Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
26-08-2024 00:59
Static task
static1
Behavioral task
behavioral1
Sample
cf44098105f2f61c3b1e3589f52d28fc2f52537d74480afc649dbb2621474298.exe
Resource
win7-20240704-en
General
-
Target
cf44098105f2f61c3b1e3589f52d28fc2f52537d74480afc649dbb2621474298.exe
-
Size
2.0MB
-
MD5
4e7e93305dce2e2413996310401f049c
-
SHA1
1f4cf694215bb527fc2f3e826e39c34c38e3ae2b
-
SHA256
cf44098105f2f61c3b1e3589f52d28fc2f52537d74480afc649dbb2621474298
-
SHA512
208dd68d7aef7170b4f8d0d35f0cec7e13d7c69f2782183669acaca4a5011f18ac92bb9bdbe9b6a1f89cd39a12673ec98e9c97b880e0d7de05749a392b9cd5e0
-
SSDEEP
49152:pVAbwUQUFD1VR+zbTPDyoW53zJJfvRCYd60p9e9bldMi:fACQZGbo1HRCYd6b9x+
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 6 IoCs
pid Process 4804 setup.exe 1080 setup.exe 4136 setup.exe 4544 Assistant_113.0.5230.31_Setup.exe_sfx.exe 2096 assistant_installer.exe 2536 assistant_installer.exe -
Loads dropped DLL 7 IoCs
pid Process 4804 setup.exe 1080 setup.exe 4136 setup.exe 2096 assistant_installer.exe 2096 assistant_installer.exe 2536 assistant_installer.exe 2536 assistant_installer.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 2 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\D: setup.exe File opened (read-only) \??\F: setup.exe -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Assistant_113.0.5230.31_Setup.exe_sfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language assistant_installer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language assistant_installer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cf44098105f2f61c3b1e3589f52d28fc2f52537d74480afc649dbb2621474298.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4 setup.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 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 setup.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 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 setup.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4804 setup.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4908 wrote to memory of 4804 4908 cf44098105f2f61c3b1e3589f52d28fc2f52537d74480afc649dbb2621474298.exe 84 PID 4908 wrote to memory of 4804 4908 cf44098105f2f61c3b1e3589f52d28fc2f52537d74480afc649dbb2621474298.exe 84 PID 4908 wrote to memory of 4804 4908 cf44098105f2f61c3b1e3589f52d28fc2f52537d74480afc649dbb2621474298.exe 84 PID 4804 wrote to memory of 1080 4804 setup.exe 86 PID 4804 wrote to memory of 1080 4804 setup.exe 86 PID 4804 wrote to memory of 1080 4804 setup.exe 86 PID 4804 wrote to memory of 4136 4804 setup.exe 89 PID 4804 wrote to memory of 4136 4804 setup.exe 89 PID 4804 wrote to memory of 4136 4804 setup.exe 89 PID 4804 wrote to memory of 4544 4804 setup.exe 101 PID 4804 wrote to memory of 4544 4804 setup.exe 101 PID 4804 wrote to memory of 4544 4804 setup.exe 101 PID 4804 wrote to memory of 2096 4804 setup.exe 102 PID 4804 wrote to memory of 2096 4804 setup.exe 102 PID 4804 wrote to memory of 2096 4804 setup.exe 102 PID 2096 wrote to memory of 2536 2096 assistant_installer.exe 103 PID 2096 wrote to memory of 2536 2096 assistant_installer.exe 103 PID 2096 wrote to memory of 2536 2096 assistant_installer.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\cf44098105f2f61c3b1e3589f52d28fc2f52537d74480afc649dbb2621474298.exe"C:\Users\Admin\AppData\Local\Temp\cf44098105f2f61c3b1e3589f52d28fc2f52537d74480afc649dbb2621474298.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Users\Admin\AppData\Local\Temp\7zSC2384197\setup.exeC:\Users\Admin\AppData\Local\Temp\7zSC2384197\setup.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Users\Admin\AppData\Local\Temp\7zSC2384197\setup.exeC:\Users\Admin\AppData\Local\Temp\7zSC2384197\setup.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector-2.opera.com/ --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=113.0.5230.32 --initial-client-data=0x330,0x334,0x338,0x32c,0x33c,0x749eae8c,0x749eae98,0x749eaea43⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1080
