Analysis

  • max time kernel
    121s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    13/02/2024, 02:30

General

  • Target

    $PLUGINSDIR/OWInstaller.exe

  • Size

    297KB

  • MD5

    cb0fdec0351bd03406e5c9b09840fa46

  • SHA1

    590d08d87583dbf3d96633e8805d9113ae7639bc

  • SHA256

    178c77481ea427cc4c61a65c7c01c8c22bdd2652d73111ad7cac733375c6a2cc

  • SHA512

    961fc5de32ef8e309e94a78471f48d37291334508d15d515e53623e94deb50ac4899ea36ba9688d15a2ffa1e755a51de9e2e1f9e3e2716a29778c0fe33ef3c63

  • SSDEEP

    6144:3M4vsZuOH4vfyMwvQwEPUI7V09b4qoSIm9t06232IL9plahcv:3M4vsYO3EPrJkoSN0TLl

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies registry class 34 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 17 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\OWInstaller.exe
    "C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\OWInstaller.exe"
    1⤵
    • Modifies Internet Explorer settings
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2532
    • C:\Windows\System32\DxDiag.exe
      "C:\Windows\System32\DxDiag.exe" /tC:\Users\Admin\AppData\Local\Overwolf\Temp\DxDiagOutput.txt
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2092
      • C:\Windows\SysWOW64\dxdiag.exe
        "C:\Windows\SysWOW64\dxdiag.exe" /tC:\Users\Admin\AppData\Local\Overwolf\Temp\DxDiagOutput.txt
        3⤵
        • Drops file in Windows directory
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:2024

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6dc601b10790c3134c719f2d2e9d17e0

    SHA1

    a5c6c8892870426708be6d6219d868f07559e237

    SHA256

    7651e71ace61ef6ef61e2bf2c70f2a91907c64370c8457cff08a54dcae0bb269

    SHA512

    acb1c915b6ec25cadc5f25a7eb1d57543b4bc226141ad7b3cfd50503000328442358bbadfb5e096166ab32fedc534a374b70c461621a548af5749d87b636bb69

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1a52104e9f60dc2d8127271be21a00d5

    SHA1

    a0a5f9810f6d84ed689ab1f73a3dac32b5962ea9

    SHA256

    796338883b635c45a7dd6d1d0d095710744a214019e77d368a31aaec750fae20

    SHA512

    93019e003ace65c8a25925a17fe81fa8f68f339a90ed44852c2ddf9beb8bc27f67234027912f6d796cd6f48803a0250a4127d82fef7a18dd407478d1fa6a226a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    555ad2cc020378baa19a3a13a4016887

    SHA1

    75eb6c47d9614bf39d8d8255249d233046c97937

    SHA256

    b9235814a295b9e56742e101b2a094376eb89ebd132bd9a9df669062bce49678

    SHA512

    eeef03679934fe575846b06fc85c25dac853f48fe4efc83584e16c11b319a184e6d68234bcffc0ea5cd7fa04a500214ff576394dfce6fa93afb146f62eed8035

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    65e4c8d8c1d801581e016f47c476cdd6

    SHA1

    9f2b20972a4a3c405f7693fdc76b334f56078ccd

    SHA256

    f2a0040a5356b987ed34c5b114e24019af49735497527f5af96a396e61a9a9ed

    SHA512

    253e622f596067c8f344361871856446b1aaf00584bc71695cf203819f9faf56a2df291ca8feb608f3c1b288bbd42698c241dfbaa5c1b05fb07f9e6c175c2bef

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2f087e6eb273000744336a98127d0cf1

    SHA1

    fc02aca2854d8fada899573b6cb7843363befbec

    SHA256

    e0581bd1b840ea7728d1c88a694d3947efb9efd7a54e3ea0975bcdd7e483eb7f

    SHA512

    2e170b4ee4c801d6bbebb9fa778049421bf4910fa032c486f63ee9abac1180d63dea3ad911c63e54601e0dbb52fb6d81f71016819c4a0dd2f14872c545f58e0b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    65ae391916090298c8d607f248beddb9

    SHA1

    9adc1e2d9d90989b6d36e7fade1caba8bb94c29b

    SHA256

    89c7c31a1d7a63d5eceef24eed3fafaa37c2148d1e9b7c357d7f81ea077bfe48

    SHA512

    38f52a5f0af266d0b83df765fbf0c08bf1794b82fe677f862c5e4a0dc5b2d534fc270672cca9b7a9400bdd024ff031b35391fad09ccd2b690befd00056df2d30

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    be1310f0ad5430cef4cebfec049683fc

