Analysis
-
max time kernel
124s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
26-03-2024 05:59
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20240221-en
General
-
Target
tmp.exe
-
Size
1.9MB
-
MD5
3754420df3c482019cd40c7796daafc7
-
SHA1
e41398638097b43c7bc923fe860826958a0b713d
-
SHA256
b2c50730f7eb0d32be9d21cf1974c0581bf617de03c3f8afb0548bcebf0eccb2
-
SHA512
709a185f2ee077b334a1da62c37bf5fa8dcf6a218e7ab4c79498f7ec3b9a44e9c073e30bb9057f2aac35429367909e7e66f190c5c492dc1c86052502ae99843c
-
SSDEEP
49152:n27wrlvBU7wbExyf3KC3O3oHTpciOL/ik:n+cla0bE0/KCe3sqF
Malware Config
Extracted
amadey
4.18
http://193.233.132.56
-
install_dir
09fd851a4f
-
install_file
explorha.exe
-
strings_key
443351145ece4966ded809641c77cfa8
-
url_paths
/Pneh2sXQk0/index.php
Signatures
-
Glupteba payload 8 IoCs
Processes:
resource yara_rule behavioral2/memory/5952-268-0x0000000002FC0000-0x00000000038AB000-memory.dmp family_glupteba behavioral2/memory/5952-276-0x0000000000400000-0x0000000000ED1000-memory.dmp family_glupteba behavioral2/memory/6032-294-0x0000000000400000-0x0000000000ED1000-memory.dmp family_glupteba behavioral2/memory/6068-299-0x0000000002FF0000-0x00000000038DB000-memory.dmp family_glupteba behavioral2/memory/6068-301-0x0000000000400000-0x0000000000ED1000-memory.dmp family_glupteba behavioral2/memory/5952-337-0x0000000000400000-0x0000000000ED1000-memory.dmp family_glupteba behavioral2/memory/6032-347-0x0000000000400000-0x0000000000ED1000-memory.dmp family_glupteba behavioral2/memory/6068-348-0x0000000000400000-0x0000000000ED1000-memory.dmp family_glupteba -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
Processes:
explorha.exeb09c94c1de.exeamadka.exetmp.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorha.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ b09c94c1de.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ amadka.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ tmp.exe -
Blocklisted process makes network request 4 IoCs
Processes:
rundll32.exerundll32.exerundll32.exerundll32.exeflow pid process 63 4468 rundll32.exe 81 1332 rundll32.exe 174 5980 rundll32.exe 175 5364 rundll32.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 8 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
amadka.exetmp.exeexplorha.exeb09c94c1de.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion amadka.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion tmp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion tmp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b09c94c1de.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b09c94c1de.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion amadka.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
chrosha.exetmp.exeexplorha.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Control Panel\International\Geo\Nation chrosha.exe Key value queried \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Control Panel\International\Geo\Nation tmp.exe Key value queried \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Control Panel\International\Geo\Nation explorha.exe -
Drops startup file 1 IoCs
Processes:
installutil.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DmteXHO9pf7VU4SQIqjWxIi9.bat installutil.exe -
Executes dropped EXE 6 IoCs
Processes:
explorha.exeb09c94c1de.exelumma21.exechrosha.exeamadka.exeun300un.exepid process 4912 explorha.exe 984 b09c94c1de.exe 5228 lumma21.exe 3296 chrosha.exe 5368 amadka.exe 5396 un300un.exe -
