Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21/08/2024, 16:56
Static task
static1
Behavioral task
behavioral1
Sample
0e4248bf837de2f8e8db2d2689139140N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0e4248bf837de2f8e8db2d2689139140N.exe
Resource
win10v2004-20240802-en
General
-
Target
0e4248bf837de2f8e8db2d2689139140N.exe
-
Size
2.7MB
-
MD5
0e4248bf837de2f8e8db2d2689139140
-
SHA1
9ef56c69d6c0ac89b0dc08b9e1c491bc4761ff33
-
SHA256
5aba89e863a6676d7d463b184ee8a77147f9cf1e7cd7e12176d12a509145e457
-
SHA512
031d676d67556b511b48cb1cf792e2b2be2727188bc8ed930870411807d997e63713574a9cc2971c316db5a94c9345c37b6513530366fcf5a85172e135100a28
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBU9w4Sx:+R0pI/IQlUoMPdmpSpe4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2728 aoptiloc.exe -
Loads dropped DLL 1 IoCs
pid Process 2876 0e4248bf837de2f8e8db2d2689139140N.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\FilesLW\\aoptiloc.exe" 0e4248bf837de2f8e8db2d2689139140N.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\GalaxIF\\dobdevec.exe" 0e4248bf837de2f8e8db2d2689139140N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aoptiloc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0e4248bf837de2f8e8db2d2689139140N.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2876 0e4248bf837de2f8e8db2d2689139140N.exe 2876 0e4248bf837de2f8e8db2d2689139140N.exe 2728 aoptiloc.exe 2876 0e4248bf837de2f8e8db2d2689139140N.exe 2728 aoptiloc.exe 2876 0e4248bf837de2f8e8db2d2689139140N.exe 2728 aoptiloc.exe 2876 0e4248bf837de2f8e8db2d2689139140N.exe 2728 aoptiloc.exe 2876 0e4248bf837de2f8e8db2d2689139140N.exe 2728 aoptiloc.exe 2876 0e4248bf837de2f8e8db2d2689139140N.exe 2728 aoptiloc.exe 2876 0e4248bf837de2f8e8db2d2689139140N.exe 2728 aoptiloc.exe 2876 0e4248bf837de2f8e8db2d2689139140N.exe 2728 aoptiloc.exe 2876 0e4248bf837de2f8e8db2d2689139140N.exe 2728 aoptiloc.exe 2876 0e4248bf837de2f8e8db2d2689139140N.exe 2728 aoptiloc.exe 2876 0e4248bf837de2f8e8db2d2689139140N.exe 2728 aoptiloc.exe 2876 0e4248bf837de2f8e8db2d2689139140N.exe 2728 aoptiloc.exe 2876 0e4248bf837de2f8e8db2d2689139140N.exe 2728 aoptiloc.exe 2876 0e4248bf837de2f8e8db2d2689139140N.exe 2728 aoptiloc.exe 2876 0e4248bf837de2f8e8db2d2689139140N.exe 2728 aoptiloc.exe 2876 0e4248bf837de2f8e8db2d2689139140N.exe 2728 aoptiloc.exe 2876 0e4248bf837de2f8e8db2d2689139140N.exe 2728 aoptiloc.exe 2876 0e4248bf837de2f8e8db2d2689139140N.exe 2728 aoptiloc.exe 2876 0e4248bf837de2f8e8db2d2689139140N.exe 2728 aoptiloc.exe 2876 0e4248bf837de2f8e8db2d2689139140N.exe 2728 aoptiloc.exe 2876 0e4248bf837de2f8e8db2d2689139140N.exe 2728 aoptiloc.exe 2876 0e4248bf837de2f8e8db2d2689139140N.exe 2728 aoptiloc.exe 2876 0e4248bf837de2f8e8db2d2689139140N.exe 2728 aoptiloc.exe 2876 0e4248bf837de2f8e8db2d2689139140N.exe 2728 aoptiloc.exe 2876 0e4248bf837de2f8e8db2d2689139140N.exe 2728 aoptiloc.exe 2876 0e4248bf837de2f8e8db2d2689139140N.exe 2728 aoptiloc.exe 2876 0e4248bf837de2f8e8db2d2689139140N.exe 2728 aoptiloc.exe 2876 0e4248bf837de2f8e8db2d2689139140N.exe 2728 aoptiloc.exe 2876 0e4248bf837de2f8e8db2d2689139140N.exe 2728 aoptiloc.exe 2876 0e4248bf837de2f8e8db2d2689139140N.exe 2728 aoptiloc.exe 2876 0e4248bf837de2f8e8db2d2689139140N.exe 2728 aoptiloc.exe 2876 0e4248bf837de2f8e8db2d2689139140N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2876 wrote to memory of 2728 2876 0e4248bf837de2f8e8db2d2689139140N.exe 30 PID 2876 wrote to memory of 2728 2876 0e4248bf837de2f8e8db2d2689139140N.exe 30 PID 2876 wrote to memory of 2728 2876 0e4248bf837de2f8e8db2d2689139140N.exe 30 PID 2876 wrote to memory of 2728 2876 0e4248bf837de2f8e8db2d2689139140N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e4248bf837de2f8e8db2d2689139140N.exe"C:\Users\Admin\AppData\Local\Temp\0e4248bf837de2f8e8db2d2689139140N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\FilesLW\aoptiloc.exeC:\FilesLW\aoptiloc.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2728
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD5314d58da9fc999bcf3ce3b2cd58a42a3
SHA101ed39d5ec2f72254bd41788f2b7c60e4ee94fc7
SHA256a0cfc648e74b391e0678854ae9a52edcf218653d3e925de650f7879ff0ac47de
SHA512127ae396f13b98662731302021acfe8aedc5d69208d2d665e83d47d0b48fac1007fe044ad6709d9647479d255f673b04acb5d1529987c981ef88af71d8193a98
-
Filesize
204B
MD599d91e66f685709276bfe7de850ba045
SHA1eaa01e470fc66029aa378f876722dc739f2b9343
SHA256c9e9eee5961aa990af5789ffedd36ee3772fec76d2ea67b95fdcd562973c8896
SHA512a249985108d6c96c22195dfda93512b3b22f29b98f5c2e7c77d01b8cff1728df69e598e60287dbcc30e27b4f0c806b30efed8c4ad99483b38f29ee920a15c803
-
Filesize
2.7MB
MD560db787ed9aa888007698f50ab909f1f
SHA1fa1d436d0f0b750c6a7d6a03cf26450b6222c357
SHA25656a51d912b21c6286ac42de386781ad9a57f8ae411bce0a414858deb1482d82b
SHA512a11b299e78261d3c48d0f6d2fc11ae20fdfd045118005d11e976e07656fa5dd58b223a113521270f806b154128fa2f23495f5dcb3e4467caffcc81bed4ebc259