Overview
overview
9Static
static
9JaffaCakes...e4.exe
windows7-x64
7JaffaCakes...e4.exe
windows10-2004-x64
7$PLUGINSDI...nu.dll
windows7-x64
3$PLUGINSDI...nu.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3$PLUGINSDI...om.dll
windows7-x64
5$PLUGINSDI...om.dll
windows10-2004-x64
5$PLUGINSDI...ry.dll
windows7-x64
3$PLUGINSDI...ry.dll
windows10-2004-x64
3$TEMP/coop...30.exe
windows7-x64
7$TEMP/coop...30.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/inetc.dll
windows7-x64
3$PLUGINSDIR/inetc.dll
windows10-2004-x64
3$_10_/$_10...er.exe
windows7-x64
3$_10_/$_10...er.exe
windows10-2004-x64
3$_10_/CCPM...fo.dll
windows7-x64
6$_10_/CCPM...fo.dll
windows10-2004-x64
6$_10_/Coopen.scr
windows7-x64
3$_10_/Coopen.scr
windows10-2004-x64
3$_10_/Coop...10.dll
windows7-x64
3$_10_/Coop...10.dll
windows10-2004-x64
3Analysis
-
max time kernel
150s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20250207-en -
resource tags
arch:x64arch:x86image:win7-20250207-enlocale:en-usos:windows7-x64system -
submitted
28/03/2025, 02:37 UTC
Behavioral task
behavioral1
Sample
JaffaCakes118_8a40c399dd59494b9c5418edca46b4e4.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_8a40c399dd59494b9c5418edca46b4e4.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20250207-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/nsRandom.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/nsRandom.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/registry.dll
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/registry.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
$TEMP/coopen_setup_100030.exe
Resource
win7-20250207-en
Behavioral task
behavioral16
Sample
$TEMP/coopen_setup_100030.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20250313-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/KillProcDLL.dll
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/KillProcDLL.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral23
Sample
$PLUGINSDIR/inetc.dll
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
$PLUGINSDIR/inetc.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral25
Sample
$_10_/$_10_/HttpDownloader.exe
Resource
win7-20241023-en
Behavioral task
behavioral26
Sample
$_10_/$_10_/HttpDownloader.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral27
Sample
$_10_/CCPMachineInfo.dll
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
$_10_/CCPMachineInfo.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral29
Sample
$_10_/Coopen.scr
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
$_10_/Coopen.scr
Resource
win10v2004-20250314-en
Behavioral task
behavioral31
Sample
$_10_/CoopenActiveControl110.dll
Resource
win7-20241010-en
Behavioral task
behavioral32
Sample
$_10_/CoopenActiveControl110.dll
Resource
win10v2004-20250314-en
General
-
Target
$TEMP/coopen_setup_100030.exe
-
Size
1.2MB
-
MD5
86417458dc5b33ed2d64ec7ca79be209
-
SHA1
4786aef18d2409c6e5aa255c4663d455196292ad
-
SHA256
4b2b035586333f7c16e6035e67bed9f4120b43933e74e8a29f64d04775e86328
-
SHA512
