Analysis
-
max time kernel
128s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
05-04-2023 14:14
Static task
static1
Behavioral task
behavioral1
Sample
windirstat1_1_2_setup.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
windirstat1_1_2_setup.exe
Resource
win10v2004-20230221-en
General
-
Target
windirstat1_1_2_setup.exe
-
Size
630KB
-
MD5
3abf1c149873e25d4e266225fbf37cbf
-
SHA1
6fa92dd2ca691c11dfbfc0a239e34369897a7fab
-
SHA256
370a27a30ee57247faddeb1f99a83933247e07c8760a07ed82e451e1cb5e5cdd
-
SHA512
b6d9672a580a02299bc370deb1fd99b5ca10ab86456385870cdae522c185ae51f8d390a7c50fcb5c7898523f52c834bb73515ffc6d0b0bcde210640e815ece9e
-
SSDEEP
12288:yCjeMsiGVBKvjxTNlZaLlcMj+wXZvQpd9nP2+ZMU2tYspZcMwr/GNd35:yCjeTZa7BTsxewXZUTP2HU2yawjY5
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
windirstat.exepid process 868 windirstat.exe -
Loads dropped DLL 11 IoCs
Processes:
windirstat1_1_2_setup.exewindirstat.exepid process 2032 windirstat1_1_2_setup.exe 2032 windirstat1_1_2_setup.exe 2032 windirstat1_1_2_setup.exe 2032 windirstat1_1_2_setup.exe 2032 windirstat1_1_2_setup.exe 2032 windirstat1_1_2_setup.exe 2032 windirstat1_1_2_setup.exe 2032 windirstat1_1_2_setup.exe 868 windirstat.exe 868 windirstat.exe 868 windirstat.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
windirstat.exedescription ioc process File opened (read-only) \??\D: windirstat.exe -
Drops file in Program Files directory 3 IoCs
Processes:
windirstat1_1_2_setup.exedescription ioc process File created C:\Program Files (x86)\WinDirStat\windirstat.chm windirstat1_1_2_setup.exe File created C:\Program Files (x86)\WinDirStat\Uninstall.exe windirstat1_1_2_setup.exe File created C:\Program Files (x86)\WinDirStat\windirstat.exe windirstat1_1_2_setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
NSIS installer 2 IoCs
Processes:
resource yara_rule \Program Files (x86)\WinDirStat\Uninstall.exe nsis_installer_1 C:\Program Files (x86)\WinDirStat\Uninstall.exe nsis_installer_1 -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
windirstat1_1_2_setup.exewindirstat.exedescription pid process Token: SeRestorePrivilege 2032 windirstat1_1_2_setup.exe Token: SeBackupPrivilege 2032 windirstat1_1_2_setup.exe Token: SeBackupPrivilege 868 windirstat.exe Token: SeBackupPrivilege 868 windirstat.exe Token: SeBackupPrivilege 868 windirstat.exe Token: SeBackupPrivilege 868 windirstat.exe Token: SeBackupPrivilege 868 windirstat.exe Token: SeBackupPrivilege 868 windirstat.exe Token: SeBackupPrivilege 868 windirstat.exe Token: SeBackupPrivilege 868 windirstat.exe Token: SeBackupPrivilege 868 windirstat.exe Token: SeBackupPrivilege 868 windirstat.exe Token: SeBackupPrivilege 868 windirstat.exe Token: SeBackupPrivilege 868 windirstat.exe Token: SeBackupPrivilege 868 windirstat.exe Token: SeBackupPrivilege 868 windirstat.exe Token: SeBackupPrivilege 868 windirstat.exe Token: SeBackupPrivilege 868 windirstat.exe Token: SeBackupPrivilege 868 windirstat.exe Token: SeBackupPrivilege 868 windirstat.exe Token: SeBackupPrivilege 868 windirstat.exe Token: SeBackupPrivilege 868 windirstat.exe Token: SeBackupPrivilege 868 windirstat.exe Token: SeBackupPrivilege 868 windirstat.exe Token: SeBackupPrivilege 868 windirstat.exe Token: SeBackupPrivilege 868 windirstat.exe Token: SeBackupPrivilege 868 windirstat.exe Token: SeBackupPrivilege 868 windirstat.exe Token: SeBackupPrivilege 868 windirstat.exe Token: SeBackupPrivilege 868 windirstat.exe Token: SeBackupPrivilege 868 windirstat.exe Token: SeBackupPrivilege 868 windirstat.exe Token: SeBackupPrivilege 868 windirstat.exe Token: SeBackupPrivilege 868 windirstat.exe Token: SeBackupPrivilege 868 windirstat.exe Token: SeBackupPrivilege 868 windirstat.exe Token: SeBackupPrivilege 868 windirstat.exe Token: SeBackupPrivilege 868 windirstat.exe Token: SeBackupPrivilege 868 windirstat.exe Token: SeBackupPrivilege 868 windirstat.exe Token: SeBackupPrivilege 868 windirstat.exe Token: SeBackupPrivilege 868 windirstat.exe Token: SeBackupPrivilege 868 windirstat.exe Token: SeBackupPrivilege 868 windirstat.exe Token: SeBackupPrivilege 868 windirstat.exe Token: SeBackupPrivilege 868 windirstat.exe Token: SeBackupPrivilege 868 windirstat.exe Token: SeBackupPrivilege 868 windirstat.exe Token: SeBackupPrivilege 868 windirstat.exe Token: SeBackupPrivilege 868 windirstat.exe Token: SeBackupPrivilege 868 windirstat.exe Token: SeBackupPrivilege 868 windirstat.exe Token: SeBackupPrivilege 868 windirstat.exe Token: SeBackupPrivilege 868 windirstat.exe Token: SeBackupPrivilege 868 windirstat.exe Token: SeBackupPrivilege 868 windirstat.exe Token: SeBackupPrivilege 868 windirstat.exe Token: SeBackupPrivilege 868 windirstat.exe Token: SeBackupPrivilege 868 windirstat.exe Token: SeBackupPrivilege 868 windirstat.exe Token: SeBackupPrivilege 868 windirstat.exe Token: SeBackupPrivilege 868 windirstat.exe Token: SeBackupPrivilege 868 windirstat.exe Token: SeBackupPrivilege 868 windirstat.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
windirstat.exepid process 868 windirstat.exe 868 windirstat.exe 868 windirstat.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
windirstat1_1_2_setup.exedescription pid process target process PID 2032 wrote to memory of 868 2032 windirstat1_1_2_setup.exe windirstat.exe PID 2032 wrote to memory of 868 2032 windirstat1_1_2_setup.exe windirstat.exe PID 2032 wrote to memory of 868 2032 windirstat1_1_2_setup.exe windirstat.exe PID 2032 wrote to memory of 868 2032 windirstat1_1_2_setup.exe windirstat.exe PID 2032 wrote to memory of 868 2032 windirstat1_1_2_setup.exe windirstat.exe PID 2032 wrote to memory of 868 2032 windirstat1_1_2_setup.exe windirstat.exe PID 2032 wrote to memory of 868 2032 windirstat1_1_2_setup.exe windirstat.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\windirstat1_1_2_setup.exe"C:\Users\Admin\AppData\Local\Temp\windirstat1_1_2_setup.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Program Files (x86)\WinDirStat\windirstat.exe"C:\Program Files (x86)\WinDirStat\windirstat.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:868
