Overview
overview
10Static
static
10virussign....b0.exe
windows7-x64
10virussign....b0.exe
windows10-2004-x64
10virussign....60.exe
windows7-x64
7virussign....60.exe
windows10-2004-x64
7virussign....40.exe
windows7-x64
7virussign....40.exe
windows10-2004-x64
7virussign....e0.exe
windows7-x64
7virussign....e0.exe
windows10-2004-x64
7virussign....00.exe
windows7-x64
10virussign....00.exe
windows10-2004-x64
10virussign....90.exe
windows7-x64
7virussign....90.exe
windows10-2004-x64
7virussign....40.exe
windows7-x64
7virussign....40.exe
windows10-2004-x64
7virussign....10.exe
windows7-x64
5virussign....10.exe
windows10-2004-x64
5virussign....60.exe
windows7-x64
7virussign....60.exe
windows10-2004-x64
7virussign....c0.exe
windows7-x64
10virussign....c0.exe
windows10-2004-x64
10virussign....d0.exe
windows7-x64
7virussign....d0.exe
windows10-2004-x64
7virussign....b0.exe
windows7-x64
10virussign....b0.exe
windows10-2004-x64
10virussign....10.exe
windows7-x64
7virussign....10.exe
windows10-2004-x64
7virussign....e0.exe
windows7-x64
7virussign....e0.exe
windows10-2004-x64
7virussign....20.exe
windows7-x64
7virussign....20.exe
windows10-2004-x64
7virussign....c0.exe
windows7-x64
7virussign....c0.exe
windows10-2004-x64
7Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-11-2024 17:08
Behavioral task
behavioral1
Sample
virussign.com_b1d2087d1d88f80870106373da2011b0.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
virussign.com_b1d2087d1d88f80870106373da2011b0.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
virussign.com_b4a073dab1d51b27d63f81649310ab60.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
virussign.com_b4a073dab1d51b27d63f81649310ab60.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
virussign.com_b793dc2ed636fdaee1a701e05fde1640.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
virussign.com_b793dc2ed636fdaee1a701e05fde1640.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
virussign.com_ba1f70e629bc3e70fba35036be583ce0.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
virussign.com_ba1f70e629bc3e70fba35036be583ce0.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
virussign.com_bcab6f30045483fd648d1924aba88b00.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
virussign.com_bcab6f30045483fd648d1924aba88b00.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
virussign.com_bf4239be7de1ad8dddc78d1aff0d6090.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
virussign.com_bf4239be7de1ad8dddc78d1aff0d6090.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
virussign.com_c251643a9964695966b3f7a545401440.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
virussign.com_c251643a9964695966b3f7a545401440.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
virussign.com_c3fa4d199e50171575cfa553fd205a10.exe
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
virussign.com_c3fa4d199e50171575cfa553fd205a10.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
virussign.com_c527d92958bc1247a6471765e5449c60.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
virussign.com_c527d92958bc1247a6471765e5449c60.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
virussign.com_c7d033cce29ec681f70bfb5f2ec867c0.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
virussign.com_c7d033cce29ec681f70bfb5f2ec867c0.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
virussign.com_ca6b0e41f6273b8c6a022729b7a7efd0.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