6b2153538d758b35ebb46cb0ff8485c3f8213c36d6a995329a439826225174333a068dfb08d6755e2fe19f2aa0bd752f962a2bcb80fd9a294f878586ee6e9da3
-
SSDEEP
24576:kLBUwTKA2P9U/cDeCiFwM9hmYYvNKt6n5duze92xK/zftXhp/:kLqsPihZieBYYvNKt65j2W7tXhF
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Coopen²¥·ÅÆ÷.lnk coopen_setup_100030.exe -
Executes dropped EXE 2 IoCs
pid Process 2988 Coopen.exe 1168 CoopenAir.exe -
Loads dropped DLL 20 IoCs
pid Process 2364 coopen_setup_100030.exe 2364 coopen_setup_100030.exe 2364 coopen_setup_100030.exe 2364 coopen_setup_100030.exe 2364 coopen_setup_100030.exe 2364 coopen_setup_100030.exe 2364 coopen_setup_100030.exe 2364 coopen_setup_100030.exe 2364 coopen_setup_100030.exe 2364 coopen_setup_100030.exe 2988 Coopen.exe 2988 Coopen.exe 2988 Coopen.exe 2988 Coopen.exe 2988 Coopen.exe 2988 Coopen.exe 2988 Coopen.exe 1168 CoopenAir.exe 1168 CoopenAir.exe 1168 CoopenAir.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 Coopen.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\Coopen.scr Coopen.exe File opened for modification C:\Windows\SysWOW64\Coopen.scr Coopen.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\Coopen\Coopen.exe coopen_setup_100030.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\CoopenOldWallPaper.jpg Coopen.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CoopenAir.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language coopen_setup_100030.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Coopen.exe -
Modifies Control Panel 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Control Panel\Desktop coopen_setup_100030.exe Set value (str) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Users\\Public\\Coopen\\Coopen.scr" coopen_setup_100030.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{B0C95278-1A3D-4AEA-AC49-3296B8D699DA}\ProxyStubClsid32 Coopen.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D3ECD831-4859-4374-A7B4-46A7E4D016F7}\1.0\0\win32 Coopen.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CoopenActiveControl.CoopenControl.1 Coopen.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{51D33728-411D-423D-B1C3-92717AB6970A}\MiscStatus\1\ = "131473" Coopen.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{B0C95278-1A3D-4AEA-AC49-3296B8D699DA}\TypeLib Coopen.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B0C95278-1A3D-4AEA-AC49-3296B8D699DA}\ProxyStubClsid32 Coopen.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CoopenActiveControl.CoopenControl\ = "CoopenControl Class" Coopen.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{51D33728-411D-423D-B1C3-92717AB6970A}\VersionIndependentProgID\ = "CoopenActiveControl.CoopenControl" Coopen.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{51D33728-411D-423D-B1C3-92717AB6970A}\InprocServer32 Coopen.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{51D33728-411D-423D-B1C3-92717AB6970A}\TypeLib Coopen.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{B0C95278-1A3D-4AEA-AC49-3296B8D699DA} Coopen.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B0C95278-1A3D-4AEA-AC49-3296B8D699DA}\ = "ICoopenControl" Coopen.