analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
URL:

https://dood.la/e/o51w9lakja1o

Full analysis: https://app.any.run/tasks/450021c6-0028-45eb-84c2-229bb8960b78
Verdict: Malicious activity
Analysis date: August 12, 2022, 19:08:54
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

77B3021966996E1F7540C7C32A9E79DA

SHA1:

5BD734F6B64FC7A0AAFAF401D00FB850E4AC7512

SHA256:

BA7AE07AFB0366299E1F81630440F57323EDCB826D2B45CFD6B1E484D71A3DA5

SSDEEP:

3:N8SAJ8Rkn:2Ssukn

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    No suspicious indicators.
  • INFO

    • Reads the date of Windows installation

      • opera.exe (PID: 3120)
    • Checks supported languages

      • opera.exe (PID: 3120)
    • Check for Java to be installed

      • opera.exe (PID: 3120)
    • Reads the computer name

      • opera.exe (PID: 3120)
    • Dropped object may contain Bitcoin addresses

      • opera.exe (PID: 3120)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
33
Monitored processes
1
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start opera.exe

Process information

PID
CMD
Path
Indicators
Parent process
3120"C:\Program Files\Opera\opera.exe" "https://dood.la/e/o51w9lakja1o"C:\Program Files\Opera\opera.exe
Explorer.EXE
User:
admin
Company:
Opera Software
Integrity Level:
MEDIUM
Description:
Opera Internet Browser
Version:
1748
Modules
Images
c:\program files\opera\opera.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\psapi.dll
c:\windows\system32\wintrust.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msasn1.dll
c:\windows\system32\rpcrt4.dll
Total events
1 074
Read events
1 015
Write events
59
Delete events
0

Modification events

(PID) Process:(3120) opera.exeKey:HKEY_CURRENT_USER\Software\Opera Software
Operation:writeName:Last CommandLine v2
Value:
C:\Program Files\Opera\opera.exe "https://dood.la/e/o51w9lakja1o"
(PID) Process:(3120) opera.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\16C\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
Executable files
0
Suspicious files
15
Text files
26
Unknown types
20

