Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
20-08-2024 06:53
Static task
static1
Behavioral task
behavioral1
Sample
37abe3e7419258005219514c404a2b70N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
37abe3e7419258005219514c404a2b70N.exe
Resource
win10v2004-20240802-en
General
-
Target
37abe3e7419258005219514c404a2b70N.exe
-
Size
2.7MB
-
MD5
37abe3e7419258005219514c404a2b70
-
SHA1
677841e772a3b17b89e4ba539e48f7a54ff17771
-
SHA256
b8d2d3ff455db439e87e0273cf74d2bd9a6ff59520acfbf16667d835b8674141
-
SHA512
8c8a417fc1ab972db782105785f1423d00890169d15d2cbe059bc90d5c43c6d3f498d0b677f07593d434ff8fb1e572108e0e01fa1deba035afe4eeb033d9d442
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBb9w4Sx:+R0pI/IQlUoMPdmpSpn4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2796 devoptisys.exe -
Loads dropped DLL 1 IoCs
pid Process 2292 37abe3e7419258005219514c404a2b70N.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\UserDotSX\\devoptisys.exe" 37abe3e7419258005219514c404a2b70N.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\VidZ7\\dobxloc.exe" 37abe3e7419258005219514c404a2b70N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 37abe3e7419258005219514c404a2b70N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language devoptisys.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2292 37abe3e7419258005219514c404a2b70N.exe 2292 37abe3e7419258005219514c404a2b70N.exe 2796 devoptisys.exe 2292 37abe3e7419258005219514c404a2b70N.exe 2796 devoptisys.exe 2292 37abe3e7419258005219514c404a2b70N.exe 2796 devoptisys.exe 2292 37abe3e7419258005219514c404a2b70N.exe 2796 devoptisys.exe 2292 37abe3e7419258005219514c404a2b70N.exe 2796 devoptisys.exe 2292 37abe3e7419258005219514c404a2b70N.exe 2796 devoptisys.exe 2292 37abe3e7419258005219514c404a2b70N.exe 2796 devoptisys.exe 2292 37abe3e7419258005219514c404a2b70N.exe 2796 devoptisys.exe 2292 37abe3e7419258005219514c404a2b70N.exe 2796 devoptisys.exe 2292 37abe3e7419258005219514c404a2b70N.exe 2796 devoptisys.exe 2292 37abe3e7419258005219514c404a2b70N.exe 2796 devoptisys.exe 2292 37abe3e7419258005219514c404a2b70N.exe 2796 devoptisys.exe 2292 37abe3e7419258005219514c404a2b70N.exe 2796 devoptisys.exe 2292 37abe3e7419258005219514c404a2b70N.exe 2796 devoptisys.exe 2292 37abe3e7419258005219514c404a2b70N.exe 2796 devoptisys.exe 2292 37abe3e7419258005219514c404a2b70N.exe 2796 devoptisys.exe 2292 37abe3e7419258005219514c404a2b70N.exe 2796 devoptisys.exe 2292 37abe3e7419258005219514c404a2b70N.exe 2796 devoptisys.exe 2292 37abe3e7419258005219514c404a2b70N.exe 2796 devoptisys.exe 2292 37abe3e7419258005219514c404a2b70N.exe 2796 devoptisys.exe 2292 37abe3e7419258005219514c404a2b70N.exe 2796 devoptisys.exe 2292 37abe3e7419258005219514c404a2b70N.exe 2796 devoptisys.exe 2292 37abe3e7419258005219514c404a2b70N.exe 2796 devoptisys.exe 2292 37abe3e7419258005219514c404a2b70N.exe 2796 devoptisys.exe 2292 37abe3e7419258005219514c404a2b70N.exe 2796 devoptisys.exe 2292 37abe3e7419258005219514c404a2b70N.exe 2796 devoptisys.exe 2292 37abe3e7419258005219514c404a2b70N.exe 2796 devoptisys.exe 2292 37abe3e7419258005219514c404a2b70N.exe 2796 devoptisys.exe 2292 37abe3e7419258005219514c404a2b70N.exe 2796 devoptisys.exe 2292 37abe3e7419258005219514c404a2b70N.exe 2796 devoptisys.exe 2292 37abe3e7419258005219514c404a2b70N.exe 2796 devoptisys.exe 2292 37abe3e7419258005219514c404a2b70N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2292 wrote to memory of 2796 2292 37abe3e7419258005219514c404a2b70N.exe 30 PID 2292 wrote to memory of 2796 2292 37abe3e7419258005219514c404a2b70N.exe 30 PID 2292 wrote to memory of 2796 2292 37abe3e7419258005219514c404a2b70N.exe 30 PID 2292 wrote to memory of 2796 2292 37abe3e7419258005219514c404a2b70N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\37abe3e7419258005219514c404a2b70N.exe"C:\Users\Admin\AppData\Local\Temp\37abe3e7419258005219514c404a2b70N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\UserDotSX\devoptisys.exeC:\UserDotSX\devoptisys.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2796
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
204B
MD56d5a6f382ff919a365d3f23ba4482083
SHA1dd92afe0a3d27d817c5938c801d3965de14a306a
SHA2568da3b2d4973bc01ba2b4476021f49066eaac1717cf08b0df3465094ab950119b
SHA51281f74284bd351a8ced563a8b8c3f84dc5745f7a041042591c4edab3815f5f5cfb2b3f10bf75432908464ef5d97343cea20d8193db5a115ff27d8898debc1cb01
-
Filesize
2.7MB
MD5c84b6a1d469e25a5445cf31550ae7ab3
SHA15806594447406799a6a438d2dfb3d8ddd79010f0
SHA256b7da5e5c9573db7211242cf6e084782a0aeb3d61307f34b19725022df07d5f38
SHA512d144f3d38a18b806d759083eaf66df1aeaa2e9a03c361b681863d91a6e807877a1d27ccf772ce6c7cdbf6c4077bfcef6139b2f867cbc16174b9325530c4b96f5
-
Filesize
2.7MB
MD50cc0d164369884954265ece386f8eedb
SHA124b73e20f95d985b08e7a32753feeb2f40208903
SHA256624dcdf5a9965139f712c554e9ffed39212491b0f096f08097a07e02492b280f
SHA5121137f77cdc23691fd9a0259672cc9535efb16987162fe7ea9fa986c3b15639560c7bc0275f849cb781936ed31e7d41ecdbe671045d2a55a0215b9bcd06d36774