Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
22-08-2024 16:13
Static task
static1
Behavioral task
behavioral1
Sample
6f1b9a3c933f6effef76d8fdce9c12f0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
6f1b9a3c933f6effef76d8fdce9c12f0N.exe
Resource
win10v2004-20240802-en
General
-
Target
6f1b9a3c933f6effef76d8fdce9c12f0N.exe
-
Size
33KB
-
MD5
6f1b9a3c933f6effef76d8fdce9c12f0
-
SHA1
19ade1b3672c03362deb82d133783af0997b6ee2
-
SHA256
a336fa6b8f4ed976d9558605dd9e2f2e568d7ab34e6b04c626cde9617b93c0b3
-
SHA512
9d066ce1a4cca2bda289365eed6ce6d211f9ac5a4867fcda247ac779f1b69d8385cc3a08537344590804c467e55dba42aa52944b79e981b8af8dedc9de73b758
-
SSDEEP
192:CnuPSSRT/K36yFBvarOeJ1bKSAf7AlC+1lj8a1KVVVflkxIY9M6Qh/Ke0uc4W+xA:CU+fyyQ1KS0AC+1l91KldNAcZc1ncOVn
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2772 opera_autoupdater.exe -
Loads dropped DLL 4 IoCs
pid Process 3044 6f1b9a3c933f6effef76d8fdce9c12f0N.exe 2772 opera_autoupdater.exe 2772 opera_autoupdater.exe 2772 opera_autoupdater.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language opera_autoupdater.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6f1b9a3c933f6effef76d8fdce9c12f0N.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3044 wrote to memory of 2772 3044 6f1b9a3c933f6effef76d8fdce9c12f0N.exe 30 PID 3044 wrote to memory of 2772 3044 6f1b9a3c933f6effef76d8fdce9c12f0N.exe 30 PID 3044 wrote to memory of 2772 3044 6f1b9a3c933f6effef76d8fdce9c12f0N.exe 30 PID 3044 wrote to memory of 2772 3044 6f1b9a3c933f6effef76d8fdce9c12f0N.exe 30 PID 3044 wrote to memory of 2772 3044 6f1b9a3c933f6effef76d8fdce9c12f0N.exe 30 PID 3044 wrote to memory of 2772 3044 6f1b9a3c933f6effef76d8fdce9c12f0N.exe 30 PID 3044 wrote to memory of 2772 3044 6f1b9a3c933f6effef76d8fdce9c12f0N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\6f1b9a3c933f6effef76d8fdce9c12f0N.exe"C:\Users\Admin\AppData\Local\Temp\6f1b9a3c933f6effef76d8fdce9c12f0N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Users\Admin\AppData\Local\Temp\opera_autoupdater.exe"C:\Users\Admin\AppData\Local\Temp\opera_autoupdater.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2772
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD51c32b4b4309761ebdaed4b0f02470795
SHA17854e326f3ff260893338b37da2d2db4e7d65c95
SHA25686a10eaeb479243b5a347ea93e31238c1bc07f93aa4499481fc0d6bb21d96cb5
SHA5121967993ed9dcf8202f9187c0bbda28b020fbd423c8c34efb00a9c62e0e07500387a89f02ac4a8de0beae27fcabd4946aa0a82a801eb012f0b024b189df8be95c