Analysis

  • max time kernel
    143s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/02/2023, 08:47

General

  • Target

    923a55ed2358269706e1082c79ab37edffe88c86edac4a17c518b2e46b67bb9f.exe

  • Size

    2.1MB

  • MD5

    04d79796199ba6251e39c0052dfb2a18

  • SHA1

    442a49c3535454a9326298e69e8ab6c60711645b

  • SHA256

    923a55ed2358269706e1082c79ab37edffe88c86edac4a17c518b2e46b67bb9f

  • SHA512

    1449985aeb4a3b088629a7d9115a1d48f174bd8315acfd4be9a37c2e0d73e9987eac5cff07d50c82e3c9c74f539f320d7bca7e49a7d77232875fe9d8d4ba50a9

  • SSDEEP

    49152:YXTKGWWn+fN3LFpqaGuHWhX9g3wYHqLREU026DhkI3SRYu0J0YuuLDjlFQCB:9GWWn+VZpguHqX9g3F2Rdq7iRT0JBdF7

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies system certificate store 2 TTPs 13 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\923a55ed2358269706e1082c79ab37edffe88c86edac4a17c518b2e46b67bb9f.exe
    "C:\Users\Admin\AppData\Local\Temp\923a55ed2358269706e1082c79ab37edffe88c86edac4a17c518b2e46b67bb9f.exe"
    1⤵
    • Loads dropped DLL
    • Enumerates connected drives
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:4808
    • C:\Users\Admin\AppData\Local\Temp\923a55ed2358269706e1082c79ab37edffe88c86edac4a17c518b2e46b67bb9f.exe
      C:\Users\Admin\AppData\Local\Temp\923a55ed2358269706e1082c79ab37edffe88c86edac4a17c518b2e46b67bb9f.exe --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=60.0.3255.170 --initial-client-data=0x270,0x284,0x288,0x280,0x28c,0x74ecce60,0x74ecce70,0x74ecce7c
      2⤵
      • Loads dropped DLL
      PID:3064
    • C:\Users\Admin\AppData\Local\Temp\Opera Installer Temp\923a55ed2358269706e1082c79ab37edffe88c86edac4a17c518b2e46b67bb9f.exe
      "C:\Users\Admin\AppData\Local\Temp\Opera Installer Temp\923a55ed2358269706e1082c79ab37edffe88c86edac4a17c518b2e46b67bb9f.exe" --version
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:376

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\Opera Installer Temp\923a55ed2358269706e1082c79ab37edffe88c86edac4a17c518b2e46b67bb9f.exe

          Filesize

          2.1MB

          MD5

          04d79796199ba6251e39c0052dfb2a18

          SHA1

          442a49c3535454a9326298e69e8ab6c60711645b

          SHA256

          923a55ed2358269706e1082c79ab37edffe88c86edac4a17c518b2e46b67bb9f

          SHA512

          1449985aeb4a3b088629a7d9115a1d48f174bd8315acfd4be9a37c2e0d73e9987eac5cff07d50c82e3c9c74f539f320d7bca7e49a7d77232875fe9d8d4ba50a9

        • C:\Users\Admin\AppData\Local\Temp\Opera_installer_2302070947349224808.dll

          Filesize

          3.1MB

          MD5

          b98f0621c62fe81ab1bdbc2d6c586164

          SHA1

          28012b0595cee7de3b0d5c2884c552878950506f

          SHA256

          1fc169b877a0888367c482785678001fc9b3db86947fd9d267b2c15abaede007

          SHA512

          fe5e3bb1080583af6159ebae8e700b146c8aeae6f122d0334016c9c4dca6ce1ca9ec9524d9b390f81398c165441d7bf5160315c4b2e30751aa620fbcb6e957c7

        • C:\Users\Admin\AppData\Local\Temp\Opera_installer_2302070947355473064.dll

          Filesize

          3.1MB

          MD5

          b98f0621c62fe81ab1bdbc2d6c586164

          SHA1

          28012b0595cee7de3b0d5c2884c552878950506f

          SHA256

          1fc169b877a0888367c482785678001fc9b3db86947fd9d267b2c15abaede007

          SHA512

          fe5e3bb1080583af6159ebae8e700b146c8aeae6f122d0334016c9c4dca6ce1ca9ec9524d9b390f81398c165441d7bf5160315c4b2e30751aa620fbcb6e957c7

        • C:\Users\Admin\AppData\Local\Temp\Opera_installer_230207094736031376.dll

          Filesize

          3.1MB

          MD5

          b98f0621c62fe81ab1bdbc2d6c586164

          SHA1

          28012b0595cee7de3b0d5c2884c552878950506f

          SHA256

          1fc169b877a0888367c482785678001fc9b3db86947fd9d267b2c15abaede007

          SHA512

          fe5e3bb1080583af6159ebae8e700b146c8aeae6f122d0334016c9c4dca6ce1ca9ec9524d9b390f81398c165441d7bf5160315c4b2e30751aa620fbcb6e957c7

        • C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports\settings.dat

          Filesize

          40B

          MD5

          9036af817a772359310bab6b7b80ecc4

          SHA1

          4985e800f7446fd3b86e2f1f2494eea33a3c7543

          SHA256

          fe322945fe00c6eb41a275d0ce108f86a7fa293a5612a084e9e5f2f46e3579ac

          SHA512

          b95b4c10bb098e0179d4deb2a3401bde2528e368a2d3479d11afd338dbf67df92a10683814c64061d7a892e5ee54b8e747910716a2d6f698d2e27ab47f816230

        • memory/376-140-0x0000000000840000-0x0000000000C2A000-memory.dmp

          Filesize

          3.9MB

        • memory/3064-141-0x0000000000800000-0x0000000000BEA000-memory.dmp

          Filesize

          3.9MB

        • memory/4808-133-0x0000000000800000-0x0000000000BEA000-memory.dmp

          Filesize

          3.9MB