Analysis
-
max time kernel
153s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
17-10-2023 14:04
Static task
static1
Behavioral task
behavioral1
Sample
windirstat1_1_2_setup.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
windirstat1_1_2_setup.exe
Resource
win10v2004-20230915-en
General
-
Target
windirstat1_1_2_setup.exe
-
Size
630KB
-
MD5
3abf1c149873e25d4e266225fbf37cbf
-
SHA1
6fa92dd2ca691c11dfbfc0a239e34369897a7fab
-
SHA256
370a27a30ee57247faddeb1f99a83933247e07c8760a07ed82e451e1cb5e5cdd
-
SHA512
b6d9672a580a02299bc370deb1fd99b5ca10ab86456385870cdae522c185ae51f8d390a7c50fcb5c7898523f52c834bb73515ffc6d0b0bcde210640e815ece9e
-
SSDEEP
12288:yCjeMsiGVBKvjxTNlZaLlcMj+wXZvQpd9nP2+ZMU2tYspZcMwr/GNd35:yCjeTZa7BTsxewXZUTP2HU2yawjY5
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
windirstat.exepid process 1856 windirstat.exe -
Loads dropped DLL 11 IoCs
Processes:
windirstat1_1_2_setup.exewindirstat.exepid process 2236 windirstat1_1_2_setup.exe 2236 windirstat1_1_2_setup.exe 2236 windirstat1_1_2_setup.exe 2236 windirstat1_1_2_setup.exe 2236 windirstat1_1_2_setup.exe 2236 windirstat1_1_2_setup.exe 2236 windirstat1_1_2_setup.exe 2236 windirstat1_1_2_setup.exe 1856 windirstat.exe 1856 windirstat.exe 1856 windirstat.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 2 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
windirstat.exedescription ioc process File opened (read-only) \??\D: windirstat.exe File opened (read-only) \??\F: windirstat.exe -
Drops file in Program Files directory 3 IoCs
Processes:
windirstat1_1_2_setup.exedescription ioc process File created C:\Program Files (x86)\WinDirStat\windirstat.chm windirstat1_1_2_setup.exe File created C:\Program Files (x86)\WinDirStat\Uninstall.exe windirstat1_1_2_setup.exe File created C:\Program Files (x86)\WinDirStat\windirstat.exe windirstat1_1_2_setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 1 IoCs
Processes:
resource yara_rule \Program Files (x86)\WinDirStat\Uninstall.exe nsis_installer_1 -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
windirstat1_1_2_setup.exewindirstat.exedescription pid process Token: SeRestorePrivilege 2236 windirstat1_1_2_setup.exe Token: SeBackupPrivilege 2236 windirstat1_1_2_setup.exe Token: SeBackupPrivilege 1856 windirstat.exe Token: SeBackupPrivilege 1856 windirstat.exe Token: SeBackupPrivilege 1856 windirstat.exe Token: SeBackupPrivilege 1856 windirstat.exe Token: SeBackupPrivilege 1856 windirstat.exe Token: SeBackupPrivilege 1856 windirstat.exe Token: SeBackupPrivilege 1856 windirstat.exe Token: SeBackupPrivilege 1856 windirstat.exe Token: SeBackupPrivilege 1856 windirstat.exe Token: SeBackupPrivilege 1856 windirstat.exe Token: SeBackupPrivilege 1856 windirstat.exe Token: SeBackupPrivilege 1856 windirstat.exe Token: SeBackupPrivilege 1856 windirstat.exe Token: SeBackupPrivilege 1856 windirstat.exe Token: SeBackupPrivilege 1856 windirstat.exe Token: SeBackupPrivilege 1856 windirstat.exe Token: SeBackupPrivilege 1856 windirstat.exe Token: SeBackupPrivilege 1856 windirstat.exe Token: SeBackupPrivilege 1856 windirstat.exe Token: SeBackupPrivilege 1856 windirstat.exe Token: SeBackupPrivilege 1856 windirstat.exe Token: SeBackupPrivilege 1856 windirstat.exe Token: SeBackupPrivilege 1856 windirstat.exe Token: SeBackupPrivilege 1856 windirstat.exe Token: