Analysis

  • max time kernel
    146s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-03-2024 14:08

General

  • Target

    de317b1dfc68f3e5f3c112be13af7471.exe

  • Size

    3.1MB

  • MD5

    de317b1dfc68f3e5f3c112be13af7471

  • SHA1

    94d03b66a045d21913f461059d495c63f759c9a7

  • SHA256

    155bd1827a29c5dd67cf0e359d5376e172a2e25d34c423435a7ccabeadeb38b1

  • SHA512

    457ad35004ecd805d698640ed32be7fb6354fa89f3138a1d686702d3c6d2863b120070d0ab700c17746103a58654283cb902f5c39b98ebe8d3bd9899e03858e0

  • SSDEEP

    98304:GwsFkDa3X0wCXY8DzEQNwM/fY8oLtbbqvzX1pS6EH0H3m:8mgKVrwM9o4TzeEm

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates connected drives 3 TTPs 2 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies system certificate store 2 TTPs 8 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\de317b1dfc68f3e5f3c112be13af7471.exe
    "C:\Users\Admin\AppData\Local\Temp\de317b1dfc68f3e5f3c112be13af7471.exe"
    1⤵
    • Loads dropped DLL
    • Enumerates connected drives
    • Modifies system certificate store
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3148
    • C:\Users\Admin\AppData\Local\Temp\de317b1dfc68f3e5f3c112be13af7471.exe
      C:\Users\Admin\AppData\Local\Temp\de317b1dfc68f3e5f3c112be13af7471.exe --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera GX Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera GX Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktopGX --annotation=ver=77.0.4054.275 --initial-client-data=0x2d8,0x2dc,0x2e0,0x2b4,0x2e4,0x751bcf90,0x751bcfa0,0x751bcfac
      2⤵
      • Loads dropped DLL
      PID:648
    • C:\Users\Admin\AppData\Local\Temp\.opera\Opera GX Installer Temp\de317b1dfc68f3e5f3c112be13af7471.exe
      "C:\Users\Admin\AppData\Local\Temp\.opera\Opera GX Installer Temp\de317b1dfc68f3e5f3c112be13af7471.exe" --version
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:4116
    • C:\Users\Admin\AppData\Local\Temp\.opera\Opera GX Installer Temp\opera_package_202403251408521\assistant\_sfx.exe
      "C:\Users\Admin\AppData\Local\Temp\.opera\Opera GX Installer Temp\opera_package_202403251408521\assistant\_sfx.exe"
      2⤵
      • Executes dropped EXE
      PID:3648
    • C:\Users\Admin\AppData\Local\Temp\.opera\Opera GX Installer Temp\opera_package_202403251408521\assistant\assistant_installer.exe
      "C:\Users\Admin\AppData\Local\Temp\.opera\Opera GX Installer Temp\opera_package_202403251408521\assistant\assistant_installer.exe" --version
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4904
      • C:\Users\Admin\AppData\Local\Temp\.opera\Opera GX Installer Temp\opera_package_202403251408521\assistant\assistant_installer.exe
        "C:\Users\Admin\AppData\Local\Temp\.opera\Opera GX Installer Temp\opera_package_202403251408521\assistant\assistant_installer.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera GX Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera GX Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktopGX --annotation=ver=73.0.3856.382 --initial-client-data=0x26c,0x270,0x274,0x248,0x278,0xd84f48,0xd84f58,0xd84f64
        3⤵
        • Executes dropped EXE
        PID:460

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\.opera\Opera GX Installer Temp\de317b1dfc68f3e5f3c112be13af7471.exe

    Filesize

    3.1MB

    MD5

    de317b1dfc68f3e5f3c112be13af7471

    SHA1

    94d03b66a045d21913f461059d495c63f759c9a7

    SHA256

    155bd1827a29c5dd67cf0e359d5376e172a2e25d34c423435a7ccabeadeb38b1

    SHA512

    457ad35004ecd805d698640ed32be7fb6354fa89f3138a1d686702d3c6d2863b120070d0ab700c17746103a58654283cb902f5c39b98ebe8d3bd9899e03858e0

