Analysis

  • max time kernel
    142s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    12-01-2024 21:10

General

  • Target

    windirstat1_1_2_setup.exe

  • Size

    630KB

  • MD5

    3abf1c149873e25d4e266225fbf37cbf

  • SHA1

    6fa92dd2ca691c11dfbfc0a239e34369897a7fab

  • SHA256

    370a27a30ee57247faddeb1f99a83933247e07c8760a07ed82e451e1cb5e5cdd

  • SHA512

    b6d9672a580a02299bc370deb1fd99b5ca10ab86456385870cdae522c185ae51f8d390a7c50fcb5c7898523f52c834bb73515ffc6d0b0bcde210640e815ece9e

  • SSDEEP

    12288:yCjeMsiGVBKvjxTNlZaLlcMj+wXZvQpd9nP2+ZMU2tYspZcMwr/GNd35:yCjeTZa7BTsxewXZUTP2HU2yawjY5

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 11 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 2 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • NSIS installer 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\windirstat1_1_2_setup.exe
    "C:\Users\Admin\AppData\Local\Temp\windirstat1_1_2_setup.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2932
    • C:\Program Files (x86)\WinDirStat\windirstat.exe
      "C:\Program Files (x86)\WinDirStat\windirstat.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Enumerates connected drives
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:1504

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\WinDirStat\windirstat.chm
    Filesize

    50KB

    MD5

    1bddb8a0e0f9cd90a5b3936ec2c2c4cf

    SHA1

    c8302168fb532fe03e76cb8a82aa53b49ee0bc44

    SHA256

    1e87c07744054709d271337d8ce06929429b334d70875605cb68ecc4c6610cd1

    SHA512

    b857de9026b3eab13f4dbc464e6403835e3a61e5e9e3566735bf1ddd8dedc4ecf08807b27207bd8b385250b71ea234b301dd49e6f3c90f1270ae03868c035472

  • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\WinDirStat\Help (ENG).lnk
    Filesize

    1KB

    MD5

    8fadddb48d81ecc223182974fd0bac4e

    SHA1

    4fc95f0308c7b8eab1298b96f87a76a174defc92

    SHA256

    a2bb36b7d40b414b37c2cbdd533bfe97364d54cd1f2f481944a6b2f8f29b01a0

    SHA512

    c15f7c0861d7359b86d184fd6435dc9a49364081bea24c8fa6cf00937f616fe95cc9e89fc4ddd1368b116cb1ec81aeec36047b4b78c50dc67843867967870f3e

  • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\WinDirStat\Uninstall WinDirStat.lnk
    Filesize

    1KB

    MD5

    52814f120f6e77615bc94b55fba525b3

    SHA1

    34a3f822e7c723ab29aa441135f9f7df4c9b4829

    SHA256

    a310c25dc2b8b5255d262d9bd87500ad48b176ebaa088eabf7455dbd0bc1c00b

    SHA512

    0ed48781cb49ca3ac4204b7b057fddecce11a2df02b43c6d20427e9e376f3723bcb96c3b57f6ccabe4d9909a9916d47b27d3d25b46c5574406fa4a3dd9fd1932

  • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\WinDirStat\WinDirStat.lnk
    Filesize

    1KB

    MD5

    b5457cceaea2fbc9572c229651549972

    SHA1

    530535aa1a1541ff30155176264c07fc4686d546

    SHA256

    74e1f8a223ac1b10e02b5edff57f4f61138044ba45df9732b4328105957b2f69

    SHA512

    146e47841e347b4045a8517e99138abbb109173c9888508c2345638601bc681c6e5c2ade607e65d79384e5bd8c3167792648b1b15f67dc9218d1b3eb587677b5

  • C:\Users\Admin\AppData\Local\Temp\nso3A64.tmp\ioSpecial.ini
    Filesize

    738B

    MD5

    2b369169d6c32aaa13041b25bbe2b065

    SHA1

    2e06f87c00e9fff9037a31d8d4ba85ca3aea7d8d

    SHA256

    e7afa5bffb7b115a57dfd8aa8cd5b1e956a465171c34d88585795edd922f2228

    SHA512

    7a5def69ef47146a24baf4fe9d080cd52919ece688da96174180284e8cdf086b7a133437099914694de44cc3cb429d24cc72d0ddb11537ef434869fcf6c20921