Identifies Wine through registry keys 2 TTPs 4 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
explorha.exeb09c94c1de.exeamadka.exetmp.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Software\Wine explorha.exe Key opened \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Software\Wine b09c94c1de.exe Key opened \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Software\Wine amadka.exe Key opened \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Software\Wine tmp.exe -
Loads dropped DLL 6 IoCs
Processes:
rundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exepid process 1332 rundll32.exe 4468 rundll32.exe 1332 rundll32.exe 5960 rundll32.exe 5980 rundll32.exe 5364 rundll32.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule C:\Users\Admin\Pictures\tD55kjy3daziS55rtxlU73zs.exe themida C:\Users\Admin\Pictures\tD55kjy3daziS55rtxlU73zs.exe themida behavioral2/memory/2380-292-0x00007FF766510000-0x00007FF766F27000-memory.dmp themida behavioral2/memory/2380-293-0x00007FF766510000-0x00007FF766F27000-memory.dmp themida behavioral2/memory/2380-295-0x00007FF766510000-0x00007FF766F27000-memory.dmp themida behavioral2/memory/2380-297-0x00007FF766510000-0x00007FF766F27000-memory.dmp themida behavioral2/memory/2380-298-0x00007FF766510000-0x00007FF766F27000-memory.dmp themida behavioral2/memory/2380-302-0x00007FF766510000-0x00007FF766F27000-memory.dmp themida behavioral2/memory/2380-303-0x00007FF766510000-0x00007FF766F27000-memory.dmp themida behavioral2/memory/2380-365-0x00007FF766510000-0x00007FF766F27000-memory.dmp themida -
Processes:
resource yara_rule C:\Users\Admin\Pictures\FH22Hd0WmOKVz4QM2q1UeYOn.exe upx behavioral2/memory/5628-330-0x0000000000F30000-0x0000000001468000-memory.dmp upx C:\Users\Admin\Pictures\FH22Hd0WmOKVz4QM2q1UeYOn.exe upx C:\Users\Admin\Pictures\FH22Hd0WmOKVz4QM2q1UeYOn.exe upx behavioral2/memory/5928-350-0x0000000000F30000-0x0000000001468000-memory.dmp upx behavioral2/memory/1612-357-0x0000000000A20000-0x0000000000F58000-memory.dmp upx behavioral2/memory/1612-358-0x0000000000A20000-0x0000000000F58000-memory.dmp upx C:\Users\Admin\Pictures\FH22Hd0WmOKVz4QM2q1UeYOn.exe upx C:\Users\Admin\Pictures\FH22Hd0WmOKVz4QM2q1UeYOn.exe upx -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
explorha.exechrosha.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\b09c94c1de.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000022001\\b09c94c1de.exe" explorha.exe Set value (str) \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\amadka.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000087001\\amadka.exe" chrosha.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 221 ipinfo.io 215 api.myip.com 216 api.myip.com 218 ipinfo.io -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
Processes:
tmp.exeexplorha.exeamadka.exepid process 228 tmp.exe 4912 explorha.exe 5368 amadka.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
un300un.exedescription pid process target process PID 5396 set thread context of 5552 5396 un300un.exe installutil.exe -
Drops file in Windows directory 2 IoCs
Processes:
tmp.exelumma21.exedescription ioc process File created C:\Windows\Tasks\explorha.job tmp.exe File created C:\Windows\Tasks\chrosha.job lumma21.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 32 IoCs
Processes:
tmp.exeexplorha.exerundll32.exepowershell.exeamadka.exerundll32.exepowershell.exepid process 228 tmp.exe 228 tmp.exe 4912 explorha.exe 4912 explorha.exe 4468 rundll32.exe 4468 rundll32.exe 4468 rundll32.exe 4468 rundll32.exe 4468 rundll32.exe 4468 rundll32.exe 4468 rundll32.exe 4468 rundll32.exe 4468 rundll32.exe 4468 rundll32.exe 4688 powershell.exe 4688 powershell.exe 4688 powershell.exe 5368 amadka.exe 5368 amadka.exe 5980 rundll32.exe 5980 rundll32.exe 5980 rundll32.exe 5980 rundll32.exe 5980 rundll32.exe 5980 rundll32.exe 5980 rundll32.exe 5980 rundll32.exe 5980 rundll32.exe 5980 rundll32.exe 4768 powershell.exe 4768 powershell.exe 4768 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
powershell.exepowershell.exeinstallutil.exedescription pid process Token: SeDebugPrivilege 4688 powershell.exe Token: SeDebugPrivilege 4768 powershell.exe Token: SeDebugPrivilege 5552 installutil.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
tmp.exepid process 228 tmp.exe -
Suspicious use of WriteProcessMemory 52 IoCs
Processes:
tmp.exeexplorha.exerundll32.exerundll32.exechrosha.exerundll32.exerundll32.exeun300un.exedescription pid process target process PID 228 wrote to memory of 4912 228 tmp.exe explorha.exe PID 228 wrote to memory of 4912 228 tmp.exe explorha.exe PID 228 wrote to memory of 4912 228 tmp.exe explorha.exe PID 4912 wrote to memory of 984 4912 explorha.exe b09c94c1de.exe PID 4912 wrote to memory of 984 4912 explorha.exe b09c94c1de.exe PID 4912 wrote to memory of 984 4912 explorha.exe b09c94c1de.exe PID 4912 wrote to memory of 1332 4912 explorha.exe rundll32.exe PID 4912 wrote to memory of 1332 4912 explorha.exe rundll32.exe PID 4912 wrote to memory of 1332 4912 explorha.exe rundll32.exe PID 1332 wrote to memory of 4468 1332 rundll32.exe rundll32.exe PID 1332 wrote to memory of 4468 1332 rundll32.exe rundll32.exe PID 4468 wrote to memory of 3084 4468 rundll32.exe netsh.exe PID 4468 wrote to memory of 3084 4468 rundll32.exe netsh.exe PID 4468 wrote to memory of 4688 4468 rundll32.exe powershell.exe PID 4468 wrote to memory of 4688 4468 rundll32.exe powershell.exe PID 4912 wrote to memory of 1332 4912 explorha.exe rundll32.exe PID 4912 wrote to memory of 1332 4912 explorha.exe rundll32.exe PID 4912 wrote to memory of 1332 4912 explorha.exe rundll32.exe PID 4912 wrote to memory of 5156 4912 explorha.exe explorha.exe PID 4912 wrote to memory of 5156 4912 explorha.exe explorha.exe PID 4912 wrote to memory of 5156 4912 explorha.exe explorha.exe PID 4912 wrote to memory of 5228 4912 explorha.exe lumma21.exe PID 4912 wrote to memory of 5228 4912 explorha.exe lumma21.exe PID 4912 wrote to memory of 5228 4912 explorha.exe lumma21.exe PID 3296 wrote to memory of 5368 3296 chrosha.exe amadka.exe PID 3296 wrote to memory of 5368 3296 chrosha.exe amadka.exe PID 3296 wrote to memory of 5368 3296 chrosha.exe amadka.exe PID 3296 wrote to memory of 5960 3296 chrosha.exe rundll32.exe PID 3296 wrote to memory of 5960 3296 chrosha.exe rundll32.exe PID 3296 wrote to memory of 5960 3296 chrosha.exe rundll32.exe PID 5960 wrote to memory of 5980 5960 rundll32.exe rundll32.exe PID 5960 wrote to memory of 5980 5960 rundll32.exe rundll32.exe PID 5980 wrote to memory of 6008 5980 rundll32.exe netsh.exe PID 5980 wrote to memory of 6008 5980 rundll32.exe netsh.exe PID 5980 wrote to memory of 4768 5980 rundll32.exe powershell.exe PID 5980 wrote to memory of 4768 5980 rundll32.exe powershell.exe PID 3296 wrote to memory of 5396 3296 chrosha.exe un300un.exe PID 3296 wrote to memory of 5396 3296 chrosha.exe