Analysis

  • max time kernel
    158s
  • max time network
    177s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    29-01-2023 14:36

General

  • Target

    8e0c7fabb2ed7c880f985e160f6e5fbdfc15bb645a8ae9701761cd70a582f997.exe

  • Size

    893KB

  • MD5

    fcaba1be07ff24ecbc53df4eda744298

  • SHA1

    5f793f1ec29377213eb80556b8819f7f7fefefdd

  • SHA256

    8e0c7fabb2ed7c880f985e160f6e5fbdfc15bb645a8ae9701761cd70a582f997

  • SHA512

    bcde87620a2590e05ac78b9a8777d1f6c51cfdc68b5a283ca15fdf7942cb288996c9d935b883d70aaca5f887f75ad5230304b263b69ad784a2f4d089cac2c9ae

  • SSDEEP

    24576:lIbVFZC10w1sepi8Hx28WdNizMMTTdcvcCJM3pEGppDrIko:lILA1T1poMx28MNizMKor6uGp

Malware Config

Signatures

  • Detects PlugX payload 3 IoCs
  • PlugX

    PlugX is a RAT (Remote Access Trojan) that has been around since 2008.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 14 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies system certificate store 2 TTPs 13 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8e0c7fabb2ed7c880f985e160f6e5fbdfc15bb645a8ae9701761cd70a582f997.exe
    "C:\Users\Admin\AppData\Local\Temp\8e0c7fabb2ed7c880f985e160f6e5fbdfc15bb645a8ae9701761cd70a582f997.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1020
    • C:\Users\Admin\AppData\Local\Temp\nsj6E7E.tmp\OWinstaller.exe
      "C:\Users\Admin\AppData\Local\Temp\nsj6E7E.tmp\OWinstaller.exe" Partner=3337
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1928
      • C:\ProgramData\Overwolf\Setup\0.116.2.25\OverwolfSetup.exe
        "C:\ProgramData\Overwolf\Setup\0.116.2.25\OverwolfSetup.exe" /S "/TargetDir=C:\Program Files (x86)\Overwolf\" -ignoredotnet
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Modifies system certificate store
        PID:1840
  • C:\Windows\system32\wbem\WmiApSrv.exe
    C:\Windows\system32\wbem\WmiApSrv.exe
    1⤵
      PID:1644
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0xc8
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1080

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    2
    T1112

    Install Root Certificate

    1
    T1130

    Discovery

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\Overwolf\Setup\0.116.2.25\OverwolfSetup.exe
      Filesize

      241.1MB

      MD5

      e5559f83f3ee9ed0ed8b25d4e9dec909

      SHA1

      d1de96592bc181e44976c4e14ed9939854e2967b

      SHA256

      dd3a9a2fa0c4b14945ba49375312f0f834d769b995d5f4aac09630909c122152

      SHA512

      ad81f0747b83322b8599f61fb24c3351089a7e83e513697a669478f569c323a02d7e3d52ba59bc223b3a2d83e4ae30f4c76f9a4c977e20e538bbce7c81489b51

    • C:\ProgramData\Overwolf\Setup\0.116.2.25\OverwolfSetup.exe
      Filesize

      216.7MB

      MD5

      a2aa4312ab2bebaf7e3ad355866913cc

      SHA1

      0f137b2fdb09c338ab60242ecebac28ffa2d75bb

      SHA256

      1aa2ab610a491cf708549c44e6a45b0f3ef35a47a912f1d5269a99e767e3fe41

      SHA512

      42d72a1bdcafa4ac653e6bfad425094afc82433c013167510c94896b21df5be159ea91db482ef74e38cbd45d88e5348e8721792dbeaf3ed6bca31ad1a1872fb8

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
      Filesize

      61KB

      MD5

      fc4666cbca561e864e7fdf883a9e6661

      SHA1

      2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

      SHA256

      10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

      SHA512

      c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      b79bfb32d0dcda4b629b6bbd9b77749a

