Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
01-09-2024 12:08
Static task
static1
Behavioral task
behavioral1
Sample
OperaGXSetup.exe
Resource
win7-20240704-en
General
-
Target
OperaGXSetup.exe
-
Size
3.1MB
-
MD5
d0a52431bff2b2876660ff3cdc90987f
-
SHA1
28f77e74a38592729a072a8233da9820ba67b0fe
-
SHA256
cc89c6df453fd0454d55b6a785d6b5a648f0775263438f98c3949c34a6c30602
-
SHA512
43851d0171c5e955a51655ab2ebd48c80125a38d672c5b1ec9a4e7d2bc034893405938fc1bc86981146662186ca17c661c2e60ab3d3f71aa3f0c72fed2bc460e
-
SSDEEP
98304:xAcRTd/kggQSwydThBmnXodHG+z92I0xkZV8zDzSCn:JRTFkg3SwyhsXoRG+zAkZCzDz/n
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2180 setup.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language OperaGXSetup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\OperaGXSetup.exe"C:\Users\Admin\AppData\Local\Temp\OperaGXSetup.exe"1⤵
- System Location Discovery: System Language Discovery
PID:2556 -
C:\Users\Admin\AppData\Local\Temp\7zSCF987DB6\setup.exeC:\Users\Admin\AppData\Local\Temp\7zSCF987DB6\setup.exe --server-tracking-blob=ZTBmMDBhNmIwZGM4NzIwODNiNzcwNWZhZGM2OGVhMWExODc3MWE4ZGNjM2Y5M2Q2YTk5MWUzNDg3MzEwYThjYjp7ImNvdW50cnkiOiJHQiIsImVkaXRpb24iOiJzdGQtMiIsImh0dHBfcmVmZXJyZXIiOiJodHRwczovL3d3dy5vcGVyYS5jb20vIiwiaW5zdGFsbGVyX25hbWUiOiJPcGVyYUdYU2V0dXAuZXhlIiwicHJvZHVjdCI6Im9wZXJhX2d4IiwicXVlcnkiOiIvb3BlcmFfZ3gvc3RhYmxlL3dpbmRvd3M/ZWRpdGlvbj1zdGQtMiZ1dG1fc291cmNlPVBXTmdhbWVzJnV0bV9tZWRpdW09cGEmdXRtX2NhbXBhaWduPVBXTl9HQl9YVlJfMTMwNCZlZGl0aW9uPXN0ZC0yJnV0bV9jb250ZW50PTEzMDRfMjM4NDkwNDU1ODA0MzA1NjYmdXRtX2lkPWZmM2NkNzYzMjgxYzQ3OWM4YTJmYjY3NDU0MTQ2YWJhJmh0dHBfcmVmZXJyZXI9aHR0cHMlM0ElMkYlMkZ3d3cub3BlcmEuY29tJTJGZ3glM0Z1dG1fc291cmNlJTNEUFdOZ2FtZXMlMjZ1dG1fbWVkaXVtJTNEcGElMjZ1dG1fY2FtcGFpZ24lM0RQV05fR0JfWFZSXzEzMDQlMjZ1dG1fY29udGVudCUzRDEzMDRfMjM4NDkwNDU1ODA0MzA1NjYlMjZ1dG1faWQlM0RmZjNjZDc2MzI4MWM0NzljOGEyZmI2NzQ1NDE0NmFiYSUyNmVkaXRpb24lM0RzdGQtMiZ1dG1fc2l0ZT1vcGVyYV9jb20mdXRtX2xhc3RwYWdlPW9wZXJhLmNvbSUyRiZ1dG1faWQ9ZmYzY2Q3NjMyODFjNDc5YzhhMmZiNjc0NTQxNDZhYmEmZGxfdG9rZW49NjY4OTU0OTkiLCJ0aW1lc3RhbXAiOiIxNzI1MTkyNDcyLjk1NjUiLCJ1c2VyYWdlbnQiOiJNb3ppbGxhLzUuMCAoV2luZG93cyBOVCAxMC4wOyBXaW42NDsgeDY0KSBBcHBsZVdlYktpdC81MzcuMzYgKEtIVE1MLCBsaWtlIEdlY2tvKSBDaHJvbWUvMTI4LjAuMC4wIFNhZmFyaS81MzcuMzYiLCJ1dG0iOnsiY2FtcGFpZ24iOiJQV05fR0JfWFZSXzEzMDQiLCJjb250ZW50IjoiMTMwNF8yMzg0OTA0NTU4MDQzMDU2NiIsImlkIjoiZmYzY2Q3NjMyODFjNDc5YzhhMmZiNjc0NTQxNDZhYmEiLCJsYXN0cGFnZSI6Im9wZXJhLmNvbS8iLCJtZWRpdW0iOiJwYSIsInNpdGUiOiJvcGVyYV9jb20iLCJzb3VyY2UiOiJQV05nYW1lcyJ9LCJ1dWlkIjoiOTFjNzkzZWEtN2I4MC00MDM0LWFjMmQtZjliYmM3ZjdhNzViIn0=2⤵
- Executes dropped EXE
PID:2180
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.4MB
MD5b4da1657d31832c9965d54c5037a3402
SHA1c312863d621b0b5ec9ec930b1db73de3c95f7141
SHA256563fcd4ca2678ddb6c1366c92aa4daa410d7eba73d68d9336fb967f732770c8d
SHA512643d2ec57767443e0efcc580a0e5abe062375f34b936daa22aa24e20d837b84854de18f636dc0ca5d100b4309a456746d733a65f8d1ccb173fe590ab5bf99007