SeBackupPrivilege 1856 windirstat.exe Token: SeBackupPrivilege 1856 windirstat.exe Token: SeBackupPrivilege 1856 windirstat.exe Token: SeBackupPrivilege 1856 windirstat.exe Token: SeBackupPrivilege 1856 windirstat.exe Token: SeBackupPrivilege 1856 windirstat.exe Token: SeBackupPrivilege 1856 windirstat.exe Token: SeBackupPrivilege 1856 windirstat.exe Token: SeBackupPrivilege 1856 windirstat.exe Token: SeBackupPrivilege 1856 windirstat.exe Token: SeBackupPrivilege 1856 windirstat.exe Token: SeBackupPrivilege 1856 windirstat.exe Token: SeBackupPrivilege 1856 windirstat.exe Token: SeBackupPrivilege 1856 windirstat.exe Token: SeBackupPrivilege 1856 windirstat.exe Token: SeBackupPrivilege 1856 windirstat.exe Token: SeBackupPrivilege 1856 windirstat.exe Token: SeBackupPrivilege 1856 windirstat.exe Token: SeBackupPrivilege 1856 windirstat.exe Token: SeBackupPrivilege 1856 windirstat.exe Token: SeBackupPrivilege 1856 windirstat.exe Token: SeBackupPrivilege 1856 windirstat.exe Token: SeBackupPrivilege 1856 windirstat.exe Token: SeBackupPrivilege 1856 windirstat.exe Token: SeBackupPrivilege 1856 windirstat.exe Token: SeBackupPrivilege 1856 windirstat.exe Token: SeBackupPrivilege 1856 windirstat.exe Token: SeBackupPrivilege 1856 windirstat.exe Token: SeBackupPrivilege 1856 windirstat.exe Token: SeBackupPrivilege 1856 windirstat.exe Token: SeBackupPrivilege 1856 windirstat.exe Token: SeBackupPrivilege 1856 windirstat.exe Token: SeBackupPrivilege 1856 windirstat.exe Token: SeBackupPrivilege 1856 windirstat.exe Token: SeBackupPrivilege 1856 windirstat.exe Token: SeBackupPrivilege 1856 windirstat.exe Token: SeBackupPrivilege 1856 windirstat.exe Token: SeBackupPrivilege 1856 windirstat.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
windirstat.exepid process 1856 windirstat.exe 1856 windirstat.exe 1856 windirstat.exe 1856 windirstat.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
windirstat1_1_2_setup.exedescription pid process target process PID 2236 wrote to memory of 1856 2236 windirstat1_1_2_setup.exe windirstat.exe PID 2236 wrote to memory of 1856 2236 windirstat1_1_2_setup.exe windirstat.exe PID 2236 wrote to memory of 1856 2236 windirstat1_1_2_setup.exe windirstat.exe PID 2236 wrote to memory of 1856 2236 windirstat1_1_2_setup.exe windirstat.exe PID 2236 wrote to memory of 1856 2236 windirstat1_1_2_setup.exe windirstat.exe PID 2236 wrote to memory of 1856 2236 windirstat1_1_2_setup.exe windirstat.exe PID 2236 wrote to memory of 1856 2236 windirstat1_1_2_setup.exe windirstat.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\windirstat1_1_2_setup.exe"C:\Users\Admin\AppData\Local\Temp\windirstat1_1_2_setup.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Program Files (x86)\WinDirStat\windirstat.exe"C:\Program Files (x86)\WinDirStat\windirstat.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1856
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\WinDirStat\windirstat.exeFilesize
636KB
MD524cd9a82fcfc658dd3ae7ba25c958ffb
SHA126e14a532e1e050eb20755a0b7a5fea99dd80588
SHA256cc3ee246f2710dc9ba9e2a88e3192b88f1db4caa2eefb8641642a33df04e585c
SHA5124de675be1f7d618d133ef24765a027840473e0c5bc93550d5e5fdbf078edc74c2241e6e3cd8753517e2954c7f09b9909028de7b727294d723fb5700658c7979d
-
C:\Program Files (x86)\WinDirStat\windirstat.exeFilesize
636KB
MD524cd9a82fcfc658dd3ae7ba25c958ffb