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\WinDirStat\Uninstall.exeFilesize
46KB
MD5a127e6118b9dd2f9d5a7cc4d697a0105
SHA19ac17d4dcf0884ceafacf10c42209c0942dfe7a8
SHA256afc864cfce79b2a6add491a27ea672d958233ed7a97a2cbbce60100d2fa1e670
SHA5120e57d2856c02c55d477d9b3cc1d4bf5ffa3650d4b20be18b0a9e614d19143aee325c4cd92ff31bbddf6e93cd3ebeb47d8727de6e25faa366341cc71117122065
-
C:\Program Files (x86)\WinDirStat\windirstat.chmFilesize
50KB
MD51bddb8a0e0f9cd90a5b3936ec2c2c4cf
SHA1c8302168fb532fe03e76cb8a82aa53b49ee0bc44
SHA2561e87c07744054709d271337d8ce06929429b334d70875605cb68ecc4c6610cd1
SHA512b857de9026b3eab13f4dbc464e6403835e3a61e5e9e3566735bf1ddd8dedc4ecf08807b27207bd8b385250b71ea234b301dd49e6f3c90f1270ae03868c035472
-
C:\Program Files (x86)\WinDirStat\windirstat.exeFilesize
636KB
MD524cd9a82fcfc658dd3ae7ba25c958ffb
SHA126e14a532e1e050eb20755a0b7a5fea99dd80588
SHA256cc3ee246f2710dc9ba9e2a88e3192b88f1db4caa2eefb8641642a33df04e585c
SHA5124de675be1f7d618d133ef24765a027840473e0c5bc93550d5e5fdbf078edc74c2241e6e3cd8753517e2954c7f09b9909028de7b727294d723fb5700658c7979d
-
C:\Program Files (x86)\WinDirStat\windirstat.exeFilesize
636KB
MD524cd9a82fcfc658dd3ae7ba25c958ffb
SHA126e14a532e1e050eb20755a0b7a5fea99dd80588
SHA256cc3ee246f2710dc9ba9e2a88e3192b88f1db4caa2eefb8641642a33df04e585c
SHA5124de675be1f7d618d133ef24765a027840473e0c5bc93550d5e5fdbf078edc74c2241e6e3cd8753517e2954c7f09b9909028de7b727294d723fb5700658c7979d
-
C:\Program Files (x86)\WinDirStat\windirstat.exeFilesize
636KB
MD524cd9a82fcfc658dd3ae7ba25c958ffb
SHA126e14a532e1e050eb20755a0b7a5fea99dd80588
SHA256cc3ee246f2710dc9ba9e2a88e3192b88f1db4caa2eefb8641642a33df04e585c
SHA5124de675be1f7d618d133ef24765a027840473e0c5bc93550d5e5fdbf078edc74c2241e6e3cd8753517e2954c7f09b9909028de7b727294d723fb5700658c7979d
-
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\WinDirStat\Help (ENG).lnkFilesize
1KB
MD5b4732981379af38b281785b7e3bfa391
SHA176976d92bc01820c9c9321297969f4806e6b59c6
SHA25686514d5abfd9410222cd7ae5f9bb3911eb88e65617beb2343d4a1033b1c07e04
SHA5127f907ba15a5a0308fad83b0969e989197fcbc7da5b1db17a37ab9c2cf12284e021f5b51b1dc74fe9b1d2b20931cfc8dfcfacbbb166449c0927609c2cc8a05447
-
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\WinDirStat\Uninstall WinDirStat.lnkFilesize
1KB
MD5c30984414fee6e0df077f89e7c35b62c
SHA1d3e6450079d12d2adf99549fc7caa276fed80593
SHA256dcf352d0cca48c0595e3aa46b8e433ce6332735f16a82e75419608843a9bd925
SHA51245ce2944f8763555cd495a6744eff97b2541d98118e440e7497fd73457be82af3622bd4d9e2ac77e1bdb9f0ddce3dbb64d40d4f064ea58bf9f1cfd9bc95b8e1a
-
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\WinDirStat\WinDirStat.lnkFilesize
1KB
MD515fba4d963287744cf322d6e088047e2
SHA155f5e23618c8e311be5c914ede2207223282bbdf
SHA2569cab4b69091ce37f528d767fbdde837af89dfa63fcb2cdac77f191633cec9808
SHA5123ddb92c1ca6271f2fdb2b79fc5c75c1f55c9bf484b5ac9b8035320d8e25def4bfc15e3eaa6ede60a76a34318ad2963b2b2add7a10e7c504ed97cabf565b6fa39
-