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{B0C95278-1A3D-4AEA-AC49-3296B8D699DA}\TypeLib\Version = "1.0" Coopen.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CoopenActiveControl.CoopenControl.1\ = "CoopenControl Class" Coopen.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{51D33728-411D-423D-B1C3-92717AB6970A}\ToolboxBitmap32\ = "C:\\Users\\Public\\Coopen\\CoopenActiveControl110.dll, 101" Coopen.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{8A6C03BB-F95D-4845-B571-A4EBFA48F77F}\TypeLib\ = "{D3ECD831-4859-4374-A7B4-46A7E4D016F7}" Coopen.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{8A6C03BB-F95D-4845-B571-A4EBFA48F77F}\TypeLib\Version = "1.0" Coopen.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8A6C03BB-F95D-4845-B571-A4EBFA48F77F}\TypeLib Coopen.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CoopenActiveControl.CoopenControl\CLSID Coopen.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{51D33728-411D-423D-B1C3-92717AB6970A}\ProgID\ = "CoopenActiveControl.CoopenControl.1" Coopen.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{51D33728-411D-423D-B1C3-92717AB6970A}\ToolboxBitmap32 Coopen.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D3ECD831-4859-4374-A7B4-46A7E4D016F7}\1.0\FLAGS Coopen.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B0C95278-1A3D-4AEA-AC49-3296B8D699DA} Coopen.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{51D33728-411D-423D-B1C3-92717AB6970A}\Version\ = "1.0" Coopen.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8A6C03BB-F95D-4845-B571-A4EBFA48F77F}\TypeLib\ = "{D3ECD831-4859-4374-A7B4-46A7E4D016F7}" Coopen.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{51D33728-411D-423D-B1C3-92717AB6970A}\MiscStatus\ = "0" Coopen.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CoopenActiveControl.CoopenControl.1\CLSID Coopen.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CoopenActiveControl.CoopenControl\CurVer Coopen.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{51D33728-411D-423D-B1C3-92717AB6970A} Coopen.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{51D33728-411D-423D-B1C3-92717AB6970A}\ = "CoopenControl Class" Coopen.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{51D33728-411D-423D-B1C3-92717AB6970A}\Control Coopen.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D3ECD831-4859-4374-A7B4-46A7E4D016F7}\1.0\ = "CoopenActiveControl 1.0 Type Library" Coopen.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{51D33728-411D-423D-B1C3-92717AB6970A}\InprocServer32\ = "C:\\Users\\Public\\Coopen\\CoopenActiveControl110.dll" Coopen.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{51D33728-411D-423D-B1C3-92717AB6970A}\Insertable Coopen.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B0C95278-1A3D-4AEA-AC49-3296B8D699DA}\TypeLib Coopen.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{8A6C03BB-F95D-4845-B571-A4EBFA48F77F}\ProxyStubClsid32 Coopen.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{8A6C03BB-F95D-4845-B571-A4EBFA48F77F}\TypeLib Coopen.