un300un.exe PID 5396 wrote to memory of 3208 5396 un300un.exe msbuild.exe PID 5396 wrote to memory of 3208 5396 un300un.exe msbuild.exe PID 5396 wrote to memory of 3208 5396 un300un.exe msbuild.exe PID 5396 wrote to memory of 5552 5396 un300un.exe installutil.exe PID 5396 wrote to memory of 5552 5396 un300un.exe installutil.exe PID 5396 wrote to memory of 5552 5396 un300un.exe installutil.exe PID 5396 wrote to memory of 5552 5396 un300un.exe installutil.exe PID 5396 wrote to memory of 5552 5396 un300un.exe installutil.exe PID 5396 wrote to memory of 5552 5396 un300un.exe installutil.exe PID 5396 wrote to memory of 5552 5396 un300un.exe installutil.exe PID 5396 wrote to memory of 5552 5396 un300un.exe installutil.exe PID 3296 wrote to memory of 5364 3296 chrosha.exe rundll32.exe PID 3296 wrote to memory of 5364 3296 chrosha.exe rundll32.exe PID 3296 wrote to memory of 5364 3296 chrosha.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Users\Admin\AppData\Local\Temp\1000022001\b09c94c1de.exe"C:\Users\Admin\AppData\Local\Temp\1000022001\b09c94c1de.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
PID:984 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main4⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4468 -
C:\Windows\system32\netsh.exenetsh wlan show profiles5⤵PID:3084
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\904519900954_Desktop.zip' -CompressionLevel Optimal5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4688 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:1332 -
C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"3⤵PID:5156
-
C:\Users\Admin\AppData\Local\Temp\1000036001\lumma21.exe"C:\Users\Admin\AppData\Local\Temp\1000036001\lumma21.exe"3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:5228
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3956 --field-trial-handle=2588,i,4353937220825226770,7138584070663735671,262144 --variations-seed-version /prefetch:81⤵PID:5532
-
C:\Users\Admin\AppData\Local\Temp\4d0ab15804\chrosha.exeC:\Users\Admin\AppData\Local\Temp\4d0ab15804\chrosha.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3296 -
C:\Users\Admin\AppData\Local\Temp\1000087001\amadka.exe"C:\Users\Admin\AppData\Local\Temp\1000087001\amadka.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5368 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\cred64.dll, Main2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:5960 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\cred64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5980 -
C:\Windows\system32\netsh.exenetsh wlan show profiles4⤵PID:6008
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\904519900954_Desktop.zip' -CompressionLevel Optimal4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4768 -
C:\Users\Admin\AppData\Local\Temp\1000091001\un300un.exe"C:\Users\Admin\AppData\Local\Temp\1000091001\un300un.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5396 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"3⤵PID:3208
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe"3⤵
- Drops startup file
- Suspicious use of AdjustPrivilegeToken
PID:5552 -
C:\Users\Admin\Pictures\fAyDZWvOJZFCwh7ygXnfATaV.exe"C:\Users\Admin\Pictures\fAyDZWvOJZFCwh7ygXnfATaV.exe"4⤵PID:5952
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵PID:6008
-
C:\Users\Admin\Pictures\G6yhNRQzZNzJBDLTE2qUqy3i.exe"C:\Users\Admin\Pictures\G6yhNRQzZNzJBDLTE2qUqy3i.exe"4⤵PID:6032