      SHA1

      fbd6b1b2edf3a088bcacfcff2c21de5d319f3945

      SHA256

      0f955cabffea45c2b2aedd05655e32646ae8da940783d21569eb93c84a06a791

      SHA512

      9ea3286e6bd4063c1bdf1e43d1cf06af42f1c51f79feccf7b00e92d40f4f6e8bc78230969bfd6a0f8e2269ab03c718145124122796602280ed54eba74d2c4ca6

    • C:\Users\Admin\AppData\Local\Temp\nsj6E7E.tmp\OWInstaller.exe
      Filesize

      1.8MB

      MD5

      c2f4d3e0a24f4c1aefc19ef652584020

      SHA1

      84eb726913ce4100ed7a86d2be6f290aa884bda2

      SHA256

      8935c77b4a1abbd423b1ff36f9263a4f436356aaa338debb989cd5245d00e154

      SHA512

      2a1271871fb08587d1f7939ffa16e994fd46dfac1fbb84bd348f227c4ff8040a3f3f3f4ea248a5f1bc7e40debddd4d140805f173a84be43c137c28436424b64e

    • C:\Users\Admin\AppData\Local\Temp\nsj6E7E.tmp\OWinstaller.exe
      Filesize

      1.8MB

      MD5

      c2f4d3e0a24f4c1aefc19ef652584020

      SHA1

      84eb726913ce4100ed7a86d2be6f290aa884bda2

      SHA256

      8935c77b4a1abbd423b1ff36f9263a4f436356aaa338debb989cd5245d00e154

      SHA512

      2a1271871fb08587d1f7939ffa16e994fd46dfac1fbb84bd348f227c4ff8040a3f3f3f4ea248a5f1bc7e40debddd4d140805f173a84be43c137c28436424b64e

    • C:\Users\Admin\AppData\Local\Temp\nsj6E7E.tmp\OWinstaller.exe.config
      Filesize

      190B

      MD5

      4bf2a039cd2cf37cf37c19f2912996e0

      SHA1

      13d480c222d586a70fe568f45b499e6039e63cdb

      SHA256

      ec7c6bc4205712a0a78c68f7f0f762ac7e62276720a61a6877a94f6a573f0aa7

      SHA512

      0d69fa9238aad43d205926f92706bfa566eeab96ca213a22d8bdac8e414484b10c4a507a4f4deef058afa9c170e6a3be6c3b0196b290f5809da456860770e22c

    • \ProgramData\Overwolf\Setup\0.116.2.25\OverwolfSetup.exe
      Filesize

      241.7MB

      MD5

      f22bb275ede1ec736b29e564deb7bd49

      SHA1

      ec7692ce6b5e060cb725337ada7a45b07fa8bd70

      SHA256

      e9271c11d1b86fec6d87b0921cf93cc97a4abedf5e690019a6e85560d9c9827f

      SHA512

      4dcc27ad4659f855bf6dcf085634b1079a755c7a16b45a2c4d086285ae9eac28ebc87038254fc1110028fbf00a2ca632dfbdca08d89704c2489d56f4d15653f8

    • \Users\Admin\AppData\Local\Overwolf\InstallerCache\OWResources.dll
      Filesize

      190KB

      MD5

      5c252f1bbeb9c18ec94c3697855a7ea5

      SHA1

      dd2d259a1924baef5be20d79036e156cd82f0f72

      SHA256

      e4ba5095daab78d5db2fd71a8fc64bef68457768f3d9cd984ae914aa2379dbfb

      SHA512

      885ae33aecbc07aebb4628ce464b0a780370ea823dd4fbfd5d5a7a87cfbac2e91c629e0fc77a3661e610038c3b9c9eced3820932dfd2a6e3f0293ca4ea60d15c

    • \Users\Admin\AppData\Local\Overwolf\InstallerCache\OWResources.dll
      Filesize

      190KB

      MD5

      5c252f1bbeb9c18ec94c3697855a7ea5

      SHA1

      dd2d259a1924baef5be20d79036e156cd82f0f72

      SHA256

      e4ba5095daab78d5db2fd71a8fc64bef68457768f3d9cd984ae914aa2379dbfb

      SHA512

      885ae33aecbc07aebb4628ce464b0a780370ea823dd4fbfd5d5a7a87cfbac2e91c629e0fc77a3661e610038c3b9c9eced3820932dfd2a6e3f0293ca4ea60d15c

