Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25-02-2024 16:45
Static task
static1
Behavioral task
behavioral1
Sample
fada2d23185568fe84d7b5110cc51c92badc1cf615b993e3ecbfb5a96083786e.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fada2d23185568fe84d7b5110cc51c92badc1cf615b993e3ecbfb5a96083786e.exe
Resource
win10v2004-20240221-en
General
-
Target
fada2d23185568fe84d7b5110cc51c92badc1cf615b993e3ecbfb5a96083786e.exe
-
Size
44.1MB
-
MD5
71ba5156246b9df86f7ce5232d10379a
-
SHA1
78255379df33cdfe5fd3245b18edc0f14f77bd96
-
SHA256
fada2d23185568fe84d7b5110cc51c92badc1cf615b993e3ecbfb5a96083786e
-
SHA512
cbe0d08397825bca7c303bf3336cae9396c511e4f963703d572322f892df3149b3b10e6c57e656dd14cb52db8760360bd36b3a6292e8f2a6747f5f532b6dc8f7
-
SSDEEP
786432:3rMzfSAY24BjG2JnLns5oTgztADHw1zsgoTYpu1ME79NO8Lzv0eO5gpHG+vHhqEg:IzfZTyVnLTT7HweQqNBO+GtIKl
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1936 fada2d23185568fe84d7b5110cc51c92badc1cf615b993e3ecbfb5a96083786e.exe -
Loads dropped DLL 4 IoCs
pid Process 1664 fada2d23185568fe84d7b5110cc51c92badc1cf615b993e3ecbfb5a96083786e.exe 2076 fada2d23185568fe84d7b5110cc51c92badc1cf615b993e3ecbfb5a96083786e.exe 1664 fada2d23185568fe84d7b5110cc51c92badc1cf615b993e3ecbfb5a96083786e.exe 1936 fada2d23185568fe84d7b5110cc51c92badc1cf615b993e3ecbfb5a96083786e.exe -
Enumerates connected drives 3 TTPs 2 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\D: fada2d23185568fe84d7b5110cc51c92badc1cf615b993e3ecbfb5a96083786e.exe File opened (read-only) \??\F: fada2d23185568fe84d7b5110cc51c92badc1cf615b993e3ecbfb5a96083786e.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Opera fada2d23185568fe84d7b5110cc51c92badc1cf615b993e3ecbfb5a96083786e.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1664 fada2d23185568fe84d7b5110cc51c92badc1cf615b993e3ecbfb5a96083786e.exe 1664 fada2d23185568fe84d7b5110cc51c92badc1cf615b993e3ecbfb5a96083786e.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1664 fada2d23185568fe84d7b5110cc51c92badc1cf615b993e3ecbfb5a96083786e.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1664 wrote to memory of 2076 1664 fada2d23185568fe84d7b5110cc51c92badc1cf615b993e3ecbfb5a96083786e.exe 28 PID 1664 wrote to memory of 2076 1664 fada2d23185568fe84d7b5110cc51c92badc1cf615b993e3ecbfb5a96083786e.exe 28 PID 1664 wrote to memory of 2076 1664 fada2d23185568fe84d7b5110cc51c92badc1cf615b993e3ecbfb5a96083786e.exe 28 PID 1664 wrote to memory of 2076 1664 fada2d23185568fe84d7b5110cc51c92badc1cf615b993e3ecbfb5a96083786e.exe 28 PID 1664 wrote to memory of 2076 1664 fada2d23185568fe84d7b5110cc51c92badc1cf615b993e3ecbfb5a96083786e.exe 28 PID 1664 wrote to memory of 2076 1664 fada2d23185568fe84d7b5110cc51c92badc1cf615b993e3ecbfb5a96083786e.exe 28 PID 1664 wrote to memory of 2076 1664 fada2d23185568fe84d7b5110cc51c92badc1cf615b993e3ecbfb5a96083786e.exe 