Analysis
-
max time kernel
119s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19/08/2024, 07:34
Static task
static1
Behavioral task
behavioral1
Sample
e50ddc0ac0961f65272fc4370a017d50N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
e50ddc0ac0961f65272fc4370a017d50N.exe
Resource
win10v2004-20240802-en
General
-
Target
e50ddc0ac0961f65272fc4370a017d50N.exe
-
Size
2.7MB
-
MD5
e50ddc0ac0961f65272fc4370a017d50
-
SHA1
d2ebda900629e7cdec4e3d4b57b98b89d7b575c6
-
SHA256
a5e411e3724df697d4585b97aa637301029b17510e3a0b48ffd63cbe10ba8f58
-
SHA512
32c3fb9b861f0a5fc8dbf528145cf19cb39f74e237341880dc6f080f6c5c7f5f226853fcfc53467828205052d370337b940c769fdcdef9cab295a57f703c7cab
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LB59w4Sx:+R0pI/IQlUoMPdmpSpp4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2236 aoptisys.exe -
Loads dropped DLL 1 IoCs
pid Process 2292 e50ddc0ac0961f65272fc4370a017d50N.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\UserDotZ4\\aoptisys.exe" e50ddc0ac0961f65272fc4370a017d50N.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\GalaxMR\\dobasys.exe" e50ddc0ac0961f65272fc4370a017d50N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e50ddc0ac0961f65272fc4370a017d50N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aoptisys.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2292 e50ddc0ac0961f65272fc4370a017d50N.exe 2292 e50ddc0ac0961f65272fc4370a017d50N.exe 2236 aoptisys.exe 2292 e50ddc0ac0961f65272fc4370a017d50N.exe 2236 aoptisys.exe 2292 e50ddc0ac0961f65272fc4370a017d50N.exe 2236 aoptisys.exe 2292 e50ddc0ac0961f65272fc4370a017d50N.exe 2236 aoptisys.exe 2292 e50ddc0ac0961f65272fc4370a017d50N.exe 2236 aoptisys.exe 2292 e50ddc0ac0961f65272fc4370a017d50N.exe 2236 aoptisys.exe 2292 e50ddc0ac0961f65272fc4370a017d50N.exe 2236 aoptisys.exe 2292 e50ddc0ac0961f65272fc4370a017d50N.exe 2236 aoptisys.exe 2292 e50ddc0ac0961f65272fc4370a017d50N.exe 2236 aoptisys.exe 2292 e50ddc0ac0961f65272fc4370a017d50N.exe 2236 aoptisys.exe 2292 e50ddc0ac0961f65272fc4370a017d50N.exe 2236 aoptisys.exe 2292 e50ddc0ac0961f65272fc4370a017d50N.exe 2236 aoptisys.exe 2292 e50ddc0ac0961f65272fc4370a017d50N.exe 2236 aoptisys.exe 2292 e50ddc0ac0961f65272fc4370a017d50N.exe 2236 aoptisys.exe 2292 e50ddc0ac0961f65272fc4370a017d50N.exe 2236 aoptisys.exe 2292 e50ddc0ac0961f65272fc4370a017d50N.exe 2236 aoptisys.exe 2292 e50ddc0ac0961f65272fc4370a017d50N.exe 2236 aoptisys.exe 2292 e50ddc0ac0961f65272fc4370a017d50N.exe 2236 aoptisys.exe 2292 e50ddc0ac0961f65272fc4370a017d50N.exe 2236 aoptisys.exe 2292 e50ddc0ac0961f65272fc4370a017d50N.exe 2236 aoptisys.exe 2292 e50ddc0ac0961f65272fc4370a017d50N.exe 2236 aoptisys.exe 2292 e50ddc0ac0961f65272fc4370a017d50N.exe 2236 aoptisys.exe 2292 e50ddc0ac0961f65272fc4370a017d50N.exe 2236 aoptisys.exe 2292 e50ddc0ac0961f65272fc4370a017d50N.exe 2236 aoptisys.exe 2292 e50ddc0ac0961f65272fc4370a017d50N.exe 2236 aoptisys.exe 2292 e50ddc0ac0961f65272fc4370a017d50N.exe 2236 aoptisys.exe 2292 e50ddc0ac0961f65272fc4370a017d50N.exe 2236 aoptisys.exe 2292 e50ddc0ac0961f65272fc4370a017d50N.exe 2236 aoptisys.exe 2292 e50ddc0ac0961f65272fc4370a017d50N.exe 2236 aoptisys.exe 2292 e50ddc0ac0961f65272fc4370a017d50N.exe 2236 aoptisys.exe 2292 e50ddc0ac0961f65272fc4370a017d50N.exe 2236 aoptisys.exe 2292 e50ddc0ac0961f65272fc4370a017d50N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2292 wrote to memory of 2236 2292 e50ddc0ac0961f65272fc4370a017d50N.exe 28 PID 2292 wrote to memory of 2236 2292 e50ddc0ac0961f65272fc4370a017d50N.exe 28 PID 2292 wrote to memory of 2236 2292 e50ddc0ac0961f65272fc4370a017d50N.exe 28 PID 2292 wrote to memory of 2236 2292 e50ddc0ac0961f65272fc4370a017d50N.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\e50ddc0ac0961f65272fc4370a017d50N.exe"C:\Users\Admin\AppData\Local\Temp\e50ddc0ac0961f65272fc4370a017d50N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\UserDotZ4\aoptisys.exeC:\UserDotZ4\aoptisys.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2236
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD521384485573e10a82f7a8011c13013a1
SHA18b63242f0e4aa6990516fc0c4dcf984a3317fc44
SHA25683220dd69f7ff03a8094cb5577a607527b9dca7622b65acd16c82534b41ab397
SHA512d4ab6de972750a205c018d6b888da2aaffe3985bc97b64ad7e1194ac6ea9bc85953ccdba34da929f9b5c4b56c5dce45621ee365537a2e454d1b942e31cb9b6ea
-
Filesize
206B
MD54a3026bd7635ca8c61872ddf58ebf8d5
SHA1e3fd7ad9aac012dbab778f0b396687f385ccdb89
SHA256bdc3ecb7d866d7796ab7bb28f4ca95a9c19120cdee0ecfffb76fc115dd93d6a2
SHA512255810a9a3b2522451d8d054561191a30d508ca78b98f4111c5b017a0665ec53db00eec9e695832d0d273b5f038cacacd4488dbf62e7ca1870db1c536a05eafd
-
Filesize
2.7MB
MD51dc32cc98cdd4e2371e0c0d94d33a3a4
SHA11b65db3dede23da1a1cc319feec7b4fd477e3e72
SHA2568c51fee74408a860f8471da5db1f9514d21b3bcdca435fd9b155bf46476ef34b
SHA512936716fa05bc7f720236622f94ab8abad8bb0947703dd81cc6b39fd30c3a80d15b7e397b148f5848fc1dfb7ca99ddc3188c16890e3c7a3d4ca142b6da9052ad8