Analysis

  • max time kernel
    117s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    19/07/2024, 23:09

General

  • Target

    $PLUGINSDIR/OWInstaller.exe

  • Size

    298KB

  • MD5

    bb7efb489861f452fbf9af03e97fedf0

  • SHA1

    932411b6c265c02c672c14b6a2427d9c6b4ed0e6

  • SHA256

    5703d91bd803be3331ff71761acc61250ef030f2bb878676c1ed296b7ea81851

  • SHA512

    3891d7136773d8433df7439eba87223440ad57a31d5e03303bdb2d56e0b14979825f996a84cff972b035f8f3facca48a1c609bd5691dc497c03137a406cbdfb4

  • SSDEEP

    6144:4pntLzy7dLKc/6XFGau09bFyoSIm900Tkq2dSxplWJchT:4pntyL6X81FoSU0+SNZ

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies registry class 34 IoCs
  • Modifies system certificate store 2 TTPs 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\OWInstaller.exe
    "C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\OWInstaller.exe"
    1⤵
    • Modifies Internet Explorer settings
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:300
    • C:\Windows\System32\DxDiag.exe
      "C:\Windows\System32\DxDiag.exe" /tC:\Users\Admin\AppData\Local\Overwolf\Temp\DxDiagOutput.txt
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2808
      • C:\Windows\SysWOW64\dxdiag.exe
        "C:\Windows\SysWOW64\dxdiag.exe" /tC:\Users\Admin\AppData\Local\Overwolf\Temp\DxDiagOutput.txt
        3⤵
        • Drops file in Windows directory
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:2724

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    de7e7ab5d860f655efa48fcb8d7bc5ff

    SHA1

    6ce61e6ee340edf5e8dc5f4aa1b5a9eacb3be085

    SHA256

    2018be2af78ef2b6f6129ba04570031750c8c880fae02edec497471c424607e5

    SHA512

    e54b86e91b3770b7aee2d9dc9910e9524b0af5e37001fb9f74d7d13fc27e40c61da3f7d0ba169f00a5edd718f2d1b16127cdc7e9a740444100ceedb00f707255

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\69P6875H\reset[1].css

    Filesize

    427B

    MD5

    d29f1cfab4739a8757e86b90ee9a745f

    SHA1

    9f36d9336ed6a90beca34bfc7d5cee28adc3aa44

    SHA256

    a5d4254113dc8ec027bc30da0df9dde7c39583b024660fccca1e949d1db70f90

    SHA512

    56ce5d8cee435b2d9a1b9626e8ffdb449b5e1813d24468dc5808f31271d5b8adb9fa143f17743a48f5c081f67325e08ae8c881ae1acdf8dec4c3cea36fc2fa4e

  • C:\Users\Admin\AppData\Local\Overwolf\Settings\SettingsPageBasic.xml

    Filesize

    752B

    MD5

    1aa1c62e8e1399e4201fba30eec26051

    SHA1

    224559942c252d9793eea7bfde24745ba08a6046

    SHA256

    500d1cb624a25d37b6006d843ba5604700319e42252b0aa9e6efd9eeae50a229

    SHA512

    a0d0d077d98b6d003c37717e1ad0d665cb32661b127523ee8d0490eb25d9950fb63fd82c28d24d20b023541f30333c695b432e4f614d747a9d28620fec083313

  • C:\Users\Admin\AppData\Local\Overwolf\Temp\DxDiagOutput.txt

    Filesize

    15KB

    MD5

    95cc15058fe91c8c7b37bf9afbaa89ea

    SHA1

    303b4833aea6cf01eda43b96980ca2320dfe83c0

    SHA256

    b8650bbf6516c4dea5f19c496bd5179eac530aa5d82fc6c5d54e0c9567ec1709

    SHA512

    5cac9aa8ac67a9c8abdf2a7d98e2a839da39ad49dd31a4238dfd4ede85d1f9afb4c0881e33667651cb11819546b198b0296bfda910af7f62df74139184c10ed8

  • C:\Users\Admin\AppData\Local\Temp\CabE32E.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarE40B.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/300-4-0x000007FEF61A0000-0x000007FEF6B8C000-memory.dmp

    Filesize

    9.9MB

  • memory/300-5-0x00000000009B0000-0x00000000009C8000-memory.dmp

    Filesize

    96KB

  • memory/300-38-0x0000000026880000-0x0000000027026000-memory.dmp

    Filesize

    7.6MB

  • memory/300-283-0x000007FEF61A0000-0x000007FEF6B8C000-memory.dmp

    Filesize

    9.9MB

  • memory/300-282-0x000007FEF61A3000-0x000007FEF61A4000-memory.dmp

    Filesize

    4KB

  • memory/300-13-0x000000001BB70000-0x000000001BC20000-memory.dmp

    Filesize

    704KB

  • memory/300-1-0x000000013F470000-0x000000013F4BC000-memory.dmp

    Filesize

    304KB

  • memory/300-2-0x0000000000650000-0x00000000006F4000-memory.dmp

    Filesize

    656KB

  • memory/300-3-0x0000000000930000-0x0000000000976000-memory.dmp

    Filesize

    280KB

  • memory/300-0-0x000007FEF61A3000-0x000007FEF61A4000-memory.dmp

    Filesize

    4KB

  • memory/2724-52-0x00000000005C0000-0x00000000005CA000-memory.dmp

    Filesize

    40KB

  • memory/2724-55-0x0000000002A40000-0x0000000002A9C000-memory.dmp

    Filesize

    368KB

  • memory/2724-76-0x0000000000C00000-0x0000000000C2A000-memory.dmp

    Filesize

    168KB

  • memory/2724-75-0x0000000000C00000-0x0000000000C2A000-memory.dmp

    Filesize

    168KB

  • memory/2724-74-0x0000000000550000-0x0000000000555000-memory.dmp

    Filesize

    20KB

  • memory/2724-56-0x0000000002A40000-0x0000000002A9C000-memory.dmp

    Filesize

    368KB

  • memory/2724-53-0x0000000002A40000-0x0000000002A9C000-memory.dmp

    Filesize

    368KB

  • memory/2724-54-0x0000000002A40000-0x0000000002A9C000-memory.dmp

    Filesize

    368KB

  • memory/2724-51-0x00000000005C0000-0x00000000005CA000-memory.dmp

    Filesize

    40KB

  • memory/2724-39-0x0000000000550000-0x000000000055A000-memory.dmp

    Filesize

    40KB

  • memory/2724-40-0x0000000000550000-0x000000000055A000-memory.dmp

    Filesize

    40KB

  • memory/2724-284-0x0000000000C00000-0x0000000000C2A000-memory.dmp

    Filesize

    168KB