Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08-04-2024 10:25
Static task
static1
Behavioral task
behavioral1
Sample
windirstat1_1_2_setup.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
windirstat1_1_2_setup.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
windirstat.exe
Resource
win7-20240221-en
General
-
Target
windirstat1_1_2_setup.exe
-
Size
630KB
-
MD5
3abf1c149873e25d4e266225fbf37cbf
-
SHA1
6fa92dd2ca691c11dfbfc0a239e34369897a7fab
-
SHA256
370a27a30ee57247faddeb1f99a83933247e07c8760a07ed82e451e1cb5e5cdd
-
SHA512
b6d9672a580a02299bc370deb1fd99b5ca10ab86456385870cdae522c185ae51f8d390a7c50fcb5c7898523f52c834bb73515ffc6d0b0bcde210640e815ece9e
-
SSDEEP
12288:yCjeMsiGVBKvjxTNlZaLlcMj+wXZvQpd9nP2+ZMU2tYspZcMwr/GNd35:yCjeTZa7BTsxewXZUTP2HU2yawjY5
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
windirstat.exepid process 1228 windirstat.exe -
Loads dropped DLL 11 IoCs
Processes:
windirstat1_1_2_setup.exewindirstat.exepid process 3052 windirstat1_1_2_setup.exe 3052 windirstat1_1_2_setup.exe 3052 windirstat1_1_2_setup.exe 3052 windirstat1_1_2_setup.exe 3052 windirstat1_1_2_setup.exe 3052 windirstat1_1_2_setup.exe 3052 windirstat1_1_2_setup.exe 3052 windirstat1_1_2_setup.exe 1228 windirstat.exe 1228 windirstat.exe 1228 windirstat.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 2 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
windirstat.exedescription ioc process File opened (read-only) \??\D: windirstat.exe File opened (read-only) \??\F: windirstat.exe -
Drops file in Program Files directory 3 IoCs
Processes:
windirstat1_1_2_setup.exedescription ioc process File created C:\Program Files (x86)\WinDirStat\windirstat.chm windirstat1_1_2_setup.exe File created C:\Program Files (x86)\WinDirStat\Uninstall.exe windirstat1_1_2_setup.exe File created C:\Program Files (x86)\WinDirStat\windirstat.exe windirstat1_1_2_setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 1 IoCs
Processes:
resource yara_rule \Program Files (x86)\WinDirStat\Uninstall.exe nsis_installer_1 -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
windirstat1_1_2_setup.exewindirstat.exedescription pid process Token: SeRestorePrivilege 3052 windirstat1_1_2_setup.exe Token: SeBackupPrivilege 3052 windirstat1_1_2_setup.exe Token: SeBackupPrivilege 1228 windirstat.exe Token: SeBackupPrivilege 1228 windirstat.exe Token: SeBackupPrivilege 1228 windirstat.exe Token: SeBackupPrivilege 1228 windirstat.exe Token: SeBackupPrivilege 1228 windirstat.exe Token: SeBackupPrivilege 1228 windirstat.exe Token: SeBackupPrivilege 1228 windirstat.exe Token: SeBackupPrivilege 1228 windirstat.exe Token: SeBackupPrivilege 1228 windirstat.exe Token: SeBackupPrivilege 1228 windirstat.exe Token: SeBackupPrivilege 1228 windirstat.exe Token: SeBackupPrivilege 1228 windirstat.exe Token: SeBackupPrivilege 1228 windirstat.exe Token: SeBackupPrivilege 1228 windirstat.exe Token: SeBackupPrivilege 1228 windirstat.exe Token: SeBackupPrivilege 1228 windirstat.exe Token: SeBackupPrivilege 1228 windirstat.exe Token: SeBackupPrivilege 1228 windirstat.exe Token: SeBackupPrivilege 1228 windirstat.exe Token: SeBackupPrivilege 1228 windirstat.exe Token: SeBackupPrivilege 1228 windirstat.exe Token: SeBackupPrivilege 1228 windirstat.exe Token: SeBackupPrivilege 1228 windirstat.exe Token: SeBackupPrivilege 1228 windirstat.exe Token: SeBackupPrivilege 1228 windirstat.exe Token: SeBackupPrivilege 1228 windirstat.exe Token: SeBackupPrivilege 1228 windirstat.exe Token: SeBackupPrivilege 1228 windirstat.exe Token: SeBackupPrivilege 1228 windirstat.exe Token: SeBackupPrivilege 1228 windirstat.exe Token: SeBackupPrivilege 1228 windirstat.exe