Analysis
-
max time kernel
174s -
max time network
194s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
05-01-2024 04:39
Static task
static1
Behavioral task
behavioral1
Sample
windirstat1_1_2_setup.exe
Resource
win7-20231129-en
General
-
Target
windirstat1_1_2_setup.exe
-
Size
630KB
-
MD5
3abf1c149873e25d4e266225fbf37cbf
-
SHA1
6fa92dd2ca691c11dfbfc0a239e34369897a7fab
-
SHA256
370a27a30ee57247faddeb1f99a83933247e07c8760a07ed82e451e1cb5e5cdd
-
SHA512
b6d9672a580a02299bc370deb1fd99b5ca10ab86456385870cdae522c185ae51f8d390a7c50fcb5c7898523f52c834bb73515ffc6d0b0bcde210640e815ece9e
-
SSDEEP
12288:yCjeMsiGVBKvjxTNlZaLlcMj+wXZvQpd9nP2+ZMU2tYspZcMwr/GNd35:yCjeTZa7BTsxewXZUTP2HU2yawjY5
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
windirstat.exepid process 3980 windirstat.exe -
Loads dropped DLL 3 IoCs
Processes:
windirstat1_1_2_setup.exepid process 728 windirstat1_1_2_setup.exe 728 windirstat1_1_2_setup.exe 728 windirstat1_1_2_setup.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 2 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
windirstat.exedescription ioc process File opened (read-only) \??\D: windirstat.exe File opened (read-only) \??\F: windirstat.exe -
Drops file in Program Files directory 4 IoCs
Processes:
windirstat1_1_2_setup.exedescription ioc process File created C:\Program Files (x86)\WinDirStat\wdsr040a.dll windirstat1_1_2_setup.exe File created C:\Program Files (x86)\WinDirStat\windirstat.chm windirstat1_1_2_setup.exe File created C:\Program Files (x86)\WinDirStat\Uninstall.exe windirstat1_1_2_setup.exe File created C:\Program Files (x86)\WinDirStat\windirstat.exe windirstat1_1_2_setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 1 IoCs
Processes:
resource yara_rule C:\Program Files (x86)\WinDirStat\Uninstall.exe nsis_installer_1 -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
windirstat1_1_2_setup.exewindirstat.exepid process 728 windirstat1_1_2_setup.exe 3980 windirstat.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
windirstat.exedescription pid process Token: SeBackupPrivilege 3980 windirstat.exe Token: SeBackupPrivilege 3980 windirstat.exe Token: SeBackupPrivilege 3980 windirstat.exe Token: SeBackupPrivilege 3980 windirstat.exe Token: SeBackupPrivilege 3980 windirstat.exe Token: SeBackupPrivilege 3980 windirstat.exe Token: SeBackupPrivilege 3980 windirstat.exe Token: SeBackupPrivilege 3980 windirstat.exe Token: SeBackupPrivilege 3980 windirstat.exe Token: SeBackupPrivilege 3980 windirstat.exe Token: SeBackupPrivilege 3980 windirstat.exe Token: SeBackupPrivilege 3980 windirstat.exe Token: SeBackupPrivilege 3980 windirstat.exe Token: SeBackupPrivilege 3980 windirstat.exe Token: SeBackupPrivilege 3980 windirstat.exe Token: SeBackupPrivilege 3980 windirstat.exe Token: SeBackupPrivilege 3980 windirstat.exe Token: SeBackupPrivilege 3980 windirstat.exe Token: SeBackupPrivilege 3980 windirstat.exe Token: SeBackupPrivilege 3980 windirstat.exe Token: SeBackupPrivilege 3980 windirstat.exe Token: SeBackupPrivilege 3980 windirstat.exe Token: SeBackupPrivilege 3980 windirstat.exe Token: SeBackupPrivilege 3980 windirstat.exe Token: SeBackupPrivilege 3980 windirstat.exe Token: SeBackupPrivilege 3980 windirstat.exe Token: SeBackupPrivilege 3980 windirstat.exe Token: SeBackupPrivilege 3980 windirstat.exe Token: SeBackupPrivilege 3980 windirstat.exe Token: SeBackupPrivilege 3980 windirstat.exe Token: SeBackupPrivilege 3980 windirstat.exe Token: SeBackupPrivilege 3980 windirstat.exe Token: SeBackupPrivilege 3980 windirstat.exe Token: SeBackupPrivilege 3980 windirstat.exe Token: SeBackupPrivilege 3980 windirstat.exe Token: SeBackupPrivilege 3980 windirstat.exe Token: SeBackupPrivilege 3980 windirstat.exe Token: SeBackupPrivilege 3980 windirstat.exe Token: SeBackupPrivilege 3980 windirstat.exe Token: SeBackupPrivilege 3980 windirstat.exe Token: SeBackupPrivilege 3980 windirstat.exe Token: SeBackupPrivilege 3980 windirstat.exe Token: SeBackupPrivilege 3980 windirstat.exe Token: SeBackupPrivilege 3980 windirstat.exe Token: SeBackupPrivilege 3980 windirstat.exe Token: SeBackupPrivilege 3980 windirstat.exe Token: SeBackupPrivilege 3980 windirstat.exe Token: SeBackupPrivilege 3980 windirstat.exe Token: SeBackupPrivilege 3980 windirstat.exe Token: SeBackupPrivilege 3980 windirstat.exe Token: SeBackupPrivilege 3980 windirstat.exe Token: SeBackupPrivilege 3980 windirstat.exe Token: SeBackupPrivilege 3980 windirstat.exe Token: SeBackupPrivilege 3980 windirstat.exe Token: SeBackupPrivilege 3980 windirstat.exe Token: SeBackupPrivilege 3980 windirstat.exe Token: SeBackupPrivilege 3980 windirstat.exe Token: SeBackupPrivilege 3980 windirstat.exe Token: SeBackupPrivilege 3980 windirstat.exe Token: SeBackupPrivilege 3980 windirstat.exe Token: SeBackupPrivilege 3980 windirstat.exe Token: SeBackupPrivilege 3980 windirstat.exe Token: SeBackupPrivilege 3980 windirstat.exe Token: SeBackupPrivilege 3980 windirstat.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
windirstat.exepid process 3980 windirstat.exe 3980 windirstat.exe 3980 windirstat.exe 3980 windirstat.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
windirstat1_1_2_setup.exedescription pid process target process PID 728 wrote to memory of 3980 728 windirstat1_1_2_setup.exe windirstat.exe PID 728 wrote to memory of 3980 728 windirstat1_1_2_setup.exe windirstat.exe PID 728 wrote to memory of 3980 728 windirstat1_1_2_setup.exe windirstat.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\windirstat1_1_2_setup.exe"C:\Users\Admin\AppData\Local\Temp\windirstat1_1_2_setup.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:728 -
C:\Program Files (x86)\WinDirStat\windirstat.exe"C:\Program Files (x86)\WinDirStat\windirstat.exe"2⤵
- Executes dropped EXE
- Enumerates connected drives
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3980
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\WinDirStat\Uninstall.exeFilesize
46KB
MD5a127e6118b9dd2f9d5a7cc4d697a0105
SHA19ac17d4dcf0884ceafacf10c42209c0942dfe7a8
SHA256afc864cfce79b2a6add491a27ea672d958233ed7a97a2cbbce60100d2fa1e670
SHA5120e57d2856c02c55d477d9b3cc1d4bf5ffa3650d4b20be18b0a9e614d19143aee325c4cd92ff31bbddf6e93cd3ebeb47d8727de6e25faa366341cc71117122065
-
C:\Program Files (x86)\WinDirStat\wdsr040a.dllFilesize
60KB
MD5cf69ec4f622ab3efc0d59c94c7861d3c
SHA18baa748295cb941e1693e4c2a298343fbfc5c048
SHA25675ca96992380e5b8e323310a01c8a68805ad76223197d2bdaecc03817d233dea
SHA512dcc99395fed596e6ef7a959731254093e73fa006a14b0ecbe6f780a9d8236428d9e90024e016d5f1bdbf323e1fe01ffa3727c9d09a8666ef2745dc56462ed6cf
-
C:\Program Files (x86)\WinDirStat\windirstat.chmFilesize
50KB
MD51bddb8a0e0f9cd90a5b3936ec2c2c4cf
SHA1c8302168fb532fe03e76cb8a82aa53b49ee0bc44
SHA2561e87c07744054709d271337d8ce06929429b334d70875605cb68ecc4c6610cd1
