Analysis

  • max time kernel
    118s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    19-04-2024 06:03

General

  • Target

    windirstat1_1_2_setup.exe

  • Size

    630KB

  • MD5

    3abf1c149873e25d4e266225fbf37cbf

  • SHA1

    6fa92dd2ca691c11dfbfc0a239e34369897a7fab

  • SHA256

    370a27a30ee57247faddeb1f99a83933247e07c8760a07ed82e451e1cb5e5cdd

  • SHA512

    b6d9672a580a02299bc370deb1fd99b5ca10ab86456385870cdae522c185ae51f8d390a7c50fcb5c7898523f52c834bb73515ffc6d0b0bcde210640e815ece9e

  • SSDEEP

    12288:yCjeMsiGVBKvjxTNlZaLlcMj+wXZvQpd9nP2+ZMU2tYspZcMwr/GNd35:yCjeTZa7BTsxewXZUTP2HU2yawjY5

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 11 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 2 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • NSIS installer 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\windirstat1_1_2_setup.exe
    "C:\Users\Admin\AppData\Local\Temp\windirstat1_1_2_setup.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2652
    • C:\Program Files (x86)\WinDirStat\windirstat.exe
      "C:\Program Files (x86)\WinDirStat\windirstat.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Enumerates connected drives
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:108

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\WinDirStat\windirstat.chm
    Filesize

    50KB

    MD5

    1bddb8a0e0f9cd90a5b3936ec2c2c4cf

    SHA1

    c8302168fb532fe03e76cb8a82aa53b49ee0bc44

    SHA256

    1e87c07744054709d271337d8ce06929429b334d70875605cb68ecc4c6610cd1

    SHA512

    b857de9026b3eab13f4dbc464e6403835e3a61e5e9e3566735bf1ddd8dedc4ecf08807b27207bd8b385250b71ea234b301dd49e6f3c90f1270ae03868c035472

  • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\WinDirStat\Help (ENG).lnk
    Filesize

    1KB

    MD5

    0adb7282fef5a86be3de63a992d178ed

    SHA1

    2039f0ec6453d6a552b22f9e9ff8b2f94196a77b

    SHA256

    aa17e9a1a314ffea124c74fb65626b37b7c3e8f7ae72801fb604b1b0ad3c088b

    SHA512

    a785569c372c8d4a4da8dd0139aa6fabf06a92b45f30672df5493c8ddf3d0c321626d0b88f95c40b46d5a439b19a98778277ba77338abeeb99f0080d8f61d3ee

  • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\WinDirStat\Uninstall WinDirStat.lnk
    Filesize

    1KB

    MD5

    b73b168144077a7ed1b9d28d60d35543

    SHA1

    8a510543474fe4bde2cd180ffb015cba3f06055e

    SHA256

    8b26a8b5a7e674cd1fd8b5c555210bf439be24549d59cf1e76e551abb78b04f2

    SHA512

    e0211c41dc1246832bfe3febd94bc9d034f2cff38c550e9a94325c89889b986a1a9c8751dc10792c939cfff8dbe4862a2d54d49fa3287fb0b53015f6635dba8e

  • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\WinDirStat\WinDirStat.lnk
    Filesize

    1KB

    MD5

    1fea5b65faf5270ebaf481ea82200598

    SHA1

    fb21ab1770ef37835db16ac5ff093bcc3bd1cc9a

    SHA256

    569ddf9ee39d2265a4d8737c9e6ab4848e4f1f5c1a59742f198311cb7e819087

    SHA512

    67817c2893a20458a42e33ec5eb781ca8fbbc77473571af3577314b666ea739f04bd97eb722d0c3073b0552407df4d663d166e17e78bab22cedacb71959ed771

  • C:\Users\Admin\AppData\Local\Temp\nsdC2F3.tmp\ioSpecial.ini
    Filesize

    790B

    MD5

    d41738a043d97236e9ed10145ac81427

    SHA1

    78ba19e6576f6201d2dfb75fe54cb375e2e4d568

    SHA256

    809e8a23ae20f301b0c5e09d8e8eefeedb8ab97e9e52ea902ee9ba7ff9561be1

    SHA512

    7002fa34743a4737f0ec7e14066a47033fa1f9143156c16fee2a38c4e25db95396bae18dfb224a5d72a97bed71925086986ef1725a811888909dbb0e9d487111

