Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-08-2024 16:54

General

  • Target

    207780eb24f1dccc3653850fae048d50N.exe

  • Size

    3.1MB

  • MD5

    207780eb24f1dccc3653850fae048d50

  • SHA1

    2cfa74a6f7fac0cbf7ed124ce2c505143fe0422c

  • SHA256

    797b8705d4de20e70f525550bebd2c983839f9e436f7004991f0be4517b1afc3

  • SHA512

    5feb2017ce7685b2aebd4359ee8feec84d6607d973cb283b984538d903aa679f8c9a539b9b183f47bb7f29fa04d57a876d256e4feed1081dae76f75d533d2697

  • SSDEEP

    49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LB69w4Su+LNfej:+R0pI/IQlUoMPdmpSpg4JkNfej

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\207780eb24f1dccc3653850fae048d50N.exe
    "C:\Users\Admin\AppData\Local\Temp\207780eb24f1dccc3653850fae048d50N.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3296
    • C:\AdobeDF\xoptisys.exe
      C:\AdobeDF\xoptisys.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:1960
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3852,i,15436195446242760253,4000484513008731869,262144 --variations-seed-version --mojo-platform-channel-handle=4248 /prefetch:8
    1⤵
      PID:2392

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\AdobeDF\xoptisys.exe

      Filesize

      3.1MB

      MD5

      79cc2c345fdd4e88a88c29456b309dfe

      SHA1

      754e79f7a347883effd678a1a3b16dfebcf3c466

      SHA256

      8e09b1389ff1898e0710ab3d49d7fc5798ee5119eb252cfaa215f84c5c8cf0a7

      SHA512

      be01b27276029487862c96aca6d5c748cbc133592ebba144915898dd9f5da7fd0f6eea0da13d727fa0a7e74cda98bc34d7c09211f986b694100fe2c2cf6dacc6

    • C:\LabZ5P\optixloc.exe

      Filesize

      3.1MB

      MD5

      538823920bcf53dc27f533d845c88efe

      SHA1

      98d116704c9615132ba7986c8399e3432f123a97

      SHA256

      5d762a083bd53a2d28a87b01d7af5f05459a88f40d761b6058ca8df347893831

      SHA512

      52c75501bf2c62a68d938825a1e7e9a6733505ba2385eac9364436487b8f9586e42c011739737747030e76b1892752edc266ed3eb160dfcc71bcf4e2209dc19f

    • C:\Users\Admin\253086396416_10.0_Admin.ini

      Filesize

      204B

      MD5

      ca3b4cd7ce63d35060acbc1ae0fc1846

      SHA1

      e054a6f280ce2d264a1e6acf5542715cce37b4fb

      SHA256

      326b0f6205fa84dc5e4067d44b2ec9f84ded9e4efd7e52d60e3d775eec21e050

      SHA512

      86208a2e1fdb224733131e8a88880a802ba08adbb8607de9db491f86cc2cb065c4963674a26bce7bcd76d8217d8014d86d2c15286c332a989d5fcd8aa425bc28