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B0C95278-1A3D-4AEA-AC49-3296B8D699DA}\TypeLib\ = "{D3ECD831-4859-4374-A7B4-46A7E4D016F7}" Coopen.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{B0C95278-1A3D-4AEA-AC49-3296B8D699DA}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" Coopen.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{51D33728-411D-423D-B1C3-92717AB6970A}\Version Coopen.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{8A6C03BB-F95D-4845-B571-A4EBFA48F77F}\ = "_ICoopenControlEvents" Coopen.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8A6C03BB-F95D-4845-B571-A4EBFA48F77F} Coopen.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8A6C03BB-F95D-4845-B571-A4EBFA48F77F}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" Coopen.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D3ECD831-4859-4374-A7B4-46A7E4D016F7} Coopen.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D3ECD831-4859-4374-A7B4-46A7E4D016F7}\1.0 Coopen.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D3ECD831-4859-4374-A7B4-46A7E4D016F7}\1.0\HELPDIR\ = "C:\\Users\\Public\\Coopen" Coopen.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{8A6C03BB-F95D-4845-B571-A4EBFA48F77F} Coopen.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B0C95278-1A3D-4AEA-AC49-3296B8D699DA}\TypeLib\Version = "1.0" Coopen.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{51D33728-411D-423D-B1C3-92717AB6970A}\VersionIndependentProgID Coopen.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{51D33728-411D-423D-B1C3-92717AB6970A}\Programmable Coopen.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D3ECD831-4859-4374-A7B4-46A7E4D016F7}\1.0\0\win32\ = "C:\\Users\\Public\\Coopen\\CoopenActiveControl110.dll" Coopen.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D3ECD831-4859-4374-A7B4-46A7E4D016F7}\1.0\HELPDIR Coopen.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{8A6C03BB-F95D-4845-B571-A4EBFA48F77F}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" Coopen.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8A6C03BB-F95D-4845-B571-A4EBFA48F77F}\ = "_ICoopenControlEvents" Coopen.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B0C95278-1A3D-4AEA-AC49-3296B8D699DA}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" Coopen.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{51D33728-411D-423D-B1C3-92717AB6970A}\TypeLib\ = "{D3ECD831-4859-4374-A7B4-46A7E4D016F7}" Coopen.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D3ECD831-4859-4374-A7B4-46A7E4D016F7}\1.0\FLAGS\ = "0" Coopen.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8A6C03BB-F95D-4845-B571-A4EBFA48F77F}\TypeLib\Version = "1.0" Coopen.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CoopenActiveControl.CoopenControl.1\CLSID\ = "{51D33728-411D-423D-B1C3-92717AB6970A}" Coopen.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CoopenActiveControl.CoopenControl\CLSID\ = "{51D33728-411D-423D-B1C3-92717AB6970A}" Coopen.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{51D33728-411D-423D-B1C3-92717AB6970A}\ProgID Coopen.