Analysis
-
max time kernel
119s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20/11/2024, 05:11
Static task
static1
Behavioral task
behavioral1
Sample
2ff4d396642fe645f20092ed01bd952a13de311a85635f535a7ae1fd21fa5e8eN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2ff4d396642fe645f20092ed01bd952a13de311a85635f535a7ae1fd21fa5e8eN.exe
Resource
win10v2004-20241007-en
General
-
Target
2ff4d396642fe645f20092ed01bd952a13de311a85635f535a7ae1fd21fa5e8eN.exe
-
Size
2.6MB
-
MD5
8a2de1a619b66fb9813a0e8f2a310a60
-
SHA1
5822dfc297539ff9f2f6ed305167296cac803000
-
SHA256
2ff4d396642fe645f20092ed01bd952a13de311a85635f535a7ae1fd21fa5e8e
-
SHA512
52964fc7ff81c1fa2b3143b9effb09e62c66b36265ecbdd5a71643c1882164859549341bfcf88e91d0713d656a38e668908ae6437675e3290355fd33b08e0f68
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBmB/bSq:sxX7QnxrloE5dpUpJbV
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysxopti.exe 2ff4d396642fe645f20092ed01bd952a13de311a85635f535a7ae1fd21fa5e8eN.exe -
Executes dropped EXE 2 IoCs
pid Process 2248 sysxopti.exe 2236 xoptiloc.exe -
Loads dropped DLL 2 IoCs
pid Process 2828 2ff4d396642fe645f20092ed01bd952a13de311a85635f535a7ae1fd21fa5e8eN.exe 2828 2ff4d396642fe645f20092ed01bd952a13de311a85635f535a7ae1fd21fa5e8eN.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\Intelproc94\\xoptiloc.exe" 2ff4d396642fe645f20092ed01bd952a13de311a85635f535a7ae1fd21fa5e8eN.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\VidU4\\bodaloc.exe" 2ff4d396642fe645f20092ed01bd952a13de311a85635f535a7ae1fd21fa5e8eN.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sysxopti.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xoptiloc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2ff4d396642fe645f20092ed01bd952a13de311a85635f535a7ae1fd21fa5e8eN.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2828 2ff4d396642fe645f20092ed01bd952a13de311a85635f535a7ae1fd21fa5e8eN.exe 2828 2ff4d396642fe645f20092ed01bd952a13de311a85635f535a7ae1fd21fa5e8eN.exe 2248 sysxopti.exe 2236 xoptiloc.exe 2248 sysxopti.exe 2236 xoptiloc.exe 2248 sysxopti.exe 2236 xoptiloc.exe 2248 sysxopti.exe 2236 xoptiloc.exe 2248 sysxopti.exe 2236 xoptiloc.exe 2248 sysxopti.exe 2236 xoptiloc.exe 2248 sysxopti.exe 2236 xoptiloc.exe 2248 sysxopti.exe 2236 xoptiloc.exe 2248 sysxopti.exe 2236 xoptiloc.exe 2248 sysxopti.exe 2236 xoptiloc.exe 2248 sysxopti.exe 2236 xoptiloc.exe 2248 sysxopti.exe 2236 xoptiloc.exe 2248 sysxopti.exe 2236 xoptiloc.exe 2248 sysxopti.exe 2236 xoptiloc.exe 2248 sysxopti.exe 2236 xoptiloc.exe 2248 sysxopti.exe 2236 xoptiloc.exe 2248 sysxopti.exe 2236 xoptiloc.exe 2248 sysxopti.exe 2236 xoptiloc.exe 2248 sysxopti.exe 2236 xoptiloc.exe 2248 sysxopti.exe 2236 xoptiloc.exe 2248 sysxopti.exe 2236 xoptiloc.exe 2248 sysxopti.exe 2236 xoptiloc.exe 2248 sysxopti.exe 2236 xoptiloc.exe 2248 sysxopti.exe 2236 xoptiloc.exe 2248 sysxopti.exe 2236 xoptiloc.exe 2248 sysxopti.exe 2236 xoptiloc.exe 2248 sysxopti.exe 2236 xoptiloc.exe 2248 sysxopti.exe 2236 xoptiloc.exe 2248 sysxopti.exe 2236 xoptiloc.exe 2248 sysxopti.exe 2236 xoptiloc.exe 2248 sysxopti.exe 2236 xoptiloc.