Analysis

  • max time kernel
    63s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    05/01/2023, 15:48

General

  • Target

    31027859da298a1881be68d3ef9a0ea0d53aaf1013cd90bb5e5261d9922fda3d.exe

  • Size

    2.3MB

  • MD5

    98d4f533ad120076a556184e210a81cd

  • SHA1

    936cf59c57115593c9bd465666277a667a2a1e43

  • SHA256

    31027859da298a1881be68d3ef9a0ea0d53aaf1013cd90bb5e5261d9922fda3d

  • SHA512

    644364699c09d381a869b13d2bb049eb1eca257e3b2495bf2171596182b5014c9aca026a6deb93c38dd1c8cbf2ac0f421106ba818d2af43b0e9c495fca09924b

  • SSDEEP

    49152:FnDmzmD/IfhJjvGBaDPyPQ1yG7TQ6WGKohAMtyrrhSRCQw5GA0MzFswrnGFQy:htIfhJjvGkzyP8TnWehURuCQkd1sCOQy

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\31027859da298a1881be68d3ef9a0ea0d53aaf1013cd90bb5e5261d9922fda3d.exe
    "C:\Users\Admin\AppData\Local\Temp\31027859da298a1881be68d3ef9a0ea0d53aaf1013cd90bb5e5261d9922fda3d.exe"
    1⤵
    • Loads dropped DLL
    • Enumerates connected drives
    • Modifies system certificate store
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1268
    • C:\Users\Admin\AppData\Local\Temp\31027859da298a1881be68d3ef9a0ea0d53aaf1013cd90bb5e5261d9922fda3d.exe
      C:\Users\Admin\AppData\Local\Temp\31027859da298a1881be68d3ef9a0ea0d53aaf1013cd90bb5e5261d9922fda3d.exe --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=64.0.3417.61 --initial-client-data=0x108,0x110,0x114,0x10c,0x118,0x749ff4b8,0x749ff4c8,0x749ff4d4
      2⤵
      • Loads dropped DLL
      PID:1740
    • C:\Users\Admin\AppData\Local\Temp\Opera Installer Temp\31027859da298a1881be68d3ef9a0ea0d53aaf1013cd90bb5e5261d9922fda3d.exe
      "C:\Users\Admin\AppData\Local\Temp\Opera Installer Temp\31027859da298a1881be68d3ef9a0ea0d53aaf1013cd90bb5e5261d9922fda3d.exe" --version
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:736

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Opera Installer Temp\31027859da298a1881be68d3ef9a0ea0d53aaf1013cd90bb5e5261d9922fda3d.exe

    Filesize

    2.3MB

    MD5

    98d4f533ad120076a556184e210a81cd

    SHA1

    936cf59c57115593c9bd465666277a667a2a1e43

    SHA256

    31027859da298a1881be68d3ef9a0ea0d53aaf1013cd90bb5e5261d9922fda3d

    SHA512

    644364699c09d381a869b13d2bb049eb1eca257e3b2495bf2171596182b5014c9aca026a6deb93c38dd1c8cbf2ac0f421106ba818d2af43b0e9c495fca09924b

  • C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports\settings.dat

    Filesize

    40B

    MD5

    8ab79e58e6691a6119f6d2f524e5faf1

    SHA1

    c6476ae77386b01b60bd8923e261de445a9c18b8

    SHA256

    ab436038f126bca33afd7f5608bc69919a575ce54bae10ffc6d4265afa29b607

    SHA512

    18e6fd74fbdace186ba4ec0826bbdeb85fc95bc2f5c0b5e0f9fba6b2ab0e951b8534e4fed7693124495d96c7849c48480a648a503de873c3fb64ef68a6366adc

  • \Users\Admin\AppData\Local\Temp\Opera Installer Temp\31027859da298a1881be68d3ef9a0ea0d53aaf1013cd90bb5e5261d9922fda3d.exe

    Filesize

    2.3MB

    MD5

    98d4f533ad120076a556184e210a81cd

    SHA1

    936cf59c57115593c9bd465666277a667a2a1e43

    SHA256

    31027859da298a1881be68d3ef9a0ea0d53aaf1013cd90bb5e5261d9922fda3d

    SHA512

    644364699c09d381a869b13d2bb049eb1eca257e3b2495bf2171596182b5014c9aca026a6deb93c38dd1c8cbf2ac0f421106ba818d2af43b0e9c495fca09924b

  • \Users\Admin\AppData\Local\Temp\Opera_installer_2301051649035451268.dll

    Filesize

    3.2MB

    MD5

    c3829382a6d3b961640bdde2cc3a0999

    SHA1

    dbb3a4e310bead65dc01fbb2589e62af1e42f2a7

    SHA256

    eafe94e091bc9a082d27768345985dc7d1ecdf19fa1d2f4914e6d2835b478272

    SHA512

    cf5f1360790fc53348f5e6792c657ab9f414dac5ed39dfb93720113cfdbbf92e2e141eace21fc2008fe245eadd8acccd55f7e335929ba85e0b7a3142230ad884

  • \Users\Admin\AppData\Local\Temp\Opera_installer_2301051649041801740.dll

    Filesize

    3.2MB

    MD5

    c3829382a6d3b961640bdde2cc3a0999

    SHA1

    dbb3a4e310bead65dc01fbb2589e62af1e42f2a7

    SHA256

    eafe94e091bc9a082d27768345985dc7d1ecdf19fa1d2f4914e6d2835b478272

    SHA512

    cf5f1360790fc53348f5e6792c657ab9f414dac5ed39dfb93720113cfdbbf92e2e141eace21fc2008fe245eadd8acccd55f7e335929ba85e0b7a3142230ad884

  • \Users\Admin\AppData\Local\Temp\Opera_installer_230105164905581736.dll

    Filesize

    3.2MB

    MD5

    c3829382a6d3b961640bdde2cc3a0999

    SHA1

    dbb3a4e310bead65dc01fbb2589e62af1e42f2a7

    SHA256

    eafe94e091bc9a082d27768345985dc7d1ecdf19fa1d2f4914e6d2835b478272

    SHA512

    cf5f1360790fc53348f5e6792c657ab9f414dac5ed39dfb93720113cfdbbf92e2e141eace21fc2008fe245eadd8acccd55f7e335929ba85e0b7a3142230ad884

  • memory/736-68-0x0000000000020000-0x000000000047D000-memory.dmp

    Filesize

    4.4MB

  • memory/1268-60-0x0000000002910000-0x0000000002D6D000-memory.dmp

    Filesize

    4.4MB

  • memory/1268-59-0x0000000000BE0000-0x000000000103D000-memory.dmp

    Filesize

    4.4MB

  • memory/1268-55-0x0000000074F41000-0x0000000074F43000-memory.dmp

    Filesize

    8KB

  • memory/1268-69-0x0000000000BE0000-0x000000000103D000-memory.dmp

    Filesize

    4.4MB

  • memory/1740-61-0x0000000000BE0000-0x000000000103D000-memory.dmp

    Filesize

    4.4MB