Analysis

  • max time kernel
    436s
  • max time network
    442s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-03-2024 19:25

General

  • Target

    windirstat1_1_2_setup.exe

  • Size

    630KB

  • MD5

    3abf1c149873e25d4e266225fbf37cbf

  • SHA1

    6fa92dd2ca691c11dfbfc0a239e34369897a7fab

  • SHA256

    370a27a30ee57247faddeb1f99a83933247e07c8760a07ed82e451e1cb5e5cdd

  • SHA512

    b6d9672a580a02299bc370deb1fd99b5ca10ab86456385870cdae522c185ae51f8d390a7c50fcb5c7898523f52c834bb73515ffc6d0b0bcde210640e815ece9e

  • SSDEEP

    12288:yCjeMsiGVBKvjxTNlZaLlcMj+wXZvQpd9nP2+ZMU2tYspZcMwr/GNd35:yCjeTZa7BTsxewXZUTP2HU2yawjY5

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 2 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • NSIS installer 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\windirstat1_1_2_setup.exe
    "C:\Users\Admin\AppData\Local\Temp\windirstat1_1_2_setup.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:1448
    • C:\Program Files (x86)\WinDirStat\windirstat.exe
      "C:\Program Files (x86)\WinDirStat\windirstat.exe"
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      PID:2840
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:3616

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\WinDirStat\Uninstall.exe
      Filesize

      46KB

      MD5

      a127e6118b9dd2f9d5a7cc4d697a0105

      SHA1

      9ac17d4dcf0884ceafacf10c42209c0942dfe7a8

      SHA256

      afc864cfce79b2a6add491a27ea672d958233ed7a97a2cbbce60100d2fa1e670

      SHA512

      0e57d2856c02c55d477d9b3cc1d4bf5ffa3650d4b20be18b0a9e614d19143aee325c4cd92ff31bbddf6e93cd3ebeb47d8727de6e25faa366341cc71117122065

    • C:\Program Files (x86)\WinDirStat\windirstat.chm
      Filesize

      50KB

      MD5

      1bddb8a0e0f9cd90a5b3936ec2c2c4cf

      SHA1

      c8302168fb532fe03e76cb8a82aa53b49ee0bc44

      SHA256

      1e87c07744054709d271337d8ce06929429b334d70875605cb68ecc4c6610cd1

      SHA512

      b857de9026b3eab13f4dbc464e6403835e3a61e5e9e3566735bf1ddd8dedc4ecf08807b27207bd8b385250b71ea234b301dd49e6f3c90f1270ae03868c035472

    • C:\Program Files (x86)\WinDirStat\windirstat.exe
      Filesize

      636KB

      MD5

      24cd9a82fcfc658dd3ae7ba25c958ffb

      SHA1

      26e14a532e1e050eb20755a0b7a5fea99dd80588

      SHA256

      cc3ee246f2710dc9ba9e2a88e3192b88f1db4caa2eefb8641642a33df04e585c

      SHA512

      4de675be1f7d618d133ef24765a027840473e0c5bc93550d5e5fdbf078edc74c2241e6e3cd8753517e2954c7f09b9909028de7b727294d723fb5700658c7979d

    • C:\Users\Admin\AppData\Local\Temp\nsw7C66.tmp\InstallOptions.dll
      Filesize

      14KB

      MD5

      9b2ad0546fd834c01a3bdcbfbc95da7d

      SHA1

      4f92f5a6b269d969ba3340f1c1978d337992a62c

      SHA256

      7e08cb4ff81dbb0573c672301681e31b2042682e9a2204673f811455f823dd37

      SHA512

      5b374fe7cc8d6ff8b93cfcc8deae23f2313f8240c998d04d3e65c196b33c7d36a33930ffd481cdd6d30aa4c73dd2a1c6fe43791e9bf10bd71b33321a8e71c6b8

    • C:\Users\Admin\AppData\Local\Temp\nsw7C66.tmp\System.dll
      Filesize

      10KB

      MD5

      4125926391466fdbe8a4730f2374b033

      SHA1

      fdd23034ada72d2537939ac6755d7f7c0e9b3f0e

      SHA256

      6692bd93bcd04146831652780c1170da79aa3784c3c070d95fb1580e339de6c5

      SHA512

      32a1cf96842454b3c3641316ee39051ae024bdce9e88ac236eadad531f2c0a08d46b77d525f7d994c9a5af4cc9a391d30ee92b9ec782b7fb9a42c76f0f52a008

    • C:\Users\Admin\AppData\Local\Temp\nsw7C66.tmp\ioSpecial.ini
      Filesize

      725B

      MD5

      a52fc62f7e595031f98648daf0d09992

      SHA1

      4b04d5f90a4ea12ed50554f2807f2f9a38a4ac5b

      SHA256

      a8142efa37e36b0bd43f57b8fb75c8d8de79e5a70f1dd53f86bd39aa5c758273

      SHA512

      0d8fe05c70adab305a02e50c41d3a6fa5625026c0aa5d203aed854beb6c53984dedc1d1c1d4aac4ca0b1e624bebd3fade8d55dfe017abb2f0fccb154499eb87f

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\WinDirStat\Help (ENG).lnk
      Filesize

      1KB

      MD5

      7e1fd6d69a953307a23c9fbe63b0436c

      SHA1

      dd94486c78d05b8566f72f7955d73fd5eb74a770

      SHA256

      b79cc14d6bee0df65aac683b1f9332e057bd8d7eaf2b8d702e4852d670fb3db9

      SHA512

      c0c703b5480b5c90126aa19e2b26ebb5782607e76a2c864cb042ce6078d876b8e9556b4d15e59821c266f90b50f7d9f655789e9ea44cec2e3bda98c8f441b98b

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\WinDirStat\Uninstall WinDirStat.lnk
      Filesize

      1KB

      MD5

      cd0a3b45825a061c74a991bd663be27f

      SHA1

      24e9ba3c55f6c36e7682d844fec3cc33824516fb

      SHA256

      0e85f846639da4750e135994a4b09f188ac88f8da355e7758354f010fb9fdb59

      SHA512

      b11b11d91da4fd2a6c47de3eae20412bf961b1cdb21f26d97977e00ec40ac61f2c90deb8f9accc3550d1a489f028ca2f709f9edc80f24e3ec52b87cfa2802ca3

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\WinDirStat\WinDirStat.lnk
      Filesize

      1KB

      MD5

      f3cc878ae8d984af1c5410a316168c91

      SHA1

      272a94338fd1d632f8dee6060d144f743dfa0ae3

      SHA256

      d221b048ca07be4b3b18de9aa95667a503de0ab4e25d9ccd174963c3b80de9c6

      SHA512

      d4886e31e034f633bb005138e34f80c4ccfa4552611e29e2795355ca0c797ec86c9583c0b47c3ad4995620dd102d8d7c98bb4a0e3ed21be3af788adec77fa6f2

    • C:\Users\Admin\Desktop\WinDirStat.lnk
      Filesize

      1KB

      MD5

      60301c33bb26295ddb6bb24a1a96d2e6

      SHA1

      b137f77594496570caafd7ca15e678390c92d281

      SHA256

      7fee5748d549a31f3480e1913caf2381a15446e348fa07c3353357e423d90e8b

      SHA512

      1e48667ce745e0c3d597f0027d642c5a04069e9bd0178db3e9fbfb4e81f35590ccd90c3bc698cf6169f149b582f0633679f28c79ce056a42084f1700e296c50d