Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
28-07-2024 23:52
Behavioral task
behavioral1
Sample
729d6539f4eae0ad9178d7a60b3d478780d8b68bde520d59311e87a4c5f7dc30.exe
Resource
win7-20240729-en
General
-
Target
729d6539f4eae0ad9178d7a60b3d478780d8b68bde520d59311e87a4c5f7dc30.exe
-
Size
63KB
-
MD5
0ac4039b1060355d3408ad727a6127be
-
SHA1
a2cad20ee53c6fb731b9052bc7a9d1745f0ee1a8
-
SHA256
729d6539f4eae0ad9178d7a60b3d478780d8b68bde520d59311e87a4c5f7dc30
-
SHA512
cf9ce5f07d862438d11ed6a13730be7a90dd525fc0331b3532f3a757801ecbc5adb020f9882108e8f80c2ae0c087cd52d8aaff19114e133c5c6919b67358da54
-
SSDEEP
768:muY6LVcsTPq781wC8A+Xju8Z4gdKmDrRHsL1+T4tSNGHmDbDdph0oXGkLnTSuIdP:HeQPc/ymDrRH8iUUbXh9/2uIdpqKmY7
Malware Config
Extracted
asyncrat
Default
192.168.1.108:2024
-
delay
1
-
install
true
-
install_file
OperaGx.exe
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule behavioral2/files/0x000b000000023422-11.dat family_asyncrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Control Panel\International\Geo\Nation 729d6539f4eae0ad9178d7a60b3d478780d8b68bde520d59311e87a4c5f7dc30.exe -
Executes dropped EXE 1 IoCs
pid Process 2128 OperaGx.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 4020 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3472 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4364 729d6539f4eae0ad9178d7a60b3d478780d8b68bde520d59311e87a4c5f7dc30.exe 4364 729d6539f4eae0ad9178d7a60b3d478780d8b68bde520d59311e87a4c5f7dc30.exe 4364 729d6539f4eae0ad9178d7a60b3d478780d8b68bde520d59311e87a4c5f7dc30.exe 4364 729d6539f4eae0ad9178d7a60b3d478780d8b68bde520d59311e87a4c5f7dc30.exe 4364 729d6539f4eae0ad9178d7a60b3d478780d8b68bde520d59311e87a4c5f7dc30.exe 4364 729d6539f4eae0ad9178d7a60b3d478780d8b68bde520d59311e87a4c5f7dc30.exe 4364 729d6539f4eae0ad9178d7a60b3d478780d8b68bde520d59311e87a4c5f7dc30.exe 4364 729d6539f4eae0ad9178d7a60b3d478780d8b68bde520d59311e87a4c5f7dc30.exe 4364 729d6539f4eae0ad9178d7a60b3d478780d8b68bde520d59311e87a4c5f7dc30.exe 4364 729d6539f4eae0ad9178d7a60b3d478780d8b68bde520d59311e87a4c5f7dc30.exe 4364 729d6539f4eae0ad9178d7a60b3d478780d8b68bde520d59311e87a4c5f7dc30.exe 4364 729d6539f4eae0ad9178d7a60b3d478780d8b68bde520d59311e87a4c5f7dc30.exe 4364 729d6539f4eae0ad9178d7a60b3d478780d8b68bde520d59311e87a4c5f7dc30.exe 4364 729d6539f4eae0ad9178d7a60b3d478780d8b68bde520d59311e87a4c5f7dc30.exe 4364 729d6539f4eae0ad9178d7a60b3d478780d8b68bde520d59311e87a4c5f7dc30.exe 4364 729d6539f4eae0ad9178d7a60b3d478780d8b68bde520d59311e87a4c5f7dc30.exe 4364 729d6539f4eae0ad9178d7a60b3d478780d8b68bde520d59311e87a4c5f7dc30.exe 4364 729d6539f4eae0ad9178d7a60b3d478780d8b68bde520d59311e87a4c5f7dc30.exe 4364 729d6539f4eae0ad9178d7a60b3d478780d8b68bde520d59311e87a4c5f7dc30.exe 4364 729d6539f4eae0ad9178d7a60b3d478780d8b68bde520d59311e87a4c5f7dc30.exe 4364 729d6539f4eae0ad9178d7a60b3d478780d8b68bde520d59311e87a4c5f7dc30.exe 4364 729d6539f4eae0ad9178d7a60b3d478780d8b68bde520d59311e87a4c5f7dc30.exe 4364 729d6539f4eae0ad9178d7a60b3d478780d8b68bde520d59311e87a4c5f7dc30.exe 4364 729d6539f4eae0ad9178d7a60b3d478780d8b68bde520d59311e87a4c5f7dc30.exe 4364 729d6539f4eae0ad9178d7a60b3d478780d8b68bde520d59311e87a4c5f7dc30.exe 4364 729d6539f4eae0ad9178d7a60b3d478780d8b68bde520d59311e87a4c5f7dc30.exe 4364 729d6539f4eae0ad9178d7a60b3d478780d8b68bde520d59311e87a4c5f7dc30.exe 