General
-
Target
OperaGXSetup.exe
-
Size
6.3MB
-
Sample
240722-w151ja1emm
-
MD5
31de348d7c53bd31503b52ff02a91275
-
SHA1
ef423540e6d7d6bce77b035e179086afb85bd28d
-
SHA256
126e6e665261c5cba9c187d74e9bd7c3fe4eec7c4446c55ee83fb6cc2e300513
-
SHA512
c15b6eb22c6d00c8e2a940c1258441b66ad83cf88286a46fc5c6581b319fb12bef13e6340629c5fa6bd4632e7c833aebf3429f1e0dbbc08a2ce3abef78e09e56
-
SSDEEP
196608:VkDKFfRYtPz8Z3x0GHBOik8DXVnO38fXS65VkmSsLAZNAdIhqx89/DRt5/pnp2zC:SDKFfRYtPz8Z3xNHBOik8DXVnO38fXS5
Static task
static1
Behavioral task
behavioral1
Sample
OperaGXSetup.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral2
Sample
OperaGXSetup.exe
Resource
win11-20240709-en
Malware Config
Targets
-
-
Target
OperaGXSetup.exe
-
Size
6.3MB
-
MD5
31de348d7c53bd31503b52ff02a91275
-
SHA1
ef423540e6d7d6bce77b035e179086afb85bd28d
-
SHA256
126e6e665261c5cba9c187d74e9bd7c3fe4eec7c4446c55ee83fb6cc2e300513
-
SHA512
c15b6eb22c6d00c8e2a940c1258441b66ad83cf88286a46fc5c6581b319fb12bef13e6340629c5fa6bd4632e7c833aebf3429f1e0dbbc08a2ce3abef78e09e56
-
SSDEEP
196608:VkDKFfRYtPz8Z3x0GHBOik8DXVnO38fXS65VkmSsLAZNAdIhqx89/DRt5/pnp2zC:SDKFfRYtPz8Z3xNHBOik8DXVnO38fXS5
-
Downloads MZ/PE file
-
Event Triggered Execution: Image File Execution Options Injection
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Checks system information in the registry
System information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
2Component Object Model Hijacking
1Image File Execution Options Injection
1Privilege Escalation
Event Triggered Execution
2Component Object Model Hijacking
1Image File Execution Options Injection
1Defense Evasion
Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1