virussign.com_ca6b0e41f6273b8c6a022729b7a7efd0.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
virussign.com_ccf2dfc7e36c604f207bf823231b57b0.exe
Resource
win7-20241023-en
Behavioral task
behavioral24
Sample
virussign.com_ccf2dfc7e36c604f207bf823231b57b0.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
virussign.com_cf449b9fd99f5da93cbb91c84e64e710.exe
Resource
win7-20241010-en
Behavioral task
behavioral26
Sample
virussign.com_cf449b9fd99f5da93cbb91c84e64e710.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
virussign.com_d2157a5e0405795aa865f9264e231ee0.exe
Resource
win7-20240729-en
Behavioral task
behavioral28
Sample
virussign.com_d2157a5e0405795aa865f9264e231ee0.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
virussign.com_d4dd384ae38fed77098536c5b075c320.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
virussign.com_d4dd384ae38fed77098536c5b075c320.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
virussign.com_d7c1eea17ae01e04b622ede80b6732c0.exe
Resource
win7-20241023-en
Behavioral task
behavioral32
Sample
virussign.com_d7c1eea17ae01e04b622ede80b6732c0.exe
Resource
win10v2004-20241007-en
General
-
Target
virussign.com_c527d92958bc1247a6471765e5449c60.exe
-
Size
2.6MB
-
MD5
c527d92958bc1247a6471765e5449c60
-
SHA1
84fba87a0998698d3b6040dcfb83667a3eb2109b
-
SHA256
e9b4211e90f2c15e783c73a5998e3284b75b4afe70dae956e6dab0eb17732125
-
SHA512
1fdcac718581fa8fbdf15b3d3cdb0c2cf06f6a9a56facab47cf1841578264a1a6014cc51c07488939005852a569ae8c4c45b61b54e0b99d4d1f0bc78c1daa8da
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBXB/bSq:sxX7QnxrloE5dpUpUbV
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysaopti.exe virussign.com_c527d92958bc1247a6471765e5449c60.exe -
Executes dropped EXE 2 IoCs
pid Process 4980 sysaopti.exe 2776 aoptiec.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\UserDotYD\\aoptiec.exe" virussign.com_c527d92958bc1247a6471765e5449c60.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\VidBS\\optixec.exe" virussign.com_c527d92958bc1247a6471765e5449c60.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language virussign.com_c527d92958bc1247a6471765e5449c60.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sysaopti.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aoptiec.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4904 virussign.com_c527d92958bc1247a6471765e5449c60.exe 4904 virussign.com_c527d92958bc1247a6471765e5449c60.exe 4904 virussign.com_c527d92958bc1247a6471765e5449c60.exe 4904 virussign.com_c527d92958bc1247a6471765e5449c60.exe 4980 sysaopti.exe 4980 sysaopti.exe 2776 aoptiec.exe 2776 aoptiec.exe 4980 sysaopti.exe 4980 sysaopti.exe 2776 aoptiec.exe 2776 aoptiec.exe 4980 sysaopti.exe 4980 sysaopti.exe 2776 aoptiec.exe 2776 aoptiec.exe 4980 sysaopti.exe 4980 sysaopti.exe 2776 aoptiec.exe 2776 aoptiec.exe 4980 sysaopti.exe 4980 sysaopti.exe 2776 aoptiec.exe 2776 aoptiec.exe 4980 sysaopti.exe 4980 sysaopti.exe 2776 aoptiec.exe 2776 aoptiec.exe 4980 sysaopti.exe 4980 sysaopti.exe 2776 aoptiec.exe 2776 aoptiec.exe 4980 sysaopti.exe 4980 sysaopti.exe 2776 aoptiec.exe 2776 aoptiec.exe 4980 sysaopti.exe 4980 sysaopti.exe 2776 aoptiec.exe 2776 aoptiec.exe 4980 sysaopti.exe 4980 sysaopti.exe 2776 aoptiec.exe 2776 aoptiec.exe 4980 sysaopti.exe 4980 sysaopti.exe 2776 aoptiec.exe 2776 aoptiec.exe 4980 sysaopti.exe 4980 sysaopti.exe 2776 aoptiec.exe 2776 aoptiec.exe 4980 sysaopti.exe 4980 sysaopti.exe 2776 aoptiec.exe 2776 aoptiec.exe 4980 sysaopti.exe 4980 sysaopti.exe 2776 aoptiec.exe 2776 aoptiec.exe 4980 sysaopti.exe 4980 sysaopti.exe 2776 aoptiec.exe 2776 aoptiec.