Analysis

  • max time kernel
    60s
  • max time network
    65s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    25-04-2024 12:22

General

  • Target

    resources/app.asar.unpacked/node_modules/@overwolf/ow-electron/dist/electron.exe

  • Size

    142.2MB

  • MD5

    40b4e5764acd927c02a006c375bc7f41

  • SHA1

    0c83cb6dab4782fb2d210d56da028429725e4527

  • SHA256

    977f03901d520ee7f2412ec7e86f1a5ceb05aa9c4d1017eaa4d8f75c7763ac49

  • SHA512

    17736fc143c6ddb82060f69314d5cf36663be37611d5ad48f24c9cdbfb8eef3fa8ee5ce99fa98152a3e94c38f5e358e0539de27b0679ce193a7c49bdc447c3c7

  • SSDEEP

    1572864:iIkBFDwRUI7ngGGlkWGJOblScJeZrLTVQI3n+F:0u8GGiAYB3e

Score
5/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Modifies system certificate store 2 TTPs 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\resources\app.asar.unpacked\node_modules\@overwolf\ow-electron\dist\electron.exe
    "C:\Users\Admin\AppData\Local\Temp\resources\app.asar.unpacked\node_modules\@overwolf\ow-electron\dist\electron.exe"
    1⤵
    • Checks computer location settings
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3024
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /d /s /c "%windir%\System32\REG.exe QUERY HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography /v MachineGuid"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2704
      • C:\Windows\System32\reg.exe
        C:\Windows\System32\REG.exe QUERY HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography /v MachineGuid
        3⤵
          PID:2708
      • C:\Users\Admin\AppData\Local\Temp\resources\app.asar.unpacked\node_modules\@overwolf\ow-electron\dist\electron.exe
        "C:\Users\Admin\AppData\Local\Temp\resources\app.asar.unpacked\node_modules\@overwolf\ow-electron\dist\electron.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\Electron" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1020 --field-trial-handle=1112,i,11841864490244585208,14564774410482916648,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2
        2⤵
          PID:3068
        • C:\Users\Admin\AppData\Local\Temp\resources\app.asar.unpacked\node_modules\@overwolf\ow-electron\dist\electron.exe
          "C:\Users\Admin\AppData\Local\Temp\resources\app.asar.unpacked\node_modules\@overwolf\ow-electron\dist\electron.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\Electron" --mojo-platform-channel-handle=776 --field-trial-handle=1112,i,11841864490244585208,14564774410482916648,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:8
          2⤵
            PID:2444
          • C:\Users\Admin\AppData\Local\Temp\resources\app.asar.unpacked\node_modules\@overwolf\ow-electron\dist\electron.exe
            "C:\Users\Admin\AppData\Local\Temp\resources\app.asar.unpacked\node_modules\@overwolf\ow-electron\dist\electron.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\Electron" --app-path="C:\Users\Admin\AppData\Local\Temp\resources\app.asar.unpacked\node_modules\@overwolf\ow-electron\dist\resources\default_app.asar" --enable-sandbox --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --mojo-platform-channel-handle=1364 --field-trial-handle=1112,i,11841864490244585208,14564774410482916648,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:1
            2⤵
            • Checks computer location settings
            PID:2476
          • C:\Users\Admin\AppData\Local\Temp\resources\app.asar.unpacked\node_modules\@overwolf\ow-electron\dist\electron.exe
            "C:\Users\Admin\AppData\Local\Temp\resources\app.asar.unpacked\node_modules\@overwolf\ow-electron\dist\electron.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\Electron" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1020 --field-trial-handle=1112,i,11841864490244585208,14564774410482916648,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2
            2⤵
              PID:2760

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\070E0202839D9D67350CD2613E78E416

            Filesize

            1KB

            MD5

            55540a230bdab55187a841cfe1aa1545

            SHA1

            363e4734f757bdeb89868efe94907774a327695e

            SHA256

            d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb

            SHA512

            c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

            Filesize

            68KB

            MD5

            29f65ba8e88c063813cc50a4ea544e93

            SHA1

            05a7040d5c127e68c25d81cc51271ffb8bef3568

            SHA256

            1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

            SHA512

            e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

            Filesize

            1KB

            MD5

            a266bb7dcc38a562631361bbf61dd11b

            SHA1

            3b1efd3a66ea28b16697394703a72ca340a05bd5

            SHA256

            df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

            SHA512

            0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416

            Filesize

            230B

            MD5

            6a28f4a4fc3c921fe90cd12a00337738

            SHA1

            e4e85bfa000a1597fc5a0525c7f521124f2ac9f5

            SHA256

            569d41badf79e30d91ab9208cf56ca20aff16bc82d9ab53dcf015ca4289a9add

            SHA512

            6b74a3acb30c5888f3f3449ee5fd0b6a3c77fc03801601d9b11c14bc7df0afb2aaed6aab383724fd3616f210235e245cd626f6d58ee9c5d755ba332a8b53f851

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            344B

            MD5

            30b60339a91448c431c4b6b160262ba0

            SHA1

            4f2c222c7c95335e99530f4794198eea9d020812

            SHA256

            6a0ad769ab2c43af7128b904835c82fdcd49f9c4ac206fe54e041e169b66d7e2

            SHA512

            caa3d495270f0f11f73cf8afc7252e4b8f3608a67f8d69099bf99db8f9922a139e7b7c3006870554647ba467672ba2d608ad1ec6f754da8791a246385671c4d2

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

            Filesize

            242B

            MD5

            0adfd53379450ca17161f77b533c83ae

            SHA1

            c1dc78276d43e31a48b49c01af121dc0072fa300

            SHA256

            5353eaf60d5c110882c18dd5f8e28d869c2e756060be5aabdea7830f3346fafe

            SHA512

            a286ca79480962259aeadb0db0f6385df02a380581177c36622f1a68427080f53afd93509651bb3ce231b864f1bef0a355b9dfd6d00fc9f9d2fac14d3fc863a3

          • C:\Users\Admin\AppData\Local\Temp\Tar4D1C.tmp

            Filesize

            177KB

            MD5

            435a9ac180383f9fa094131b173a2f7b

            SHA1

            76944ea657a9db94f9a4bef38f88c46ed4166983

            SHA256

            67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

            SHA512

            1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

          • C:\Users\Admin\AppData\Roaming\Electron\Local Storage\leveldb\CURRENT~RFf764470.TMP

            Filesize

            16B

            MD5

            46295cac801e5d4857d09837238a6394

            SHA1

            44e0fa1b517dbf802b18faf0785eeea6ac51594b

            SHA256

            0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

            SHA512

            8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

          • C:\Users\Admin\AppData\Roaming\Electron\Session Storage\000002.dbtmp

            Filesize

            16B

            MD5

            206702161f94c5cd39fadd03f4014d98

            SHA1

            bd8bfc144fb5326d21bd1531523d9fb50e1b600a

            SHA256

            1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

            SHA512

            0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

          • memory/3024-47-0x0000000002520000-0x0000000002521000-memory.dmp

            Filesize

            4KB

          • memory/3024-378-0x0000000002520000-0x0000000002521000-memory.dmp

            Filesize

            4KB

          • memory/3068-48-0x0000000077DC0000-0x0000000077DC1000-memory.dmp

            Filesize

            4KB

          • memory/3068-2-0x0000000000060000-0x0000000000061000-memory.dmp

            Filesize

            4KB