4364 729d6539f4eae0ad9178d7a60b3d478780d8b68bde520d59311e87a4c5f7dc30.exe 4364 729d6539f4eae0ad9178d7a60b3d478780d8b68bde520d59311e87a4c5f7dc30.exe 2128 OperaGx.exe 2128 OperaGx.exe 2128 OperaGx.exe 2128 OperaGx.exe 2128 OperaGx.exe 2128 OperaGx.exe 2128 OperaGx.exe 2128 OperaGx.exe 2128 OperaGx.exe 2128 OperaGx.exe 2128 OperaGx.exe 2128 OperaGx.exe 2128 OperaGx.exe 2128 OperaGx.exe 2128 OperaGx.exe 2128 OperaGx.exe 2128 OperaGx.exe 2128 OperaGx.exe 2128 OperaGx.exe 2128 OperaGx.exe 2128 OperaGx.exe 2128 OperaGx.exe 2128 OperaGx.exe 2128 OperaGx.exe 2128 OperaGx.exe 2128 OperaGx.exe 2128 OperaGx.exe 2128 OperaGx.exe 2128 OperaGx.exe 2128 OperaGx.exe 2128 OperaGx.exe 2128 OperaGx.exe 2128 OperaGx.exe 2128 OperaGx.exe 2128 OperaGx.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4364 729d6539f4eae0ad9178d7a60b3d478780d8b68bde520d59311e87a4c5f7dc30.exe Token: SeDebugPrivilege 4364 729d6539f4eae0ad9178d7a60b3d478780d8b68bde520d59311e87a4c5f7dc30.exe Token: SeDebugPrivilege 2128 OperaGx.exe Token: SeDebugPrivilege 2128 OperaGx.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 4364 wrote to memory of 2364 4364 729d6539f4eae0ad9178d7a60b3d478780d8b68bde520d59311e87a4c5f7dc30.exe 89 PID 4364 wrote to memory of 2364 4364 729d6539f4eae0ad9178d7a60b3d478780d8b68bde520d59311e87a4c5f7dc30.exe 89 PID 4364 wrote to memory of 3660 4364 729d6539f4eae0ad9178d7a60b3d478780d8b68bde520d59311e87a4c5f7dc30.exe 91 PID 4364 wrote to memory of 3660 4364 729d6539f4eae0ad9178d7a60b3d478780d8b68bde520d59311e87a4c5f7dc30.exe 91 PID 2364 wrote to memory of 3472 2364 cmd.exe 93 PID 2364 wrote to memory of 3472 2364 cmd.exe 93 PID 3660 wrote to memory of 4020 3660 cmd.exe 94 PID 3660 wrote to memory of 4020 3660 cmd.exe 94 PID 3660 wrote to memory of 2128 3660 cmd.exe 98 PID 3660 wrote to memory of 2128 3660 cmd.exe 98 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\729d6539f4eae0ad9178d7a60b3d478780d8b68bde520d59311e87a4c5f7dc30.exe"C:\Users\Admin\AppData\Local\Temp\729d6539f4eae0ad9178d7a60b3d478780d8b68bde520d59311e87a4c5f7dc30.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "OperaGx" /tr '"C:\Users\Admin\AppData\Roaming\OperaGx.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "OperaGx" /tr '"C:\Users\Admin\AppData\Roaming\OperaGx.exe"'3⤵
- Scheduled Task/Job: Scheduled Task
PID:3472
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpE5EB.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:3660 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:4020
-
-
C:\Users\Admin\AppData\Roaming\OperaGx.exe"C:\Users\Admin\AppData\Roaming\OperaGx.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2128
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
151B
MD51d0c667039e4e4ddbc143c72878bbd40
SHA197b2ca89cbdc2b47e0d8b33f2f0d0f8fc3952996
SHA2569606b01b346e75e6ca60362864492a9ceb56457f6b0758a87c5299f05ddfbf01
SHA512c538d757a47b807504bd7bc1b1deb04e7b440d5f961cabbf015d2946c4f820f1b265b035853eb80a121bfdd47c4d93f7ebbbfd6f34fb6aed79d3b47bcc4f03aa
-
Filesize
63KB
MD50ac4039b1060355d3408ad727a6127be
SHA1a2cad20ee53c6fb731b9052bc7a9d1745f0ee1a8
SHA256729d6539f4eae0ad9178d7a60b3d478780d8b68bde520d59311e87a4c5f7dc30
SHA512cf9ce5f07d862438d11ed6a13730be7a90dd525fc0331b3532f3a757801ecbc5adb020f9882108e8f80c2ae0c087cd52d8aaff19114e133c5c6919b67358da54