SHA126e14a532e1e050eb20755a0b7a5fea99dd80588
SHA256cc3ee246f2710dc9ba9e2a88e3192b88f1db4caa2eefb8641642a33df04e585c
SHA5124de675be1f7d618d133ef24765a027840473e0c5bc93550d5e5fdbf078edc74c2241e6e3cd8753517e2954c7f09b9909028de7b727294d723fb5700658c7979d
-
C:\Program Files (x86)\WinDirStat\windirstat.exeFilesize
636KB
MD524cd9a82fcfc658dd3ae7ba25c958ffb
SHA126e14a532e1e050eb20755a0b7a5fea99dd80588
SHA256cc3ee246f2710dc9ba9e2a88e3192b88f1db4caa2eefb8641642a33df04e585c
SHA5124de675be1f7d618d133ef24765a027840473e0c5bc93550d5e5fdbf078edc74c2241e6e3cd8753517e2954c7f09b9909028de7b727294d723fb5700658c7979d
-
C:\Users\Admin\AppData\Local\Temp\nsyE36E.tmp\InstallOptions.dllFilesize
14KB
MD59b2ad0546fd834c01a3bdcbfbc95da7d
SHA14f92f5a6b269d969ba3340f1c1978d337992a62c
SHA2567e08cb4ff81dbb0573c672301681e31b2042682e9a2204673f811455f823dd37
SHA5125b374fe7cc8d6ff8b93cfcc8deae23f2313f8240c998d04d3e65c196b33c7d36a33930ffd481cdd6d30aa4c73dd2a1c6fe43791e9bf10bd71b33321a8e71c6b8
-
C:\Users\Admin\AppData\Local\Temp\nsyE36E.tmp\System.dllFilesize
10KB
MD54125926391466fdbe8a4730f2374b033
SHA1fdd23034ada72d2537939ac6755d7f7c0e9b3f0e
SHA2566692bd93bcd04146831652780c1170da79aa3784c3c070d95fb1580e339de6c5
SHA51232a1cf96842454b3c3641316ee39051ae024bdce9e88ac236eadad531f2c0a08d46b77d525f7d994c9a5af4cc9a391d30ee92b9ec782b7fb9a42c76f0f52a008
-
C:\Users\Admin\AppData\Local\Temp\nsyE36E.tmp\ioSpecial.iniFilesize
790B
MD5be46cd566f911d57baaff5cf1c20a82e
SHA124b30cfbf05c43357c688d75d72b50b7e1b38ec9
SHA2567b330b349b7c20e01f4758a9fc4be093237cdda0ce3b062714bfa495919888a1
SHA512ecaf4cb9fc6d6df41b2efe98fe126630180e09ef721e7722bf37939913796db698df62c698d8a1ca34316f108bd960b4a715ed2778940a584989974a80507cef
-
C:\Users\Admin\AppData\Local\Temp\nsyE36E.tmp\ioSpecial.iniFilesize
799B
MD5ce69ba91cfc6296bc5a89f3b90d43a48
SHA10653b9e5a939f44868f29d435969bc6387056b25
SHA2569bd153883abfcf777f0033d9d375bd3d5217a9e56883dbe513a265fd1f72305f
SHA51238ce9ef0b1c124c139d12874fea78dd5c9966e610812d8917fd067b5bba041d16eff922b43d4672fff4b0750968e046d8f597b9331be69f66743999c5c4c3eed
-
C:\Users\Admin\AppData\Local\Temp\nsyE36E.tmp\ioSpecial.iniFilesize
725B
MD57424d1392a6b063304704938ef64a97f
SHA1912229e5f82df899eeca36d2e88663d388d575f9
SHA256ffd102d3f4698333bcd8c2bf4f8b1f8c25ab66d38a62cd8da8e39a0a73c4453b
SHA512ef674f9a366704bc5c2f41223ff646974b245545e65dfc0994b8bda52dad6f6296bffde2399babc6bb690165602118a73869ad61cc4e3893c570eccc8546d65e
-
C:\Users\Admin\Desktop\WinDirStat.lnkFilesize
1KB
MD5c49cbd76b01262ee158b84ccbb9623ae
SHA1ebbdfa994f0d57bd70eeaf8b42a6eaf389265cec
SHA256447b02cca3f7bf8f12cf33fcf88379912930997d427afcf02de8bbf4fb88ff62
SHA512beb0caec9045c367e931bb47d5e15beaa652ffa0f61b0946d9d1ac9d1526b12f6321692c5c6d693f077ba72915b0f1a5a3a87681a7fe45fc01e84a9ea0b1a67d
-
\Program Files (x86)\WinDirStat\Uninstall.exeFilesize
46KB
MD5a127e6118b9dd2f9d5a7cc4d697a0105
SHA19ac17d4dcf0884ceafacf10c42209c0942dfe7a8
SHA256afc864cfce79b2a6add491a27ea672d958233ed7a97a2cbbce60100d2fa1e670
SHA5120e57d2856c02c55d477d9b3cc1d4bf5ffa3650d4b20be18b0a9e614d19143aee325c4cd92ff31bbddf6e93cd3ebeb47d8727de6e25faa366341cc71117122065
-
\Program Files (x86)\WinDirStat\windirstat.exeFilesize
636KB
MD524cd9a82fcfc658dd3ae7ba25c958ffb
SHA126e14a532e1e050eb20755a0b7a5fea99dd80588
SHA256cc3ee246f2710dc9ba9e2a88e3192b88f1db4caa2eefb8641642a33df04e585c
