Analysis

  • max time kernel
    119s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    19-07-2024 13:55

General

  • Target

    $PLUGINSDIR/OWInstaller.exe

  • Size

    298KB

  • MD5

    664fa65707954e3e3b6b7f67dfbcbeaf

  • SHA1

    df8aa34ee94968d7bdd3e834bb15a45386519da5

  • SHA256

    d895144b6393be39c6cbc4c3b67e99ac5f04472a58ffc07fb067800607c6ca4a

  • SHA512

    eecfa11a80ecaacb090db4595a0ee82b3ee8ed9afdb070142f74ebc7ea0289a8b73c3f34fcd2fea0b9214296fce4d2045f3fa8e34c551e3a0e79d9eca43cc49e

  • SSDEEP

    6144:BpatEos7zVZxA7iJ7TUOgFR5Ru09bFyoSIm9006zq29Slplkucq4:BpatqzVZB7IOgF7YFoSU0oSKh

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies registry class 34 IoCs
  • Modifies system certificate store 2 TTPs 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\OWInstaller.exe
    "C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\OWInstaller.exe"
    1⤵
    • Modifies Internet Explorer settings
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2632
    • C:\Windows\System32\DxDiag.exe
      "C:\Windows\System32\DxDiag.exe" /tC:\Users\Admin\AppData\Local\Overwolf\Temp\DxDiagOutput.txt
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2820
      • C:\Windows\SysWOW64\dxdiag.exe
        "C:\Windows\SysWOW64\dxdiag.exe" /tC:\Users\Admin\AppData\Local\Overwolf\Temp\DxDiagOutput.txt
        3⤵
        • Drops file in Windows directory
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:2272

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4809616ee86dfe9b9e6ba6cc740e6bb0

    SHA1

    9ce9be655d084b9cd4f003da7ca3da3a11060f76

    SHA256

    ea6a42f4a195e34ff5c7ef18f495a703bbf72c3bec501840a633d66d87a105dd

    SHA512

    8170d706fb4a1a46514f90bdd46e6e37157ec698a99ec1c4f9642c19ab16a3d57678f033d9eaadd5bbf41a6e1fbbc71f1a52b7162ca03be3cff3b114a50ccbc6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d04966b9bd601b7ca6900c1544fa6d01

    SHA1

    617d2867b2555181a7daa9fced2400c62bf82d16

    SHA256

    44361dbbe6875d99dcf80707b3a3addfe9a5117df490cbbca23fa43ea9d168fc

    SHA512

    d173e283ae5fd53fa94648fffbd8cd33c4880a644650ad3facbbb95588dab61384b0215f6d29f0d4a5b519f77ddb4a61e6c6d6f551bcd0d5c75f2ec0b12fb469

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\CWSOWPAF\block_inputs[1].js

    Filesize

    281B

    MD5

    78958110509900367e8bd8f6fe554e70

    SHA1

    7559eccda81669fee7a06b4ec54a22a672d8c64c

    SHA256

    b2a763b225eee36970d4525500d538ed2efb00cfb2fed01b13ccc4d98beeab57

    SHA512

    7662859b3b5cd3713293118c101d6afa0017924ac49e731f8b80b9fa938021257b4fe04befd6b810c10cd4420fe5c611ef4167b7d4d028593abf59d588dbb0d8

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\CWSOWPAF\style[1].css

    Filesize

    1KB

    MD5

    bde238bc90d90deecbdfebadafbac483

    SHA1

    b406e2a9766130621a3ba8f23bc6f302164b915d

    SHA256

    06fa8be623a7a52f8a45976fae5209b9d539b1e849755d50de9a3d2de0b9881b

    SHA512

    126eab9624db7093b7000abf3f01f6923ad243a5dfa4a7cba016164f540d2e0ea8480a8e9ce0e037120872a84c2f38da2a929713b85dda00888f185085790681

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\NT8UAXPK\jquery-1.10.2.min[1].js

    Filesize

    90KB

    MD5

    f5181545817b45e967869df84ad33f49

    SHA1

    4464b91f3536b736543eb49e04e6ff2cefeb5e33

    SHA256

    a881c47a88411a1c65c5107537c9253d4d4db16b57db5cf0201bee1a9f2f30b2

    SHA512

    1a7d57e96179b10e4024c337a9ef276d28738673cc495f6a9ad677c568ee08d5be62b1040a63cb31cd8353c8dbea3ecdb468e1afab6d69088e8d14cd48322ebc

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\NT8UAXPK\reset[1].css

    Filesize

    427B

    MD5

    d29f1cfab4739a8757e86b90ee9a745f

    SHA1

    9f36d9336ed6a90beca34bfc7d5cee28adc3aa44

    SHA256

    a5d4254113dc8ec027bc30da0df9dde7c39583b024660fccca1e949d1db70f90

    SHA512

    56ce5d8cee435b2d9a1b9626e8ffdb449b5e1813d24468dc5808f31271d5b8adb9fa143f17743a48f5c081f67325e08ae8c881ae1acdf8dec4c3cea36fc2fa4e