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵PID:5976
-
C:\Users\Admin\Pictures\Dxd3tHT5HWtUwXZxgjY72r2w.exe"C:\Users\Admin\Pictures\Dxd3tHT5HWtUwXZxgjY72r2w.exe"4⤵PID:6068
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵PID:2688
-
C:\Users\Admin\Pictures\tD55kjy3daziS55rtxlU73zs.exe"C:\Users\Admin\Pictures\tD55kjy3daziS55rtxlU73zs.exe"4⤵PID:2380
-
C:\Users\Admin\Pictures\FH22Hd0WmOKVz4QM2q1UeYOn.exe"C:\Users\Admin\Pictures\FH22Hd0WmOKVz4QM2q1UeYOn.exe" --silent --allusers=04⤵PID:5628
-
C:\Users\Admin\Pictures\FH22Hd0WmOKVz4QM2q1UeYOn.exeC:\Users\Admin\Pictures\FH22Hd0WmOKVz4QM2q1UeYOn.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=108.0.5067.40 --initial-client-data=0x2e0,0x2e4,0x2e8,0x2bc,0x2ec,0x6e9f21f8,0x6e9f2204,0x6e9f22105⤵PID:5928
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\FH22Hd0WmOKVz4QM2q1UeYOn.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\FH22Hd0WmOKVz4QM2q1UeYOn.exe" --version5⤵PID:1612
-
C:\Users\Admin\Pictures\FH22Hd0WmOKVz4QM2q1UeYOn.exe"C:\Users\Admin\Pictures\FH22Hd0WmOKVz4QM2q1UeYOn.exe" --backend --install --import-browser-data=0 --enable-stats=1 --enable-installer-stats=1 --consent-given=0 --general-interests=0 --general-location=0 --personalized-content=0 --personalized-ads=0 --launchopera=1 --installfolder="C:\Users\Admin\AppData\Local\Programs\Opera" --profile-folder --language=en --singleprofile=0 --copyonly=0 --allusers=0 --setdefaultbrowser=1 --pintotaskbar=1 --pintostartmenu=1 --run-at-startup=1 --show-intro-overlay --server-tracking-data=server_tracking_data --initial-pid=5628 --package-dir-prefix="C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_20240326060141" --session-guid=db00fa51-afcf-4f9b-ba70-72493bab0d51 --server-tracking-blob=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 --silent --desktopshortcut=1 --wait-for-package --initial-proc-handle=A0050000000000005⤵PID:5836
-
C:\Users\Admin\Pictures\FH22Hd0WmOKVz4QM2q1UeYOn.exeC:\Users\Admin\Pictures\FH22Hd0WmOKVz4QM2q1UeYOn.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=108.0.5067.40 --initial-client-data=0x2ec,0x2f0,0x2f4,0x2bc,0x2f8,0x6de821f8,0x6de82204,0x6de822106⤵PID:5492
-
C:\Users\Admin\Pictures\8H7rsN84Pk3pB7ASPY6POqSw.exe"C:\Users\Admin\Pictures\8H7rsN84Pk3pB7ASPY6POqSw.exe"4⤵PID:3480
-
C:\Users\Admin\AppData\Local\Temp\7zSBA9C.tmp\Install.exe.\Install.exe5⤵PID:6064
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll, Main2⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:5364
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵PID:2952
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:5484
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Unsecured Credentials
3Credentials In Files
2Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5fe3aab3ae544a134b68e881b82b70169
SHA1926e9b4e527ae1bd9b3b25726e1f59d5a34d36a6
SHA256bda499e3f69d8fe0227e734bbb935dc5bf0050d37adf03bc41356dfcb5bcca0b
SHA5123fbd3499d98280b6c79c67b0ee183b27692dbc31acf103b4f8ca4dcdf392afff2b3aad500037f4288581ed37e85f45c3bbb5dcde11cddf3ef0609f44b2ecb280
-
Filesize
1KB
MD54b6a25a6c2228d5e8c6d21de29f7ab9b
SHA108b46ff30e31bb8b32ed835458f40885d5f3f305
SHA256a2ac48e136a9d05230a7710bf2a0777dc5537066ba16a4dd0cc5f904040677e7
SHA512c67ac96967fcd644d2c6c27de99bda74e05adf169a10b0126af3558f71ec019882df92a554e9fdd368eed797a3c27b2afb409a681e9c35ae879ad93ee08cad7a
-
Filesize
1.8MB
MD5e5445a597f28eba93d9d31d4ff0a09ce
SHA122015fe3e6efbc8eb8567fbca07fb909f459c9cf
