Analysis

  • max time kernel
    119s
  • max time network
    100s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-10-2024 09:19

General

  • Target

    01e5e880956712931ba5083c3b3ee5ecb913a76bb8533578883ff392b529d280N.exe

  • Size

    2.7MB

  • MD5

    f3ee36526dd8738cfdc046e683b92380

  • SHA1

    1bc2c77040a4f81bd3ad4d9ff08b6e602a9d9530

  • SHA256

    01e5e880956712931ba5083c3b3ee5ecb913a76bb8533578883ff392b529d280

  • SHA512

    37a549735c8f5b8d44cfaf59c69591d567ad91219fc0537611fa6837eb55c743df3ac6a5c77f264439063b77e718660f824d8019249da6b129888bb2bbd3319e

  • SSDEEP

    49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBW9w4Sx:+R0pI/IQlUoMPdmpSpY4

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\01e5e880956712931ba5083c3b3ee5ecb913a76bb8533578883ff392b529d280N.exe
    "C:\Users\Admin\AppData\Local\Temp\01e5e880956712931ba5083c3b3ee5ecb913a76bb8533578883ff392b529d280N.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3496
    • C:\UserDot5R\aoptiloc.exe
      C:\UserDot5R\aoptiloc.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:3928

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\KaVBQX\dobxec.exe

    Filesize

    2.7MB

    MD5

    527da7fe237420d5b241a19b05eade20

    SHA1

    1418daa4060293b5d22530f16c69a2b9502512a8

    SHA256

    e90c97f82cd9e74c23b2ef5e60c9a7b47c3d674f8a643e8df8df166e366bc761

    SHA512

    286f8ec29c844898f13f3d1b25c59224e8d2d3f7dfa814287f29e65a22a57e248f6ec051cc4ad4e72a6019702357ba1b7e5a6fcd6eba7024d7ed8cea44ba1a32

  • C:\UserDot5R\aoptiloc.exe

    Filesize

    2.7MB

    MD5

    e1ca24c6771dff4c38653cdb3c5be4ee

    SHA1

    d1c2c5e5725535d241c2619837e5d47babea3b5c

    SHA256

    02a83e130c447c0ee2f9d7c841d1657a51d8d6964c77602f17a561e0c2b8615a

    SHA512

    290996640d1f5fadc2f69479a5754f53123394b96e274c407d52ce8c17804bd96a34a365b04e3ea462e33db2f7612a19b5abea87d99bf8895d5b977dba415fc4

  • C:\Users\Admin\253086396416_10.0_Admin.ini

    Filesize

    203B

    MD5

    943a91bf755626550d9cf2272cc18cd7

    SHA1

    7356618a7001e051e24ed7538de2d90c0029d7e4

    SHA256

    8bc87eb02f624e5761ffa335c4794dc5bfbf351ff2e7b94dae2f704f5b2af46c

    SHA512

    b140bf30032151d029a8fbf28c8876799c389008af8d77dca7b0f0c58782046297f1c22f953f39fa35d1bda55fb136f376dbcdcf6a0b38739657df6ceba2a807