Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
25/09/2024, 23:45
Static task
static1
Behavioral task
behavioral1
Sample
8c84cbf6642e5a14d364da72d692e2bb0e08098d2df447e985f49703d6251758.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8c84cbf6642e5a14d364da72d692e2bb0e08098d2df447e985f49703d6251758.exe
Resource
win10v2004-20240910-en
General
-
Target
8c84cbf6642e5a14d364da72d692e2bb0e08098d2df447e985f49703d6251758.exe
-
Size
229KB
-
MD5
f37df14965dbd1216523994a5fd519c2
-
SHA1
a7957659837b7e35414d85563b0d3b996228d7df
-
SHA256
8c84cbf6642e5a14d364da72d692e2bb0e08098d2df447e985f49703d6251758
-
SHA512
5ff4ec99ba13f69c76cdbf2d03758164f60ca0a86c4f3ab674482f26a7556f92a07020788d67e8d4598692f2eb224ec6b36af3e69df628180718ab27192483a0
-
SSDEEP
6144:XN3oLzY164VZLZlad2nYQrJ6AthVbiN03KawzkV1O:VcdWrYAtvbipz2O
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3672 Onapya.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job Onapya.exe File created C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job 8c84cbf6642e5a14d364da72d692e2bb0e08098d2df447e985f49703d6251758.exe File opened for modification C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job 8c84cbf6642e5a14d364da72d692e2bb0e08098d2df447e985f49703d6251758.exe File created C:\Windows\Onapya.exe 8c84cbf6642e5a14d364da72d692e2bb0e08098d2df447e985f49703d6251758.exe File opened for modification C:\Windows\Onapya.exe 8c84cbf6642e5a14d364da72d692e2bb0e08098d2df447e985f49703d6251758.exe File created C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job Onapya.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8c84cbf6642e5a14d364da72d692e2bb0e08098d2df447e985f49703d6251758.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Onapya.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Software\Microsoft\Internet Explorer\Main Onapya.exe Key created \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Software\Microsoft\Internet Explorer\International Onapya.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3672 Onapya.exe 3672 Onapya.exe 3672 Onapya.exe 3672 Onapya.exe 3672 Onapya.exe 3672 Onapya.exe 3672 Onapya.exe 3672 Onapya.exe 3672 Onapya.exe 3672 Onapya.exe 3672 Onapya.exe 3672 Onapya.exe 3672 Onapya.exe 3672 Onapya.exe 3672 Onapya.exe 3672 Onapya.exe 3672 Onapya.exe 3672 Onapya.exe 3672 Onapya.exe 3672 Onapya.exe 3672 Onapya.exe 3672 Onapya.exe 3672 Onapya.exe 3672 Onapya.exe 3672 Onapya.exe 3672 Onapya.exe 3672 Onapya.exe 3672 Onapya.exe 3672 Onapya.exe 3672 Onapya.exe 3672 Onapya.exe 3672 Onapya.exe 3672 Onapya.exe 3672 Onapya.exe 3672 Onapya.exe 3672 Onapya.exe 3672 Onapya.exe 3672 Onapya.exe 3672 Onapya.exe 3672 Onapya.exe 3672 Onapya.exe 3672 Onapya.exe 3672 Onapya.exe 3672 Onapya.exe 3672 Onapya.exe 3672 Onapya.exe 3672 Onapya.exe 3672 Onapya.exe 3672 Onapya.exe 3672 Onapya.exe 3672 Onapya.exe 3672 Onapya.exe 3672 Onapya.exe 3672 Onapya.exe 3672 Onapya.exe 3672 Onapya.exe 3672 Onapya.exe 3672 Onapya.exe 3672 Onapya.exe 3672 Onapya.exe 3672 Onapya.exe 3672 Onapya.exe 3672 Onapya.exe 3672 Onapya.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4840 wrote to memory of 3672 4840 8c84cbf6642e5a14d364da72d692e2bb0e08098d2df447e985f49703d6251758.exe 89 PID 4840 wrote to memory of 3672 4840 8c84cbf6642e5a14d364da72d692e2bb0e08098d2df447e985f49703d6251758.exe 89 PID 4840 wrote to memory of 3672 4840 8c84cbf6642e5a14d364da72d692e2bb0e08098d2df447e985f49703d6251758.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\8c84cbf6642e5a14d364da72d692e2bb0e08098d2df447e985f49703d6251758.exe"C:\Users\Admin\AppData\Local\Temp\8c84cbf6642e5a14d364da72d692e2bb0e08098d2df447e985f49703d6251758.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4840 -
C:\Windows\Onapya.exeC:\Windows\Onapya.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:3672
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
229KB
MD5f37df14965dbd1216523994a5fd519c2
SHA1a7957659837b7e35414d85563b0d3b996228d7df
SHA2568c84cbf6642e5a14d364da72d692e2bb0e08098d2df447e985f49703d6251758
SHA5125ff4ec99ba13f69c76cdbf2d03758164f60ca0a86c4f3ab674482f26a7556f92a07020788d67e8d4598692f2eb224ec6b36af3e69df628180718ab27192483a0
-
Filesize
426B
MD56747b12c00fcb041db1f6721adffc1cc
SHA1437e788320228df12382788107c455bdc12c9990
SHA2562550e583d09778deec91fc259b72245a66019a6dadb1a7ab361e51fb9f902286
SHA51202a695e5535001eb5d014487109ae6e1a80c0a2d01ce7ca07b9c2bc06da85696486105170bcf96f2d5aa1611893603ecf41f5df0e0bab314270d43cbb4d152ed