C:\Users\Admin\AppData\Local\Temp\nsj1A19.tmp\InstallOptions.dllFilesize
14KB
MD59b2ad0546fd834c01a3bdcbfbc95da7d
SHA14f92f5a6b269d969ba3340f1c1978d337992a62c
SHA2567e08cb4ff81dbb0573c672301681e31b2042682e9a2204673f811455f823dd37
SHA5125b374fe7cc8d6ff8b93cfcc8deae23f2313f8240c998d04d3e65c196b33c7d36a33930ffd481cdd6d30aa4c73dd2a1c6fe43791e9bf10bd71b33321a8e71c6b8
-
C:\Users\Admin\AppData\Local\Temp\nsj1A19.tmp\System.dllFilesize
10KB
MD54125926391466fdbe8a4730f2374b033
SHA1fdd23034ada72d2537939ac6755d7f7c0e9b3f0e
SHA2566692bd93bcd04146831652780c1170da79aa3784c3c070d95fb1580e339de6c5
SHA51232a1cf96842454b3c3641316ee39051ae024bdce9e88ac236eadad531f2c0a08d46b77d525f7d994c9a5af4cc9a391d30ee92b9ec782b7fb9a42c76f0f52a008
-
C:\Users\Admin\AppData\Local\Temp\nsj1A19.tmp\ioSpecial.iniFilesize
790B
MD51ddd4d4d7aa2a3011e8657425b9039eb
SHA101a40ddcff835e3f9a5284c32d326378383d6c52
SHA2565a167595590504dc086144bfb189944401f2ac2b81496b56d72233d3237aebaf
SHA5126b0f2b802578599aa0a0846c69dfeef67c0016f26b590633ea78312859e2e5a5d1f7b500eb21ec08d0588ab98471687f6f3758ededdc73461dfa45c6407968f5
-
C:\Users\Admin\AppData\Local\Temp\nsj1A19.tmp\ioSpecial.iniFilesize
799B
MD51edf43260057786760c9ad3ecf5342ef
SHA10a142043dc3af0d4d89474d0fd1b541562313a3a
SHA256d8fff8aeb8d02d8409c35ef8fcf60d488e4cefb7b373e73e9c903eea50304f0d
SHA51277fa9ec6abeaf0f8a59457312227d28dce1f915c5ff0454b852cabe0291ada9ed706b94c6670ab6c49d1a18d66a17bb0153c498b599310e019c6e91022cc3ab2
-
C:\Users\Admin\AppData\Local\Temp\nsj1A19.tmp\ioSpecial.iniFilesize
725B
MD574ff757b42142e090c407fdf6f4e59cd
SHA1100a39a25cb2f7f56fd91cd14d603097b146a771
SHA25635f255446be227cc7ec6b896c9ecfca255e36d05131e7d3f7ec7b9a35cab29c7
SHA51215e569fa01f69fd70515a583c4eb474a808f28cff1fb76b5556d17b2db5b3b5672ac87f8f9e0765384ed3809ea9b92ebe06531a8aba9476da0b277e9f9be7076
-
C:\Users\Admin\Desktop\WinDirStat.lnkFilesize
1KB
MD5e3ea1970d1c4cea94805fee1e2502ff1
SHA1c460e88b76d11cee66a978a09c07bb222da53cb7
SHA256b5b18bd544ca2cd86617b6c992762c25a1ac41e76bd3f3e141b0154d988af867
SHA512b63838c0346dbe72ff4e1db45cf7f484686422006a2cc8415ee2bcd5a23967e1275133faae50a42ab858b7f46f2b2b26d1bf28bd49d2ca76f00c7cb5a339e007
-
\Program Files (x86)\WinDirStat\Uninstall.exeFilesize
46KB
MD5a127e6118b9dd2f9d5a7cc4d697a0105
SHA19ac17d4dcf0884ceafacf10c42209c0942dfe7a8
SHA256afc864cfce79b2a6add491a27ea672d958233ed7a97a2cbbce60100d2fa1e670
SHA5120e57d2856c02c55d477d9b3cc1d4bf5ffa3650d4b20be18b0a9e614d19143aee325c4cd92ff31bbddf6e93cd3ebeb47d8727de6e25faa366341cc71117122065
-
\Program Files (x86)\WinDirStat\windirstat.exeFilesize
636KB
MD524cd9a82fcfc658dd3ae7ba25c958ffb
SHA126e14a532e1e050eb20755a0b7a5fea99dd80588
SHA256cc3ee246f2710dc9ba9e2a88e3192b88f1db4caa2eefb8641642a33df04e585c
SHA5124de675be1f7d618d133ef24765a027840473e0c5bc93550d5e5fdbf078edc74c2241e6e3cd8753517e2954c7f09b9909028de7b727294d723fb5700658c7979d
-
\Program Files (x86)\WinDirStat\windirstat.exeFilesize
636KB
MD524cd9a82fcfc658dd3ae7ba25c958ffb
SHA126e14a532e1e050eb20755a0b7a5fea99dd80588
