Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
10/10/2024, 16:18
Static task
static1
Behavioral task
behavioral1
Sample
OperaSetup.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
OperaSetup.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
OperaSetup.exe
Resource
win10v2004-20241007-en
General
-
Target
OperaSetup.exe
-
Size
2.1MB
-
MD5
46252fe1a6423fbbd272b168d98c00ba
-
SHA1
fd4ede984fea0e0a15f1b03ec1ee7aa7393903cd
-
SHA256
dc074ad6fcb6a29b76b8da45c84ecb811c3ddcd662d93ec69f0929578c267383
-
SHA512
ac68428d96d606d87d83f22e31585d3944e83f7cf90a101d685867970d2a6a6df54e6f84daffafb04e7f38bfeb61001291178c30cbfe0ae926995b27045d9592
-
SSDEEP
49152:RVAbwC95j527tIqUxHzKHhDLsRikQUTsoUq8IcgXzNGLRg9x:3AM7tqxTKHnqsoUq8ajzx
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1932 setup.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language OperaSetup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\OperaSetup.exe"C:\Users\Admin\AppData\Local\Temp\OperaSetup.exe"1⤵
- System Location Discovery: System Language Discovery
PID:1952 -
C:\Users\Admin\AppData\Local\Temp\7zS0A7B3C86\setup.exeC:\Users\Admin\AppData\Local\Temp\7zS0A7B3C86\setup.exe --server-tracking-blob=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⤵
- Executes dropped EXE
PID:1932
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.3MB
MD5d2b32d2ca95b09c440db5f37788a3829
SHA1d0f5f06b9050ee2cc9202e6eae18349ab1257d70
SHA2566cab004538645353524008c307f897f76a1b46282ea6761cc88fdd4b6fe3e9ca
SHA512cc091d48ff9abf5add640bfdf99148b466cfded3cafc8451f87cf3723fd4b7f096e4b518216fbf7482f34167dc8deea5de251fe369bccd28ce2bf56b09163a86