Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23-04-2024 02:36
Static task
static1
Behavioral task
behavioral1
Sample
windirstat1_1_2_setup.exe
Resource
win7-20240221-en
General
-
Target
windirstat1_1_2_setup.exe
-
Size
630KB
-
MD5
3abf1c149873e25d4e266225fbf37cbf
-
SHA1
6fa92dd2ca691c11dfbfc0a239e34369897a7fab
-
SHA256
370a27a30ee57247faddeb1f99a83933247e07c8760a07ed82e451e1cb5e5cdd
-
SHA512
b6d9672a580a02299bc370deb1fd99b5ca10ab86456385870cdae522c185ae51f8d390a7c50fcb5c7898523f52c834bb73515ffc6d0b0bcde210640e815ece9e
-
SSDEEP
12288:yCjeMsiGVBKvjxTNlZaLlcMj+wXZvQpd9nP2+ZMU2tYspZcMwr/GNd35:yCjeTZa7BTsxewXZUTP2HU2yawjY5
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
windirstat.exepid process 1300 windirstat.exe -
Loads dropped DLL 11 IoCs
Processes:
windirstat1_1_2_setup.exewindirstat.exepid process 2956 windirstat1_1_2_setup.exe 2956 windirstat1_1_2_setup.exe 2956 windirstat1_1_2_setup.exe 2956 windirstat1_1_2_setup.exe 2956 windirstat1_1_2_setup.exe 2956 windirstat1_1_2_setup.exe 2956 windirstat1_1_2_setup.exe 2956 windirstat1_1_2_setup.exe 1300 windirstat.exe 1300 windirstat.exe 1300 windirstat.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 2 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
windirstat.exedescription ioc process File opened (read-only) \??\D: windirstat.exe File opened (read-only) \??\F: windirstat.exe -
Drops file in Program Files directory 3 IoCs
Processes:
windirstat1_1_2_setup.exedescription ioc process File created C:\Program Files (x86)\WinDirStat\windirstat.exe windirstat1_1_2_setup.exe File created C:\Program Files (x86)\WinDirStat\windirstat.chm windirstat1_1_2_setup.exe File created C:\Program Files (x86)\WinDirStat\Uninstall.exe windirstat1_1_2_setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 1 IoCs
Processes:
resource yara_rule \Program Files (x86)\WinDirStat\Uninstall.exe nsis_installer_1 -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
windirstat1_1_2_setup.exewindirstat.exedescription pid process Token: SeRestorePrivilege 2956 windirstat1_1_2_setup.exe Token: SeBackupPrivilege 2956 windirstat1_1_2_setup.exe Token: SeBackupPrivilege 1300 windirstat.exe Token: SeBackupPrivilege 1300 windirstat.exe Token: SeBackupPrivilege 1300 windirstat.exe Token: SeBackupPrivilege 1300 windirstat.exe Token: SeBackupPrivilege 1300 windirstat.exe Token: SeBackupPrivilege 1300 windirstat.exe Token: SeBackupPrivilege 1300 windirstat.exe Token: SeBackupPrivilege 1300 windirstat.exe Token: SeBackupPrivilege 1300 windirstat.exe Token: SeBackupPrivilege 1300 windirstat.exe Token: SeBackupPrivilege 1300 windirstat.exe Token: SeBackupPrivilege 1300 windirstat.exe Token: SeBackupPrivilege 1300 windirstat.exe Token: SeBackupPrivilege 1300 windirstat.exe Token: SeBackupPrivilege 1300 windirstat.exe Token: SeBackupPrivilege 1300 windirstat.exe Token: SeBackupPrivilege 1300 windirstat.exe Token: SeBackupPrivilege 1300 windirstat.exe Token: SeBackupPrivilege 1300 windirstat.exe Token: SeBackupPrivilege 1300 windirstat.exe Token: SeBackupPrivilege 1300 windirstat.exe Token: SeBackupPrivilege 1300 windirstat.exe Token: SeBackupPrivilege 1300 windirstat.exe Token: SeBackupPrivilege 1300 windirstat.exe Token: SeBackupPrivilege 1300 windirstat.exe Token: SeBackupPrivilege 1300 windirstat.exe Token: SeBackupPrivilege 1300 windirstat.exe Token: SeBackupPrivilege 1300 windirstat.exe Token: SeBackupPrivilege 1300 windirstat.exe Token: SeBackupPrivilege 1300 windirstat.exe Token: