Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
28-07-2024 23:52
Behavioral task
behavioral1
Sample
729d6539f4eae0ad9178d7a60b3d478780d8b68bde520d59311e87a4c5f7dc30.exe
Resource
win7-20240729-en
General
-
Target
729d6539f4eae0ad9178d7a60b3d478780d8b68bde520d59311e87a4c5f7dc30.exe
-
Size
63KB
-
MD5
0ac4039b1060355d3408ad727a6127be
-
SHA1
a2cad20ee53c6fb731b9052bc7a9d1745f0ee1a8
-
SHA256
729d6539f4eae0ad9178d7a60b3d478780d8b68bde520d59311e87a4c5f7dc30
-
SHA512
cf9ce5f07d862438d11ed6a13730be7a90dd525fc0331b3532f3a757801ecbc5adb020f9882108e8f80c2ae0c087cd52d8aaff19114e133c5c6919b67358da54
-
SSDEEP
768:muY6LVcsTPq781wC8A+Xju8Z4gdKmDrRHsL1+T4tSNGHmDbDdph0oXGkLnTSuIdP:HeQPc/ymDrRH8iUUbXh9/2uIdpqKmY7
Malware Config
Extracted
asyncrat
Default
192.168.1.108:2024
-
delay
1
-
install
true
-
install_file
OperaGx.exe
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x00080000000120fc-16.dat family_asyncrat -
Executes dropped EXE 1 IoCs
pid Process 2548 OperaGx.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 2692 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2968 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3000 729d6539f4eae0ad9178d7a60b3d478780d8b68bde520d59311e87a4c5f7dc30.exe 3000 729d6539f4eae0ad9178d7a60b3d478780d8b68bde520d59311e87a4c5f7dc30.exe 3000 729d6539f4eae0ad9178d7a60b3d478780d8b68bde520d59311e87a4c5f7dc30.exe 3000 729d6539f4eae0ad9178d7a60b3d478780d8b68bde520d59311e87a4c5f7dc30.exe 3000 729d6539f4eae0ad9178d7a60b3d478780d8b68bde520d59311e87a4c5f7dc30.exe 2548 OperaGx.exe 2548 OperaGx.exe 2548 OperaGx.exe 2548 OperaGx.exe 2548 OperaGx.exe 2548 OperaGx.exe 2548 OperaGx.exe 2548 OperaGx.exe 2548 OperaGx.exe 2548 OperaGx.exe 2548 OperaGx.exe 2548 OperaGx.exe 2548 OperaGx.exe 2548 OperaGx.exe 2548 OperaGx.exe 2548 OperaGx.exe 2548 OperaGx.exe 2548 OperaGx.exe 2548 OperaGx.exe 2548 OperaGx.exe 2548 OperaGx.exe 2548 OperaGx.exe 2548 OperaGx.exe 2548 OperaGx.exe 2548 OperaGx.exe 2548 OperaGx.exe 2548 OperaGx.exe 2548 OperaGx.exe 2548 OperaGx.exe 2548 OperaGx.exe 2548 OperaGx.exe 2548 OperaGx.exe 2548 OperaGx.exe 2548 OperaGx.exe 2548 OperaGx.exe 2548 OperaGx.exe 2548 OperaGx.exe 2548 OperaGx.exe 2548 OperaGx.exe 2548 OperaGx.exe 2548 OperaGx.exe 2548 OperaGx.exe 2548 OperaGx.exe 2548 OperaGx.exe 2548 OperaGx.exe 2548 OperaGx.exe 2548 OperaGx.exe 2548 OperaGx.exe 2548 OperaGx.exe 2548 OperaGx.exe 2548 OperaGx.exe 2548 OperaGx.exe 2548 OperaGx.exe 2548 OperaGx.exe 2548 OperaGx.exe 2548 OperaGx.exe 2548 OperaGx.exe 2548 OperaGx.exe 2548 OperaGx.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 3000 729d6539f4eae0ad9178d7a60b3d478780d8b68bde520d59311e87a4c5f7dc30.exe Token: SeDebugPrivilege 3000 729d6539f4eae0ad9178d7a60b3d478780d8b68bde520d59311e87a4c5f7dc30.exe Token: SeDebugPrivilege 2548 OperaGx.exe Token: SeDebugPrivilege 2548 OperaGx.