Analysis
-
max time kernel
119s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19-08-2024 23:33
Static task
static1
Behavioral task
behavioral1
Sample
18bf01212bb81efd17086ec065989dc0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
18bf01212bb81efd17086ec065989dc0N.exe
Resource
win10v2004-20240802-en
General
-
Target
18bf01212bb81efd17086ec065989dc0N.exe
-
Size
2.7MB
-
MD5
18bf01212bb81efd17086ec065989dc0
-
SHA1
aea81576499ea8e7cd4a5898122d9289130d0d92
-
SHA256
aad290a235503e343dfe00984d07cc2f4065a5800274de755edeb8c18885cf7f
-
SHA512
c2b59d24609e8aa3475fdccd8e90708adcf81c88f7fc08abc116d20d438c0cc58213a1df367d4721056481d2b81b81788e07877b9667e166b4693c2340cc5003
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBj9w4Sx:+R0pI/IQlUoMPdmpSpH4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2744 xoptiec.exe -
Loads dropped DLL 1 IoCs
pid Process 1292 18bf01212bb81efd17086ec065989dc0N.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\SysDrvH6\\xoptiec.exe" 18bf01212bb81efd17086ec065989dc0N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\LabZQ6\\dobxloc.exe" 18bf01212bb81efd17086ec065989dc0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 18bf01212bb81efd17086ec065989dc0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xoptiec.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1292 18bf01212bb81efd17086ec065989dc0N.exe 1292 18bf01212bb81efd17086ec065989dc0N.exe 2744 xoptiec.exe 1292 18bf01212bb81efd17086ec065989dc0N.exe 2744 xoptiec.exe 1292 18bf01212bb81efd17086ec065989dc0N.exe 2744 xoptiec.exe 1292 18bf01212bb81efd17086ec065989dc0N.exe 2744 xoptiec.exe 1292 18bf01212bb81efd17086ec065989dc0N.exe 2744 xoptiec.exe 1292 18bf01212bb81efd17086ec065989dc0N.exe 2744 xoptiec.exe 1292 18bf01212bb81efd17086ec065989dc0N.exe 2744 xoptiec.exe 1292 18bf01212bb81efd17086ec065989dc0N.exe 2744 xoptiec.exe 1292 18bf01212bb81efd17086ec065989dc0N.exe 2744 xoptiec.exe 1292 18bf01212bb81efd17086ec065989dc0N.exe 2744 xoptiec.exe 1292 18bf01212bb81efd17086ec065989dc0N.exe 2744 xoptiec.exe 1292 18bf01212bb81efd17086ec065989dc0N.exe 2744 xoptiec.exe 1292 18bf01212bb81efd17086ec065989dc0N.exe 2744 xoptiec.exe 1292 18bf01212bb81efd17086ec065989dc0N.exe 2744 xoptiec.exe 1292 18bf01212bb81efd17086ec065989dc0N.exe 2744 xoptiec.exe 1292 18bf01212bb81efd17086ec065989dc0N.exe 2744 xoptiec.exe 1292 18bf01212bb81efd17086ec065989dc0N.exe 2744 xoptiec.exe 1292 18bf01212bb81efd17086ec065989dc0N.exe 2744 xoptiec.exe 1292 18bf01212bb81efd17086ec065989dc0N.exe 2744 xoptiec.exe 1292 18bf01212bb81efd17086ec065989dc0N.exe 2744 xoptiec.exe 1292 18bf01212bb81efd17086ec065989dc0N.exe 2744 xoptiec.exe 1292 18bf01212bb81efd17086ec065989dc0N.exe 2744 xoptiec.exe 1292 18bf01212bb81efd17086ec065989dc0N.exe 2744 xoptiec.exe 1292 18bf01212bb81efd17086ec065989dc0N.exe 2744 xoptiec.exe 1292 18bf01212bb81efd17086ec065989dc0N.exe 2744 xoptiec.exe 1292 18bf01212bb81efd17086ec065989dc0N.exe 2744 xoptiec.exe 1292 18bf01212bb81efd17086ec065989dc0N.exe 2744 xoptiec.exe 1292 18bf01212bb81efd17086ec065989dc0N.exe 2744 xoptiec.exe 1292 18bf01212bb81efd17086ec065989dc0N.exe 2744 xoptiec.exe 1292 18bf01212bb81efd17086ec065989dc0N.exe 2744 xoptiec.exe 1292 18bf01212bb81efd17086ec065989dc0N.exe 2744 xoptiec.exe 1292 18bf01212bb81efd17086ec065989dc0N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1292 wrote to memory of 2744 1292 18bf01212bb81efd17086ec065989dc0N.exe 30 PID 1292 wrote to memory of 2744 1292 18bf01212bb81efd17086ec065989dc0N.exe 30 PID 1292 wrote to memory of 2744 1292 18bf01212bb81efd17086ec065989dc0N.exe 30 PID 1292 wrote to memory of 2744 1292 18bf01212bb81efd17086ec065989dc0N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\18bf01212bb81efd17086ec065989dc0N.exe"C:\Users\Admin\AppData\Local\Temp\18bf01212bb81efd17086ec065989dc0N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\SysDrvH6\xoptiec.exeC:\SysDrvH6\xoptiec.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2744
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD5b8b01e7e01e766c413fad56b23235206
SHA17c5b2f90cbd32272b2c8f30e7a77d7ff8f9c2f56
SHA2565958d23ce61fe71aea56d28740e738863d6398888b581d4a3efda33a03c9b886
SHA5127dc57b6751f39bd783026e4c708bf06d0b3cd4bd252dd7c3f97839697601b32899452d05c7b356ce4f1b41a732e3718ea046083831493647528e26cea5df9eb7
-
Filesize
201B
MD5c6e1d903b51ea54f7cced5c788d187ec
SHA1a2a9aca01fae1cbf3a0b9480f8e88a82dfa2bbd5
SHA256a25e80bd57b8ff697b61a8adaf1cc41ff1b31aa34b556f65ac5aff3cb9d7f7e8
SHA5127dae82ac81490276f92f79d20ae513c6eb7f0efd3169f23497dd97b61d97026cb3f827cb19c943136fb98c66f6db05bf34dbf3eaeb7065e9767fd97b867db2c1
-
Filesize
2.7MB
MD59fa2ff0e666016df561dd91a564425a4
SHA114d10a09cd4afef8b03c891712ff2ad03156f3d4
SHA256f14e49bb14b64efe90333ff61e2f8bac83a7b65109e0457e7014a0f3cd600c6a
SHA5124e3e95a32ed48531c53f086954e84543fe1e0212819058999b823fbccd25753eab667047805d51ae591e895f3a38bf15876b95efc47bdadd6e345046c0339e2a