-
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\setup.exe" --version3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4136
-
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202408260059581\assistant\Assistant_113.0.5230.31_Setup.exe_sfx.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202408260059581\assistant\Assistant_113.0.5230.31_Setup.exe_sfx.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4544
-
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202408260059581\assistant\assistant_installer.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202408260059581\assistant\assistant_installer.exe" --version3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202408260059581\assistant\assistant_installer.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202408260059581\assistant\assistant_installer.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector-2.opera.com/ --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=113.0.5230.31 --initial-client-data=0x220,0x224,0x228,0x1fc,0x22c,0xf02c48,0xf02c54,0xf02c604⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2536
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\NUB8HZ4Z\Assistant_113.0.5230.31_Setup[1].exe
Filesize2.6MB
MD50995a010e2f8b866c6abca90fa49130f
SHA1f282871f9d6333f5bcc738062613c44567a58dc0
SHA25674d4c26b0ee35a7431944e51aaf5ec4ab3338b6776bf44bdfdbc1e201b4fea76
SHA512b98e4bd252a9bdb11a7f15c795910daabdbe8e0ba0fa86a5ee6f8167ff66a9b67790c51f700666239781ad46241926590588b6831d16e5057dcbfebe37c3ae6b
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202408260059581\assistant\assistant_installer.exe
Filesize1.9MB
MD51d980ac7aa07def69627a334168853f9
SHA1c4b6a91eb61eb1a946b922ceef9aea86dde79eb5
SHA256a08d4c13a57600c280d10aa2d0c5c13352638b6ac38651aa908af1c0ec351807
SHA512e8f7afb5299d627d67f6656f71006f60c1dbaa535175ff935d2934197e2ed5faca0f9d64897695965deeeea7612a4229bf117a8243a3b5de902a001d4e91797b
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202408260059581\assistant\dbgcore.dll
Filesize166KB
MD598d373f7e891c8282b7a163880ffff55
SHA1a84b5607aebd38833a96ee46b33f2d1b748e6ea0
SHA25667bce323f46300c83866e02b1a3923b93834e30741999b965b351531073e8f2b
SHA512b417629c5276ed942578273af5d2de4ab35fdb1cec102b47999b0b54d50c98d0ec36e8fca01db8c6f9fc4dc6aa130fef916fe07d131586c84f4a75bb589bb927
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202408260059581\assistant\dbghelp.dll
Filesize1.7MB
MD549c70bed12c523235e2e154326b1a8f0
SHA14a011c6909ea9c08357dd4bebdd62f8b3bfab8dd
SHA25627251f799e2d950c561fda99c07ff49553c1d538ccd544bcd1ee12820eed5cd5
SHA5121553f9ddbb95603d82c01668320a128766ba8b039ee127f86a2008de222e9390b4d8b7153443444790c946b40742b85625fbc422e81073a353e9e434cc56eba3
-
Filesize
5.1MB
MD596be1b5fb15ec0912b8de6133d283180
SHA186d5f8af9018f27045389a48a66dffa7e1f8daf1
SHA25604eead61515be0515643281aa8f29809facddd419c5bc06450d031d64e60461c
SHA512c649720a6ac4409b32663f9987aca971e1475b7e30c2b7c2c31467a1214228f8d93f154580b0436933f86f998e8079d0df7e2f67b20adfa2aaaaff075a16ed32
-
Filesize
4.6MB
MD5b84992e5212817c964aa64b35dbf0ac6
SHA19361bf7b334f06ee3b3fd0770bf8dea0c2518146
SHA256a3a7dab81491b07cda3d6c5d8ed1655c9b39c6db01a532d7d429b2f0aece3fc8
SHA5129b61ab193514505c64fdad8b7457bec96ae7af1835a16d60f781e1240d29f20fa72479d395e3ff45f42197ffc82e96eac107f9d19ef3274efaddd71ee66ba2a4
-
Filesize
40B
MD56475b4a3cef251585bd83efffc27f0ae
SHA1f36162332b91e1df3f84472bacd97fce46f06151
SHA256f9d840c160c308dafc1774794e3a040c1670c30be0841b34e69fd33526ba6774
SHA512a077b540a0bf6f3f4ebb9d0b0bfe6eec84c810b1634b6592906d544f2c305a7d0cc406b2037cc8fcbefd144f92f6c777fd453a3f7b515af78348e781af1b4b07