Analysis
-
max time kernel
123s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15/05/2024, 22:58
Static task
static1
Behavioral task
behavioral1
Sample
OpiumFree.exe
Resource
win10v2004-20240508-en
General
-
Target
OpiumFree.exe
-
Size
351KB
-
MD5
97b3318dd013a8192cd8baf848f1b954
-
SHA1
73f3f90ff537237807e1508b348b2c227b8a9467
-
SHA256
6ef0b0a69a059b1a1c15fd878fc6e7f861fb4bb5e3f320dec4acf2a8931b2c4a
-
SHA512
57a7d43a8b66a2d5ca1aec20fbceac120deb476dc951c5580bee019a29b5bd19ebd31cc8b3b2187f8de7511a1e929a20dcd5d9ddb343b1a0a1640eb0fec8b837
-
SSDEEP
6144:nBlkZvaF4NTBx8V39oN9lKOK46uWEQ5n95NAXWWWGYWFOHzPoqPr:noSWNTrPEOHwF951LHzoqT
Malware Config
Signatures
-
Delays execution with timeout.exe 8 IoCs
pid Process 4620 timeout.exe 1020 timeout.exe 956 timeout.exe 3312 timeout.exe 3256 timeout.exe 5020 timeout.exe 1272 timeout.exe 3336 timeout.exe -
Runs net.exe
-
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 772 wrote to memory of 4904 772 OpiumFree.exe 91 PID 772 wrote to memory of 4904 772 OpiumFree.exe 91 PID 4904 wrote to memory of 2888 4904 cmd.exe 92 PID 4904 wrote to memory of 2888 4904 cmd.exe 92 PID 4904 wrote to memory of 5116 4904 cmd.exe 93 PID 4904 wrote to memory of 5116 4904 cmd.exe 93 PID 5116 wrote to memory of 1160 5116 net.exe 94 PID 5116 wrote to memory of 1160 5116 net.exe 94 PID 4904 wrote to memory of 3676 4904 cmd.exe 95 PID 4904 wrote to memory of 3676 4904 cmd.exe 95 PID 4904 wrote to memory of 1816 4904 cmd.exe 96 PID 4904 wrote to memory of 1816 4904 cmd.exe 96 PID 4904 wrote to memory of 1476 4904 cmd.exe 97 PID 4904 wrote to memory of 1476 4904 cmd.exe 97 PID 4904 wrote to memory of 408 4904 cmd.exe 98 PID 4904 wrote to memory of 408 4904 cmd.exe 98 PID 4904 wrote to memory of 1684 4904 cmd.exe 100 PID 4904 wrote to memory of 1684 4904 cmd.exe 100 PID 4904 wrote to memory of 4852 4904 cmd.exe 101 PID 4904 wrote to memory of 4852 4904 cmd.exe 101 PID 4852 wrote to memory of 2380 4852 cmd.exe 102 PID 4852 wrote to memory of 2380 4852 cmd.exe 102 PID 4904 wrote to memory of 3356 4904 cmd.exe 103 PID 4904 wrote to memory of 3356 4904 cmd.exe 103 PID 4904 wrote to memory of 212 4904 cmd.exe 104 PID 4904 wrote to memory of 212 4904 cmd.exe 104 PID 4904 wrote to memory of 428 4904 cmd.exe 105 PID 4904 wrote to memory of 428 4904 cmd.exe 105 PID 4904 wrote to memory of 5020 4904 cmd.exe 106 PID 4904 wrote to memory of 5020 4904 cmd.exe 106 PID 4904 wrote to memory of 1272 4904 cmd.exe 107 PID 4904 wrote to memory of 1272 4904 cmd.exe 107 PID 4904 wrote to memory of 3336 4904 cmd.exe 108 PID 4904 wrote to memory of 3336 4904 cmd.exe 108 PID 4904 wrote to memory of 4620 4904 cmd.exe 109 PID 4904 wrote to memory of 4620 4904 cmd.exe 109 PID 4904 wrote to memory of 1020 4904 cmd.exe 110 PID 4904 wrote to memory of 1020 4904 cmd.exe 110 PID 4904 wrote to memory of 956 4904 cmd.exe 111 PID 4904 wrote to memory of 956 4904 cmd.exe 111 PID 4904 wrote to memory of 3312 4904 cmd.exe 112 PID 4904 wrote to memory of 3312 4904 cmd.exe 112 PID 4904 wrote to memory of 3256 4904 cmd.exe 113 PID 4904 wrote to memory of 3256 4904 cmd.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\OpiumFree.exe"C:\Users\Admin\AppData\Local\Temp\OpiumFree.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:772 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\C311.tmp\C312.tmp\C313.bat C:\Users\Admin\AppData\Local\Temp\OpiumFree.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Windows\system32\mode.commode con: cols=1553⤵PID:2888
-
-
C:\Windows\system32\net.exenet session3⤵
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 session4⤵PID:1160
-
-
-
C:\Windows\system32\chcp.comchcp 650013⤵PID:3676
-
-
C:\Windows\system32\mode.commode con cols=1923⤵PID:1816
-
-
C:\Windows\system32\mode.commode con lines=453⤵PID:1476
-
-
C:\Windows\system32\chcp.comchcp 650013⤵PID:408
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c copy "C:\Users\Admin\AppData\Local\Temp\C311.tmp\C312.tmp\C313.bat" nul /z3⤵PID:1684
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c mode con3⤵
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Windows\system32\mode.commode con4⤵PID:2380
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c set pb.3⤵PID:3356
-
-
C:\Windows\system32\mode.comMODE CON COLS=192 LINES=453⤵PID:212
-
-
C:\Windows\system32\chcp.comchcp 650013⤵PID:428
-
-
C:\Windows\system32\timeout.exetimeout 23⤵
- Delays execution with timeout.exe
PID:5020
-
-
C:\Windows\system32\timeout.exetimeout 23⤵
- Delays execution with timeout.exe
PID:1272
-
-
C:\Windows\system32\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:3336
-
-
C:\Windows\system32\timeout.exetimeout 23⤵
- Delays execution with timeout.exe
PID:4620
-
-
C:\Windows\system32\timeout.exetimeout 23⤵
- Delays execution with timeout.exe
PID:1020
-
-
C:\Windows\system32\timeout.exetimeout 23⤵
- Delays execution with timeout.exe
PID:956
-
-
C:\Windows\system32\timeout.exetimeout 23⤵
- Delays execution with timeout.exe
PID:3312
-
-
C:\Windows\system32\timeout.exetimeout 23⤵
- Delays execution with timeout.exe
PID:3256
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152KB
MD5261743db8d8e1354c4dd7327881d6aa7
SHA19b92b6e9f27a82531977a37a44382673df2ff748
SHA2565e456c7eb67e505d678ed5c30f595c7b5db28f4e5cf29e331a55909d40ce6592
SHA51281942597501b7f342e71a0132835ac63d47802cd461af414ebb86072d7ecf8271976464d51d440064bb96fb8e6aa63fdfe9081936c9a6f69d7818b519d860e53