Analysis

  • max time kernel
    64s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/10/2022, 02:44

General

  • Target

    49afd931c8706597b4ab2b681febebe7137180059bed1502081cbdef239c3b47.exe

  • Size

    2.1MB

  • MD5

    34bbd1e4ce33e85843d3f750f2b6bd88

  • SHA1

    9aed3c2f1384deefb65f35d45a5507bb15bc4e94

  • SHA256

    49afd931c8706597b4ab2b681febebe7137180059bed1502081cbdef239c3b47

  • SHA512

    42e91bf50c9c2c12440cf8822bd47ecb01eb1d4b46ad8b253d271380c0d0910b63ab83e9406cfc4630560301bd55c52358663435001ee801f893579763ec2ad7

  • SSDEEP

    49152:AXTKGWWn+fN3LFpqaGuHWhX9g3wYHqLREU026DhkI3SRYu0J0YuuLDjlFQCV:FGWWn+VZpguHqX9g3F2Rdq7iRT0JBdF7

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies system certificate store 2 TTPs 13 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\49afd931c8706597b4ab2b681febebe7137180059bed1502081cbdef239c3b47.exe
    "C:\Users\Admin\AppData\Local\Temp\49afd931c8706597b4ab2b681febebe7137180059bed1502081cbdef239c3b47.exe"
    1⤵
    • Loads dropped DLL
    • Enumerates connected drives
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:3144
    • C:\Users\Admin\AppData\Local\Temp\49afd931c8706597b4ab2b681febebe7137180059bed1502081cbdef239c3b47.exe
      C:\Users\Admin\AppData\Local\Temp\49afd931c8706597b4ab2b681febebe7137180059bed1502081cbdef239c3b47.exe --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=60.0.3255.170 --initial-client-data=0x270,0x284,0x288,0x280,0x28c,0x757cce60,0x757cce70,0x757cce7c
      2⤵
      • Loads dropped DLL
      PID:4144
    • C:\Users\Admin\AppData\Local\Temp\Opera Installer Temp\49afd931c8706597b4ab2b681febebe7137180059bed1502081cbdef239c3b47.exe
      "C:\Users\Admin\AppData\Local\Temp\Opera Installer Temp\49afd931c8706597b4ab2b681febebe7137180059bed1502081cbdef239c3b47.exe" --version
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:3536

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Opera Installer Temp\49afd931c8706597b4ab2b681febebe7137180059bed1502081cbdef239c3b47.exe

    Filesize

    2.1MB

    MD5

    34bbd1e4ce33e85843d3f750f2b6bd88

    SHA1

    9aed3c2f1384deefb65f35d45a5507bb15bc4e94

    SHA256

    49afd931c8706597b4ab2b681febebe7137180059bed1502081cbdef239c3b47

    SHA512

    42e91bf50c9c2c12440cf8822bd47ecb01eb1d4b46ad8b253d271380c0d0910b63ab83e9406cfc4630560301bd55c52358663435001ee801f893579763ec2ad7

  • C:\Users\Admin\AppData\Local\Temp\Opera_installer_2210060244489543144.dll

    Filesize

    3.1MB

    MD5

    b98f0621c62fe81ab1bdbc2d6c586164

    SHA1

    28012b0595cee7de3b0d5c2884c552878950506f

    SHA256

    1fc169b877a0888367c482785678001fc9b3db86947fd9d267b2c15abaede007

    SHA512

    fe5e3bb1080583af6159ebae8e700b146c8aeae6f122d0334016c9c4dca6ce1ca9ec9524d9b390f81398c165441d7bf5160315c4b2e30751aa620fbcb6e957c7

  • C:\Users\Admin\AppData\Local\Temp\Opera_installer_2210060244494544144.dll

    Filesize

    3.1MB

    MD5

    b98f0621c62fe81ab1bdbc2d6c586164

    SHA1

    28012b0595cee7de3b0d5c2884c552878950506f

    SHA256

    1fc169b877a0888367c482785678001fc9b3db86947fd9d267b2c15abaede007

    SHA512

    fe5e3bb1080583af6159ebae8e700b146c8aeae6f122d0334016c9c4dca6ce1ca9ec9524d9b390f81398c165441d7bf5160315c4b2e30751aa620fbcb6e957c7

  • C:\Users\Admin\AppData\Local\Temp\Opera_installer_2210060244498763536.dll

    Filesize

    3.1MB

    MD5

    b98f0621c62fe81ab1bdbc2d6c586164

    SHA1

    28012b0595cee7de3b0d5c2884c552878950506f

    SHA256

    1fc169b877a0888367c482785678001fc9b3db86947fd9d267b2c15abaede007

    SHA512

    fe5e3bb1080583af6159ebae8e700b146c8aeae6f122d0334016c9c4dca6ce1ca9ec9524d9b390f81398c165441d7bf5160315c4b2e30751aa620fbcb6e957c7

  • C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports\settings.dat

    Filesize

    40B

    MD5

    0d6ff9b7eb1088cc9e50182cbfffa986

    SHA1

    dd1902fb66f21b86c3d18e9256c780dc90c91271

    SHA256

    c4c7c0aa267e503f5884777e1cbeddaacc21012280e69158d63b05b5a8b52652

    SHA512

    e7386ffbd9de9742f235624e5b9b7d1bdd0b2ee3961359a5e36d33ba35b7b537ffc26d5b3a4e86596ac02465176a46957c5d037d7940cb0fb8c9aaa354dc3026

  • memory/3144-133-0x0000000000400000-0x00000000007EA000-memory.dmp

    Filesize

    3.9MB

  • memory/3536-140-0x0000000000240000-0x000000000062A000-memory.dmp

    Filesize

    3.9MB

  • memory/4144-141-0x0000000000400000-0x00000000007EA000-memory.dmp

    Filesize

    3.9MB