ChromeMain
Static task
static1
Behavioral task
behavioral1
Sample
#/#/#/#/#/#/#/#/opera_browser.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
#/#/#/#/#/#/#/#/opera_browser.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
#/#/#/#/#/#/#/#/test.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
#/#/#/#/#/#/#/#/test.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
Predlog termina zvanicne posjete zamjenice predsjedavajuceg Vijeca ministara i ministarke vanjskih poslova BiH.pdf.lnk
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
Predlog termina zvanicne posjete zamjenice predsjedavajuceg Vijeca ministara i ministarke vanjskih poslova BiH.pdf.lnk
Resource
win10v2004-20240226-en
General
-
Target
4cd7d84e464a2786446df623629aa7e2e6c776c9a870278eb39b54c5fba05044
-
Size
570KB
-
MD5
c285eaea0fe441f550479f7ef85a3dd0
-
SHA1
41d61af1d61d6e1c4718132e64268005ce362b36
-
SHA256
4cd7d84e464a2786446df623629aa7e2e6c776c9a870278eb39b54c5fba05044
-
SHA512
d690def7d3f84262112d823cd195a6eb9eda5a86723d466c6f4f38954dd93d97e495750e4e7cb5dfea1c9324a600d831f0646c54580915c14fb194cb9313a315
-
SSDEEP
12288:HNSmrcURq1FjrOBN1UIlrBnJEU1jiw7m7ZIERI4RSJvxvylFAHxVVXY+vxP:HNKURqzO31/XJEYFuna4Y34qVXY+vxP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/#/#/#/#/#/#/#/#/opera_browser.dll
Files
-
4cd7d84e464a2786446df623629aa7e2e6c776c9a870278eb39b54c5fba05044.rar
-
#/#/#/#/#/#/#/#/operaDB.dat
-
#/#/#/#/#/#/#/#/opera_browser.dll.dll windows:6 windows x86 arch:x86
fdb3870ee19b555101bfac048b94e1bb
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetProcAddress
CloseHandle
WriteConsoleW
GetCommandLineA
GetCurrentThreadId
IsDebuggerPresent
IsProcessorFeaturePresent
EncodePointer
DecodePointer
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetLastError
SetLastError
MultiByteToWideChar
HeapAlloc
RaiseException
ExitProcess
GetModuleHandleExW
WideCharToMultiByte
GetProcessHeap
GetStdHandle
GetFileType
DeleteCriticalSection
GetStartupInfoW
GetModuleFileNameA
HeapFree
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
Sleep
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
EnterCriticalSection
LeaveCriticalSection
GetStringTypeW
LCMapStringW
WriteFile
GetModuleFileNameW
LoadLibraryExW
RtlUnwind
HeapReAlloc
OutputDebugStringW
HeapSize
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetStdHandle
SetFilePointerEx
CreateFileW
user32
wsprintfW
Exports
Exports
Sections
.text Size: 86KB - Virtual size: 86KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
#/#/#/#/#/#/#/#/test.bpl.exe windows:5 windows x86 arch:x86
10ef7b64e487e6ba3481006debbbf7b2
Code Sign
0f:de:84:f0:d5:5d:8d:33:68:32:5d:c0:cd:c4:a9:79Certificate
IssuerCN=DigiCert EV Code Signing CA (SHA2),OU=www.digicert.com,O=DigiCert Inc,C=USNot Before23/06/2016, 00:00Not After27/06/2019, 12:00SubjectSERIALNUMBER=916 368 127,CN=Opera Software AS,O=Opera Software AS,POSTALCODE=NO-0484,STREET=Gjerdrums vei 19,L=Oslo,ST=Oslo,C=NO,1.3.6.1.4.1.311.60.2.1.3=#13024e4f,2.5.4.15=#131450726976617465204f7267616e697a6174696f6eExtended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
03:f1:b4:e1:5f:3a:82:f1:14:96:78:b3:d7:d8:47:5cCertificate
IssuerCN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O=DigiCert Inc,C=USNot Before18/04/2012, 12:00Not After18/04/2027, 12:00SubjectCN=DigiCert EV Code Signing CA (SHA2),OU=www.digicert.com,O=DigiCert Inc,C=USExtended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
09:c0:fc:46:c8:04:42:13:b5:59:8b:af:28:4f:4e:41Certificate
IssuerCN=DigiCert SHA2 Assured ID Timestamping CA,OU=www.digicert.com,O=DigiCert Inc,C=USNot Before04/01/2017, 00:00Not After18/01/2028, 00:00SubjectCN=DigiCert SHA2 Timestamp Responder,O=DigiCert,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
0a:a1:25:d6:d6:32:1b:7e:41:e4:05:da:36:97:c2:15Certificate
IssuerCN=DigiCert Assured ID Root CA,OU=www.digicert.com,O=DigiCert Inc,C=USNot Before07/01/2016, 12:00Not After07/01/2031, 12:00SubjectCN=DigiCert SHA2 Assured ID Timestamping CA,OU=www.digicert.com,O=DigiCert Inc,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
35:f1:a7:fc:df:0f:3b:fe:aa:44:ea:0a:57:9e:65:59:1f:ae:f8:d5:bb:24:a6:6a:36:c6:ae:9f:27:4a:82:ddSigner
Actual PE Digest35:f1:a7:fc:df:0f:3b:fe:aa:44:ea:0a:57:9e:65:59:1f:ae:f8:d5:bb:24:a6:6a:36:c6:ae:9f:27:4a:82:ddDigest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