    • \Users\Admin\AppData\Local\Overwolf\InstallerCache\OWResources.dll
      Filesize

      190KB

      MD5

      5c252f1bbeb9c18ec94c3697855a7ea5

      SHA1

      dd2d259a1924baef5be20d79036e156cd82f0f72

      SHA256

      e4ba5095daab78d5db2fd71a8fc64bef68457768f3d9cd984ae914aa2379dbfb

      SHA512

      885ae33aecbc07aebb4628ce464b0a780370ea823dd4fbfd5d5a7a87cfbac2e91c629e0fc77a3661e610038c3b9c9eced3820932dfd2a6e3f0293ca4ea60d15c

    • \Users\Admin\AppData\Local\Temp\0.116.2.25\nsis7z.dll
      Filesize

      169KB

      MD5

      567103638bb0c81cf9bd86f727ea12ac

      SHA1

      ddc03ea66412f11b5975092f92067a85d29d17b1

      SHA256

      37dd96230521a91dc7eba0d0a4fe8726b4405562b1a96363a01e28334bde94fd

      SHA512

      1d64a197489ea45e21a89ec535ca0282eed47ade40589dee31de865870ddb91ffc0921a5eacea89ddf9bc1d9b93bb7edf6f6c3148a18a9611df87be0fc369fa4

    • \Users\Admin\AppData\Local\Temp\nse1151.tmp\INetC.dll
      Filesize

      24KB

      MD5

      640bff73a5f8e37b202d911e4749b2e9

      SHA1

      9588dd7561ab7de3bca392b084bec91f3521c879

      SHA256

      c1e568e25ec111184deb1b87cfda4bfec529b1abeab39b66539d998012f33502

      SHA512

      39c6c358e2b480c8cbebcc1da683924c8092fb2947f2da4a8df1b0dc1fdda61003d91d12232a436ec88ff4e0995b7f6ee8c6efbdca935eaa984001f7a72fea0a

    • \Users\Admin\AppData\Local\Temp\nse1151.tmp\INetC.dll
      Filesize

      24KB

      MD5

      640bff73a5f8e37b202d911e4749b2e9

      SHA1

      9588dd7561ab7de3bca392b084bec91f3521c879

      SHA256

      c1e568e25ec111184deb1b87cfda4bfec529b1abeab39b66539d998012f33502

      SHA512

      39c6c358e2b480c8cbebcc1da683924c8092fb2947f2da4a8df1b0dc1fdda61003d91d12232a436ec88ff4e0995b7f6ee8c6efbdca935eaa984001f7a72fea0a

    • \Users\Admin\AppData\Local\Temp\nse1151.tmp\LogEx.dll
      Filesize

      44KB

      MD5

      0f96d9eb959ad4e8fd205e6d58cf01b8

      SHA1

      7c45512cbdb24216afd23a9e8cdce0cfeaa7660f

      SHA256

      57ede354532937e38c4ae9da3710ee295705ea9770c402dfb3a5c56a32fd4314

      SHA512

      9f3afb61d75ac7b7dc84abcbf1b04f759b7055992d46140dc5dcc269aed22268d044ee8030f5ea260bbb912774e5bbb751560c16e54efa99c700b9fc7d48832c

    • \Users\Admin\AppData\Local\Temp\nse1151.tmp\System.dll
      Filesize

      11KB

      MD5

      7399323923e3946fe9140132ac388132

      SHA1

      728257d06c452449b1241769b459f091aabcffc5

      SHA256

      5a1c20a3e2e2eb182976977669f2c5d9f3104477e98f74d69d2434e79b92fdc3

      SHA512

      d6f28ba761351f374ae007c780be27758aea7b9f998e2a88a542eede459d18700adffe71abcb52b8a8c00695efb7ccc280175b5eeb57ca9a645542edfabb64f1