  • C:\Users\Admin\AppData\Local\Temp\nso3A64.tmp\ioSpecial.ini
    Filesize

    799B

    MD5

    1b67c5b04e6d2851dcbad65c1ee37bde

    SHA1

    a63a6c0228b82a3f7e15d69ac27c7ba3aa473942

    SHA256

    4fcc6ffe9f4a5bd04d95ccbb05da876b47636ff9f735ef9c759dccd4e20aecd6

    SHA512

    2aa6073fcc57f708e4b5161860a249e22a5143d37c1bdfb1cab384aae21d8794b2e49e008448b655e3a528669f67209e757be6c81cab69c0d9c8c43a4a58d84b

  • C:\Users\Admin\AppData\Local\Temp\nso3A64.tmp\ioSpecial.ini
    Filesize

    725B

    MD5

    15d00a0c6c553a5b7ad060dac9dd2103

    SHA1

    982a9c902392118e68dfdca5edd2e6bad73d6f1b

    SHA256

    1506b46f0db95205caea6c946a41acf1380c6316ed7071b8968ac5b3fc0798c5

    SHA512

    bed760f14051163e24bc55385b04a96824266cc2be712fcc8c2691ceac88a1a6dcd2804180c6356b65f1063d50f1cb866842772ff7bae0c80dad25781716b894

  • C:\Users\Admin\Desktop\WinDirStat.lnk
    Filesize

    1KB

    MD5

    451f547933ef4880d911a125269cc8c4

    SHA1

    f9845cb83ed038ade98ae6b5e12ff88ab3bb059b

    SHA256

    b11b5a2bf57f3bfc3ab97844dc513d8c7a20a896bd57930b1ddfedc063f1bc00

    SHA512

    44e65b4c891d44a8c0bd45691c9101fa875589ccaa263c43bb624825d2d0c64bf8db8581e931b59d84d9d58599dea1a7b3d5673d0d68847bbbf0a1b24883d60d

  • \Program Files (x86)\WinDirStat\Uninstall.exe
    Filesize

    46KB

    MD5

    a127e6118b9dd2f9d5a7cc4d697a0105

    SHA1

    9ac17d4dcf0884ceafacf10c42209c0942dfe7a8

    SHA256

    afc864cfce79b2a6add491a27ea672d958233ed7a97a2cbbce60100d2fa1e670

    SHA512

    0e57d2856c02c55d477d9b3cc1d4bf5ffa3650d4b20be18b0a9e614d19143aee325c4cd92ff31bbddf6e93cd3ebeb47d8727de6e25faa366341cc71117122065

  • \Program Files (x86)\WinDirStat\windirstat.exe
    Filesize

    636KB

    MD5

    24cd9a82fcfc658dd3ae7ba25c958ffb

    SHA1

    26e14a532e1e050eb20755a0b7a5fea99dd80588

    SHA256

    cc3ee246f2710dc9ba9e2a88e3192b88f1db4caa2eefb8641642a33df04e585c

    SHA512

    4de675be1f7d618d133ef24765a027840473e0c5bc93550d5e5fdbf078edc74c2241e6e3cd8753517e2954c7f09b9909028de7b727294d723fb5700658c7979d

  • \Users\Admin\AppData\Local\Temp\nso3A64.tmp\InstallOptions.dll
    Filesize

    14KB

    MD5

    9b2ad0546fd834c01a3bdcbfbc95da7d

    SHA1

    4f92f5a6b269d969ba3340f1c1978d337992a62c

    SHA256

    7e08cb4ff81dbb0573c672301681e31b2042682e9a2204673f811455f823dd37

    SHA512

    5b374fe7cc8d6ff8b93cfcc8deae23f2313f8240c998d04d3e65c196b33c7d36a33930ffd481cdd6d30aa4c73dd2a1c6fe43791e9bf10bd71b33321a8e71c6b8

  • \Users\Admin\AppData\Local\Temp\nso3A64.tmp\System.dll
    Filesize

    10KB

    MD5

    4125926391466fdbe8a4730f2374b033

    SHA1

    fdd23034ada72d2537939ac6755d7f7c0e9b3f0e

    SHA256

    6692bd93bcd04146831652780c1170da79aa3784c3c070d95fb1580e339de6c5

    SHA512

    32a1cf96842454b3c3641316ee39051ae024bdce9e88ac236eadad531f2c0a08d46b77d525f7d994c9a5af4cc9a391d30ee92b9ec782b7fb9a42c76f0f52a008