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{51D33728-411D-423D-B1C3-92717AB6970A}\InprocServer32\ThreadingModel = "Apartment" Coopen.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{B0C95278-1A3D-4AEA-AC49-3296B8D699DA}\TypeLib\ = "{D3ECD831-4859-4374-A7B4-46A7E4D016F7}" Coopen.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D3ECD831-4859-4374-A7B4-46A7E4D016F7}\1.0\0 Coopen.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2364 coopen_setup_100030.exe 2364 coopen_setup_100030.exe 2364 coopen_setup_100030.exe 2364 coopen_setup_100030.exe 2364 coopen_setup_100030.exe 2364 coopen_setup_100030.exe 2364 coopen_setup_100030.exe 2364 coopen_setup_100030.exe 2364 coopen_setup_100030.exe 2364 coopen_setup_100030.exe 2364 coopen_setup_100030.exe 2364 coopen_setup_100030.exe 2364 coopen_setup_100030.exe 2364 coopen_setup_100030.exe 1168 CoopenAir.exe 1168 CoopenAir.exe 1168 CoopenAir.exe 1168 CoopenAir.exe 1168 CoopenAir.exe 1168 CoopenAir.exe 1168 CoopenAir.exe 1168 CoopenAir.exe 1168 CoopenAir.exe 1168 CoopenAir.exe 1168 CoopenAir.exe 1168 CoopenAir.exe 1168 CoopenAir.exe 1168 CoopenAir.exe 1168 CoopenAir.exe 1168 CoopenAir.exe 1168 CoopenAir.exe 1168 CoopenAir.exe 1168 CoopenAir.exe 1168 CoopenAir.exe 1168 CoopenAir.exe 1168 CoopenAir.exe 1168 CoopenAir.exe 1168 CoopenAir.exe 1168 CoopenAir.exe 1168 CoopenAir.exe 1168 CoopenAir.exe 1168 CoopenAir.exe 1168 CoopenAir.exe 1168 CoopenAir.exe 1168 CoopenAir.exe 1168 CoopenAir.exe 1168 CoopenAir.exe 1168 CoopenAir.exe 1168 CoopenAir.exe 1168 CoopenAir.exe 1168 CoopenAir.exe 1168 CoopenAir.exe 1168 CoopenAir.exe 1168 CoopenAir.exe 1168 CoopenAir.exe 1168 CoopenAir.exe 1168 CoopenAir.exe 1168 CoopenAir.exe 1168 CoopenAir.exe 1168 CoopenAir.exe 1168 CoopenAir.exe 1168 CoopenAir.exe 1168 CoopenAir.exe 1168 CoopenAir.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2988 Coopen.exe -
Suspicious use of FindShellTrayWindow 15 IoCs
pid Process 2988 Coopen.exe 2988 Coopen.exe 2988 Coopen.exe 2988 Coopen.exe 2988 Coopen.exe 2988 Coopen.exe 2988 Coopen.exe 2988 Coopen.exe 2988 Coopen.exe 2988 Coopen.exe 2988 Coopen.exe 2988 Coopen.exe 2988 Coopen.exe 2988 Coopen.exe 2988 Coopen.exe -
Suspicious use of SendNotifyMessage 15 IoCs
pid Process 2988 Coopen.exe 2988 Coopen.exe 2988 Coopen.exe 2988 Coopen.exe 2988 Coopen.exe 2988 Coopen.exe 2988 Coopen.exe 2988 Coopen.exe 2988 Coopen.exe 2988 Coopen.exe 2988 Coopen.exe 2988 Coopen.exe 2988 Coopen.exe 2988 Coopen.exe 2988 Coopen.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1168 CoopenAir.exe 1168 CoopenAir.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2364 wrote to memory of 2988 2364 coopen_setup_100030.exe 30 PID 2364 wrote to memory of 2988 2364 coopen_setup_100030.exe 30 PID 2364 wrote to memory of 2988 2364 coopen_setup_100030.exe 30 PID 2364 wrote to memory of 2988 2364 coopen_setup_100030.exe 30 PID 2364 wrote to memory of 2988 2364 coopen_setup_100030.exe 30 PID 2364 wrote to memory of 2988 2364 coopen_setup_100030.exe 30 PID 2364 wrote to memory of 2988 2364 coopen_setup_100030.exe 30 PID 2988 wrote to memory of 1168 2988 Coopen.exe 31 PID 2988 wrote to memory of 1168 2988 Coopen.exe 31 PID 2988 wrote to memory of 1168 2988 Coopen.exe 31 PID 2988 wrote to memory of 1168 2988 Coopen.exe 31 PID 2988 wrote to memory of 1168 2988 Coopen.exe 31 PID 2988 wrote to memory of 1168 2988 Coopen.exe 31 PID 2988 wrote to memory of 1168 2988 Coopen.