Analysis
-
max time kernel
97s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14/09/2024, 17:32
Static task
static1
Behavioral task
behavioral1
Sample
ec0a32771ed9b20e52b81dd84d78d360N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ec0a32771ed9b20e52b81dd84d78d360N.exe
Resource
win10v2004-20240802-en
General
-
Target
ec0a32771ed9b20e52b81dd84d78d360N.exe
-
Size
37KB
-
MD5
ec0a32771ed9b20e52b81dd84d78d360
-
SHA1
1ef4d8ef398331db54a9503e65f19174c9d6e6ad
-
SHA256
d363e06cea74ed1b968c1962ccb0dc136d14f7cc2bf9244fbe46ca1dd2e402e5
-
SHA512
a17fa9c2611f84f63b4d20a2b7919a7546aead8c9d45c276ce1ece97632e1f066901d497566d6087def430c4d862a5ada2aaf88d640a533c0448630782fd9e73
-
SSDEEP
384:CU+fyyQ1KS0AC+1l91KldNAcZcrmFCxEF+67D3F4AjnqZaj8BRtkN5i:cyOE1wlo4crb67DF4A7qZm8BgO
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation ec0a32771ed9b20e52b81dd84d78d360N.exe Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation opera_autoupdater.exe -
Executes dropped EXE 1 IoCs
pid Process 3076 opera_autoupdater.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ec0a32771ed9b20e52b81dd84d78d360N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language opera_autoupdater.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1072 wrote to memory of 3076 1072 ec0a32771ed9b20e52b81dd84d78d360N.exe 84 PID 1072 wrote to memory of 3076 1072 ec0a32771ed9b20e52b81dd84d78d360N.exe 84 PID 1072 wrote to memory of 3076 1072 ec0a32771ed9b20e52b81dd84d78d360N.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\ec0a32771ed9b20e52b81dd84d78d360N.exe"C:\Users\Admin\AppData\Local\Temp\ec0a32771ed9b20e52b81dd84d78d360N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Users\Admin\AppData\Local\Temp\opera_autoupdater.exe"C:\Users\Admin\AppData\Local\Temp\opera_autoupdater.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3076
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37KB
MD5c94d8cf81836bf06dfa991ea8c194799
SHA1aeed2dd9a45317abd294c13f25d5b4d27732cd9f
SHA256c5d97f7bf5ed81e17c22cdddfb2f77e45777c613cc870392f6461b9613383eba
SHA512b7f11b71282ad84de7295e93e7e1a04182cdd5220f3a7db30faa2d50ff625b65110e76ff9bb5ff37431a738e842a67b6af7dd5930bf2d09370e0983af71d4e3f