SHA256cc3ee246f2710dc9ba9e2a88e3192b88f1db4caa2eefb8641642a33df04e585c
SHA5124de675be1f7d618d133ef24765a027840473e0c5bc93550d5e5fdbf078edc74c2241e6e3cd8753517e2954c7f09b9909028de7b727294d723fb5700658c7979d
-
\Program Files (x86)\WinDirStat\windirstat.exeFilesize
636KB
MD524cd9a82fcfc658dd3ae7ba25c958ffb
SHA126e14a532e1e050eb20755a0b7a5fea99dd80588
SHA256cc3ee246f2710dc9ba9e2a88e3192b88f1db4caa2eefb8641642a33df04e585c
SHA5124de675be1f7d618d133ef24765a027840473e0c5bc93550d5e5fdbf078edc74c2241e6e3cd8753517e2954c7f09b9909028de7b727294d723fb5700658c7979d
-
\Program Files (x86)\WinDirStat\windirstat.exeFilesize
636KB
MD524cd9a82fcfc658dd3ae7ba25c958ffb
SHA126e14a532e1e050eb20755a0b7a5fea99dd80588
SHA256cc3ee246f2710dc9ba9e2a88e3192b88f1db4caa2eefb8641642a33df04e585c
SHA5124de675be1f7d618d133ef24765a027840473e0c5bc93550d5e5fdbf078edc74c2241e6e3cd8753517e2954c7f09b9909028de7b727294d723fb5700658c7979d
-
\Program Files (x86)\WinDirStat\windirstat.exeFilesize
636KB
MD524cd9a82fcfc658dd3ae7ba25c958ffb
SHA126e14a532e1e050eb20755a0b7a5fea99dd80588
SHA256cc3ee246f2710dc9ba9e2a88e3192b88f1db4caa2eefb8641642a33df04e585c
SHA5124de675be1f7d618d133ef24765a027840473e0c5bc93550d5e5fdbf078edc74c2241e6e3cd8753517e2954c7f09b9909028de7b727294d723fb5700658c7979d
-
\Program Files (x86)\WinDirStat\windirstat.exeFilesize
636KB
MD524cd9a82fcfc658dd3ae7ba25c958ffb
SHA126e14a532e1e050eb20755a0b7a5fea99dd80588
SHA256cc3ee246f2710dc9ba9e2a88e3192b88f1db4caa2eefb8641642a33df04e585c
SHA5124de675be1f7d618d133ef24765a027840473e0c5bc93550d5e5fdbf078edc74c2241e6e3cd8753517e2954c7f09b9909028de7b727294d723fb5700658c7979d
-
\Program Files (x86)\WinDirStat\windirstat.exeFilesize
636KB
MD524cd9a82fcfc658dd3ae7ba25c958ffb
SHA126e14a532e1e050eb20755a0b7a5fea99dd80588
SHA256cc3ee246f2710dc9ba9e2a88e3192b88f1db4caa2eefb8641642a33df04e585c
SHA5124de675be1f7d618d133ef24765a027840473e0c5bc93550d5e5fdbf078edc74c2241e6e3cd8753517e2954c7f09b9909028de7b727294d723fb5700658c7979d
-
\Users\Admin\AppData\Local\Temp\nsj1A19.tmp\InstallOptions.dllFilesize
14KB
MD59b2ad0546fd834c01a3bdcbfbc95da7d
SHA14f92f5a6b269d969ba3340f1c1978d337992a62c
SHA2567e08cb4ff81dbb0573c672301681e31b2042682e9a2204673f811455f823dd37
SHA5125b374fe7cc8d6ff8b93cfcc8deae23f2313f8240c998d04d3e65c196b33c7d36a33930ffd481cdd6d30aa4c73dd2a1c6fe43791e9bf10bd71b33321a8e71c6b8
-
\Users\Admin\AppData\Local\Temp\nsj1A19.tmp\System.dllFilesize
10KB
MD54125926391466fdbe8a4730f2374b033
SHA1fdd23034ada72d2537939ac6755d7f7c0e9b3f0e
SHA2566692bd93bcd04146831652780c1170da79aa3784c3c070d95fb1580e339de6c5
SHA51232a1cf96842454b3c3641316ee39051ae024bdce9e88ac236eadad531f2c0a08d46b77d525f7d994c9a5af4cc9a391d30ee92b9ec782b7fb9a42c76f0f52a008
-
\Users\Admin\AppData\Local\Temp\nsj1A19.tmp\System.dllFilesize
10KB
MD54125926391466fdbe8a4730f2374b033
SHA1fdd23034ada72d2537939ac6755d7f7c0e9b3f0e
SHA2566692bd93bcd04146831652780c1170da79aa3784c3c070d95fb1580e339de6c5
SHA51232a1cf96842454b3c3641316ee39051ae024bdce9e88ac236eadad531f2c0a08d46b77d525f7d994c9a5af4cc9a391d30ee92b9ec782b7fb9a42c76f0f52a008