C:\buildbot\slave\workdir\repos\opera\chromium\src\out\Release\opera.exe.pdb
Imports
advapi32
OpenProcessToken
GetTokenInformation
ConvertSidToStringSidW
RegCreateKeyExW
RegOpenKeyExW
RegCloseKey
RegQueryValueExW
SystemFunction036
EventRegister
EventUnregister
EventWrite
RevertToSelf
RegDisablePredefinedCache
ConvertStringSecurityDescriptorToSecurityDescriptorW
GetSecurityDescriptorSacl
SetSecurityInfo
ConvertStringSidToSidW
GetLengthSid
SetTokenInformation
GetKernelObjectSecurity
GetAce
SetKernelObjectSecurity
DuplicateTokenEx
EqualSid
CreateProcessAsUserW
SetThreadToken
CreateRestrictedToken
DuplicateToken
LookupPrivilegeValueW
CopySid
CreateWellKnownSid
GetSecurityInfo
SetEntriesInAclW
kernel32
WriteConsoleW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
IsValidCodePage
LoadLibraryExW
GetProcAddress
VirtualAlloc
VirtualFree
GetCommandLineW
LocalFree
GetSystemTimeAsFileTime
ReleaseSRWLockExclusive
QueryPerformanceFrequency
QueryPerformanceCounter
QueryThreadCycleTime
GetCurrentThread
GetThreadPriority
SetThreadPriority
Sleep
GetModuleHandleW
GetCurrentProcess
GetLastError
SetLastError
CloseHandle
CreateFileW
GetCurrentDirectoryW
GetModuleFileNameW
GetCurrentProcessId
GetLocalTime
GetTickCount
FormatMessageA
OutputDebugStringA
WriteFile
SetFilePointerEx
ReadFile
DuplicateHandle
FlushFileBuffers
TryAcquireSRWLockExclusive
AcquireSRWLockExclusive
GetCurrentThreadId
IsDebuggerPresent
RaiseException
CreateThread
GetThreadId
WaitForSingleObject
HeapCreate
HeapDestroy
GetVersionExW
GetNativeSystemInfo
GetHandleInformation
CreateEventW
GetModuleHandleA
GetFileAttributesW
GetTempPathW
GetLongPathNameW
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
QueryDosDeviceW
GetSystemDirectoryW
GetWindowsDirectoryW
GetModuleHandleExW
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetUserDefaultLangID
TlsGetValue
WideCharToMultiByte
MultiByteToWideChar
UnregisterWaitEx
RegisterWaitForSingleObject
FreeLibrary
VirtualQuery
TerminateProcess
FindClose
FindNextFileW
FindFirstFileExW
SetEnvironmentVariableW
GetEnvironmentVariableW
SetUnhandledExceptionFilter
RtlCaptureStackBackTrace
TlsAlloc
TlsFree
TlsSetValue
HeapSetInformation
GetProcessTimes
VirtualQueryEx
SwitchToThread
SleepConditionVariableSRW
WakeAllConditionVariable
WakeConditionVariable
ResetEvent
SetEvent
CreateIoCompletionPort
PostQueuedCompletionStatus
SetInformationJobObject
GetQueuedCompletionStatus
VirtualAllocEx
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
TerminateJobObject
DeleteCriticalSection
GetUserDefaultLCID
ProcessIdToSessionId
GetFileType
SetHandleInformation
AssignProcessToJobObject
WriteProcessMemory
GetProcessHandleCount
GetProcessHeaps
SignalObjectAndWait
VirtualProtectEx
ReadProcessMemory
VirtualFreeEx
CreateNamedPipeW
CreateProcessW
CreateRemoteThread
CreateJobObjectW
CreateMutexW
SearchPathW
lstrlenW
DebugBreak
ReadConsoleW
GetDriveTypeW
EnumSystemLocalesW
IsValidLocale
GetACP
GetStdHandle
SetStdHandle
GetFullPathNameW
ExitProcess
GetConsoleMode
GetConsoleCP
RtlUnwind
GetCPInfo
GetStringTypeW
GetLocaleInfoW
LCMapStringW
DecodePointer
EncodePointer
InitializeCriticalSectionAndSpinCount
InitializeSListHead
GetStartupInfoW
IsProcessorFeaturePresent
UnhandledExceptionFilter
WaitForSingleObjectEx
ole32
CoUninitialize
CoTaskMemFree
CoInitializeEx
psapi
QueryWorkingSetEx
shell32
CommandLineToArgvW
SHGetFolderPathW
SHGetKnownFolderPath
user32
CloseWindowStation
CloseDesktop
UnregisterClassW
DefWindowProcW
SetWindowLongW
GetWindowLongW
GetUserObjectInformationW
CreateDesktopW
CreateWindowExW
SetProcessWindowStation
DispatchMessageW
TranslateMessage
PostQuitMessage
MsgWaitForMultipleObjectsEx
GetQueueStatus
PeekMessageW
SetTimer
PostMessageW
KillTimer
SetProcessDPIAware
GetProcessWindowStation
GetThreadDesktop
DestroyWindow
CreateWindowStationW
RegisterClassExW
winmm
timeEndPeriod
timeBeginPeriod
timeGetTime
Exports
Exports
GetHandleVerifier
IsSandboxedProcess
Sections
.text Size: 510KB - Virtual size: 509KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 160KB - Virtual size: 160KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 165KB - Virtual size: 165KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 23KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
Predlog termina zvanicne posjete zamjenice predsjedavajuceg Vijeca ministara i ministarke vanjskih poslova BiH.pdf.lnk.lnk