Analysis

  • max time kernel
    120s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    21/02/2024, 02:48

General

  • Target

    $PLUGINSDIR/OWInstaller.exe

  • Size

    297KB

  • MD5

    20be056350071fdd100d4b1c0d7384a9

  • SHA1

    e57532b05e66a50ee95c012da08eba3625fa8614

  • SHA256

    d5d3dc22533ff99c15a3df37d6a05ee574ddc18db09e97bc588eee8a733a5843

  • SHA512

    84a5655618bdf34f70f315b0a648baf8bebe4765c98b990bdec9e26dca8ab442969b51cca899387856e5b25a2fca2e29fe8808c8c6ba13075a306e4b19dad5b1

  • SSDEEP

    6144:uM4vsZuOH4vfyMwvQwEPUI7V09b4qoSIm9t06232IL9plTwcu:uM4vsYO3EPrJkoSN0TLz

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies registry class 34 IoCs
  • Modifies system certificate store 2 TTPs 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\OWInstaller.exe
    "C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\OWInstaller.exe"
    1⤵
    • Modifies Internet Explorer settings
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2652
    • C:\Windows\System32\DxDiag.exe
      "C:\Windows\System32\DxDiag.exe" /tC:\Users\Admin\AppData\Local\Overwolf\Temp\DxDiagOutput.txt
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2704
      • C:\Windows\SysWOW64\dxdiag.exe
        "C:\Windows\SysWOW64\dxdiag.exe" /tC:\Users\Admin\AppData\Local\Overwolf\Temp\DxDiagOutput.txt
        3⤵
        • Drops file in Windows directory
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:2832

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\070E0202839D9D67350CD2613E78E416

    Filesize

    1KB

    MD5

    55540a230bdab55187a841cfe1aa1545

    SHA1

    363e4734f757bdeb89868efe94907774a327695e

    SHA256

    d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb

    SHA512

    c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416

    Filesize

    230B

    MD5

    d7cb399c6cd63b3c78b6c55ff08713be

    SHA1

    fee8c50df53986252ec74c0ef0790fbc1c61f4aa

    SHA256

    5e25c4d85610ed7065ec22fd51a2bf68e92d20624d18b7fad3601423987f7b09

    SHA512

    fbee71c22027399b0a9e1bef0441d4bc54cb7c6ae6e72968bf11c1bf19854f42ef9543686dd3150049519f8cf5310bb5b52b2973d6c03c155b6fdad131ce6c5e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    c5651957e540d043d77da2a251258a7a

    SHA1

    2bfe101dec58ba71d1476c3024d0a4d821f6432b

    SHA256

    9f6fd2c946fe6b0ba4ae6e87c4b1c2aaf2f64a0a774c69a9c1d2da9596daff3d

    SHA512

    44d82e14f7fa321ba75666af15674b3a513508c7be0cb443a23224c84f246f61cf6c0ebfdee2704d6edd9209873c222ae3ba16fbf56ffbc5af6a4cef3c591ede

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    4a8e651d530084361593c10e30523b63

    SHA1

    0b1c8ec79fd7af81183e54547e7477315f015185

    SHA256

    9b4fa600613a957ea40eb5a1f93e3d96a4209a80464cb2f39f8da5a2e91c9762

    SHA512

    14b92c14dbdd59be9da0e8c3e1ec2ef46e6722654ecaf02555b7f5edc676013c669438152b94a5bec6856c106dc10596b93c295b5d1d371a376cbd9bf4e06ed7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    44a1004645c45acfaf6221645984cfd2

    SHA1

    199e31eb98347128ffcd63b10dbba567165638aa

    SHA256

    f9bfc9265f171c14457ec5a6a35d8babdab0b6c02ed73e5c33017e573a3a57d7

    SHA512

    21a18df42c9782706592c3264a2943fcb843bd54de1a982d77249642117e85f236f0988405ae0d1fa4d9ba5f87a975d917dbf80c94b878b3746336eded3f8e29

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    fcd42f1b54a25b6feb6a3c56e3c2a61a

