Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1796s -
max time network
1799s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15/06/2024, 16:35
General
-
Target
OperaGXSetup.exe
-
Size
3.4MB
-
MD5
b96daab710a921a57577ec655644f218
-
SHA1
6e6aa81a463977e27a910565ba7311d98b5c6019
-
SHA256
ebd9ea05e2ba1f40d420da180063709967adf4f851c811ce2f0abf491c99cf29
-
SHA512
ccfd50d258569414b63c23cf0bb7fea1cb4e85263daa26050318e5ccdbb57431295c1b24acefd83db217283caed72c7f719e898cf80976f280098664fef167fc
-
SSDEEP
98304:lsnNu5qENvcys2iKVx2KVBok2aMoKySPFlH4+xDx0TJGw8oeu26N84:lm0qGdzboNPbH4UN76NL
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1868 OperaGXSetup.exe -
Loads dropped DLL 3 IoCs
pid Process 2256 OperaGXSetup.exe 1976 OperaGXSetup.exe 1868 OperaGXSetup.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2256-3-0x0000000000080000-0x0000000000663000-memory.dmp upx behavioral1/memory/1976-7-0x0000000000080000-0x0000000000663000-memory.dmp upx behavioral1/files/0x000700000002340e-13.dat upx behavioral1/memory/1868-15-0x0000000000120000-0x0000000000703000-memory.dmp upx behavioral1/memory/1868-20-0x0000000000120000-0x0000000000703000-memory.dmp upx behavioral1/memory/1976-23-0x0000000000080000-0x0000000000663000-memory.dmp upx -
Enumerates connected drives 3 TTPs 2 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\D: OperaGXSetup.exe File opened (read-only) \??\F: OperaGXSetup.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2256 OperaGXSetup.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2256 wrote to memory of 1976 2256 OperaGXSetup.exe 82 PID 2256 wrote to memory of 1976 2256 OperaGXSetup.exe 82 PID 2256 wrote to memory of 1976 2256 OperaGXSetup.exe 82 PID 2256 wrote to memory of 1868 2256 OperaGXSetup.exe 85 PID 2256 wrote to memory of 1868 2256 OperaGXSetup.exe 85 PID 2256 wrote to memory of 1868 2256 OperaGXSetup.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\OperaGXSetup.exe"C:\Users\Admin\AppData\Local\Temp\OperaGXSetup.exe"1⤵
- Loads dropped DLL
- Enumerates connected drives
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Users\Admin\AppData\Local\Temp\OperaGXSetup.exeC:\Users\Admin\AppData\Local\Temp\OperaGXSetup.exe --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera GX Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera GX Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktopGX --annotation=ver=96.0.4693.59 --initial-client-data=0x2f4,0x2f8,0x2fc,0x2c8,0x300,0x751764b0,0x751764c0,0x751764cc2⤵
- Loads dropped DLL
PID:1976
-
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera GX Installer Temp\OperaGXSetup.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera GX Installer Temp\OperaGXSetup.exe" --version2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1868
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.4MB
MD5b96daab710a921a57577ec655644f218
SHA16e6aa81a463977e27a910565ba7311d98b5c6019
SHA256ebd9ea05e2ba1f40d420da180063709967adf4f851c811ce2f0abf491c99cf29
SHA512ccfd50d258569414b63c23cf0bb7fea1cb4e85263daa26050318e5ccdbb57431295c1b24acefd83db217283caed72c7f719e898cf80976f280098664fef167fc
-
Filesize
5.3MB
MD5f98d55e0edb2877478545624674864f1
SHA1cd8df75c33c7f8fce64da869ceabfd7d65c71cc2
SHA2564b42a530d4a22f3d7a34e816908738096ea0a91137beb96c6b3f4798f5c7ceab
SHA5123fbed3d9b802edadf24d3d2c0a77f9f6224cea7a845d13dd2982909346451dc2db09f2b513b04a66ae71c685117da640319a87a5c321e49c340149da586b33e0