28 PID 1664 wrote to memory of 1936 1664 fada2d23185568fe84d7b5110cc51c92badc1cf615b993e3ecbfb5a96083786e.exe 29 PID 1664 wrote to memory of 1936 1664 fada2d23185568fe84d7b5110cc51c92badc1cf615b993e3ecbfb5a96083786e.exe 29 PID 1664 wrote to memory of 1936 1664 fada2d23185568fe84d7b5110cc51c92badc1cf615b993e3ecbfb5a96083786e.exe 29 PID 1664 wrote to memory of 1936 1664 fada2d23185568fe84d7b5110cc51c92badc1cf615b993e3ecbfb5a96083786e.exe 29 PID 1664 wrote to memory of 1936 1664 fada2d23185568fe84d7b5110cc51c92badc1cf615b993e3ecbfb5a96083786e.exe 29 PID 1664 wrote to memory of 1936 1664 fada2d23185568fe84d7b5110cc51c92badc1cf615b993e3ecbfb5a96083786e.exe 29 PID 1664 wrote to memory of 1936 1664 fada2d23185568fe84d7b5110cc51c92badc1cf615b993e3ecbfb5a96083786e.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\fada2d23185568fe84d7b5110cc51c92badc1cf615b993e3ecbfb5a96083786e.exe"C:\Users\Admin\AppData\Local\Temp\fada2d23185568fe84d7b5110cc51c92badc1cf615b993e3ecbfb5a96083786e.exe"1⤵
- Loads dropped DLL
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Users\Admin\AppData\Local\Temp\fada2d23185568fe84d7b5110cc51c92badc1cf615b993e3ecbfb5a96083786e.exe"C:\Users\Admin\AppData\Local\Temp\fada2d23185568fe84d7b5110cc51c92badc1cf615b993e3ecbfb5a96083786e.exe" --crash-reporter-parent-id=16642⤵
- Loads dropped DLL
PID:2076
-
-
C:\Users\Admin\AppData\Local\Temp\Opera Installer\fada2d23185568fe84d7b5110cc51c92badc1cf615b993e3ecbfb5a96083786e.exe"C:\Users\Admin\AppData\Local\Temp\Opera Installer\fada2d23185568fe84d7b5110cc51c92badc1cf615b993e3ecbfb5a96083786e.exe" --version2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1936
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\Opera Installer\fada2d23185568fe84d7b5110cc51c92badc1cf615b993e3ecbfb5a96083786e.exe
Filesize8.4MB
MD5603f05df69a48311cf1e5d28931da768
SHA1d9e82288438b47b0e1105c03bd7df913bfea261e
SHA25676c437058a16d47a759b3b75c62477b4156b176853c2ecf4ae7107a4ed70d86e
SHA512ceffbfb2e66052cbfa16c7c9604937e8ef9461f211a79d4338a9b99d8fc294576270b26557c30bafd627105022e4e62bf83be7fac1fc66128e76fc216d7a7339
-
\Users\Admin\AppData\Local\Temp\Opera Installer\fada2d23185568fe84d7b5110cc51c92badc1cf615b993e3ecbfb5a96083786e.exe
Filesize9.6MB
MD518159ab6bbac231d0d83f64f6c8dc8f4
SHA157ac2515b8529899bdd82898eaa855e9415b9dfc
SHA256cb7c7e63f0b7f7ed94fa42e4010ad301b8b58714ec816d0eae77386762f81691
SHA5125a76cf03d29a5a42d4156316129255c70618cd6aec2f00ba42da59ebb303391c201046e0e3d2310a5b041024e2f6a7f2e18f16941dd97cd49e383ae7b77df5ba
-
Filesize
1.5MB
MD56775542a38c0cc65efee6cf8d346b384
SHA1c91ca7e67d69c949fedba14d72fd9cf96459359a
SHA256146320f8bbff9e56aeee7b87a22ead991bd4cce94953a49288b0a2b07569f3d9
SHA51294d86e857b5e6fd9dad969ba77d31aa8cfa0714d23f1daafa7c380c3eeaf3283d3e9968786b65da8e4891fd23721e399e3217186ed31cda0688697b287b78f71