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\$TEMP\coopen_setup_100030.exe"C:\Users\Admin\AppData\Local\Temp\$TEMP\coopen_setup_100030.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Program Files (x86)\Coopen\Coopen.exe"C:\Program Files (x86)\Coopen\Coopen.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Users\Public\Coopen\CoopenAir.exe"C:\Users\Public\Coopen\CoopenAir.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1168
-
-
Network
-
Remote address:8.8.8.8:53Requestconf.coopen.cnIN AResponse
-
Remote address:8.8.8.8:53Requestpiclist.conf.coopen.cnIN AResponse
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
90KB
MD5f9193966e62c1956bf3c9a716e958a0e
SHA187401d4a6cb2f023537398fdbf6fc721cacbd93b
SHA256b6f9170d208cfb347ab0095b811a65a1a717ea1246ca25796923b45d2f986e41
SHA51225d9a1b5c7702ebccbfdbcbdd81f6dc5d0aeb5bb6df4a8e8e05ba7cf5840e92b7e64d448d923775345e860ee5939bb34228de81e4b3044f750bab1b5b44ca3bd
-
Filesize
44KB
MD53238b5035688cc6949293247b08c015e
SHA1076d1a4467981297fa6d26278a798711639df02f
SHA2567c5500ef23b0fedffb0155cf00130f8b2b1e66932e2a0cdbadaae355fd6f8b03
SHA51218aba14c669c17825c0a428f9f2ea3f8f9b42afe584b89a3c6dc6b249aacaf517c179349242bb950161d3889c7e5c16ed9f03f580dcc377143b220709ff045e9
-
Filesize
238KB
MD581caf14643c2fe71ee456f99a4ebbd87
SHA1cc6fc467ee8b05dd12080fa1e8f1725e07e180cb
SHA256d94657d062b2abdcbf5b8fa9dd8974ad2218abca7426fdc7534a6d4aeaed523c
SHA51269a15ecd6df384f648789bfe2cb1401b210d45a1c939c19ab6ad17c6271e0acf527d439a488d55f365757324a4aef1337e20ba044647c11606c424e1de86f059
-
Filesize
868KB
MD560aee0a9b29f56e333093d237fb20f6b
SHA1a3023dab4d74a0e9803382e20b64ce780c9c2ff3
SHA2564675621564a482c0d242e86d0da3ce818e60143672155570a3a14ec09f6afa26
SHA5129f7224e38056fe18bc34730496faa739fb245a70fb429365b1044c606ca22d2bb5338323013c436dbda63bf863683eb2bfc3a0364777c8df2149a8691c4ffdda
-
Filesize
5KB
MD5af3fc561248514b757b1e1ca3ed933ac
SHA16f65624a45a267ec0ff48f323be99b100f79db9f
SHA256a441f330499453a3ecb20b7ac00f086dfae1fcf8c523cc4d2535c52723ce9a40
SHA51205cd63672031d5469d735923ea26ec9b459cb07078af46d107e390906927999c8572b6d2c44383ab3419644b476131fae762ac8b8d08e1d113f2de8c00c915dc
-
Filesize
2KB
MD54dd7916a2eadda37420721628143f823
SHA1a00187f9fd16b59ac23272292363bfa6a1860630
SHA25607a4013a51c36fa265ab621fe673c2e2c5dd1af480f51ecc54b7b2c919242477
SHA512f8058f209a24eb99da466b866024e04bc627086976b9733493e5e67b10b6a0df3db9c5b3fb050f8f458d6656e72e00306bde2457b7e171907b684bf7262328b6
-
Filesize
1KB
MD53866af8e64c640812c954641ba87d8d7
SHA1e602a7934f74d9d59ee8923ec37113041be54e79
SHA256c2fff663bcdf180985f6b45fba7fd0e526ffd11d8b27eae6eb1eb302fd9cd767
SHA5128afe1e59424759f1c336bcfc5229a14c626d4c92a173a64bd8354823411a7a9ad066d4e9a9e42820d73ca052b4a97009ac8b1356c339722742ef93384474f43d
