82d52b8fbf22a7fa9c19afd4651f4babf023a229530
SHA512c01c469f46d47cdc51d9e08954432034f940b80d82c4b2f8a90aee628cb8617a29ae239bc91efaebbf9bc1136327d7777e5ba695178dde3e8a7c49f7e08f5bbc
-
Filesize
52KB
MD5b2d90ecd570f632b28133582fe5ba8a1
SHA12907f998c835d7ebfeba12772f9fbcdffe49c77d
SHA25694ee3fe1ab261a73c377bb96bb35b3be73ef8da4a14fab256302866f4b19d6d3
SHA512ec83c2af6adc6b46fa7c3f565bc35520c41630e316b999cf3e2a0422bb63eca7de5973dac6262d6f6dc045fc3c5071ec42e28addc1c39ea1f24667f509456e74
-
Filesize
205B
MD57e1bb2efe12d01bad0987db3f9de55be
SHA14d5ed032266bb74835ba0abdf160e69958f4f245
SHA256c200b5f82ef6bcd057df9efc6bd4135877dfe9afa8038d7b784a6adc3874f1f4
SHA512b981400d2e866cc8ccd4e4e95b54deda7c007ed830d6740ea73cb0351511e52a5b5d54b0cd60e7c37cebdc98b25789a6d5af3cd4b1b9f6d6139f7f735f7302d8