SHA512b857de9026b3eab13f4dbc464e6403835e3a61e5e9e3566735bf1ddd8dedc4ecf08807b27207bd8b385250b71ea234b301dd49e6f3c90f1270ae03868c035472
-
C:\Program Files (x86)\WinDirStat\windirstat.exeFilesize
636KB
MD524cd9a82fcfc658dd3ae7ba25c958ffb
SHA126e14a532e1e050eb20755a0b7a5fea99dd80588
SHA256cc3ee246f2710dc9ba9e2a88e3192b88f1db4caa2eefb8641642a33df04e585c
SHA5124de675be1f7d618d133ef24765a027840473e0c5bc93550d5e5fdbf078edc74c2241e6e3cd8753517e2954c7f09b9909028de7b727294d723fb5700658c7979d
-
C:\Users\Admin\AppData\Local\Temp\nsuB5D0.tmp\InstallOptions.dllFilesize
14KB
MD59b2ad0546fd834c01a3bdcbfbc95da7d
SHA14f92f5a6b269d969ba3340f1c1978d337992a62c
SHA2567e08cb4ff81dbb0573c672301681e31b2042682e9a2204673f811455f823dd37
SHA5125b374fe7cc8d6ff8b93cfcc8deae23f2313f8240c998d04d3e65c196b33c7d36a33930ffd481cdd6d30aa4c73dd2a1c6fe43791e9bf10bd71b33321a8e71c6b8
-
C:\Users\Admin\AppData\Local\Temp\nsuB5D0.tmp\System.dllFilesize
10KB
MD54125926391466fdbe8a4730f2374b033
SHA1fdd23034ada72d2537939ac6755d7f7c0e9b3f0e
SHA2566692bd93bcd04146831652780c1170da79aa3784c3c070d95fb1580e339de6c5
SHA51232a1cf96842454b3c3641316ee39051ae024bdce9e88ac236eadad531f2c0a08d46b77d525f7d994c9a5af4cc9a391d30ee92b9ec782b7fb9a42c76f0f52a008
-
C:\Users\Admin\AppData\Local\Temp\nsuB5D0.tmp\ioSpecial.iniFilesize
799B
MD53742046d04bd1a991231bdb2a34b6957
SHA1c91224b90dcfc459fd8f2c43c22d97523f454bfe
SHA2568dfee0e113f914de567996a49017b4cd33d13feba0ba4699924cede849feda38
SHA512881c8e142dcdb6ed59a7fe79c4b572a7bae55934e8ccd21196ca38d268b7244124171eb209d1eafeb18eaf3f9e828de285da9ce4c3713b21422f4ae4acbb4645
-
C:\Users\Admin\AppData\Local\Temp\nsuB5D0.tmp\ioSpecial.iniFilesize
725B
MD5ccbbf6a071aa5a36e4f8dac6d932c23f
SHA18600bac1b2e3925b4cb97d151ef48d81a899a3a5
SHA256e6d2ab2c02efc2dc0d4d3e489abcd7ab95467b06cd4c6161eebd1820670b1c0d
SHA51290ecf62b7ac72ce8dc36c4498f7dd2460ce6d3d88e6e600327c9cd4fbf049cf556e588c1a69278d336e65a570a0593f0d6663d768643cfc0a73b79c974dbbe36
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\WinDirStat\Help (ENG).lnkFilesize
1KB
MD5123cd38f35543702466ec17b4fa0db2c
SHA1bea19e4d7f2d3f8e64fd238025fb5ea944a84047
SHA2561602cc3938bf4fe3b4e954d3172b40250e469f63bd864cdd8f09e4c8dfdbf417
SHA51210ad9139f02e2c01a8b9c8f2b7311e0dd0e275eb300d33e0bc2b3ed9cbcaf95e48492a81abc649897f02f5639648328977f9c489800d0dfded6e8d1ae0565343
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\WinDirStat\Uninstall WinDirStat.lnkFilesize
1KB
MD5658a206bd1ef337f6d83bdcea9bee5fd
SHA16b00f2c0c33eff3c4198448e67757e65fca1183e
SHA256656fda20775ce23df271b421245793168286d4c2e1b7ff014309864e3082b6e0
SHA512663de8c3df71dfa1d1a89d16f6a7908bcf9ab17e757076c421d35f9d601545d9126dc691cb46a963a1cb5e1d108f96daa54d72e3c083a9afee40cd2318fdd400
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\WinDirStat\WinDirStat.lnkFilesize
1KB
MD534f76f56000af6e062470aa05591bfd0
SHA1e3e07e9d9a7bab3961bc49a280a45b88997158df
SHA2560dc2850d27f35dc9454b736465773f9f0ac4ae7918b3517be4c33f46cd75a639
SHA512d0fb3ded3312c3df2efba264c12ee7f5eef1e48bb5186cb24d2ae76515c3d01779fdd03ded87a08d88ca1676624b7e90e96498c7cd1597a090170cefaef4edb3
-
C:\Users\Admin\Desktop\WinDirStat.lnkFilesize
1KB
MD55a34efbb08a35e070bc6403c570b28e5
SHA149716bb793136660d52c57df6e110d1761e58a4d
SHA2564e1cc7bf8ee68db13fd751f3964d9d75345a7b96b5dcb8e0f27c1207551d1420
SHA512a4ff293fef8d6291b505ee40e5052aa89f2b85f17496614f97d5d73f7ca2e2340036ac0089e1f0460df5a4b93f1f6d8227746609101fe8d4992dc890e83014d6