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2828 wrote to memory of 2248 2828 2ff4d396642fe645f20092ed01bd952a13de311a85635f535a7ae1fd21fa5e8eN.exe 30 PID 2828 wrote to memory of 2248 2828 2ff4d396642fe645f20092ed01bd952a13de311a85635f535a7ae1fd21fa5e8eN.exe 30 PID 2828 wrote to memory of 2248 2828 2ff4d396642fe645f20092ed01bd952a13de311a85635f535a7ae1fd21fa5e8eN.exe 30 PID 2828 wrote to memory of 2248 2828 2ff4d396642fe645f20092ed01bd952a13de311a85635f535a7ae1fd21fa5e8eN.exe 30 PID 2828 wrote to memory of 2236 2828 2ff4d396642fe645f20092ed01bd952a13de311a85635f535a7ae1fd21fa5e8eN.exe 31 PID 2828 wrote to memory of 2236 2828 2ff4d396642fe645f20092ed01bd952a13de311a85635f535a7ae1fd21fa5e8eN.exe 31 PID 2828 wrote to memory of 2236 2828 2ff4d396642fe645f20092ed01bd952a13de311a85635f535a7ae1fd21fa5e8eN.exe 31 PID 2828 wrote to memory of 2236 2828 2ff4d396642fe645f20092ed01bd952a13de311a85635f535a7ae1fd21fa5e8eN.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\2ff4d396642fe645f20092ed01bd952a13de311a85635f535a7ae1fd21fa5e8eN.exe"C:\Users\Admin\AppData\Local\Temp\2ff4d396642fe645f20092ed01bd952a13de311a85635f535a7ae1fd21fa5e8eN.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysxopti.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysxopti.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2248
-
-
C:\Intelproc94\xoptiloc.exeC:\Intelproc94\xoptiloc.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2236
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD59b18dd61c9bd23593e1219eea4ee8dae
SHA18a4a53a9793dbcfe8855c0be627b9e13a6201ead
SHA25699ea5a8ec484f39a4d60c156ee0bfca93d1b9a65a34ef014ba08e4cac0ddd4bc
SHA512f704395be4ca52e40daea41893305c7ad6dec56b77c2a27f97898661a58843fe3ae274e67f35a1db61865f37e13a8986646c435288ea4c5bf03315d268fbb4ef
-
Filesize
173B
MD567b8ab8fd5b0a8c8406b4865bdf3a2e4
SHA15ca58fd77e2f06bd92c1c3fb88d8a22e1ea894cc
SHA256eae27cd186dc5f283d83e70cbe14851939541338ed15b890bb34304651d1a9d5
SHA5121ad7ac6430500fc6a9d05109a6567508afd116cf5b1e516ba1c745f8371cbb9362264691951c40526c6eae4cd6a02310be92ed8f1f211570cebfdf13832e1c97
-
Filesize
205B
MD53c206a4ddf8914dfcb77b71690497daa
SHA189a03109860b35d24434c2aff48e8d678ffadd5e
SHA256b997de936d1faba9460f183309e9d37e12f8dee05fb05856e95a445d47f2e2a2
SHA51271bbe26cc6c1a005f51c9c7cd5f418427784600ffe198a4366f47fdd56d1299e03f1a1ec896bcf8c51139ddb545c70258971e0e169739868533eca299ce3d717
-
Filesize
2.6MB
MD5e1cf1460db6aab0555bebb34832f3bb9
SHA13d22d97175b3ec086998d2fcf8058dbcab139491
SHA2565077a5fd6cf6a126a0cbccef5e9561968ca1e7b6860dfc973de4e0c14ee1d8ee
SHA512f5657aac73bb67e3efb51937c817d0a2785d57bd01c3abc9801442853a369b2aed3822062fa5abe36c37713955d6caeb7f68641332324c57783f8c6c1833fd89
-
Filesize
2.6MB
MD56c5eb08d5751fefb12eed171b1bf1aa7
SHA1b40a2607f79c1efe498da343129a529645531165
SHA256cb472625949c3750688e8ba8af46dc17201a2ecc217f73be57fa5b32cd23ce20
SHA5127b0b3da4d14892bf0fdf5fe938cf9d45e39848ff80fc5908499dbb7b7523519f28b3e9e481b918c27a9e336c9f6a5bdd2e1251110d86bd08baa7a766303137f9
-
Filesize
2.6MB
MD5be9efe81d5159a696eea56127af5f9a7
SHA150acbe321ee9fbbf789fddd8170158884bc6e962
SHA256a0db65d92ca7e7246abd6e8b6c8e24b0b8b59933042a074b2aa65a35b2ac8d04
SHA5123fa36cda181351995e41c530598e0e242a4f7830742817884499dea76b4477d53e7a4c721a62df51d80cc9fa23c40e89c9f6058b5a0b1cb9c205082bd2e74a74