Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    01-09-2024 12:08

General

  • Target

    OperaGXSetup.exe

  • Size

    3.1MB

  • MD5

    d0a52431bff2b2876660ff3cdc90987f

  • SHA1

    28f77e74a38592729a072a8233da9820ba67b0fe

  • SHA256

    cc89c6df453fd0454d55b6a785d6b5a648f0775263438f98c3949c34a6c30602

  • SHA512

    43851d0171c5e955a51655ab2ebd48c80125a38d672c5b1ec9a4e7d2bc034893405938fc1bc86981146662186ca17c661c2e60ab3d3f71aa3f0c72fed2bc460e

  • SSDEEP

    98304:xAcRTd/kggQSwydThBmnXodHG+z92I0xkZV8zDzSCn:JRTFkg3SwyhsXoRG+zAkZCzDz/n

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\OperaGXSetup.exe
    "C:\Users\Admin\AppData\Local\Temp\OperaGXSetup.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2556
    • C:\Users\Admin\AppData\Local\Temp\7zSCF987DB6\setup.exe
      C:\Users\Admin\AppData\Local\Temp\7zSCF987DB6\setup.exe --server-tracking-blob=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
      2⤵
      • Executes dropped EXE
      PID:2180

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\7zSCF987DB6\setup.exe

    Filesize

    6.4MB

    MD5

    b4da1657d31832c9965d54c5037a3402

    SHA1

    c312863d621b0b5ec9ec930b1db73de3c95f7141

    SHA256

    563fcd4ca2678ddb6c1366c92aa4daa410d7eba73d68d9336fb967f732770c8d

    SHA512

    643d2ec57767443e0efcc580a0e5abe062375f34b936daa22aa24e20d837b84854de18f636dc0ca5d100b4309a456746d733a65f8d1ccb173fe590ab5bf99007