SeBackupPrivilege 1300 windirstat.exe Token: SeBackupPrivilege 1300 windirstat.exe Token: SeBackupPrivilege 1300 windirstat.exe Token: SeBackupPrivilege 1300 windirstat.exe Token: SeBackupPrivilege 1300 windirstat.exe Token: SeBackupPrivilege 1300 windirstat.exe Token: SeBackupPrivilege 1300 windirstat.exe Token: SeBackupPrivilege 1300 windirstat.exe Token: SeBackupPrivilege 1300 windirstat.exe Token: SeBackupPrivilege 1300 windirstat.exe Token: SeBackupPrivilege 1300 windirstat.exe Token: SeBackupPrivilege 1300 windirstat.exe Token: SeBackupPrivilege 1300 windirstat.exe Token: SeBackupPrivilege 1300 windirstat.exe Token: SeBackupPrivilege 1300 windirstat.exe Token: SeBackupPrivilege 1300 windirstat.exe Token: SeBackupPrivilege 1300 windirstat.exe Token: SeBackupPrivilege 1300 windirstat.exe Token: SeBackupPrivilege 1300 windirstat.exe Token: SeBackupPrivilege 1300 windirstat.exe Token: SeBackupPrivilege 1300 windirstat.exe Token: SeBackupPrivilege 1300 windirstat.exe Token: SeBackupPrivilege 1300 windirstat.exe Token: SeBackupPrivilege 1300 windirstat.exe Token: SeBackupPrivilege 1300 windirstat.exe Token: SeBackupPrivilege 1300 windirstat.exe Token: SeBackupPrivilege 1300 windirstat.exe Token: SeBackupPrivilege 1300 windirstat.exe Token: SeBackupPrivilege 1300 windirstat.exe Token: SeBackupPrivilege 1300 windirstat.exe Token: SeBackupPrivilege 1300 windirstat.exe Token: SeBackupPrivilege 1300 windirstat.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
windirstat.exepid process 1300 windirstat.exe 1300 windirstat.exe 1300 windirstat.exe 1300 windirstat.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
windirstat1_1_2_setup.exedescription pid process target process PID 2956 wrote to memory of 1300 2956 windirstat1_1_2_setup.exe windirstat.exe PID 2956 wrote to memory of 1300 2956 windirstat1_1_2_setup.exe windirstat.exe PID 2956 wrote to memory of 1300 2956 windirstat1_1_2_setup.exe windirstat.exe PID 2956 wrote to memory of 1300 2956 windirstat1_1_2_setup.exe windirstat.exe PID 2956 wrote to memory of 1300 2956 windirstat1_1_2_setup.exe windirstat.exe PID 2956 wrote to memory of 1300 2956 windirstat1_1_2_setup.exe windirstat.exe PID 2956 wrote to memory of 1300 2956 windirstat1_1_2_setup.exe windirstat.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\windirstat1_1_2_setup.exe"C:\Users\Admin\AppData\Local\Temp\windirstat1_1_2_setup.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Program Files (x86)\WinDirStat\windirstat.exe"C:\Program Files (x86)\WinDirStat\windirstat.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1300
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\WinDirStat\windirstat.chmFilesize
50KB
MD51bddb8a0e0f9cd90a5b3936ec2c2c4cf
SHA1c8302168fb532fe03e76cb8a82aa53b49ee0bc44
SHA2561e87c07744054709d271337d8ce06929429b334d70875605cb68ecc4c6610cd1
SHA512b857de9026b3eab13f4dbc464e6403835e3a61e5e9e3566735bf1ddd8dedc4ecf08807b27207bd8b385250b71ea234b301dd49e6f3c90f1270ae03868c035472
-
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\WinDirStat\Help (ENG).lnkFilesize
1KB
MD580ef2329a9a7359af82232c958343a95
SHA10dfed029e3092680d0e44725122b0965dc06e61d
SHA256d4ee42d2c9606b68d476231d192571f295b69a7602c565ce156caa26c8916bf3
SHA51262db9fbf0fdbb90e296882da3b085741999ec957fc25265af80d8a05297e155a36af1fb1c77582fbf283df71c771b46bc19cd401ae6b8af8940a7b96ffc8c521
-
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\WinDirStat\Uninstall WinDirStat.lnkFilesize
1KB
MD5879dfea06b81d8b9b5ed6267fc0ac154