Token: SeBackupPrivilege 1228 windirstat.exe Token: SeBackupPrivilege 1228 windirstat.exe Token: SeBackupPrivilege 1228 windirstat.exe Token: SeBackupPrivilege 1228 windirstat.exe Token: SeBackupPrivilege 1228 windirstat.exe Token: SeBackupPrivilege 1228 windirstat.exe Token: SeBackupPrivilege 1228 windirstat.exe Token: SeBackupPrivilege 1228 windirstat.exe Token: SeBackupPrivilege 1228 windirstat.exe Token: SeBackupPrivilege 1228 windirstat.exe Token: SeBackupPrivilege 1228 windirstat.exe Token: SeBackupPrivilege 1228 windirstat.exe Token: SeBackupPrivilege 1228 windirstat.exe Token: SeBackupPrivilege 1228 windirstat.exe Token: SeBackupPrivilege 1228 windirstat.exe Token: SeBackupPrivilege 1228 windirstat.exe Token: SeBackupPrivilege 1228 windirstat.exe Token: SeBackupPrivilege 1228 windirstat.exe Token: SeBackupPrivilege 1228 windirstat.exe Token: SeBackupPrivilege 1228 windirstat.exe Token: SeBackupPrivilege 1228 windirstat.exe Token: SeBackupPrivilege 1228 windirstat.exe Token: SeBackupPrivilege 1228 windirstat.exe Token: SeBackupPrivilege 1228 windirstat.exe Token: SeBackupPrivilege 1228 windirstat.exe Token: SeBackupPrivilege 1228 windirstat.exe Token: SeBackupPrivilege 1228 windirstat.exe Token: SeBackupPrivilege 1228 windirstat.exe Token: SeBackupPrivilege 1228 windirstat.exe Token: SeBackupPrivilege 1228 windirstat.exe Token: SeBackupPrivilege 1228 windirstat.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
windirstat.exepid process 1228 windirstat.exe 1228 windirstat.exe 1228 windirstat.exe 1228 windirstat.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
windirstat1_1_2_setup.exedescription pid process target process PID 3052 wrote to memory of 1228 3052 windirstat1_1_2_setup.exe windirstat.exe PID 3052 wrote to memory of 1228 3052 windirstat1_1_2_setup.exe windirstat.exe PID 3052 wrote to memory of 1228 3052 windirstat1_1_2_setup.exe windirstat.exe PID 3052 wrote to memory of 1228 3052 windirstat1_1_2_setup.exe windirstat.exe PID 3052 wrote to memory of 1228 3052 windirstat1_1_2_setup.exe windirstat.exe PID 3052 wrote to memory of 1228 3052 windirstat1_1_2_setup.exe windirstat.exe PID 3052 wrote to memory of 1228 3052 windirstat1_1_2_setup.exe windirstat.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\windirstat1_1_2_setup.exe"C:\Users\Admin\AppData\Local\Temp\windirstat1_1_2_setup.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Program Files (x86)\WinDirStat\windirstat.exe"C:\Program Files (x86)\WinDirStat\windirstat.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1228
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\WinDirStat\windirstat.chmFilesize
50KB
MD51bddb8a0e0f9cd90a5b3936ec2c2c4cf
SHA1c8302168fb532fe03e76cb8a82aa53b49ee0bc44
SHA2561e87c07744054709d271337d8ce06929429b334d70875605cb68ecc4c6610cd1
SHA512b857de9026b3eab13f4dbc464e6403835e3a61e5e9e3566735bf1ddd8dedc4ecf08807b27207bd8b385250b71ea234b301dd49e6f3c90f1270ae03868c035472
-
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\WinDirStat\Help (ENG).lnkFilesize
1KB
MD57cedd166e975d51cb08bf68c74da103e
SHA161343701a9f33b6edfb909a2c3a2f15e10726770
SHA2567acd1e8ea53b3c6ebf44b1e32369769299dff381419e0de43e3c6b42b0fa591f
SHA512312a591c97d49aa5cad244e7c70fca92d9db22aa0a596357f52d999d0c11b5117a43edab24a4ec342418bede0719337f413c4335193349d8985f57fddb8226ff
-
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\WinDirStat\Uninstall WinDirStat.lnkFilesize
1KB
MD55e3b29395a765d3bca505a8ca5a4292c
SHA114d24c58941b4e4fe893e1f49e55df9828066771
SHA256f8e875b1f666c41694a4b5b508065f7365188e93b01d33d0ad6d4d5703f099eb
SHA512f43acd1b81131645099ea2cafab9dd84d3bf846de5f8cad21b977892f9041393a245787ca25044b9b65d9395862b377f31ee70463ad82dfb93c6788a3ef8a56f
