Analysis

  • max time kernel
    69s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    09/09/2022, 09:19

General

  • Target

    4ceab6facd10d06c0829890701a922c6ad32eaaf29cd61e5a701ebbe058015c5.exe

  • Size

    1.9MB

  • MD5

    a2c7950e1574a924393f98fc07f017b1

  • SHA1

    a77820cd2dbcb6e15b3971ba7a193a2cc3f9d09f

  • SHA256

    4ceab6facd10d06c0829890701a922c6ad32eaaf29cd61e5a701ebbe058015c5

  • SHA512

    6398df4579cd38abec9069d6be0738464ce8dab39cc75bb21c22f0be98239706ca089518a845c7df09dc08dcf2f2cd3edbe8cedfebfe59ff6d3f9e14c88f36d1

  • SSDEEP

    49152:KnOjk61zBUzkqHLVAMZNFDr8KTv1eCduF/lfq7ni2v:yOjk61qrVtN1ePFwF

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4ceab6facd10d06c0829890701a922c6ad32eaaf29cd61e5a701ebbe058015c5.exe
    "C:\Users\Admin\AppData\Local\Temp\4ceab6facd10d06c0829890701a922c6ad32eaaf29cd61e5a701ebbe058015c5.exe"
    1⤵
    • Loads dropped DLL
    • Enumerates connected drives
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:1648
    • C:\Users\Admin\AppData\Local\Temp\4ceab6facd10d06c0829890701a922c6ad32eaaf29cd61e5a701ebbe058015c5.exe
      C:\Users\Admin\AppData\Local\Temp\4ceab6facd10d06c0829890701a922c6ad32eaaf29cd61e5a701ebbe058015c5.exe --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=57.0.3098.116 --initial-client-data=0x108,0x110,0x114,0x10c,0x118,0x7462d5e0,0x7462d5f0,0x7462d5fc
      2⤵
      • Loads dropped DLL
      PID:1892
    • C:\Users\Admin\AppData\Local\Temp\Opera Installer\4ceab6facd10d06c0829890701a922c6ad32eaaf29cd61e5a701ebbe058015c5.exe
      "C:\Users\Admin\AppData\Local\Temp\Opera Installer\4ceab6facd10d06c0829890701a922c6ad32eaaf29cd61e5a701ebbe058015c5.exe" --version
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:1328

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Opera Installer\4ceab6facd10d06c0829890701a922c6ad32eaaf29cd61e5a701ebbe058015c5.exe

    Filesize

    1.9MB

    MD5

    a2c7950e1574a924393f98fc07f017b1

    SHA1

    a77820cd2dbcb6e15b3971ba7a193a2cc3f9d09f

    SHA256

    4ceab6facd10d06c0829890701a922c6ad32eaaf29cd61e5a701ebbe058015c5

    SHA512

    6398df4579cd38abec9069d6be0738464ce8dab39cc75bb21c22f0be98239706ca089518a845c7df09dc08dcf2f2cd3edbe8cedfebfe59ff6d3f9e14c88f36d1

  • C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports\settings.dat

    Filesize

    40B

    MD5

    0c7977f9cfc5b0ce700cd06224c08703

    SHA1

    220919ae8c36e2ea2c450a0907d01fa1035c695e

    SHA256

    018d2c43fb0027326d27d21d1cafb1290f0013b93c894144711796c4a0849a78

    SHA512

    bdd7a7a0fb11d824f30e2371a351a68bdbb7378c1bacb06041e7bc6e37bcac3408c1f6a7b70acad70ed1005c227672b572d7997df554830bf80f7a7fb681016c

  • \Users\Admin\AppData\Local\Temp\Opera Installer\4ceab6facd10d06c0829890701a922c6ad32eaaf29cd61e5a701ebbe058015c5.exe

    Filesize

    1.9MB

    MD5

    a2c7950e1574a924393f98fc07f017b1

    SHA1

    a77820cd2dbcb6e15b3971ba7a193a2cc3f9d09f

    SHA256

    4ceab6facd10d06c0829890701a922c6ad32eaaf29cd61e5a701ebbe058015c5

    SHA512

    6398df4579cd38abec9069d6be0738464ce8dab39cc75bb21c22f0be98239706ca089518a845c7df09dc08dcf2f2cd3edbe8cedfebfe59ff6d3f9e14c88f36d1

  • \Users\Admin\AppData\Local\Temp\Opera_installer_2209091119397361648.dll

    Filesize

    2.5MB

    MD5

    7e55a5bdff42bf32f9e89080afe5b419

    SHA1

    dff1d1bbe223b5a1f33301bf623b625cc68952d4

    SHA256

    e81cd53df1ac88c6323fe15ca8980a5311030a2d46accd6c374037ac1319e224

    SHA512

    3d23893adb80e93018a80c1704cd3eb64d1fb6bec8c27152e19f9352478bafb5c4082489706e528e4803eb8658585440434c50496581f5c1e098de3aa073e4a5

  • \Users\Admin\AppData\Local\Temp\Opera_installer_2209091119401211892.dll

    Filesize

    2.5MB

    MD5

    7e55a5bdff42bf32f9e89080afe5b419

    SHA1

    dff1d1bbe223b5a1f33301bf623b625cc68952d4

    SHA256

    e81cd53df1ac88c6323fe15ca8980a5311030a2d46accd6c374037ac1319e224

    SHA512

    3d23893adb80e93018a80c1704cd3eb64d1fb6bec8c27152e19f9352478bafb5c4082489706e528e4803eb8658585440434c50496581f5c1e098de3aa073e4a5

  • \Users\Admin\AppData\Local\Temp\Opera_installer_2209091119405831328.dll

    Filesize

    2.5MB

    MD5

    7e55a5bdff42bf32f9e89080afe5b419

    SHA1

    dff1d1bbe223b5a1f33301bf623b625cc68952d4

    SHA256

    e81cd53df1ac88c6323fe15ca8980a5311030a2d46accd6c374037ac1319e224

    SHA512

    3d23893adb80e93018a80c1704cd3eb64d1fb6bec8c27152e19f9352478bafb5c4082489706e528e4803eb8658585440434c50496581f5c1e098de3aa073e4a5

  • memory/1328-65-0x00000000008B0000-0x0000000000BFC000-memory.dmp

    Filesize

    3.3MB

  • memory/1648-55-0x0000000075811000-0x0000000075813000-memory.dmp

    Filesize

    8KB

  • memory/1648-66-0x0000000000100000-0x000000000044C000-memory.dmp

    Filesize

    3.3MB

  • memory/1648-67-0x00000000025F0000-0x000000000293C000-memory.dmp

    Filesize

    3.3MB

  • memory/1648-69-0x0000000003520000-0x000000000386C000-memory.dmp

    Filesize

    3.3MB

  • memory/1892-68-0x0000000000100000-0x000000000044C000-memory.dmp

    Filesize

    3.3MB