Analysis
-
max time kernel
119s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-08-2024 17:42
Static task
static1
Behavioral task
behavioral1
Sample
3e09ff4aa8f26794de27c3e1a6fb39f0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3e09ff4aa8f26794de27c3e1a6fb39f0N.exe
Resource
win10v2004-20240802-en
General
-
Target
3e09ff4aa8f26794de27c3e1a6fb39f0N.exe
-
Size
2.7MB
-
MD5
3e09ff4aa8f26794de27c3e1a6fb39f0
-
SHA1
d643f711570e2771c700d22f06f7995e4f60dc49
-
SHA256
30a532b7e6bc2a5c653736365dd8a168178d61d9cad5f5eb0ef1199ee1078ed2
-
SHA512
0546b9e5685062c37d4345b6eadeb8e9ca62da85398a2b54dfb7f95fea9fc6adc19e5e173553dc5948a62698c874694c538b5ffa4e4a3242e44222eff9f3b1b4
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LB79w4Sx:+R0pI/IQlUoMPdmpSpr4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4532 xoptisys.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\FilesZJ\\xoptisys.exe" 3e09ff4aa8f26794de27c3e1a6fb39f0N.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\GalaxEX\\optidevloc.exe" 3e09ff4aa8f26794de27c3e1a6fb39f0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3e09ff4aa8f26794de27c3e1a6fb39f0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xoptisys.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2064 3e09ff4aa8f26794de27c3e1a6fb39f0N.exe 2064 3e09ff4aa8f26794de27c3e1a6fb39f0N.exe 2064 3e09ff4aa8f26794de27c3e1a6fb39f0N.exe 2064 3e09ff4aa8f26794de27c3e1a6fb39f0N.exe 4532 xoptisys.exe 4532 xoptisys.exe 2064 3e09ff4aa8f26794de27c3e1a6fb39f0N.exe 2064 3e09ff4aa8f26794de27c3e1a6fb39f0N.exe 4532 xoptisys.exe 4532 xoptisys.exe 2064 3e09ff4aa8f26794de27c3e1a6fb39f0N.exe 2064 3e09ff4aa8f26794de27c3e1a6fb39f0N.exe 4532 xoptisys.exe 4532 xoptisys.exe 2064 3e09ff4aa8f26794de27c3e1a6fb39f0N.exe 2064 3e09ff4aa8f26794de27c3e1a6fb39f0N.exe 4532 xoptisys.exe 4532 xoptisys.exe 2064 3e09ff4aa8f26794de27c3e1a6fb39f0N.exe 2064 3e09ff4aa8f26794de27c3e1a6fb39f0N.exe 4532 xoptisys.exe 4532 xoptisys.exe 2064 3e09ff4aa8f26794de27c3e1a6fb39f0N.exe 2064 3e09ff4aa8f26794de27c3e1a6fb39f0N.exe 4532 xoptisys.exe 4532 xoptisys.exe 2064 3e09ff4aa8f26794de27c3e1a6fb39f0N.exe 2064 3e09ff4aa8f26794de27c3e1a6fb39f0N.exe 4532 xoptisys.exe 4532 xoptisys.exe 2064 3e09ff4aa8f26794de27c3e1a6fb39f0N.exe 2064 3e09ff4aa8f26794de27c3e1a6fb39f0N.exe 4532 xoptisys.exe 4532 xoptisys.exe 2064 3e09ff4aa8f26794de27c3e1a6fb39f0N.exe 2064 3e09ff4aa8f26794de27c3e1a6fb39f0N.exe 4532 xoptisys.exe 4532 xoptisys.exe 2064 3e09ff4aa8f26794de27c3e1a6fb39f0N.exe 2064 3e09ff4aa8f26794de27c3e1a6fb39f0N.exe 4532 xoptisys.exe 4532 xoptisys.exe 2064 3e09ff4aa8f26794de27c3e1a6fb39f0N.exe 2064 3e09ff4aa8f26794de27c3e1a6fb39f0N.exe 4532 xoptisys.exe 4532 xoptisys.exe 2064 3e09ff4aa8f26794de27c3e1a6fb39f0N.exe 2064 3e09ff4aa8f26794de27c3e1a6fb39f0N.exe 4532 xoptisys.exe 4532 xoptisys.exe 2064 3e09ff4aa8f26794de27c3e1a6fb39f0N.exe 2064 3e09ff4aa8f26794de27c3e1a6fb39f0N.exe 4532 xoptisys.exe 4532 xoptisys.exe 2064 3e09ff4aa8f26794de27c3e1a6fb39f0N.exe 2064 3e09ff4aa8f26794de27c3e1a6fb39f0N.exe 4532 xoptisys.exe 4532 xoptisys.exe 2064 3e09ff4aa8f26794de27c3e1a6fb39f0N.exe 2064 3e09ff4aa8f26794de27c3e1a6fb39f0N.exe 4532 xoptisys.exe 4532 xoptisys.exe 2064 3e09ff4aa8f26794de27c3e1a6fb39f0N.exe 2064 3e09ff4aa8f26794de27c3e1a6fb39f0N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2064 wrote to memory of 4532 2064 3e09ff4aa8f26794de27c3e1a6fb39f0N.exe 92 PID 2064 wrote to memory of 4532 2064 3e09ff4aa8f26794de27c3e1a6fb39f0N.exe 92 PID 2064 wrote to memory of 4532 2064 3e09ff4aa8f26794de27c3e1a6fb39f0N.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\3e09ff4aa8f26794de27c3e1a6fb39f0N.exe"C:\Users\Admin\AppData\Local\Temp\3e09ff4aa8f26794de27c3e1a6fb39f0N.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\FilesZJ\xoptisys.exeC:\FilesZJ\xoptisys.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4532
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD5cafe81a1a8a808ba6075e6ae11430556
SHA129bc979b289d230d117b45336629a2f2c3792aca
SHA2566ba67f7589e22cc60a0d2cf45cc796985690a9dcc2b31dfd13330df8041d9458
SHA5123ae6a9b53eb55aa9c7f3cf7bf39155c67eafc0ace1463f88d5bf74a80895dbb9746bb814b5884a6fa7e45aa7e6772f1c17637b476d379d7d9dd3fd508b6b6621
-
Filesize
643KB
MD5caad0d589418b5acbc06c16128f91def
SHA15397fc5a67743bcdd367bd3bc2114d619d59e9e8
SHA256c99a7fe99547dd40140bea87dd2a8cb7947791c2ab442f66676d74d83dac5186
SHA51272facac126d24d045557f1c5e3cd47c25dffdbee99af63e2b16294c08e79fb2c9476a7e04071878e5d7d5b9d772fe74917af66434e349bc524b0aa3e60274776
-
Filesize
204B
MD572f3ae65ec7b13c2ec9b966ec6228744
SHA1fa308c06ea670252c7351605557c5807e203beab
SHA2568031f008a2d2c3b637a803d032bcf4ba82c1301c634fc41621e8f2d7a952990e
SHA51214b58978c5e459aacefb46f4cb269cbb0d980bb4a721ac05bb203e2995caaa46867e2a1e227644fee79a957db08b381a6e503daac21950a3035cd74527db28d2