Analysis
-
max time kernel
119s -
max time network
106s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23-08-2024 15:57
Static task
static1
Behavioral task
behavioral1
Sample
02a452350d14bd5913494c51127161a0N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
02a452350d14bd5913494c51127161a0N.exe
Resource
win10v2004-20240802-en
General
-
Target
02a452350d14bd5913494c51127161a0N.exe
-
Size
2.6MB
-
MD5
02a452350d14bd5913494c51127161a0
-
SHA1
d951e2c40d1aa00306b2881962c1d71b54eeb236
-
SHA256
df202c6ca898e9fda26051a904060d888ef12f67b5bc502b5380867bd40ed8e7
-
SHA512
e65f838e390d7f380e49ac38c65aa61c90ddf3c0b9a43c6e472bbc616773e154396cb96dfeca51aa037afd34e9cbc4694ab7eb043534d23abd7a35a1fb1eff7f
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBPB/bS:sxX7QnxrloE5dpUpQb
Malware Config
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locaopti.exe 02a452350d14bd5913494c51127161a0N.exe -
Executes dropped EXE 2 IoCs
pid Process 3784 locaopti.exe 2028 aoptiloc.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\FilesEO\\aoptiloc.exe" 02a452350d14bd5913494c51127161a0N.exe Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\MintRH\\dobaec.exe" 02a452350d14bd5913494c51127161a0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 02a452350d14bd5913494c51127161a0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language locaopti.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aoptiloc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4048 02a452350d14bd5913494c51127161a0N.exe 4048 02a452350d14bd5913494c51127161a0N.exe 4048 02a452350d14bd5913494c51127161a0N.exe 4048 02a452350d14bd5913494c51127161a0N.exe 3784 locaopti.exe 3784 locaopti.exe 2028 aoptiloc.exe 2028 aoptiloc.exe 3784 locaopti.exe 3784 locaopti.exe 2028 aoptiloc.exe 2028 aoptiloc.exe 3784 locaopti.exe 3784 locaopti.exe 2028 aoptiloc.exe 2028 aoptiloc.exe 3784 locaopti.exe 3784 locaopti.exe 2028 aoptiloc.exe 2028 aoptiloc.exe 3784 locaopti.exe 3784 locaopti.exe 2028 aoptiloc.exe 2028 aoptiloc.exe 3784 locaopti.exe 3784 locaopti.exe 2028 aoptiloc.exe 2028 aoptiloc.exe 3784 locaopti.exe 3784 locaopti.exe 2028 aoptiloc.exe 2028 aoptiloc.exe 3784 locaopti.exe 3784 locaopti.exe 2028 aoptiloc.exe 2028 aoptiloc.exe 3784 locaopti.exe 3784 locaopti.exe 2028 aoptiloc.exe 2028 aoptiloc.exe 3784 locaopti.exe 3784 locaopti.exe 2028 aoptiloc.exe 2028 aoptiloc.exe 3784 locaopti.exe 3784 locaopti.exe 2028 aoptiloc.exe 2028 aoptiloc.exe 3784 locaopti.exe 3784 locaopti.exe 2028 aoptiloc.exe 2028 aoptiloc.exe 3784 locaopti.exe 3784 locaopti.exe 2028 aoptiloc.exe 2028 aoptiloc.exe 3784 locaopti.exe 3784 locaopti.exe 2028 aoptiloc.exe 2028 aoptiloc.exe 3784 locaopti.exe 3784 locaopti.exe 2028 aoptiloc.exe 2028 aoptiloc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4048 wrote to memory of 3784 4048 02a452350d14bd5913494c51127161a0N.exe 88 PID 4048 wrote to memory of 3784 4048 02a452350d14bd5913494c51127161a0N.exe 88 PID 4048 wrote to memory of 3784 4048 02a452350d14bd5913494c51127161a0N.exe 88 PID 4048 wrote to memory of 2028 4048 02a452350d14bd5913494c51127161a0N.exe 89 PID 4048 wrote to memory of 2028 4048 02a452350d14bd5913494c51127161a0N.exe 89 PID 4048 wrote to memory of 2028 4048 02a452350d14bd5913494c51127161a0N.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\02a452350d14bd5913494c51127161a0N.exe"C:\Users\Admin\AppData\Local\Temp\02a452350d14bd5913494c51127161a0N.exe"1⤵
- Drops startup file
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4048 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locaopti.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locaopti.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3784
-
-
C:\FilesEO\aoptiloc.exeC:\FilesEO\aoptiloc.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2028
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD53600c053b8d0e83c84774daa316ca0f7
SHA12f1e01db2d833dc6029e0635d7db48ebf44c5054
SHA256564cdd8360774ff2cff0025f310aa3e89c228ffdd23a54f2071960dbaecd23ce
SHA5124164502a88b0088d9233faa07fcf4611f50f53c88927943493c95dc3fe99f752c75bc10691913c8eb55dba12a28de647f82fe2085d8ae8df9a7ac5ef9cd88a2d
-
Filesize
2.6MB
MD5a9b6b5013f4cdbff74b94b1734501fc8
SHA13b4793d85c1257a4f2157e5daa585b3c0b61b51d
SHA2566e266568d63a21e48a3f3f7a1eb16a9b017ab2dd541335a218239ac56f085486
SHA512a4d3e4e9ed166fdf9797f157fb2957161f330d62acf4e1db3fbf944d13438f7cde70ac0c343bab754cd292d78b8279c382ad30272071d94bd91ea3d900a5974a
-
Filesize
136KB
MD54a9df1ef4ca13e58397520a1127212d1
SHA114ec628d7898e8c997ea9fdc72eb3e8e37d7e54f
SHA2563ddd45b34cbb21322cf39c8170b544c7f6abf24dd5d84488058519841602bd9d
SHA51226ec9bf5862941039e5229bc87a4c65f8b5d8917b31ddabba2c259d8f0755a093d24c9216e5e618d58bebbfa54caabc7096052336d4316d581eceb088a69c6df
-
Filesize
201B
MD5d0a564858c613baf3f0f52f2cdc4f1bc
SHA1f9278236bf8e7771fe7292cd892bc567e91ee3f2
SHA2561d406e84b5745437525bfcfc8748fc043d14178e76da6fed0c0abfc6e57bce7c
SHA512b555f5accd299f05b86f46e612adf10bf02112c97f40f6b658223366960f9e49fbea03444a5b66451b22dfe293848f595a3f5482579b9f109cc913f832da6be1
-
Filesize
169B
MD5abae5b52a39c56017c0b39e17cfff09a
SHA19644c21015babeebebc2dfc3e6c01bcde733cf83
SHA256ccd54c24ca8ea33a8e1b4723dc86644ce8afdb7a5e6d144306d7e9211aa0bba7
SHA51279b3f409ed2daeac4b6b32b1b200b7d90bdde7d7d006147df88adbff1407534a9a230e22341bf660ab6b8f8166a50c59324ca5f0fd3854bf0f1631ade69ffad4
-
Filesize
2.6MB
MD5d0d39c280cd0afa66b5ffbc41ff50a1d
SHA1072e78018b00af30b7b7184ae7ca4616af6c6bf7
SHA256d9573f6e0cdc0c6f7f3e7f190632a16793980de387bf16a9a5b4137fa0c4e63f
SHA512cbdfab02798c7dbe691bbae7908005f795177028af32a1573bd8ee4d4e88cccf4ef749c58a6f86510d6a72e4debc97e8b3646b7f31e6dc127c3db17d3feb661a