SHA17f7a6fe66ebd96b562b4a1d16da68b06d533a44f
SHA2564818aec9a7fd4815e2ed9037b85a476cdb52b901ce736eb7c7dea13e3ff01c5c
SHA51226b3d93d1b3aeb0e710cbdb8c5b93fd3eb3f422d421062e2590abd6ba7b4be1043469a469cfd06a69dc55d965c3ea9084788ad3f8898fc043e5bec361a920851
-
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\WinDirStat\WinDirStat.lnkFilesize
1KB
MD5fae059e493070aa287cd93846a552360
SHA101682cf42b33b4f2b8f10618007a91008f0fba87
SHA2562489a12f2c3a88f13abdf823beb1836d21216cc412b8feb62ea51ba8cae3ea02
SHA512186ee256ad7f1507510c5c6470404b06d17ac9a22062f026ae6d45bccc24332d8573b0054414ac5e8dc436678e856a716737351bfce8102631bc39738c6c8b5b
-
C:\Users\Admin\AppData\Local\Temp\nsi1FC2.tmp\ioSpecial.iniFilesize
799B
MD5ad4c52da80050951d29cebc1f4877142
SHA158214978a650e3f46d2b75f5a70ab5452d395c88
SHA2564196a2e7c266f56a8b58a6c26bc6a33109ec279291f7a910e272d5fd8679f052
SHA512eb1b3681e5a3d0c026b8c854344d0c005196f33c96e936267e75c7feff6729386c6c968a525baa5162fd4fd178f91ea9ab95b25a91f6b05c2794b833bf0c9051
-
C:\Users\Admin\AppData\Local\Temp\nsi1FC2.tmp\ioSpecial.iniFilesize
725B
MD5ae5dd264272cad525209ecc23eac85ae
SHA1115a50b90654ffe8b0c93435980b31d1abdb9130
SHA256ada032bdee41eb02ba4d8b990bc7995e6d2bd952514e7482567f33314717322d
SHA5124e933d4762c16d33820d78db99ef743c053ba16a84741375ae5b07fa8366d28b0155b9e25bf42f2c01a41c9e451eca00d05baf6902aef1047ff5a5d3f935f13b
-
C:\Users\Admin\AppData\Local\Temp\nsi1FC2.tmp\ioSpecial.iniFilesize
777B
MD50f1fc104ce061c08c79dcd984fdbca9f
SHA17a5c94fd64589c7cfb64006e16ba0f1c45581e26
SHA2561b4782c1065d042716515292f593cc26e3c74280e8ad81de6387c3aae018802a
SHA512528811611516fc616640b4b91a6d2ebcb37fbda5e02acd2555763dc327603fa427a796f28af9256ff8eddc813449e3d80e43174861d196ce369d7fa0b9e79a79
-
C:\Users\Admin\Desktop\WinDirStat.lnkFilesize
1KB
MD5b1f39276a44bcddd326012adf40c10c8
SHA1f5a738de04056c3edc761b883ff521a5814a693f
SHA2566c49ed92e37d8288fa5774579a692bd02033e82e6acf69ed6652d555b7fa7fce
SHA5127260c6de9110662ee51b5354ab5a76e0dbb3af6d4cf69d5918656a90a02a226fa7bd3f4a8cd5c74a0b8966311f9324e65e231836ce311cd69bc30c8fb966305d
-
\Program Files (x86)\WinDirStat\Uninstall.exeFilesize
46KB
MD5a127e6118b9dd2f9d5a7cc4d697a0105
SHA19ac17d4dcf0884ceafacf10c42209c0942dfe7a8
SHA256afc864cfce79b2a6add491a27ea672d958233ed7a97a2cbbce60100d2fa1e670
SHA5120e57d2856c02c55d477d9b3cc1d4bf5ffa3650d4b20be18b0a9e614d19143aee325c4cd92ff31bbddf6e93cd3ebeb47d8727de6e25faa366341cc71117122065
-
\Program Files (x86)\WinDirStat\windirstat.exeFilesize
636KB
MD524cd9a82fcfc658dd3ae7ba25c958ffb
SHA126e14a532e1e050eb20755a0b7a5fea99dd80588
SHA256cc3ee246f2710dc9ba9e2a88e3192b88f1db4caa2eefb8641642a33df04e585c
SHA5124de675be1f7d618d133ef24765a027840473e0c5bc93550d5e5fdbf078edc74c2241e6e3cd8753517e2954c7f09b9909028de7b727294d723fb5700658c7979d
-
\Users\Admin\AppData\Local\Temp\nsi1FC2.tmp\InstallOptions.dllFilesize
14KB
MD59b2ad0546fd834c01a3bdcbfbc95da7d
SHA14f92f5a6b269d969ba3340f1c1978d337992a62c
SHA2567e08cb4ff81dbb0573c672301681e31b2042682e9a2204673f811455f823dd37
SHA5125b374fe7cc8d6ff8b93cfcc8deae23f2313f8240c998d04d3e65c196b33c7d36a33930ffd481cdd6d30aa4c73dd2a1c6fe43791e9bf10bd71b33321a8e71c6b8
-
\Users\Admin\AppData\Local\Temp\nsi1FC2.tmp\System.dllFilesize
10KB
MD54125926391466fdbe8a4730f2374b033
SHA1fdd23034ada72d2537939ac6755d7f7c0e9b3f0e
SHA2566692bd93bcd04146831652780c1170da79aa3784c3c070d95fb1580e339de6c5
SHA51232a1cf96842454b3c3641316ee39051ae024bdce9e88ac236eadad531f2c0a08d46b77d525f7d994c9a5af4cc9a391d30ee92b9ec782b7fb9a42c76f0f52a008