-
Filesize
3KB
MD5dc09fdd540cbffd051bce8a3403212bd
SHA1fdbfa319d99e426ec06d3401418221305220a7df
SHA2566987ad414741684bde8472c1aa252cb0066311c01a1dd27a70b5a51c524551ff
SHA5123f37e41d842b77f6704ba53b7f16d4ed747c69e8797d305451dc54b6519a88996be3d85c982cceca01675db0d6efa9c46be468b0516bfaba364413bd18f2ca5e
-
Filesize
3KB
MD52917cad3e39ac06e082780f167fa0f44
SHA1df07535366f50c5a0b00205bbb868eae9623094d
SHA256eb522f713ffdac54d5029243700ea142dfa0b1e4dc11a88257ac19148be6642d
SHA51275baa151fce8ee5c7b4317a92822612d6dd0d5052b560252831e06a5de05ac7c01dc8700be2b6c72e9831e796951df3859689ed44377162662e51298f74172bc
-
Filesize
2KB
MD5faaaaf227d4eb429f8b69fc4e0e1b16c
SHA16816313798ef3ea247621bb440bcff3440c6c446
SHA256eedc79110acc5dddcc4cc57c62961f141120359ed20a6c9de40a9f9e78476c2e
SHA51294af7615b0b39fb9a969bc324a24b29bffa08bbf8907fbc897179fc3885ca3510b6c3ddcc06ecff880165c05cead9f681dade263d52cc1247472d13796e3be93
-
Filesize
3KB
MD5e74c72f68eb70580e2a1cbd4e78d571a
SHA11be39fff6e7988718233632aa2be59acce14a285
SHA256ba0a735ccc5aaa30ecc0454f2d1465c0a313e7e45a1a7b8cfecf169944c6d351
SHA51251259aed26144bf1ffbefea7421352606ae708093d7e5fea3f068718fe70a7840204944297fba225ee645244f4f41fc989d3244507ad931a5051f50a0ae0ff27
-
Filesize
3KB
MD57381c99fabae123b943046adffb95ac8
SHA1ce905f92de5db8eab537cba9015ceb4739d41b92
SHA256b6b8d9f590e46d3f8ea11bd4ec578e6f12d45143af4554fd14cc9a13869c35e6
SHA5122f9f2f73c615a6398ec1efb6190a8d89dc2a0933612ea3759033bbb1722767cd5c855d2c6e85b02a2b2b31c57464ea154db03f7f9e6c31b90610e670a0351624
-
Filesize
1KB
MD547ad98e1168aac8e6e58a0b20304391d
SHA13e153de12d65b417cb80c7d357c782453a6cbea0
SHA256dccd8b4ab98dd10f226f450fe6d9626fd4be91679542f088a6bb2444d75eb70b
SHA512c1cb2860c0edc2ca1ae15075c563f073a9bd3a6b7653439f05a99c0b2e8732cc8432d1a3ba2a43c2171e869e56928afd4b773c4c111eeca1d9fe8593895a9c93
-
Filesize
1KB
MD5a3c16f92de8cc28ef8c96df2e40f6ced
SHA14f1f8fedd6f93be9e06105e0723d5d441cd37762
SHA2561879cd50d901d9be4a7f6dcfbb38ba98fb7ff6e4001798dae66415479eef8f9b
SHA51278b89745d755101b59d6e89ba0c3c54e312d1145de8c9b2994042b69e7a49bd4755a50e96071728908352289fb0c2e10d6d9b9b78b55f00cf5222efad62c71ba
-
Filesize
1KB
MD5f1c1c686020403197cbebaee1d4097dd
SHA16f114e31b221aba01f60d839ceed1f057b939835
SHA2562b84849d7be3dfc1d6ca56cfddfe1234fae14369bcec05fb1a200eb0dd676e0c
SHA512c9894ca952fb99de4a042301ff136515ad97d0be798aa15e201401853d61c5344fd4a4201b986c200d0f27fb1bfd9ddbf0b35a848a0acce20665491b8416e4f5
-
Filesize
141B
MD5de31224a9c1c0f0c1e7fbffe02620ee7
SHA19b89c6ebbc3470f9d390278be1f9abc9d5aab2a2
SHA2560897cb821974d1b47d882e37d99c1037097c2ceffa7a639a81d853d1f7f056cd
SHA51253e5258871ecc99bfed109e7f576f9c5463923061674269720d7f78d1f28835531bf446d1ba32986728aa9ce026a7fd860942971dab36caa00a27897fe81515b
-
Filesize
75KB
MD53a1aef530244c5246688ada270ca479e
SHA149fb60b890a2ace02641d7d4774ada8c1abd356f
SHA256f2df1c5aaf11b57af873a82237a08abfb685fe23371aafe73b7927da9075d711
SHA512b8cd7b8ce830655d65ff366a0ee8af80b6ba8365a8a0bf2ea5c50a50630995a3a816eb6925be5599c94cddfb8ffd74ddde5f4854d4c5f2e54dc1775092d21c29
-