  • C:\Users\Admin\AppData\Local\Temp\nsdC2F3.tmp\ioSpecial.ini
    Filesize

    799B

    MD5

    43b2c48c7869945375845ae8dc53c023

    SHA1

    a8e20033c1052d7131c49e9c4ac356983016a65c

    SHA256

    65127110503008d572bf4b02b5cd2e0eb64d0b18816c51bb84d6189c78001782

    SHA512

    0d9928913b406452544ca2553a25ef85e2f4c6c987ab4313d6e32200c129875b0fc58ef41cf4e8e3bebf33d6ccfc804e58fefaafae845d8e80761bc208e78871

  • C:\Users\Admin\AppData\Local\Temp\nsdC2F3.tmp\ioSpecial.ini
    Filesize

    725B

    MD5

    f0b0bc1ce2dd665868ad4a6d33da2999

    SHA1

    05b7efc3e75f1abbc75f68a93ea6b0710eb16fca

    SHA256

    6ea921ade0a5f11b00771435250d9caefac27ef54eeedc853c0a71b251450681

    SHA512

    f1ac632ce6c16de6359ba9bac1937d1b0bd4c3db7a2c3a5867d161b38a040963edd1a94e4d3557bd1715eed02b7112eae6ff1d6364bb620fa456d1d4479dedb7

  • C:\Users\Admin\Desktop\WinDirStat.lnk
    Filesize

    1KB

    MD5

    e5f95487206d6cf5a9f1ed3ece342d8b

    SHA1

    41bb7a6cdc945b3ee07cd15644b070514a2d3677

    SHA256

    377c26cfc8c8cdc5566bb868b4090aa4082aff4ec25bbed13978110046402a15

    SHA512

    5d578e20e4e15959e5dbfa31d9065e5649bd63bf6b42c86ed97c1689061b04c65096573f4ed1b373a1e8ecddae46f1b25b26d2ced23205abd0f498417ff3702d

  • \Program Files (x86)\WinDirStat\Uninstall.exe
    Filesize

    46KB

    MD5

    a127e6118b9dd2f9d5a7cc4d697a0105

    SHA1

    9ac17d4dcf0884ceafacf10c42209c0942dfe7a8

    SHA256

    afc864cfce79b2a6add491a27ea672d958233ed7a97a2cbbce60100d2fa1e670

    SHA512

    0e57d2856c02c55d477d9b3cc1d4bf5ffa3650d4b20be18b0a9e614d19143aee325c4cd92ff31bbddf6e93cd3ebeb47d8727de6e25faa366341cc71117122065

  • \Program Files (x86)\WinDirStat\windirstat.exe
    Filesize

    636KB

    MD5

    24cd9a82fcfc658dd3ae7ba25c958ffb

    SHA1

    26e14a532e1e050eb20755a0b7a5fea99dd80588

    SHA256

    cc3ee246f2710dc9ba9e2a88e3192b88f1db4caa2eefb8641642a33df04e585c

    SHA512

    4de675be1f7d618d133ef24765a027840473e0c5bc93550d5e5fdbf078edc74c2241e6e3cd8753517e2954c7f09b9909028de7b727294d723fb5700658c7979d

  • \Users\Admin\AppData\Local\Temp\nsdC2F3.tmp\InstallOptions.dll
    Filesize

    14KB

    MD5

    9b2ad0546fd834c01a3bdcbfbc95da7d

    SHA1

    4f92f5a6b269d969ba3340f1c1978d337992a62c

    SHA256

    7e08cb4ff81dbb0573c672301681e31b2042682e9a2204673f811455f823dd37

    SHA512

    5b374fe7cc8d6ff8b93cfcc8deae23f2313f8240c998d04d3e65c196b33c7d36a33930ffd481cdd6d30aa4c73dd2a1c6fe43791e9bf10bd71b33321a8e71c6b8

  • \Users\Admin\AppData\Local\Temp\nsdC2F3.tmp\System.dll
    Filesize

    10KB

    MD5

    4125926391466fdbe8a4730f2374b033

    SHA1

    fdd23034ada72d2537939ac6755d7f7c0e9b3f0e

    SHA256

    6692bd93bcd04146831652780c1170da79aa3784c3c070d95fb1580e339de6c5

    SHA512

    32a1cf96842454b3c3641316ee39051ae024bdce9e88ac236eadad531f2c0a08d46b77d525f7d994c9a5af4cc9a391d30ee92b9ec782b7fb9a42c76f0f52a008