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4904 wrote to memory of 4980 4904 virussign.com_c527d92958bc1247a6471765e5449c60.exe 84 PID 4904 wrote to memory of 4980 4904 virussign.com_c527d92958bc1247a6471765e5449c60.exe 84 PID 4904 wrote to memory of 4980 4904 virussign.com_c527d92958bc1247a6471765e5449c60.exe 84 PID 4904 wrote to memory of 2776 4904 virussign.com_c527d92958bc1247a6471765e5449c60.exe 88 PID 4904 wrote to memory of 2776 4904 virussign.com_c527d92958bc1247a6471765e5449c60.exe 88 PID 4904 wrote to memory of 2776 4904 virussign.com_c527d92958bc1247a6471765e5449c60.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\virussign.com_c527d92958bc1247a6471765e5449c60.exe"C:\Users\Admin\AppData\Local\Temp\virussign.com_c527d92958bc1247a6471765e5449c60.exe"1⤵
- Drops startup file
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysaopti.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysaopti.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4980
-
-
C:\UserDotYD\aoptiec.exeC:\UserDotYD\aoptiec.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2776
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
272KB
MD520637ffcf1493d677450ba3dcf3b3015
SHA14a304e2bf9e418106d2fa8fe3968a88806d4562d
SHA2568c2d546f232c74c51f7585c96e5be2f971a0053cd3b929f53c5c26dd6cbc7c56
SHA5128432523afb43babdb05b48fbc6a9b75ee6c23902a3f15645fa1957fe2597ee81c46a8307f34fb2e9f2dab41fab17722609cba40cfa9cc5c8f8056cf5ac0437e5
-
Filesize
2.6MB
MD5f66e6d83a6c63d6ddb2efbadc1b2c973
SHA1f6c474a86f7f12ec47cb49fd92c7159e14dd2b83
SHA256cf1917e79d860849436b24d4dc83bb3cefbb23ad81e9bc462b38b870d39339b1
SHA512896d8330e21562fe5af89325bed39561babf8e052da9da4774b8c9cdc403641907ccdc19f9655f242395a48cd303ad75da9c4a61080f77cc75ae3b5329c22d44
-
Filesize
202B
MD52fd72b4320225b098c29f1adaea103ef
SHA1c9fcc4e76ad2172f52fc631f3e4e5d559a540c3b
SHA2565e02025f76baa6fdc94db990600ab2c7aae44f51926b5cbe8f3f7c36072a9c2e
SHA512d323b29f040d7360ddaf3f6f2cf7710da114ae13532b0152d957ec5de839ef1b4d3a357b278bffed77180191b178e5fe9b84dc7a8f07abdf38bec6111cb2b007
-
Filesize
170B
MD5e0f01def667777f2ffca0fb99d9e7749
SHA18fd84a229d2eeeb8731e77611b16285d1b46b4c4
SHA25607e504fd81b6d9eb1c5911521644014c0545fe3254f3073e70247858926e3145
SHA512864dc79157e7fe51300c57943e2c5a9a9ef8787954afe24511207e07b136dc115051cd6ba76028940ce5a8b528167d2de455cf78f533284257719b7459cadede
-
Filesize
2.6MB
MD550594f36d9b053bd57b5b00b592aa99e
SHA15c6066bc50e1f3a1c6901cf63fc4e40a10ac2fbd
SHA25639f52b26eb97939dccda23320116b1d038d546d726f35c49cb03d835584c2741
SHA5129632d3f1f219b05f9734ccbb6c53b78e285cb12d884a3cbe791c9a5cc60e2698f301e8c7d03f83d66c629fde2fd7c522a7be638c53c9c8adb57c48fa54eebcd4
-
Filesize
2.6MB
MD5e02550d2dbaa2cc06bdd7411f9755619
SHA1128c468da8475db95140ba7acf083cf22b2d4a6f
SHA256241a267b9c19d50ed714e4f933f7149acd46737839c0ba396496c23f4e5c6d5d
SHA5129c44562981677561b1a553701636e41b80def2ae914452cc47120a2668e42c66659afacf5cf01e60419c9c248ba39d704dc503473d801caed4c320c21340363e
-
Filesize
2.6MB
MD512f459465bd8c0fd135cd22ecbfb1585
SHA145ac1ea02b1bfaf39a4611cc6c5fff9825b245bb
SHA25664c9b8dbc5255f36a2282797910e4325de3069a251c418b602d639fc0adbd9b5
SHA512ea22341b8bf9c81f594953e58a7caa757d95fd3e9de9fd46f0f1eb801cc307d9ba83eef9f428a7af0a0bf08dbb8d9c633184fc450cf4446bc917abf442c4ffcc