Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24-08-2024 16:54
Static task
static1
Behavioral task
behavioral1
Sample
207780eb24f1dccc3653850fae048d50N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
207780eb24f1dccc3653850fae048d50N.exe
Resource
win10v2004-20240802-en
General
-
Target
207780eb24f1dccc3653850fae048d50N.exe
-
Size
3.1MB
-
MD5
207780eb24f1dccc3653850fae048d50
-
SHA1
2cfa74a6f7fac0cbf7ed124ce2c505143fe0422c
-
SHA256
797b8705d4de20e70f525550bebd2c983839f9e436f7004991f0be4517b1afc3
-
SHA512
5feb2017ce7685b2aebd4359ee8feec84d6607d973cb283b984538d903aa679f8c9a539b9b183f47bb7f29fa04d57a876d256e4feed1081dae76f75d533d2697
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LB69w4Su+LNfej:+R0pI/IQlUoMPdmpSpg4JkNfej
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1960 xoptisys.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\AdobeDF\\xoptisys.exe" 207780eb24f1dccc3653850fae048d50N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\LabZ5P\\optixloc.exe" 207780eb24f1dccc3653850fae048d50N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xoptisys.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 207780eb24f1dccc3653850fae048d50N.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3296 207780eb24f1dccc3653850fae048d50N.exe 3296 207780eb24f1dccc3653850fae048d50N.exe 3296 207780eb24f1dccc3653850fae048d50N.exe 3296 207780eb24f1dccc3653850fae048d50N.exe 1960 xoptisys.exe 1960 xoptisys.exe 3296 207780eb24f1dccc3653850fae048d50N.exe 3296 207780eb24f1dccc3653850fae048d50N.exe 1960 xoptisys.exe 1960 xoptisys.exe 3296 207780eb24f1dccc3653850fae048d50N.exe 3296 207780eb24f1dccc3653850fae048d50N.exe 1960 xoptisys.exe 1960 xoptisys.exe 3296 207780eb24f1dccc3653850fae048d50N.exe 3296 207780eb24f1dccc3653850fae048d50N.exe 1960 xoptisys.exe 1960 xoptisys.exe 3296 207780eb24f1dccc3653850fae048d50N.exe 3296 207780eb24f1dccc3653850fae048d50N.exe 1960 xoptisys.exe 1960 xoptisys.exe 3296 207780eb24f1dccc3653850fae048d50N.exe 3296 207780eb24f1dccc3653850fae048d50N.exe 1960 xoptisys.exe 1960 xoptisys.exe 3296 207780eb24f1dccc3653850fae048d50N.exe 3296 207780eb24f1dccc3653850fae048d50N.exe 1960 xoptisys.exe 1960 xoptisys.exe 3296 207780eb24f1dccc3653850fae048d50N.exe 3296 207780eb24f1dccc3653850fae048d50N.exe 1960 xoptisys.exe 1960 xoptisys.exe 3296 207780eb24f1dccc3653850fae048d50N.exe 3296 207780eb24f1dccc3653850fae048d50N.exe 1960 xoptisys.exe 1960 xoptisys.exe 3296 207780eb24f1dccc3653850fae048d50N.exe 3296 207780eb24f1dccc3653850fae048d50N.exe 1960 xoptisys.exe 1960 xoptisys.exe 3296 207780eb24f1dccc3653850fae048d50N.exe 3296 207780eb24f1dccc3653850fae048d50N.exe 1960 xoptisys.exe 1960 xoptisys.exe 3296 207780eb24f1dccc3653850fae048d50N.exe 3296 207780eb24f1dccc3653850fae048d50N.exe 1960 xoptisys.exe 1960 xoptisys.exe 3296 207780eb24f1dccc3653850fae048d50N.exe 3296 207780eb24f1dccc3653850fae048d50N.exe 1960 xoptisys.exe 1960 xoptisys.exe 3296 207780eb24f1dccc3653850fae048d50N.exe 3296 207780eb24f1dccc3653850fae048d50N.exe 1960 xoptisys.exe 1960 xoptisys.exe 3296 207780eb24f1dccc3653850fae048d50N.exe 3296 207780eb24f1dccc3653850fae048d50N.exe 1960 xoptisys.exe 1960 xoptisys.exe 3296 207780eb24f1dccc3653850fae048d50N.exe 3296 207780eb24f1dccc3653850fae048d50N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3296 wrote to memory of 1960 3296 207780eb24f1dccc3653850fae048d50N.exe 95 PID 3296 wrote to memory of 1960 3296 207780eb24f1dccc3653850fae048d50N.exe 95 PID 3296 wrote to memory of 1960 3296 207780eb24f1dccc3653850fae048d50N.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\207780eb24f1dccc3653850fae048d50N.exe"C:\Users\Admin\AppData\Local\Temp\207780eb24f1dccc3653850fae048d50N.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3296 -
C:\AdobeDF\xoptisys.exeC:\AdobeDF\xoptisys.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3852,i,15436195446242760253,4000484513008731869,262144 --variations-seed-version --mojo-platform-channel-handle=4248 /prefetch:81⤵PID:2392
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD579cc2c345fdd4e88a88c29456b309dfe
SHA1754e79f7a347883effd678a1a3b16dfebcf3c466
SHA2568e09b1389ff1898e0710ab3d49d7fc5798ee5119eb252cfaa215f84c5c8cf0a7
SHA512be01b27276029487862c96aca6d5c748cbc133592ebba144915898dd9f5da7fd0f6eea0da13d727fa0a7e74cda98bc34d7c09211f986b694100fe2c2cf6dacc6
-
Filesize
3.1MB
MD5538823920bcf53dc27f533d845c88efe
SHA198d116704c9615132ba7986c8399e3432f123a97
SHA2565d762a083bd53a2d28a87b01d7af5f05459a88f40d761b6058ca8df347893831
SHA51252c75501bf2c62a68d938825a1e7e9a6733505ba2385eac9364436487b8f9586e42c011739737747030e76b1892752edc266ed3eb160dfcc71bcf4e2209dc19f
-
Filesize
204B
MD5ca3b4cd7ce63d35060acbc1ae0fc1846
SHA1e054a6f280ce2d264a1e6acf5542715cce37b4fb
SHA256326b0f6205fa84dc5e4067d44b2ec9f84ded9e4efd7e52d60e3d775eec21e050
SHA51286208a2e1fdb224733131e8a88880a802ba08adbb8607de9db491f86cc2cb065c4963674a26bce7bcd76d8217d8014d86d2c15286c332a989d5fcd8aa425bc28