Dropped files

PID
Process
Filename
Type
3120opera.exeC:\Users\admin\AppData\Roaming\Opera\Opera\operaprefs.initext
MD5:A9148DBBE6EC6FA1A9EB268BCAA17E84
SHA256:E5A40D85E0DBB5C62FEA8FE72B7C62873C3BF3D59B27374ECCCD92FD9BEF7692
3120opera.exeC:\Users\admin\AppData\Roaming\Opera\Opera\tasks.xmlxml
MD5:D23C20D9212AA3737336C0A039E50B24
SHA256:40EB54E56B6F93AB976FC7BD900B1E1FA72066B28A3979D4BEEDAE432ABCF08D
3120opera.exeC:\Users\admin\AppData\Roaming\Opera\Opera\opr4734.tmptext
MD5:A9148DBBE6EC6FA1A9EB268BCAA17E84
SHA256:E5A40D85E0DBB5C62FEA8FE72B7C62873C3BF3D59B27374ECCCD92FD9BEF7692
3120opera.exeC:\Users\admin\AppData\Roaming\Opera\Opera\sessions\opr6A6E.tmptext
MD5:689F0DB0BC60F42842AC211661CDD81F
SHA256:B5735686168DD2DC07FC771605028BC87654D9A6ADBF82F05A61458F95941C46
3120opera.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\A9PNW8YFUDQ0GZIRJ10D.tempbinary
MD5:3F7590FD56AC999E0289444034C9CC80
SHA256:632F80B7AD1F589FE608EF8546E3E7D1B0501A9EC3E38C0140EA1C10ED3E602B
3120opera.exeC:\Users\admin\AppData\Local\Opera\Opera\cache\sesn\opr00003.tmpxml
MD5:7966F3F842F1E41B71A94EE31B6DED29
SHA256:1298A8BC01D74ACDDF2825B82EB242D005C0A816617A7E187FCC0B7BA8E23272
3120opera.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\16ec093b8f51508f.customDestinations-msbinary
MD5:3F7590FD56AC999E0289444034C9CC80
SHA256:632F80B7AD1F589FE608EF8546E3E7D1B0501A9EC3E38C0140EA1C10ED3E602B
3120opera.exeC:\Users\admin\AppData\Roaming\Opera\Opera\opr47A2.tmpxml
MD5:D23C20D9212AA3737336C0A039E50B24
SHA256:40EB54E56B6F93AB976FC7BD900B1E1FA72066B28A3979D4BEEDAE432ABCF08D
3120opera.exeC:\Users\admin\AppData\Roaming\Opera\Opera\sessions\autosave.wintext
MD5:0100E3D2A29941CEEF4E37312A7FA332
SHA256:0C42C7737A5ABA75C8E2EA967E2A994542B2C641D0A370EDC41BC4D70A7CAC70
3120opera.exeC:\Users\admin\AppData\Roaming\Opera\Opera\opssl6.datbinary
MD5:B569078B8083F2BCAD30EA2C21EA4859
SHA256:66E3BA6ADAA14228646C2E759631C6497ADD7290069E5605BDE479067199A608
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
13
TCP/UDP connections
75
DNS requests
27
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3120
opera.exe
GET
200
93.184.220.29:80
http://crl3.digicert.com/Omniroot2025.crl
US
der
7.78 Kb
whitelisted
3120
opera.exe
GET
200
93.184.220.29:80
http://crl3.digicert.com/DigiCertHighAssuranceEVRootCA.crl
US
der
592 b
whitelisted
3120
opera.exe
GET
200
104.18.27.28:80
http://crl.identrust.com/DSTROOTCAX3CRL.crl
US
der
1.16 Kb
whitelisted
3120
opera.exe
GET
200
184.24.77.63:80
http://r3.o.lencr.org/MFMwUTBPME0wSzAJBgUrDgMCGgUABBRI2smg%2ByvTLU%2Fw3mjS9We3NfmzxAQUFC6zF7dYVsuuUAlA5h%2BvnYsUwsYCEgOGxQGWMW78dH5Ndhf%2Fq40umA%3D%3D
US
der
503 b
shared
3120
opera.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTlMusCQK2hbCidwnVINVIaWKpcFQQUGKka%2FLJFScFvMDQIK9mHnLAlV3oCEA2IBTUxEhzgse7%2BtmwJVJE%3D
US
der
471 b
whitelisted
3120
opera.exe
GET
200
18.66.107.167:80
http://crl.rootg2.amazontrust.com/rootg2.crl
US
der
660 b
whitelisted
3120
opera.exe
GET
200
184.24.77.76:80
http://r3.o.lencr.org/MFMwUTBPME0wSzAJBgUrDgMCGgUABBRI2smg%2ByvTLU%2Fw3mjS9We3NfmzxAQUFC6zF7dYVsuuUAlA5h%2BvnYsUwsYCEgMgdp5YGU8GCxc%2Bp5h54kFHhA%3D%3D
US
der
503 b
shared
3120
opera.exe
GET
200
172.64.155.188:80
http://crl.comodoca.com/AAACertificateServices.crl
US
der
506 b
whitelisted
3120
opera.exe
GET
200
104.18.32.68:80
http://crl.usertrust.com/USERTrustRSACertificationAuthority.crl
US
der
978 b
whitelisted
3120
opera.exe
GET
200
18.66.92.225:80
http://s.ss2.us/r.crl
US
der
434 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3120
opera.exe
185.26.182.93:443
certs.opera.com
Opera Software AS
whitelisted
3120
opera.exe
185.26.182.94:443
certs.opera.com
Opera Software AS
whitelisted
3120
opera.exe
104.26.0.94:443
dood.la
Cloudflare Inc
US
unknown
3120
opera.exe
172.67.69.187:443
dood.la
US
suspicious
3120
opera.exe
93.184.220.29:80
crl3.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
3120
opera.exe
82.145.216.15:443
sitecheck2.opera.com
Opera Software AS
suspicious
3120
opera.exe
82.145.216.16:443
sitecheck2.opera.com
Opera Software AS
suspicious
3120
opera.exe
104.26.6.74:443
i.doodcdn.co
Cloudflare Inc
US
unknown
3120
opera.exe
192.243.59.13:443
resetoccultkeeper.com
DataWeb Global Group B.V.
US
malicious
82.145.216.16:443
sitecheck2.opera.com
Opera Software AS
suspicious

DNS requests

Domain
IP
Reputation
dood.la
  • 104.26.0.94
  • 172.67.69.187
  • 104.26.1.94
malicious
sitecheck2.opera.com
  • 82.145.216.15
  • 82.145.216.16
whitelisted
certs.opera.com
  • 185.26.182.93
  • 185.26.182.94
whitelisted
crl3.digicert.com
  • 93.184.220.29
whitelisted
cdnjs.cloudflare.com
  • 104.17.24.14
  • 104.17.25.14
whitelisted
i.doodcdn.co
  • 104.26.6.74
  • 104.26.7.74
  • 172.67.70.190
unknown
resetoccultkeeper.com
  • 192.243.59.13
  • 192.243.59.12
  • 192.243.61.227
  • 192.243.61.225
  • 192.243.59.20
malicious
ku2d3a7pa8mdi.com
  • 62.122.171.6
suspicious
r3.o.lencr.org
  • 184.24.77.76
  • 184.24.77.63
shared
crl.identrust.com
  • 104.18.27.28
  • 104.18.26.28
whitelisted

Threats

PID
Process
Class
Message
3120
opera.exe
Potentially Bad Traffic
ET INFO TLS Handshake Failure
3120
opera.exe
Potentially Bad Traffic
ET INFO TLS Handshake Failure
3120
opera.exe
Potentially Bad Traffic
ET INFO TLS Handshake Failure
No debug info