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XY2E4O3P\fonts[1].css

    Filesize

    2KB

    MD5

    2778c70161bb0aec49f4207e1430bf63

    SHA1

    7d74122bf734778e2cf11f41836420003bd02b24

    SHA256

    086aa3af6429d74fcf04ec1f5e870145cc6309a6c4c0c22c2d46f3560d7d587d

    SHA512

    73c1d980ddaf682340cb98d5dfd4a34e0d29e9a41035295ea76f104ef659881bd783e1bb38b40281edb588616d8a59d4433fa015a0f4aa5c398f5b65e614288c

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\YUF3ZB4A\progress[1].css

    Filesize

    702B

    MD5

    1d66bac6d892d75acd1ca5fe4fd39974

    SHA1

    7ab518b9fe084077e1e0f0537ee266a84cde7c53

    SHA256

    be69261940925377fede26433a0431e2fc1521f107525f68fbc3af3ff2818044

    SHA512

    26e59e6f378d3f22f939a08796311f78dca44958e03c4f6a724e61374571561aa50bbbb58c866bcb5441aa0114e33b9e67d538b65c7e7de16d5afdfedfa403bd

  • C:\Users\Admin\AppData\Local\Overwolf\Settings\SettingsPageBasic.xml

    Filesize

    202B

    MD5

    07c3f71a896344748d6b84185857266e

    SHA1

    74bacefe25bd3f5334dc2f80a18712616be621e1

    SHA256

    6bde85038307efe78e30905856ab046d5e64cd814598286ca7966d3b64cd0525

    SHA512

    2464fd88a7725ec08923959354c4e68fe5d07bef069b6dba1aaa62aa0867e2a5e30c50d51994aec4f9f6150349fa9186579dcb2f103eea7b993325db596b5641

  • C:\Users\Admin\AppData\Local\Overwolf\Settings\SettingsPageBasic.xml

    Filesize

    752B

    MD5

    eca097c3c7531185efbb04bbee8fe36f

    SHA1

    25565fd9955f714ac9de7f05e90b12d53dfa0198

    SHA256

    d60a6689c557ee31a950ad972ee2dee9873a70281716597e79dda68c109fb721

    SHA512

    63daec18bf74b847b7144066961fdc444deca845f911bd7f9cc1ce004b6fe5372371563a8399cdcedac4371a5edcf8df08a926632348cfaeab3092af549f1be3

  • C:\Users\Admin\AppData\Local\Overwolf\Temp\DxDiagOutput.txt

    Filesize

    15KB

    MD5

    de5306e97015dab0fb8fe79ae21bc973

    SHA1

    32c958a97e60caf7b145896a0a379e79f152c61b

    SHA256

    853802f3be2947574b9b6bd54602e53a9b1f71ade5c71243a4cfbfc276893cee

    SHA512

    4245d1f9834e11de2a62215fb2da0d2c4a8dcc19c99c9a1ca44c7156f977e896dcf2c6eaed4277b8dc6ad1be7e14a7928e3105c21a8d78caa710ee74ae04886c

  • C:\Users\Admin\AppData\Local\Temp\Cab11CE.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar11F0.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2272-239-0x0000000002310000-0x000000000231A000-memory.dmp

    Filesize

    40KB

  • memory/2272-39-0x0000000001DD0000-0x0000000001DDA000-memory.dmp

    Filesize

    40KB

  • memory/2272-258-0x0000000001DD0000-0x0000000001DD5000-memory.dmp

    Filesize

    20KB

  • memory/2272-257-0x00000000024D0000-0x00000000024FA000-memory.dmp

    Filesize

    168KB

  • memory/2272-256-0x00000000024D0000-0x00000000024FA000-memory.dmp

    Filesize

    168KB

  • memory/2272-241-0x0000000002A60000-0x0000000002ABC000-memory.dmp

    Filesize

    368KB

  • memory/2272-240-0x0000000002A60000-0x0000000002ABC000-memory.dmp

    Filesize

    368KB

  • memory/2272-238-0x0000000002310000-0x000000000231A000-memory.dmp

    Filesize

    40KB

  • memory/2632-0-0x000007FEF5E13000-0x000007FEF5E14000-memory.dmp

    Filesize

    4KB

  • memory/2632-1-0x000000013FBE0000-0x000000013FC2C000-memory.dmp

    Filesize

    304KB

  • memory/2632-2-0x0000000000570000-0x0000000000614000-memory.dmp

    Filesize

    656KB

  • memory/2632-3-0x0000000000640000-0x0000000000686000-memory.dmp

    Filesize

    280KB

  • memory/2632-4-0x000007FEF5E10000-0x000007FEF67FC000-memory.dmp

    Filesize

    9.9MB

  • memory/2632-5-0x0000000000910000-0x0000000000928000-memory.dmp

    Filesize

    96KB

  • memory/2632-255-0x000007FEF5E13000-0x000007FEF5E14000-memory.dmp

    Filesize

    4KB

  • memory/2632-13-0x000000001AF90000-0x000000001B040000-memory.dmp

    Filesize

    704KB

  • memory/2632-40-0x0000000026350000-0x0000000026AF6000-memory.dmp

    Filesize

    7.6MB

  • memory/2632-264-0x000007FEF5E10000-0x000007FEF67FC000-memory.dmp

    Filesize

    9.9MB