    • \Users\Admin\AppData\Local\Temp\nse1151.tmp\UserInfo.dll
      Filesize

      4KB

      MD5

      9301577ff4d229347fe33259b43ef3b2

      SHA1

      5e39eb4f99920005a4b2303c8089d77f589c133d

      SHA256

      090c4bc8dc534e97b3877bd5115eb58b3e181495f29f231479f540bab5c01edc

      SHA512

      77dc7a1dedaeb1fb2ccefaba0a526b8d40ea64b9b37af53c056b9428159b67d552e5e3861cbffc2149ec646fdfe9ce94f4fdca51703f79c93e5f45c085e52c79

    • \Users\Admin\AppData\Local\Temp\nsj6E7E.tmp\OWInstaller.exe
      Filesize

      1.8MB

      MD5

      c2f4d3e0a24f4c1aefc19ef652584020

      SHA1

      84eb726913ce4100ed7a86d2be6f290aa884bda2

      SHA256

      8935c77b4a1abbd423b1ff36f9263a4f436356aaa338debb989cd5245d00e154

      SHA512

      2a1271871fb08587d1f7939ffa16e994fd46dfac1fbb84bd348f227c4ff8040a3f3f3f4ea248a5f1bc7e40debddd4d140805f173a84be43c137c28436424b64e

    • \Users\Admin\AppData\Local\Temp\nsj6E7E.tmp\System.dll
      Filesize

      11KB

      MD5

      7399323923e3946fe9140132ac388132

      SHA1

      728257d06c452449b1241769b459f091aabcffc5

      SHA256

      5a1c20a3e2e2eb182976977669f2c5d9f3104477e98f74d69d2434e79b92fdc3

      SHA512

      d6f28ba761351f374ae007c780be27758aea7b9f998e2a88a542eede459d18700adffe71abcb52b8a8c00695efb7ccc280175b5eeb57ca9a645542edfabb64f1

    • \Users\Admin\AppData\Local\Temp\nsj6E7E.tmp\UserInfo.dll
      Filesize

      4KB

      MD5

      9301577ff4d229347fe33259b43ef3b2

      SHA1

      5e39eb4f99920005a4b2303c8089d77f589c133d

      SHA256

      090c4bc8dc534e97b3877bd5115eb58b3e181495f29f231479f540bab5c01edc

      SHA512

      77dc7a1dedaeb1fb2ccefaba0a526b8d40ea64b9b37af53c056b9428159b67d552e5e3861cbffc2149ec646fdfe9ce94f4fdca51703f79c93e5f45c085e52c79

    • \Users\Admin\AppData\Local\Temp\nsj6E7E.tmp\utils.dll
      Filesize

      63KB

      MD5

      20863859dad63ca0638db7eed4ea6b80

      SHA1

      40e894a8bd5b58c162b52117ddde0fa785bcbfd3

      SHA256

      ec51e07941dc87526b7056204a679a9a88459d040704a44bf394a49d73c19aa4

      SHA512

      e06e8f40ea73d108cf7826a88fa349e34109fda96e5d3f9c7f16a35d7457f83cc103a94da6d4141c2c6ff3fef9f0b4555e0702267018dfbb1036f502a4b15998

    • memory/1020-54-0x0000000075571000-0x0000000075573000-memory.dmp
      Filesize

      8KB

    • memory/1840-73-0x0000000000000000-mapping.dmp
    • memory/1840-80-0x00000000003E0000-0x00000000003EC000-memory.dmp
      Filesize

      48KB

    • memory/1928-59-0x0000000000000000-mapping.dmp
    • memory/1928-70-0x0000000002279000-0x000000000228A000-memory.dmp
      Filesize

      68KB

    • memory/1928-82-0x0000000073C60000-0x000000007420B000-memory.dmp
      Filesize

      5.7MB

    • memory/1928-83-0x0000000002279000-0x000000000228A000-memory.dmp
      Filesize

      68KB

    • memory/1928-69-0x0000000073C60000-0x000000007420B000-memory.dmp
      Filesize

      5.7MB

    • memory/1928-64-0x0000000073C60000-0x000000007420B000-memory.dmp
      Filesize

      5.7MB

    • memory/1928-68-0x0000000002279000-0x000000000228A000-memory.dmp
      Filesize

      68KB