Analysis
-
max time kernel
3s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
05-02-2023 03:54
Behavioral task
behavioral1
Sample
OperaSetup.exe
Resource
win7-20221111-en
General
-
Target
OperaSetup.exe
-
Size
2.7MB
-
MD5
32a164c7440f0cea2923b544d0a169df
-
SHA1
c536227be3d6df4ad5d06cdccd5212eff6cfd988
-
SHA256
a95442dc0471e48525a794d426cb968a76ededdd0bc4684a70b366ef09772108
-
SHA512
4c6339da012fe13c1d95b4e1daddc2d0cdde5c61ef2ed0369438cd4fb4234d465f2879acaad3d5f01a4ace667828c6d69837ea1a4c68d4e8267373746aec44ef
-
SSDEEP
49152:nBTG7j5EFGJwXYK3hcHvqO4Vf6X9dDbqhXxp+2V8VqSK6j0bLlH:dKj5scbqxx6XPbqhXxrSK6j0nlH
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 864 OperaSetup.exe -
Loads dropped DLL 4 IoCs
pid Process 2020 OperaSetup.exe 1984 OperaSetup.exe 2020 OperaSetup.exe 864 OperaSetup.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/files/0x0006000000015c38-59.dat upx behavioral1/files/0x0006000000015c38-61.dat upx behavioral1/memory/2020-62-0x0000000000400000-0x0000000000947000-memory.dmp upx behavioral1/memory/1984-64-0x0000000000400000-0x0000000000947000-memory.dmp upx behavioral1/memory/864-68-0x0000000000400000-0x0000000000947000-memory.dmp upx -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\D: OperaSetup.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2020 wrote to memory of 1984 2020 OperaSetup.exe 27 PID 2020 wrote to memory of 1984 2020 OperaSetup.exe 27 PID 2020 wrote to memory of 1984 2020 OperaSetup.exe 27 PID 2020 wrote to memory of 1984 2020 OperaSetup.exe 27 PID 2020 wrote to memory of 1984 2020 OperaSetup.exe 27 PID 2020 wrote to memory of 1984 2020 OperaSetup.exe 27 PID 2020 wrote to memory of 1984 2020 OperaSetup.exe 27 PID 2020 wrote to memory of 864 2020 OperaSetup.exe 28 PID 2020 wrote to memory of 864 2020 OperaSetup.exe 28 PID 2020 wrote to memory of 864 2020 OperaSetup.exe 28 PID 2020 wrote to memory of 864 2020 OperaSetup.exe 28 PID 2020 wrote to memory of 864 2020 OperaSetup.exe 28 PID 2020 wrote to memory of 864 2020 OperaSetup.exe 28 PID 2020 wrote to memory of 864 2020 OperaSetup.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\OperaSetup.exe"C:\Users\Admin\AppData\Local\Temp\OperaSetup.exe"1⤵
- Loads dropped DLL
- Enumerates connected drives
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\OperaSetup.exeC:\Users\Admin\AppData\Local\Temp\OperaSetup.exe --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=95.0.4635.25 --initial-client-data=0x188,0x18c,0x190,0x15c,0x194,0x7450e428,0x7450e438,0x7450e4442⤵
- Loads dropped DLL
PID:1984
-
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\OperaSetup.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\OperaSetup.exe" --version2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:864
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD532a164c7440f0cea2923b544d0a169df
SHA1c536227be3d6df4ad5d06cdccd5212eff6cfd988
SHA256a95442dc0471e48525a794d426cb968a76ededdd0bc4684a70b366ef09772108
SHA5124c6339da012fe13c1d95b4e1daddc2d0cdde5c61ef2ed0369438cd4fb4234d465f2879acaad3d5f01a4ace667828c6d69837ea1a4c68d4e8267373746aec44ef
-
Filesize
2.7MB
MD532a164c7440f0cea2923b544d0a169df
SHA1c536227be3d6df4ad5d06cdccd5212eff6cfd988
SHA256a95442dc0471e48525a794d426cb968a76ededdd0bc4684a70b366ef09772108
SHA5124c6339da012fe13c1d95b4e1daddc2d0cdde5c61ef2ed0369438cd4fb4234d465f2879acaad3d5f01a4ace667828c6d69837ea1a4c68d4e8267373746aec44ef
-
Filesize
4.6MB
MD5914ec7fb3d69e977440248ef30323636
SHA12aa31e599769f34d0cb6e979947ca5728db9b009
SHA256528117e7c698fbe7ad3036aef77f99ab8af74316def7a4ba60f738c40168c203
SHA512ff62901ffe79bbc8ffe6cce3efc8f13e71f13a41772b8d0180614b6ba80d5b9db1094a97cf3d239057dca2efdd7b0adc217f3ddce5111267c50ec9d0d1125b3a
-
Filesize
4.6MB
MD5914ec7fb3d69e977440248ef30323636
SHA12aa31e599769f34d0cb6e979947ca5728db9b009
SHA256528117e7c698fbe7ad3036aef77f99ab8af74316def7a4ba60f738c40168c203
SHA512ff62901ffe79bbc8ffe6cce3efc8f13e71f13a41772b8d0180614b6ba80d5b9db1094a97cf3d239057dca2efdd7b0adc217f3ddce5111267c50ec9d0d1125b3a
-
Filesize
1.6MB
MD52f8c12dda03aebaa6ca96b8d44084324
SHA1fd8999ab1d4d7c77e755872ed1708ca24d710731
SHA256c93fd73a4aba627343563ef3aae57f81d716b35f181fdd99efb0cfae59948c46
SHA512c33c6b2b0ce92bf99d1f00c040ea986ed0274000c260cc537d499cf41f37e9edee0ce1587ce12c806b179ae046a2cf97f5157a3ace465b97957a297f1692da6d