    SHA1

    3427541e8a238475db38b9216bea8f265e5e8352

    SHA256

    41befc92d89ff677726fd9a6021da250bda1f4445b6ce4bcdc329298c5fb9b29

    SHA512

    73a514298b06ed026817882e13468d02c37e50af0b767d8bc256cf4e17c1f99028eeaedbe4796d8fb802ee8c305eff65cdf73a2838c636ec9050212124abe99c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    33a532beb57a9dcecf009e3d45efa7b0

    SHA1

    a811cd8544c5367495a42d030fe9e34590e1d1ef

    SHA256

    5f7ed6278df8181922c208dd311e6a35d9dfa54a8340b429570eca36db629060

    SHA512

    a16903e8a08df1049bf7d9b7bd2aac8ca8801e9233d1b62c8335d452bf9a53d3af6105a4f22b717a144f6e435f3c9929868bdb715a713fea6e2872ba8daec0ae

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    6c26c80f3795bcfe07f1b6bdc1031e17

    SHA1

    1ecee6dba9a72b2fdd1d6b44ea3e17ff51da50c3

    SHA256

    8ad3ed2805cc7e93a97f3ed07dad466c97efd1cfcc81f183ef3f2da025be7abc

    SHA512

    65cf3d13576a66cd35f624ca87e128569c610c12ee81185e092869ba04bba4a923ede25ffea9e74b2e32b9f5415e8592526eeeea969b58ccaec45a165c6a8e1f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    1dab8dce66be8502b08406808848825e

    SHA1

    689be285762d47f24159e1b2336ce3bd97d05b91

    SHA256

    30bbf0451e79a957fc2988ab144ae7160c7cb1dbbd064e8390f4222fef4662e2

    SHA512

    4869dc26bbf88a6b5929802bdc6c06aea7cb277cb7ef77aebe3f957eeb7c15f195ddd7fd8abc52a19047a4d9dbb6c3387db90d72d5fce87a2f6dc6ba41673e61

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    bd7305e28cab4f698070db89b2b24839

    SHA1

    211848c8f41beb5a4463c3bf5e589303fb7de1a3

    SHA256

    124bd1d86b5443295d5a1886f84fc85e215dab269d75df0c6f1b3584b87f4257

    SHA512

    ae09297f34fd3d1ab01fee3ba96080e77072595e98d2318625726ccf63eb31365299f4e8fe5883c6c01a96132fa6f83c067856c01449c8f5516cdd582c18b161

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    aaef2a1daccd2713f028a08b3845d310

    SHA1

    5311e24a4589460ac92bbbc6a9ee70c8ee532e13

    SHA256

    eddfd8de95d488988d2bc8cca3b61b323240dac287ace2e70f3bc92c03ec48bb

    SHA512

    eacbce93b70315830a9c0325c884d72d7fcfd10320392132837526d69528961450c681e784c2697ea6d1f5d12e1c4db866fabef75f0a7162d8589052a579b6fb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    6eabfdfa093ba1a61778e5744b9a5b0d

    SHA1

    c40ec23821731a7869a86625b5d7b401c577ed3e

    SHA256

    0c8d3c013f82b7cab865cb839fb7f6a09dd553e29a7c355bd4e8f57a9aa29e7b

    SHA512

    e98d6189448abaa805a3c0eb3aebb88779ad7f16ee1e87c415abe114eb2a78b79b64b7542a6f33e96bad376cbaf6462c7949c3c7ed75fbc19255a50b7d4cbaac

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    ddaf234e0c55569c479f0c97d0b96bb4

    SHA1

    20db494cb82920dc0d0a2f06931109be62c9b216

    SHA256

    caace1508ff4d466107253deb6e212d654bad8028d80fe0fbf4e43fe6e6a979b

    SHA512

    30ea3cd241984303c29e84c0ad657e82fb85f77819ac5c236c9f3c682a680811728168504a7c2dca5498f435254b1afb2f07e8700cd2216f92e5810b0446a911

