Analysis
-
max time kernel
144s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01-11-2024 17:05
Static task
static1
Behavioral task
behavioral1
Sample
DOpusInstall.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
DOpusInstall.exe
Resource
win10v2004-20241007-en
General
-
Target
DOpusInstall.exe
-
Size
38.5MB
-
MD5
99540b8e8d91ae5546fc24410a96c457
-
SHA1
f36a5a85c041126a48d7486420bf35da8c31d922
-
SHA256
4d385b9fde266f9685f95949c60ec9f5b29d1bde22de2eb0c882bca8eac71293
-
SHA512
4400f7bb0a2e78c729228149cd8d47ea55c9b5f3207fc95478c4e31316c42423c4bbf7eece178b316a9153230bc0ac87873ba203d01ff39eb348fdf72b7d14a5
-
SSDEEP
786432:/kHdKBCtY9GML0dko3ad91eoUJ9gARHTVw6Z1Wq+NYr79b7GE2xlDRB:+g99GM4v3ad99AhRHTVfZ1Wq+0ExN
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
DOpusInstall.tmppid process 2700 DOpusInstall.tmp -
Loads dropped DLL 2 IoCs
Processes:
DOpusInstall.exeDOpusInstall.tmppid process 2188 DOpusInstall.exe 2700 DOpusInstall.tmp -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
DOpusInstall.exeDOpusInstall.tmpdescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DOpusInstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DOpusInstall.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
DOpusInstall.exedescription pid process target process PID 2188 wrote to memory of 2700 2188 DOpusInstall.exe DOpusInstall.tmp PID 2188 wrote to memory of 2700 2188 DOpusInstall.exe DOpusInstall.tmp PID 2188 wrote to memory of 2700 2188 DOpusInstall.exe DOpusInstall.tmp PID 2188 wrote to memory of 2700 2188 DOpusInstall.exe DOpusInstall.tmp PID 2188 wrote to memory of 2700 2188 DOpusInstall.exe DOpusInstall.tmp PID 2188 wrote to memory of 2700 2188 DOpusInstall.exe DOpusInstall.tmp PID 2188 wrote to memory of 2700 2188 DOpusInstall.exe DOpusInstall.tmp
Processes
-
C:\Users\Admin\AppData\Local\Temp\DOpusInstall.exe"C:\Users\Admin\AppData\Local\Temp\DOpusInstall.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Users\Admin\AppData\Local\Temp\is-1KJLQ.tmp\DOpusInstall.tmp"C:\Users\Admin\AppData\Local\Temp\is-1KJLQ.tmp\DOpusInstall.tmp" /SL5="$301CE,39321588,863232,C:\Users\Admin\AppData\Local\Temp\DOpusInstall.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2700
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD507ee2202fc2470c6e4d0fd912b769931
SHA139daf3eecf260954e44e30cee162ddbfa9ba337b
SHA256c9859a64c8da1f512e6111dd028e47cdd50bae46af2e105c0a0a1e9668eb86f6
SHA5120014812f8bbe3d18b038096d50ea5d75a70ba7858de6280a3d79118f205eba6982bd4e504f5eb5d455de79503992db10509012e93f73f0105126176c45da6bf8
-
Filesize
85KB
MD5bcf8dafbc9188b00025e4425b86669cf
SHA1a8ee26d9181a69694356b90b8c5ce00fab722486
SHA2563a41354a740cd1e7f2ef27ec3249bfd9aa4f07eb803a2f1824b8ef7911b5464f
SHA512234cfac5112e46ca89035c0cde811bddd480114fdffee5e56e7fef29f39c88327471516aad3c3112a8f489a065750cca4a13d4cbab676ecae02da54d65d61d0b