Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2023, 07:31
Static task
static1
Behavioral task
behavioral1
Sample
99fd420c741b9fb74722d584a37fb107dd03e080b666c8283c9f8a374ac2d1d2.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
99fd420c741b9fb74722d584a37fb107dd03e080b666c8283c9f8a374ac2d1d2.exe
Resource
win10v2004-20230915-en
General
-
Target
99fd420c741b9fb74722d584a37fb107dd03e080b666c8283c9f8a374ac2d1d2.exe
-
Size
196KB
-
MD5
b3a71d3cbfd3dcd6850d93ab84e964c0
-
SHA1
744df70331182cd017ae12d2918e4db163c00918
-
SHA256
99fd420c741b9fb74722d584a37fb107dd03e080b666c8283c9f8a374ac2d1d2
-
SHA512
a647abe4c1a7814075d07ff6a2b7dae8496ab01a517562fd4cffdb0584e2aa025552e7231293a79f1e6c885a59deb42673a71bfe68754a12b7b7883a54a837e4
-
SSDEEP
3072:nDS++nAzJ2FDWPWtOox7p4TWaEHKdm0bme+XRkLZ5yUEg:DS+xF8DWi3ATW/qo0bme+Bgjydg
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2084 opljoq.exe 4616 opljoq.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\UC\opljoq.exe 99fd420c741b9fb74722d584a37fb107dd03e080b666c8283c9f8a374ac2d1d2.exe File opened for modification C:\Program Files (x86)\UC\opljoq.exe 99fd420c741b9fb74722d584a37fb107dd03e080b666c8283c9f8a374ac2d1d2.exe File opened for modification C:\Program Files (x86)\UC\opljoq.exe attrib.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2200 99fd420c741b9fb74722d584a37fb107dd03e080b666c8283c9f8a374ac2d1d2.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2200 99fd420c741b9fb74722d584a37fb107dd03e080b666c8283c9f8a374ac2d1d2.exe 2200 99fd420c741b9fb74722d584a37fb107dd03e080b666c8283c9f8a374ac2d1d2.exe 2084 opljoq.exe 2084 opljoq.exe 4616 opljoq.exe 4616 opljoq.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2200 wrote to memory of 4388 2200 99fd420c741b9fb74722d584a37fb107dd03e080b666c8283c9f8a374ac2d1d2.exe 86 PID 2200 wrote to memory of 4388 2200 99fd420c741b9fb74722d584a37fb107dd03e080b666c8283c9f8a374ac2d1d2.exe 86 PID 2200 wrote to memory of 4388 2200 99fd420c741b9fb74722d584a37fb107dd03e080b666c8283c9f8a374ac2d1d2.exe 86 PID 2084 wrote to memory of 4616 2084 opljoq.exe 90 PID 2084 wrote to memory of 4616 2084 opljoq.exe 90 PID 2084 wrote to memory of 4616 2084 opljoq.exe 90 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 4388 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\99fd420c741b9fb74722d584a37fb107dd03e080b666c8283c9f8a374ac2d1d2.exe"C:\Users\Admin\AppData\Local\Temp\99fd420c741b9fb74722d584a37fb107dd03e080b666c8283c9f8a374ac2d1d2.exe"1⤵
- Drops file in Program Files directory
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Windows\SysWOW64\attrib.exeattrib +h +s "C:\Program Files (x86)\UC\opljoq.exe"2⤵
- Drops file in Program Files directory
- Views/modifies file attributes
PID:4388
-
-
C:\Program Files (x86)\UC\opljoq.exe"C:\Program Files (x86)\UC\opljoq.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Program Files (x86)\UC\opljoq.exe"C:\Program Files (x86)\UC\opljoq.exe" Win72⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4616
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
196KB
MD5b3a71d3cbfd3dcd6850d93ab84e964c0
SHA1744df70331182cd017ae12d2918e4db163c00918
SHA25699fd420c741b9fb74722d584a37fb107dd03e080b666c8283c9f8a374ac2d1d2
SHA512a647abe4c1a7814075d07ff6a2b7dae8496ab01a517562fd4cffdb0584e2aa025552e7231293a79f1e6c885a59deb42673a71bfe68754a12b7b7883a54a837e4
-
Filesize
196KB
MD5b3a71d3cbfd3dcd6850d93ab84e964c0
SHA1744df70331182cd017ae12d2918e4db163c00918
SHA25699fd420c741b9fb74722d584a37fb107dd03e080b666c8283c9f8a374ac2d1d2
SHA512a647abe4c1a7814075d07ff6a2b7dae8496ab01a517562fd4cffdb0584e2aa025552e7231293a79f1e6c885a59deb42673a71bfe68754a12b7b7883a54a837e4
-
Filesize
196KB
MD5b3a71d3cbfd3dcd6850d93ab84e964c0
SHA1744df70331182cd017ae12d2918e4db163c00918
SHA25699fd420c741b9fb74722d584a37fb107dd03e080b666c8283c9f8a374ac2d1d2
SHA512a647abe4c1a7814075d07ff6a2b7dae8496ab01a517562fd4cffdb0584e2aa025552e7231293a79f1e6c885a59deb42673a71bfe68754a12b7b7883a54a837e4