Analysis

  • max time kernel
    126s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    09/05/2024, 00:58

General

  • Target

    842452b3788e5b35a9bd6c60b508e4eb88f8ada748ca470a7609f4cbd1e24388.exe

  • Size

    45KB

  • MD5

    6f47531055f199d317db285fe98728b3

  • SHA1

    8651f40089c7b0be56c6a02cc4396e832d8ef68e

  • SHA256

    842452b3788e5b35a9bd6c60b508e4eb88f8ada748ca470a7609f4cbd1e24388

  • SHA512

    0041d48e2ebefb453138b4f6163e3d670304dc44e04e63c5eeb618b70907fec40721ef3d2ab3f81d2bdd0436ef197198444a335d33d7e24bf2d8a18a43278979

  • SSDEEP

    768:6zjIBGjHXRrs9sINeZEtejlIkoLN127BFVn2p4lAnZ8OJ+1+Tadtp/bkt7Yd2zfp:AkGjXRrs9sINeZEtejlIkoLN127BFVnc

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\842452b3788e5b35a9bd6c60b508e4eb88f8ada748ca470a7609f4cbd1e24388.exe
    "C:\Users\Admin\AppData\Local\Temp\842452b3788e5b35a9bd6c60b508e4eb88f8ada748ca470a7609f4cbd1e24388.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2012
    • C:\Users\Admin\AppData\Local\Temp\opera_updater.exe
      "C:\Users\Admin\AppData\Local\Temp\opera_updater.exe"
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      PID:2340

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\opera_updater.exe

          Filesize

          45KB

          MD5

          4a9748188523ab98240472ad865e5f55

          SHA1

          ca529057f033af28577e9afaaed4e8addeb89892

          SHA256

          2e3ab58f8b9fa0fb2f366468adaa748a5f5631173e86d88e5c070c6d3a76f9c5

          SHA512

          2e72f8164de4f9d8670f3344814b7d36dcb76ea5fd90c2d971cf98871c015c20c46e8bd706874950d9a128f01367fe33b542493bf0973a0b54592af1f1c1e873

        • memory/2012-1-0x0000000000171000-0x0000000000173000-memory.dmp

          Filesize

          8KB

        • memory/2340-8-0x0000000000181000-0x0000000000183000-memory.dmp

          Filesize

          8KB