-
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\WinDirStat\WinDirStat.lnkFilesize
1KB
MD5d35cfc4575515f5cfa64b794e4fe8c1e
SHA194f6ae9f6c5c8c8c3f7c6ea6e747623a5dbfbcca
SHA2560892bd377cb8e961eff2e2c1580560bef879328b01cb1273354218a0dfced55d
SHA512de4a212ebb3a00f8c806c4abbb94d06a4660af516fa5a5cc12c0fa32786994d208e3e6d014f73c9e39bd7b96c6039c00145d401b30aac27f0136dc9d2f22a68f
-
C:\Users\Admin\AppData\Local\Temp\nsy41A4.tmp\ioSpecial.iniFilesize
790B
MD5588d52ec7dd516d19aadf960c0c505c5
SHA1ac3f675b3a33de1b4c7df08cbbfda7d144b736fd
SHA256356af992e841440aeae009946765ea2752b8701993d08322396cddf6469325cd
SHA51216f4e8ae726edefb92de5cd4d06dfa6b42004e26a969cf256353944e7de997a5fed547c8c4aa9b946353367669127ac9670fd1cddaebdfde78134118e92203d3
-
C:\Users\Admin\AppData\Local\Temp\nsy41A4.tmp\ioSpecial.iniFilesize
799B
MD5c89b9ed4e1f8dd07ff7c99f3eeac3095
SHA115f42bf586cbb019a0aa559c76a14e614eb41567
SHA25697356b6f819d3a719fde49ad684a060a2ddf9aa053a974d68bff4dbf1540e754
SHA51264e4283d419bdd2326ca1ce60d812c6b715c15da78735edeb05ed7b77227f83827721801c597d82e09d8673b31c661121c888e610feb661d4abf3d4347a76de9
-
C:\Users\Admin\AppData\Local\Temp\nsy41A4.tmp\ioSpecial.iniFilesize
585B
MD53777e0cdfb58bc171d7aff9db0a41379
SHA16f8b1743d64084445be6e407a7656dd6727f6d3b
SHA256037a87586376d70af66f1290466c6c70583da9a12b531ff3c2b8838f48e4344e
SHA5124a3cd506a1805b68d9b478e9e9a3663d277cf54a8a748cd82a4fe7afc42ba7a7053a723a36e5774989e91cd1434f478308ce48a0222f4eb27ebd7af230b365d3
-
C:\Users\Admin\AppData\Local\Temp\nsy41A4.tmp\ioSpecial.iniFilesize
725B
MD5fe91a26a09bc862dec8878e6b24fb589
SHA1762687107fe0859250be1f23a1acd24f5bf9444c
SHA256f1db92eb1b56041ce20cd0deec5a66f526154528e5d8bec91b9665fc6725ce9b
SHA5129e26b6c6f44530ceae98f9b871c014df2404eb27899a47fa48a33e6f43648d5c14632a90cdb056c3689b643ee811e0365fa240d21028acbb5d50bc4c93f649d9
-
C:\Users\Admin\Desktop\WinDirStat.lnkFilesize
1KB
MD5d1dce0fa3b442a30d50ebb0d156ed404
SHA1517584ca5184d3f85b53b00f708ec274d76a6380
SHA256f95a5c82fc1b33f809c77b0986182069c4994ef7889fb0f55078c27ee81ade92
SHA512a34df9eeb88964b1d4a89372364c417b19786ec9daff0a3223dd80d7a9ed5cf1a6e4cedd7eaa9e013222c4decba7d1c608502deee2581bbabdee33b41861b1a7
-
\Program Files (x86)\WinDirStat\Uninstall.exeFilesize
46KB
MD5a127e6118b9dd2f9d5a7cc4d697a0105
SHA19ac17d4dcf0884ceafacf10c42209c0942dfe7a8
SHA256afc864cfce79b2a6add491a27ea672d958233ed7a97a2cbbce60100d2fa1e670
SHA5120e57d2856c02c55d477d9b3cc1d4bf5ffa3650d4b20be18b0a9e614d19143aee325c4cd92ff31bbddf6e93cd3ebeb47d8727de6e25faa366341cc71117122065
-
\Program Files (x86)\WinDirStat\windirstat.exeFilesize
636KB
MD524cd9a82fcfc658dd3ae7ba25c958ffb
SHA126e14a532e1e050eb20755a0b7a5fea99dd80588
SHA256cc3ee246f2710dc9ba9e2a88e3192b88f1db4caa2eefb8641642a33df04e585c
SHA5124de675be1f7d618d133ef24765a027840473e0c5bc93550d5e5fdbf078edc74c2241e6e3cd8753517e2954c7f09b9909028de7b727294d723fb5700658c7979d
-
\Users\Admin\AppData\Local\Temp\nsy41A4.tmp\InstallOptions.dllFilesize
14KB
MD59b2ad0546fd834c01a3bdcbfbc95da7d
SHA14f92f5a6b269d969ba3340f1c1978d337992a62c
SHA2567e08cb4ff81dbb0573c672301681e31b2042682e9a2204673f811455f823dd37
SHA5125b374fe7cc8d6ff8b93cfcc8deae23f2313f8240c998d04d3e65c196b33c7d36a33930ffd481cdd6d30aa4c73dd2a1c6fe43791e9bf10bd71b33321a8e71c6b8
-
\Users\Admin\AppData\Local\Temp\nsy41A4.tmp\System.dllFilesize
10KB
MD54125926391466fdbe8a4730f2374b033
SHA1fdd23034ada72d2537939ac6755d7f7c0e9b3f0e
SHA2566692bd93bcd04146831652780c1170da79aa3784c3c070d95fb1580e339de6c5
SHA51232a1cf96842454b3c3641316ee39051ae024bdce9e88ac236eadad531f2c0a08d46b77d525f7d994c9a5af4cc9a391d30ee92b9ec782b7fb9a42c76f0f52a008