  • C:\Users\Admin\AppData\Local\Temp\.opera\Opera GX Installer Temp\opera_package_202403251408521\assistant\_sfx.exe

    Filesize

    1.4MB

    MD5

    e9a2209b61f4be34f25069a6e54affea

    SHA1

    6368b0a81608c701b06b97aeff194ce88fd0e3c0

    SHA256

    e950f17f4181009eeafa9f5306e8a9dfd26d88ca63b1838f44ff0efc738e7d1f

    SHA512

    59e46277ca79a43ed8b0a25b24eff013e251a75f90587e013b9c12851e5dd7283b6172f7d48583982f6a32069457778ee440025c1c754bf7bb6ce8ae1d2c3fc5

  • C:\Users\Admin\AppData\Local\Temp\.opera\Opera GX Installer Temp\opera_package_202403251408521\assistant\assistant_installer.exe

    Filesize

    1.8MB

    MD5

    4c8fbed0044da34ad25f781c3d117a66

    SHA1

    8dd93340e3d09de993c3bc12db82680a8e69d653

    SHA256

    afe569ce9e4f71c23ba5f6e8fd32be62ac9538e397cde8f2ecbe46faa721242a

    SHA512

    a04e6fd052d2d63a0737c83702c66a9af834f9df8423666508c42b3e1d8384300239c9ddacdc31c1e85140eb1193bcfac209f218750b40342492ffce6e9da481

  • C:\Users\Admin\AppData\Local\Temp\.opera\Opera GX Installer Temp\opera_package_202403251408521\opera_package

    Filesize

    105.7MB

    MD5

    cfc5c08412c1b719c2e883a87604956d

    SHA1

    bcc4627949c0a8991cf23fe8b615d3eebb4e5877

    SHA256

    d0b7845134eea98b642e6673d65ecf925a905fa7c8564b18e13d52657c30d41a

    SHA512

    0df58e06d49c29afe91889738943c4ef392ceac24c9eeda0642c9802562a29ed6b6f2071562b19881da1e744b264e00ea73cf4bae4a8d7b79c34ef19a94f8f44

  • C:\Users\Admin\AppData\Local\Temp\Opera_installer_2403251408513453148.dll

    Filesize

    4.4MB

    MD5

    e6e36f7ae9fd264a67ffe9bee5f5c2cf

    SHA1

    85b9fba82f9b887a30007b9fb18b3fe6b5eb5863

    SHA256

    e26f5e6cf6fd83b7c1da8317d4dd5272e1a6409449b3e0ad71d76a80ae9358cb

    SHA512

    4dbc8cd6c62c8c7d90762a595573ee4fda3839756d2d87e8a10c7048331d89f765486969e4eaa05b1ebdd8c60f0c49febbd070e069c153df28bdf2ba6feb294f

  • C:\Users\Admin\AppData\Roaming\Opera Software\Opera GX Stable\Crash Reports\settings.dat

    Filesize

    40B

    MD5

    dcd801c8d45a46301f80d9e6f1b71a71

    SHA1

    3549c3ae667c0117ea909c35f28e678f4ffe13d3

    SHA256

    830049453f77cc1f32b242a88f7339c871b42d49f621cd99501f1946a8a54e11

    SHA512

    1239510dcf303567524508dc285dc78a19cd8c177f8bc9a94fb07eb8fc4e0e82b2f1f832d4e540f29299c39194bb053bab6da813fc6a00aeb071ed4a5d800cec

  • memory/648-6-0x0000000000400000-0x00000000008D3000-memory.dmp

    Filesize

    4.8MB

  • memory/648-37-0x0000000000400000-0x00000000008D3000-memory.dmp

    Filesize

    4.8MB

  • memory/3148-0-0x0000000000400000-0x00000000008D3000-memory.dmp

    Filesize

    4.8MB

  • memory/3148-36-0x0000000000400000-0x00000000008D3000-memory.dmp

    Filesize

    4.8MB

  • memory/4116-15-0x0000000000400000-0x00000000008D3000-memory.dmp

    Filesize

    4.8MB

  • memory/4116-20-0x0000000000400000-0x00000000008D3000-memory.dmp

    Filesize

    4.8MB