SHA256013eede914b541f29a58db80fbfb690160273e8df9a722ddc474e3924759e1c6
SHA512bf1102741e1325e74bdc4b21b5b1cbffd6f7d1cdba5b852f392496ca44aa6bb293a48ea77d5c3b5ee34cf5b1a034fe48d3adf81465c5a3e5f60fb36e855dd074
-
Filesize
832KB
MD543624c35f8fbd2e0e228fb08db9cdbc2
SHA13188ca6fa612026168b4bbafcec2e7c920bcbe5b
SHA25634f31c9c98f43fffe0ebdf8cd177ca7842e14b5f261cd2c6364e8047a6c17e82
SHA51226169d7492ac8bb92d6e23eb21e01930bfcff2eccec405031bdd076971e27f0ffb0b224da70ead0e01f34d7578ee8472413dca9c6e74337baf5bf33f3b63ca1e
-
Filesize
640KB
MD534c0458fc7eee3686c2936f4a30dd062
SHA1be2e2c95a80aa0fd7944dad71e383c0a5b41564b
SHA256e421f92324dd47519646a1c12ff34539922a19d7c723f478cb8535f356143546
SHA5123cf6f1bd3f1a724697bf7968110837eefb66b81df9afc274761e6760945353f47d6360e36401fb80869d69dea734beb76993d052827a519809603d79fedc33e1
-
Filesize
3.0MB
MD5d55881f086622bc20fbee8894ba6c8c2
SHA1784eb93766dccfdadb20454e3e2c45d5487a2c46
SHA2568c24e831b99c3e28ae83a9666d873196118ca4487b7a758d8d8ce7692ca5fd90
SHA51258dfdb2f153a81e6b0e6043ab95eb82ef218856005eb508980d2a9731131c76fa4ec0e55063ff4f737882678855cafaaa09b5b66bfb703274d1472ec1725f120
-
Filesize
413KB
MD5d467222c3bd563cb72fa49302f80b079
SHA19335e2a36abb8309d8a2075faf78d66b968b2a91
SHA256fedb08b3ec7034a15e9dee7ed4dec1a854fb78e74285e1ee05c90f9e9e4f8b3e
SHA512484b6c427e28193ddb73dd7062e2bfbd132ddc72ce4811bfe08784669de30e4b92bc27140373f62a4ce651401000a3c505188620c43da410bf6b0799a0791fa7
-
Filesize
1.9MB
MD53754420df3c482019cd40c7796daafc7
SHA1e41398638097b43c7bc923fe860826958a0b713d
SHA256b2c50730f7eb0d32be9d21cf1974c0581bf617de03c3f8afb0548bcebf0eccb2
SHA512709a185f2ee077b334a1da62c37bf5fa8dcf6a218e7ab4c79498f7ec3b9a44e9c073e30bb9057f2aac35429367909e7e66f190c5c492dc1c86052502ae99843c
-
Filesize
4.1MB
MD58803d74d52bcda67e9b889bd6cc5823e
SHA1884a1fa1ae3d53bc435d34f912c0068e789a8b25
SHA256627e36dea92cbdd49fcee34c18a29884010a72b5b004c89df90c19a50303a2b3
SHA512c190ca373875789477a755f6246565bc7cb5744f1d5f62037e71d3595c1023f587f34a2437d9691ad96cde789026b7c2896110935e58cc2f1498cfea5d0d9564
-
Filesize
512KB
MD518c829a8709c8aec1640bdd90345c031
SHA1bbe99609a805090d8c91acadaa0b65076d089dc0
SHA2560acdeb10389a208a5e548900b11ae1fe21e8f4e37dcd6f2ec64d4b1d116570b9
SHA512f688640abcc9ab5625f8a6c26b336ca958e43cc61258fe312b2d1b84feed93e29d9d159f4faa9834bd6d22771cbafd6b314107885113a2aacf8c52c481e8f178
-
Filesize
448KB
MD5fc2dc82d1215c5dd23144cfed98495a4
SHA1e30c79eca42733ac847d953407f68c086e054426
SHA256ccb44a306575d5caea07efa38f4598631a68f041c180e2992966a6d406534271
SHA512ad0114bfa6ae3e841205398ae541d74b75a2464b9708a8e14369045d81da1b106e372204b58b01856250cea406c2bd7601c29ee75563fffb49c1dece05b1854e
-
Filesize
1.5MB
MD56e955e77535a4e3bf6c5176033e8bdd2
SHA15d2626b438ca9298ef5e33d9ba696241ec8666ff
SHA2565570a7d8113978ec69073550f478f4b092023de1dfc4cbc1bf86c24a81de7b4c
SHA51262eff301d672dd604a226194849cecb567fa150f4a007eb456b7d8fbf634293cbe9a2ea73e57cae36368ce2b174b2833b35b9387ccbb4c8faf03b5575c9cebdd
-
Filesize
832KB
MD50d90a0ba773a43519b34d084159bbc14
SHA1a2d094ebd67afcdea9a5b497a32d5ecaabf6e693
SHA256f2a7e9e90bbcd814f3589566966a788c2c346351c21feccf06ece2b99151a82f
SHA5128270746e68288d92a0f319abffffb3dacfaa3ae38e0196ff0cc7531ec091f368a51ddcc6c5cb14439dc268521151011aa6464068a9bfd69aa7e9b8c24569af1d
-
Filesize
704KB
MD5244df5e7fa5827d24cb2d3b807e1606e
SHA18a1d65eeb2d83e061470693fb036df427701aa55
SHA256b5b7588484cbb69db1487f73dd8d65812a7106d239c3db8a04fc17994e16ee41