    SHA1

    51b927727a92fedda1d277feb661a88c8b15b11e

    SHA256

    d428d7c5065b209852bd7e531880f4903214c78bd633b0457bb2145678023f3d

    SHA512

    1cd5f3de62a6701cffabf4d416696fdc364e639475fc387cdba0ca166637f5f724e256694540b9fe016de7647986fa8dbdfc01e3f0b74fb628bfdd0b485ad7c0

  • C:\Users\Admin\AppData\Local\Overwolf\Settings\SettingsPageBasic.xml

    Filesize

    752B

    MD5

    50e4dec142edd86da4e484cb764d580b

    SHA1

    ae4c7e0a066277ec477da4ce432a04f101a55c2f

    SHA256

    6c3f999c1003af39bf84fe4673bfe1c3dfb5a0d3bc0b46a57f65fb0dc30d672a

    SHA512

    b7e0a4d073a4148f44cbc5c5bd349c6c4c0bb7e7aaeb8683a5845e5fecdf01617efd3ec4d989debc6dd8d739e4d326b669e3b24e6b970b762bfc2373fc2bc875

  • C:\Users\Admin\AppData\Local\Overwolf\Temp\DxDiagOutput.txt

    Filesize

    15KB

    MD5

    394c3e5ff316480d0ef51fd16da4fca3

    SHA1

    3ba3b9fa6dbb74388eb441d3c43e6c16d0b19c24

    SHA256

    e050722e2d626ae91cc8c3171c614f1c1fa38556101c8b1f7dcb271764dd543a

    SHA512

    057670f1d4d34d8d4edc4e61f8ece734270c8d027771128442e0a2ae2b5b939f054354390a64381df670ffc9a3f9ba191f120bac17ebbd08e63e37f105a780ae

  • C:\Users\Admin\AppData\Local\Temp\Cab65D5.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar6664.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

  • memory/2024-94-0x0000000003010000-0x000000000306C000-memory.dmp

    Filesize

    368KB

  • memory/2024-146-0x0000000003010000-0x000000000306C000-memory.dmp

    Filesize

    368KB

  • memory/2024-56-0x0000000001DC0000-0x0000000001DCA000-memory.dmp

    Filesize

    40KB

  • memory/2024-55-0x0000000001DC0000-0x0000000001DCA000-memory.dmp

    Filesize

    40KB

  • memory/2024-41-0x00000000004C0000-0x00000000004CA000-memory.dmp

    Filesize

    40KB

  • memory/2024-570-0x00000000004C0000-0x00000000004CA000-memory.dmp

    Filesize

    40KB

  • memory/2024-569-0x00000000020F0000-0x000000000211A000-memory.dmp

    Filesize

    168KB

  • memory/2024-568-0x00000000020F0000-0x000000000211A000-memory.dmp

    Filesize

    168KB

  • memory/2024-103-0x0000000003010000-0x000000000306C000-memory.dmp

    Filesize

    368KB

  • memory/2024-145-0x0000000003010000-0x000000000306C000-memory.dmp

    Filesize

    368KB

  • memory/2532-0-0x000000013F720000-0x000000013F76C000-memory.dmp

    Filesize

    304KB

  • memory/2532-2-0x00000000008D0000-0x000000000096E000-memory.dmp

    Filesize

    632KB

  • memory/2532-13-0x000000001C6D0000-0x000000001C780000-memory.dmp

    Filesize

    704KB

  • memory/2532-114-0x000007FEF5B60000-0x000007FEF654C000-memory.dmp

    Filesize

    9.9MB

  • memory/2532-5-0x0000000000970000-0x0000000000988000-memory.dmp

    Filesize

    96KB

  • memory/2532-4-0x000000001BAE0000-0x000000001BB60000-memory.dmp

    Filesize

    512KB

  • memory/2532-3-0x0000000002130000-0x0000000002176000-memory.dmp

    Filesize

    280KB

  • memory/2532-36-0x000000001BAE0000-0x000000001BB60000-memory.dmp

    Filesize

    512KB

  • memory/2532-565-0x000000001BAE0000-0x000000001BB60000-memory.dmp

    Filesize

    512KB

  • memory/2532-566-0x000000001BAE0000-0x000000001BB60000-memory.dmp

    Filesize

    512KB

  • memory/2532-54-0x0000000026680000-0x0000000026E26000-memory.dmp

    Filesize

    7.6MB

  • memory/2532-37-0x000000001BAE0000-0x000000001BB60000-memory.dmp

    Filesize

    512KB

  • memory/2532-40-0x000000001BAE0000-0x000000001BB60000-memory.dmp

    Filesize

    512KB

  • memory/2532-1-0x000007FEF5B60000-0x000007FEF654C000-memory.dmp

    Filesize

    9.9MB

  • memory/2532-576-0x000000001BAE0000-0x000000001BB60000-memory.dmp

    Filesize

    512KB