  • C:\Users\Admin\AppData\Local\Overwolf\Settings\SettingsPageBasic.xml

    Filesize

    752B

    MD5

    9be761181e6ec671df5cbaa2ab787117

    SHA1

    096c0c2a704089872b6cbba3b0dc858de067673e

    SHA256

    cf9de2c889f23ed8ddd2d4cd664a46f32764af9fe35b15b419df17eaf4beea4f

    SHA512

    d90c2725f80bbc777033a786de705a427575f466cafd31b6e2298e86342ba21eec5ed294b4f27b7d8353c7d44ba59ab033f96c734d6b409f5b995a768ba04295

  • C:\Users\Admin\AppData\Local\Overwolf\Temp\DxDiagOutput.txt

    Filesize

    15KB

    MD5

    d0797f13648895e6498d11bcd8cac6ea

    SHA1

    6411f8c4350f130b32ad9b25081b754fb51b564d

    SHA256

    c26ed4c1a8640c1b6e4b373d0731b98d7f6a74f7715ab602bc3190f7ee019cd7

    SHA512

    4ba487edd1bd49da9554bf0a4bbec8dca98c821a8b0fe8306aaaf33314410b8c1d619250a479282e39c46e4f4bb6a386fa03161c74a835f9dbaf985909a35577

  • C:\Users\Admin\AppData\Local\Temp\Tar1578.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

  • memory/2652-36-0x000000001CA70000-0x000000001CAF0000-memory.dmp

    Filesize

    512KB

  • memory/2652-5-0x0000000000B30000-0x0000000000B48000-memory.dmp

    Filesize

    96KB

  • memory/2652-838-0x000000001CA70000-0x000000001CAF0000-memory.dmp

    Filesize

    512KB

  • memory/2652-41-0x0000000026340000-0x0000000026AE6000-memory.dmp

    Filesize

    7.6MB

  • memory/2652-839-0x000000001CA70000-0x000000001CAF0000-memory.dmp

    Filesize

    512KB

  • memory/2652-840-0x000000001CA70000-0x000000001CAF0000-memory.dmp

    Filesize

    512KB

  • memory/2652-13-0x000000001B6A0000-0x000000001B750000-memory.dmp

    Filesize

    704KB

  • memory/2652-43-0x000000001DDD0000-0x000000001DDF0000-memory.dmp

    Filesize

    128KB

  • memory/2652-4-0x000000001CA70000-0x000000001CAF0000-memory.dmp

    Filesize

    512KB

  • memory/2652-3-0x0000000000680000-0x00000000006C6000-memory.dmp

    Filesize

    280KB

  • memory/2652-2-0x00000000008F0000-0x000000000098E000-memory.dmp

    Filesize

    632KB

  • memory/2652-1-0x000007FEF5D00000-0x000007FEF66EC000-memory.dmp

    Filesize

    9.9MB

  • memory/2652-0-0x000000013F6B0000-0x000000013F6FC000-memory.dmp

    Filesize

    304KB

  • memory/2652-841-0x000000001DDD0000-0x000000001DDF0000-memory.dmp

    Filesize

    128KB

  • memory/2652-837-0x000007FEF5D00000-0x000007FEF66EC000-memory.dmp

    Filesize

    9.9MB

  • memory/2832-40-0x00000000022B0000-0x00000000022BA000-memory.dmp

    Filesize

    40KB

  • memory/2832-809-0x0000000002870000-0x000000000289A000-memory.dmp

    Filesize

    168KB

  • memory/2832-807-0x00000000022B0000-0x00000000022B5000-memory.dmp

    Filesize

    20KB

  • memory/2832-39-0x00000000022B0000-0x00000000022BA000-memory.dmp

    Filesize

    40KB

  • memory/2832-52-0x0000000002E90000-0x0000000002EEC000-memory.dmp

    Filesize

    368KB

  • memory/2832-51-0x0000000002340000-0x000000000234A000-memory.dmp

    Filesize

    40KB

  • memory/2832-50-0x0000000002340000-0x000000000234A000-memory.dmp

    Filesize

    40KB

  • memory/2832-842-0x0000000002870000-0x000000000289A000-memory.dmp

    Filesize

    168KB