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3000 wrote to memory of 2796 3000 729d6539f4eae0ad9178d7a60b3d478780d8b68bde520d59311e87a4c5f7dc30.exe 31 PID 3000 wrote to memory of 2796 3000 729d6539f4eae0ad9178d7a60b3d478780d8b68bde520d59311e87a4c5f7dc30.exe 31 PID 3000 wrote to memory of 2796 3000 729d6539f4eae0ad9178d7a60b3d478780d8b68bde520d59311e87a4c5f7dc30.exe 31 PID 3000 wrote to memory of 2732 3000 729d6539f4eae0ad9178d7a60b3d478780d8b68bde520d59311e87a4c5f7dc30.exe 33 PID 3000 wrote to memory of 2732 3000 729d6539f4eae0ad9178d7a60b3d478780d8b68bde520d59311e87a4c5f7dc30.exe 33 PID 3000 wrote to memory of 2732 3000 729d6539f4eae0ad9178d7a60b3d478780d8b68bde520d59311e87a4c5f7dc30.exe 33 PID 2796 wrote to memory of 2968 2796 cmd.exe 35 PID 2796 wrote to memory of 2968 2796 cmd.exe 35 PID 2796 wrote to memory of 2968 2796 cmd.exe 35 PID 2732 wrote to memory of 2692 2732 cmd.exe 36 PID 2732 wrote to memory of 2692 2732 cmd.exe 36 PID 2732 wrote to memory of 2692 2732 cmd.exe 36 PID 2732 wrote to memory of 2548 2732 cmd.exe 37 PID 2732 wrote to memory of 2548 2732 cmd.exe 37 PID 2732 wrote to memory of 2548 2732 cmd.exe 37 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\729d6539f4eae0ad9178d7a60b3d478780d8b68bde520d59311e87a4c5f7dc30.exe"C:\Users\Admin\AppData\Local\Temp\729d6539f4eae0ad9178d7a60b3d478780d8b68bde520d59311e87a4c5f7dc30.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "OperaGx" /tr '"C:\Users\Admin\AppData\Roaming\OperaGx.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "OperaGx" /tr '"C:\Users\Admin\AppData\Roaming\OperaGx.exe"'3⤵
- Scheduled Task/Job: Scheduled Task
PID:2968
-
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp5E46.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:2692
-
-
C:\Users\Admin\AppData\Roaming\OperaGx.exe"C:\Users\Admin\AppData\Roaming\OperaGx.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2548
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
151B
MD5ca56f5654c21526346b36984e75d4d03
SHA11c180ce4c02283ae6e0e4ba847f75bd54b49401d
SHA2564a1f97865d9864a524a892963cdcd4198b6888f7025ae167a1a86f5b9a874657
SHA512d63d13455ccc08b313325c43943899bc2ad3d173f2536b9300e1cf7765df74eff81e1ddbaed8b85280dccdded7ce97855bc83a1cdcf972ef698b3e98e9b03598
-
Filesize
63KB
MD50ac4039b1060355d3408ad727a6127be
SHA1a2cad20ee53c6fb731b9052bc7a9d1745f0ee1a8
SHA256729d6539f4eae0ad9178d7a60b3d478780d8b68bde520d59311e87a4c5f7dc30
SHA512cf9ce5f07d862438d11ed6a13730be7a90dd525fc0331b3532f3a757801ecbc5adb020f9882108e8f80c2ae0c087cd52d8aaff19114e133c5c6919b67358da54