SHA51237cd44e73768eff61c29ac7a7396be460882c982ba2a4e06b1678a1f627b4e98a8382cc6e3890ffad532732cb8bcb6fd7f33a8ce72539f77b1dd7597c57ca087
-
Filesize
1.2MB
MD59a1ac4b43850b6cc1cb95961f89967e1
SHA146edc29fed3677ac0cf35b68522c05fc431fada8
SHA2566332121f144a6a5f2de21bf664d07bb6b912450b27fa96db86a413d95cba65bb
SHA51248f2c013a683ca0fbb03394e1e0430a9ff3b98e8a249c375c9078c6addca3ea9a3110115ddfc33fc5ac38d2ea6e9c8238b722bf14f9d9d5db564073e6c1e4ece
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
40B
MD54a1b32afe5733facf7cde500f446cfd8
SHA1b9b29fb49b0601e88c8ae95df1e3e5e1317a8a27
SHA25686c10ea7a73c1d8e9efb2ddc63a4fc02b0ed7f3ae9474316b8a1aca102804094
SHA512fdca965f0349c0d16670a84ee7785965d70ff03cdd2a133a0e879991fc6b6b66a9ab63cd6158ef190098ed7e6e68726893aa1c52888b5e75364698250592ca86
-
Filesize
109KB
MD5726cd06231883a159ec1ce28dd538699
SHA1404897e6a133d255ad5a9c26ac6414d7134285a2
SHA25612fef2d5995d671ec0e91bdbdc91e2b0d3c90ed3a8b2b13ddaa8ad64727dcd46
SHA5129ea82e7cb6c6a58446bd5033855947c3e2d475d2910f2b941235e0b96aa08eec822d2dd17cc86b2d3fce930f78b799291992408e309a6c63e3011266810ea83e
-
Filesize
1.2MB
MD515a42d3e4579da615a384c717ab2109b
SHA122aeedeb2307b1370cdab70d6a6b6d2c13ad2301
SHA2563c97bb410e49b11af8116feb7240b7101e1967cae7538418c45c3d2e072e8103
SHA5121eb7f126dccc88a2479e3818c36120f5af3caa0d632b9ea803485ee6531d6e2a1fd0805b1c4364983d280df23ea5ca3ad4a5fca558ac436efae36af9b795c444
-
Filesize
109KB
MD5154c3f1334dd435f562672f2664fea6b
SHA151dd25e2ba98b8546de163b8f26e2972a90c2c79
SHA2565f431129f97f3d56929f1e5584819e091bd6c854d7e18503074737fc6d79e33f
SHA5121bca69bbcdb7ecd418769e9d4befc458f9f8e3cee81feb7316bb61e189e2904f4431e4cc7d291e179a5dec441b959d428d8e433f579036f763bbad6460222841
-
Filesize
1.2MB
MD5f35b671fda2603ec30ace10946f11a90
SHA1059ad6b06559d4db581b1879e709f32f80850872
SHA25683e3df5bec15d5333935bea8b719a6d677e2fb3dc1cf9e18e7b82fd0438285c7
SHA512b5fa27d08c64727cef7fdda5e68054a4359cd697df50d70d1d90da583195959a139066a6214531bbc5f20cd4f9bc1ca3e4244396547381291a6a1d2df9cf8705
-
Filesize
448KB
MD573843fa0154657d4b7e6db302678c8b7
SHA1602614c460144e6174384e928b44ea1bacd79d82
SHA256d9950fd93a1af569900a29357a66d07b6f000f40c4549351100c65fc4705d06b
SHA5127f578997a56abf1d3447c9361bccb6f4160e12a672f21db3bc2ad72b2b1aad57ded9d20c94c8f8dc1cb69db9fe61a8d54f40da375c22015b076e181013422d91
-
Filesize
256KB
MD5d5c8ad7b9ac4aba0205c4782099894f5
SHA10795949d3deafe6c7594c6f72c3e905c14635877
SHA256c21a3cae810028b44f2d7b546dae9d698cf27dc01afa9d1690df385f6bf46d50
SHA51239fd65175ca990d1f01807493808ec7c210d887740642e38cab92fa64fecdb87ac863f9a58ede8616ed390062047dc46c223a3b8539367289348ce7ca925830e
-
Filesize
1.8MB
MD583c7bec9bf079ddcba29db0525179e96
SHA12cff3a73fbd3e16467453abbb6c7eec6ae5f57a8
SHA256723dab28b312ecdace98a052a8e922a13ec015bef7507d5a3463ceec6f4ac4b2
SHA51255efa591e85fa3a2f1fefb4e147db53fb45968814ac0a009f7937fdb8777ffcff0e73f8367909dfbc4bcb816d7c90ab3f4efdde9bf5e3f2a71e946d40818c83e
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
1.6MB
MD50afb61fa5959c9ca954cb1896dff7d3c
SHA18e00ffdc69a387caf02f95e13bb3105ef21c8697
SHA25680bed08cadf44957821212cb9e8b7543d81830abb49329a6fe1246d27c3ed5e1
SHA51210f70d4b3d86869dcb88da92100928b469a97aec387b412bee8f40e64b1def0dce742eb76708f3f2ff615dd1332440ce2d216257b3a8ea459f2082933f8a01ee
-
Filesize
960KB
MD5a2799c77c56a13071b30261f026b2de2
SHA1607564cbc03c5ceadaeda1963c442f0408fea33f
SHA256a29d876718fa21632e132506622fecd32f717482f60ff28ca5515c1e6edf2bf1