Filesize
261B
MD5d181759cae430432c70ded919fcffb56
SHA10a72d60baa90147a34f1f6ba17a8c3775eab2da4
SHA25633b5600d00015b0e0b9a8a1135e1431bf1561bc87bcc54e2c4491981257048c5
SHA512db24623677ed12b6896cc8a7bfc8b29cf9373f80b65817aea04d6fea9415321f3ebfa9fabae869584e46df1a16d040c8ab50c4f9d723ec910a09c897b92497a1
-
Filesize
341B
MD55db7efe3a7e33e2afa0fe8f846e4ebba
SHA1ace91a021ac988cf0e7aa53f8d66b9f3430da482
SHA2567a86168e4d101fa11dd56a23459c6ad0b3f8ff52b1246153e50fdebd9c3b584f
SHA512aa842c96ad931c04c7473cd0923c17a07d24ca98b776c19e58bf2e0ec139109d81e66071ad10ed6ed2fe96f99e70add13d4b4ffbe32df8c7bc89fdbb05c2ea94
-
Filesize
374B
MD54b679440cd54d2ff389720dd1753f802
SHA172739b6ad78a7fdc5d96692b4a01f3aa835b2270
SHA25698ca6b075ab2e43f159db1a3903e5881addf0096932bcd79bdda0f4243bb2251
SHA51290c58ca4e72567301bd844dd734d9cb405b03bcd0b5d67b17ab3636c56923855d7810a992ee5b9afe11b5c35f55fcebead3ad428e626f0be5cb9ab82d7e9cca7
-
Filesize
579B
MD55f3b9238c657e46bf9ba87bf00f539a2
SHA147006bcfc7880ee345fca0dcd067ad6f47fc6b8a
SHA256a43171d739ebdce724027a48e6b24cb28b78943d4bb5acb4c0ed7d8169290082
SHA51287f4d87e845dc389d47f4471f1e0a0de247d079afd85b66487ec6a986da31bce4432475c40fe46d184e296ff5f25001f1cc9a3f066cc67cb19f37b18755c0db2
-
Filesize
44B
MD5dabdab4a8e77f088505be65c7182105b
SHA19c898a294ef6c675b0da09e68b79bc6ce973f715
SHA256318e64e6e9b17c6d072792aef74ef1ccce2ad95c3b4fdb13c8446a29d922a979
SHA5120b0a897b92a266bcd4f924805e7c88d953b93e724ebad8e540d9c00768d973bc3b7b3527e24bafaf3aaa4e856b9511bae4ff78cb745681dfd43c0235b193fd5d
-
Filesize
370B
MD5429c106d3337f9e4a606f663e8e92bb9
SHA1e7d11f453d9a8eeb2bd67c97723956d63714d57e
SHA25678ea53fb5305c65f7e78f1a331f60f09ef0ee8f3f54d47f202ce4c84dec62ddc
SHA51269be1e8fb5eabf24522325a9c44f1e59f4fa8c1c40ad109f0bdc8535487b6025e2dd5a6238dfd75e7cb70f0d02bd0c8209232fe709108a4e5091be221766b761
-
Filesize
3KB
MD5cf305214622c5d2234854c71e021ae74
SHA1b885a1bb8dca458ed3acf1b9aa2c143251428dfd
SHA256b72997d6aea481af28fbacf9463d9de324a74096d81aa51b239fdd5c46fc55d5
SHA5126a746494bdb0450b2e8f259b16e55feb85285470eab6289ba7493695d71fdbd5d29fdeb64b5b8fdffabfe2414e401df406a611f204699f5000bc3ff7833a01af
-
Filesize
24B
MD50cc02f833ad4bb8b01765646fa882b71
SHA1b7938ee092b156c8b4d95ffaffceecd1cd6e1090
SHA256592422227a3d5ec17244d6281e822f5ab69f7c3b7f2d8ea82ab3ec0aa26dddfa
SHA5123108dd6959dbc9d55575d7bc108c56973ef3e27dadb9896dd4ccad5ea23043ddf00188d9f074e962f95c5d9f065316e303930b5ef76eb03cc6543b2a01420d86
-
Filesize
4KB
MD599f345cf51b6c3c317d20a81acb11012
SHA1b3d0355f527c536ea14a8ff51741c8739d66f727
SHA256c2689ba1f66066afce85ca6457ecd36370be0fe351c58422e45efd0948655c93
SHA512937aa75be84a74f2be3b54dc80fac02c17dad1915d924ef82ab354d2a49bc773ee6d801203c52686113783a7c7ea0e8ed8e673ba696d6d3212f7006e291ed2ef
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
56KB
MD578e522aa4f7dc6ca322eabe916dd7190
SHA1e7f40650e3de52e26f5d07dd8a4dc53f935ea97c
SHA256a929ac8a08eeb966441646549a9e925a306aaea374ccba9996225ea0e14852f5
SHA5129ec165d5acf2b1e5aa0bf79986a2458f5db910e7d2c739cfd0b092e392b3acc94f9df9c871b9d6484986dda5f5652ff60bb555c5d43e5f659df35adc12a667cd