Analysis
-
max time kernel
119s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
26/08/2024, 02:36
Static task
static1
Behavioral task
behavioral1
Sample
1b8a984aaac165732ee79cede8d12800N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
1b8a984aaac165732ee79cede8d12800N.exe
Resource
win10v2004-20240802-en
General
-
Target
1b8a984aaac165732ee79cede8d12800N.exe
-
Size
2.7MB
-
MD5
1b8a984aaac165732ee79cede8d12800
-
SHA1
751862daf2dbbcd3df398ccdaea16024a4d34451
-
SHA256
72645b49a6d7e50d0d326f90e49f6b8589d3ce4639247f6821664318dd1bbca6
-
SHA512
6567c1c7e692f1c99e8bb22d348137c4ce0ef92058f9bd0f867909b611d6a5318c804bf92af14d63ccc047d5713e17002b6f78697ca24715a84811856f6cfb95
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBE9w4Sx:+R0pI/IQlUoMPdmpSp24
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2876 xoptiec.exe -
Loads dropped DLL 1 IoCs
pid Process 1528 1b8a984aaac165732ee79cede8d12800N.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\Intelproc4P\\xoptiec.exe" 1b8a984aaac165732ee79cede8d12800N.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\KaVBB2\\optixloc.exe" 1b8a984aaac165732ee79cede8d12800N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1b8a984aaac165732ee79cede8d12800N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xoptiec.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1528 1b8a984aaac165732ee79cede8d12800N.exe 1528 1b8a984aaac165732ee79cede8d12800N.exe 2876 xoptiec.exe 1528 1b8a984aaac165732ee79cede8d12800N.exe 2876 xoptiec.exe 1528 1b8a984aaac165732ee79cede8d12800N.exe 2876 xoptiec.exe 1528 1b8a984aaac165732ee79cede8d12800N.exe 2876 xoptiec.exe 1528 1b8a984aaac165732ee79cede8d12800N.exe 2876 xoptiec.exe 1528 1b8a984aaac165732ee79cede8d12800N.exe 2876 xoptiec.exe 1528 1b8a984aaac165732ee79cede8d12800N.exe 2876 xoptiec.exe 1528 1b8a984aaac165732ee79cede8d12800N.exe 2876 xoptiec.exe 1528 1b8a984aaac165732ee79cede8d12800N.exe 2876 xoptiec.exe 1528 1b8a984aaac165732ee79cede8d12800N.exe 2876 xoptiec.exe 1528 1b8a984aaac165732ee79cede8d12800N.exe 2876 xoptiec.exe 1528 1b8a984aaac165732ee79cede8d12800N.exe 2876 xoptiec.exe 1528 1b8a984aaac165732ee79cede8d12800N.exe 2876 xoptiec.exe 1528 1b8a984aaac165732ee79cede8d12800N.exe 2876 xoptiec.exe 1528 1b8a984aaac165732ee79cede8d12800N.exe 2876 xoptiec.exe 1528 1b8a984aaac165732ee79cede8d12800N.exe 2876 xoptiec.exe 1528 1b8a984aaac165732ee79cede8d12800N.exe 2876 xoptiec.exe 1528 1b8a984aaac165732ee79cede8d12800N.exe 2876 xoptiec.exe 1528 1b8a984aaac165732ee79cede8d12800N.exe 2876 xoptiec.exe 1528 1b8a984aaac165732ee79cede8d12800N.exe 2876 xoptiec.exe 1528 1b8a984aaac165732ee79cede8d12800N.exe 2876 xoptiec.exe 1528 1b8a984aaac165732ee79cede8d12800N.exe 2876 xoptiec.exe 1528 1b8a984aaac165732ee79cede8d12800N.exe 2876 xoptiec.exe 1528 1b8a984aaac165732ee79cede8d12800N.exe 2876 xoptiec.exe 1528 1b8a984aaac165732ee79cede8d12800N.exe 2876 xoptiec.exe 1528 1b8a984aaac165732ee79cede8d12800N.exe 2876 xoptiec.exe 1528 1b8a984aaac165732ee79cede8d12800N.exe 2876 xoptiec.exe 1528 1b8a984aaac165732ee79cede8d12800N.exe 2876 xoptiec.exe 1528 1b8a984aaac165732ee79cede8d12800N.exe 2876 xoptiec.exe 1528 1b8a984aaac165732ee79cede8d12800N.exe 2876 xoptiec.exe 1528 1b8a984aaac165732ee79cede8d12800N.exe 2876 xoptiec.exe 1528 1b8a984aaac165732ee79cede8d12800N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1528 wrote to memory of 2876 1528 1b8a984aaac165732ee79cede8d12800N.exe 30 PID 1528 wrote to memory of 2876 1528 1b8a984aaac165732ee79cede8d12800N.exe 30 PID 1528 wrote to memory of 2876 1528 1b8a984aaac165732ee79cede8d12800N.exe 30 PID 1528 wrote to memory of 2876 1528 1b8a984aaac165732ee79cede8d12800N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\1b8a984aaac165732ee79cede8d12800N.exe"C:\Users\Admin\AppData\Local\Temp\1b8a984aaac165732ee79cede8d12800N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Intelproc4P\xoptiec.exeC:\Intelproc4P\xoptiec.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2876
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD5c5ebb78c52315f87867fea1e2296196b
SHA19559e984ff8f8873c8e8e9c75cc38a09810ff123
SHA2564231335b1d2e48ca2ff0e33dc935d7531cc94cc058bfb6fcd531d1238d40b05b
SHA512bbf45460ccaf72ee54b5964f63bd66c351f9063dfcb5b28b5d8253bc9224d2cd6a7f25354eee10af5a134e758c509a3832d2a7438bd05ee9b9388d28f0bef680
-
Filesize
205B
MD5bb8011148454927f86fc79bd28bc2372
SHA1a3410a033fc128e245c8e9488c1057615c53779d
SHA25617463433e8d4cf434f7824a69667765b26863acdd4422eac3c06c6ceb923661d
SHA5125edef6619fdd7864522fd7d849d1df41a520709bfabbc5ae3a7e5805c26421cbf9ba7f98c9f405d050241dba32a0e5ab191bb6ae4eae7cc9bdd95bcf3a8272a8
-
Filesize
2.7MB
MD585521bdf7da05a4a0c7b0378588444ed
SHA1b54d1c2dece0dd9edacc20e2fa256b2f69cec832
SHA256c94eed086cea1cf6864616e977cf760e883fefaa3cfba443b399daf67d40bfb2
SHA5125d6339ae1296075a1a7f5be88eff679d58e04cbdb104d2542bf42a3731dea24cc9b35bf0621744a04cba386e6645871ddc16fdc510b39d26743ba31daa3406e9