SHA5125f7d0192759d57118a239fedf30fa1cf2694435f4b4228cbe89711eee4b67b1fc42176e805af85a7998d63ffe655b6724705580dfe91728ba3bae454c6080570
-
Filesize
448KB
MD568f59bc88e041113b18b45ae2892d9a8
SHA1a2432878d6834db3bd78ea1c4e4631a0e89abab5
SHA256b03d8079ea5fb92cfda789aada070362717862dbb08ea0dc33b5679a840c4a63
SHA5126e0f6aa34be0ce021dadf80664b1f780f7d832c6b1564d1b058d4b67de1936cfcc9995ce2071bb9b4190e7231007db6d73caffbd86a958e3329abf58824ef5b9
-
Filesize
896KB
MD5b0e80a8b06c2538322cf212f5842c440
SHA14879ff3b4c8b766ed33d7a4ea09724cc5f39346c
SHA256bc91e39e0b51649bfa879107151377268ce3b79ecb2b73356688fff9eaee2a61
SHA512014e08ab7e76b811dd75999348f12f96f8023db716e7a8a47019aa1d888b0595bffce29c3b3529f2b383b28fd763315a6e83becf821f11a8117c143278bed221
-
Filesize
768KB
MD5cc046d496f43fbdf3f776cdf4499d089
SHA1ad9184123968aeffe658231a532ca4f01b92284c
SHA256be04da447bb8f6cd89e3900fd670b54c0c1b273e694b98705e7e75a332ba5139
SHA512cd63604d2190639cdba5433be77c27a94868330ad908d6c27509fe59545ff87d8c29b7b07f8f0a36f01ffe97e0f49ff99c6ab83c753b36b4a19f051043007700
-
Filesize
576KB
MD50ea456954070fded0b59946e4f5ce152
SHA17774851643ced236c3460d32d21c8d5eef765a28
SHA256d83344d7c45357d75365e611fe484ee0d620ea9db1e9314fee7bdad979ac68a4
SHA512e9c1fecf5f41397448a3f80c6642a1c30588c9e8021c3d2bd471164a74514b7052718498c34b742ffd4b3cf2ef0d12a034b50695c5d186b06f4311a26057b9f6
-
Filesize
128KB
MD544250daae1893bbcc0635101e770e353
SHA18892bcd35102543061e7f76b0a74ce337b77c0e4
SHA25631367523f39953d879a2fa5b02bc2e10499e38546a8f6ec08c7e0f7fce0d5ea2
SHA512eb46e1561dfa08b3f32bd13ab5418cea14fc458d171ded69d4bc5bd9dfffe6a70c71f98876832a7b447cf7a176a4ab475956669a9036cafb8fe60f2d81abc80c
-
Filesize
7KB
MD55b423612b36cde7f2745455c5dd82577
SHA10187c7c80743b44e9e0c193e993294e3b969cc3d
SHA256e0840d2ea74a00dcc545d770b91d9d889e5a82c7bedf1b989e0a89db04685b09
SHA512c26a1e7e96dbd178d961c630abd8e564ef69532f386fb198eb20119a88ecab2fe885d71ac0c90687c18910ce00c445f352a5e8fbf5328f3403964f7c7802414c
-
Filesize
1.9MB
MD5736c55aaeb89878a6edaf95f895a5369
SHA1465dc58bf76b8c4cb0be2112a408b00b2e91c4cb
SHA256ad3d6c8439afeb13c79547bfd92d3f7c9180ac23b14605de3af645a8363afee4
SHA512ed4377734a24fccf41893d1a0e18091f8476fee60c04f43a33d8ba4f7d2ae3d3244af5d9683f6b0db7227b62c7bcd82ef3ffb9afbd81f662c25ec8106bd0c6e6
-
Filesize
896KB
MD5867b5dba63a2a5f6732da2cf957260ad
SHA14c9b408d10ae5005f0a989c59f1ca423d3f71219
SHA256cb96db841d5917fa434e09f63a6049716726b743ba95ca878239c792e5b1d1d3
SHA512eb204e7b23212355b465720ed895581ab87a297e79532a95bc265e3cac03db9c0738a7c08aa89233172b9b2eff59b97ebdfd085d392f8574a5b8d2fd66ee9d20
-
Filesize
320KB
MD5af491b2879fc40a4f9ad647481de6c68
SHA1f37e42941bede0260f3e613a0dd95a058eb06516
SHA25635d9f179818173a6462565a078413dfccd0301e4c3d4d3cc1b172eda93fe898d
SHA5125995b0c8c1f5da1d5b65d85cf7cc0851ad585d7189e36dfc08ca7b344754587d2e11a0036eed6cc051edb0dbb86909d0e748e24872b40ff7784a85f2e456f9e1
-
Filesize
192KB
MD53253a5c50eecf6f5758bbaa817e2b1eb
SHA1599e7773e1d33b37f69d1d8add7a17b40697740f
SHA2561ac75d47c9cd81b439f89d8d49a2d53beaafb9227b4d302a60209542709ea8db
SHA512510a5d88c9caaf8fb526fe1fea9573da57af7a670bd9be02527900c0507bfb1564dbee5549bf9e05cd126885864f5602e3503cf70826db7c5beb9701524e4522
-
Filesize
127B
MD58ef9853d1881c5fe4d681bfb31282a01
SHA1a05609065520e4b4e553784c566430ad9736f19f
SHA2569228f13d82c3dc96b957769f6081e5bac53cffca4ffde0ba1e102d9968f184a2
SHA5125ddee931a08cfea5bb9d1c36355d47155a24d617c2a11d08364ffc54e593064011dee4fea8ac5b67029cab515d3071f0ba0422bb76af492a3115272ba8feb005