SHA5124de675be1f7d618d133ef24765a027840473e0c5bc93550d5e5fdbf078edc74c2241e6e3cd8753517e2954c7f09b9909028de7b727294d723fb5700658c7979d
-
\Program Files (x86)\WinDirStat\windirstat.exeFilesize
636KB
MD524cd9a82fcfc658dd3ae7ba25c958ffb
SHA126e14a532e1e050eb20755a0b7a5fea99dd80588
SHA256cc3ee246f2710dc9ba9e2a88e3192b88f1db4caa2eefb8641642a33df04e585c
SHA5124de675be1f7d618d133ef24765a027840473e0c5bc93550d5e5fdbf078edc74c2241e6e3cd8753517e2954c7f09b9909028de7b727294d723fb5700658c7979d
-
\Program Files (x86)\WinDirStat\windirstat.exeFilesize
636KB
MD524cd9a82fcfc658dd3ae7ba25c958ffb
SHA126e14a532e1e050eb20755a0b7a5fea99dd80588
SHA256cc3ee246f2710dc9ba9e2a88e3192b88f1db4caa2eefb8641642a33df04e585c
SHA5124de675be1f7d618d133ef24765a027840473e0c5bc93550d5e5fdbf078edc74c2241e6e3cd8753517e2954c7f09b9909028de7b727294d723fb5700658c7979d
-
\Program Files (x86)\WinDirStat\windirstat.exeFilesize
636KB
MD524cd9a82fcfc658dd3ae7ba25c958ffb
SHA126e14a532e1e050eb20755a0b7a5fea99dd80588
SHA256cc3ee246f2710dc9ba9e2a88e3192b88f1db4caa2eefb8641642a33df04e585c
SHA5124de675be1f7d618d133ef24765a027840473e0c5bc93550d5e5fdbf078edc74c2241e6e3cd8753517e2954c7f09b9909028de7b727294d723fb5700658c7979d
-
\Program Files (x86)\WinDirStat\windirstat.exeFilesize
636KB
MD524cd9a82fcfc658dd3ae7ba25c958ffb
SHA126e14a532e1e050eb20755a0b7a5fea99dd80588
SHA256cc3ee246f2710dc9ba9e2a88e3192b88f1db4caa2eefb8641642a33df04e585c
SHA5124de675be1f7d618d133ef24765a027840473e0c5bc93550d5e5fdbf078edc74c2241e6e3cd8753517e2954c7f09b9909028de7b727294d723fb5700658c7979d
-
\Program Files (x86)\WinDirStat\windirstat.exeFilesize
636KB
MD524cd9a82fcfc658dd3ae7ba25c958ffb
SHA126e14a532e1e050eb20755a0b7a5fea99dd80588
SHA256cc3ee246f2710dc9ba9e2a88e3192b88f1db4caa2eefb8641642a33df04e585c
SHA5124de675be1f7d618d133ef24765a027840473e0c5bc93550d5e5fdbf078edc74c2241e6e3cd8753517e2954c7f09b9909028de7b727294d723fb5700658c7979d
-
\Program Files (x86)\WinDirStat\windirstat.exeFilesize
636KB
MD524cd9a82fcfc658dd3ae7ba25c958ffb
SHA126e14a532e1e050eb20755a0b7a5fea99dd80588
SHA256cc3ee246f2710dc9ba9e2a88e3192b88f1db4caa2eefb8641642a33df04e585c
SHA5124de675be1f7d618d133ef24765a027840473e0c5bc93550d5e5fdbf078edc74c2241e6e3cd8753517e2954c7f09b9909028de7b727294d723fb5700658c7979d
-
\Users\Admin\AppData\Local\Temp\nsyE36E.tmp\InstallOptions.dllFilesize
14KB
MD59b2ad0546fd834c01a3bdcbfbc95da7d
SHA14f92f5a6b269d969ba3340f1c1978d337992a62c
SHA2567e08cb4ff81dbb0573c672301681e31b2042682e9a2204673f811455f823dd37
SHA5125b374fe7cc8d6ff8b93cfcc8deae23f2313f8240c998d04d3e65c196b33c7d36a33930ffd481cdd6d30aa4c73dd2a1c6fe43791e9bf10bd71b33321a8e71c6b8
-
\Users\Admin\AppData\Local\Temp\nsyE36E.tmp\System.dllFilesize
10KB
MD54125926391466fdbe8a4730f2374b033
SHA1fdd23034ada72d2537939ac6755d7f7c0e9b3f0e
SHA2566692bd93bcd04146831652780c1170da79aa3784c3c070d95fb1580e339de6c5
SHA51232a1cf96842454b3c3641316ee39051ae024bdce9e88ac236eadad531f2c0a08d46b77d525f7d994c9a5af4cc9a391d30ee92b9ec782b7fb9a42c76f0f52a008
-
\Users\Admin\AppData\Local\Temp\nsyE36E.tmp\System.dllFilesize
10KB
MD54125926391466fdbe8a4730f2374b033
SHA1fdd23034ada72d2537939ac6755d7f7c0e9b3f0e
SHA2566692bd93bcd04146831652780c1170da79aa3784c3c070d95fb1580e339de6c5
SHA51232a1cf96842454b3c3641316ee39051ae024bdce9e88ac236eadad531f2c0a08d46b77d525f7d994c9a5af4cc9a391d30ee92b9ec782b7fb9a42c76f0f52a008