Analysis

  • max time kernel
    117s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    19-07-2024 14:58

General

  • Target

    $PLUGINSDIR/OWInstaller.exe

  • Size

    298KB

  • MD5

    1e300c17b3ea484157708c3a087ea026

  • SHA1

    c309e471461b73df65835b3792298996b219a648

  • SHA256

    31e1e4893d3b3321da2e64f067492dbb735289b485b8f85d91a63ffa22277652

  • SHA512

    3f59ed239f0e9a283a284b8c33bb7161969e2a9f1d34da41f504348754fb2b13a6a42623d72ad6e6c8ca8e904231d48f5ef8ff1dd8a509d52976c0ef6fd44558

  • SSDEEP

    6144:dpFQ9Yd2uAM4TrU96+WejMJKxLhbUV09b1moSIm9l062q2ZSypl/acbv:dpFQyUuAiqdJMLhedoSF0HS8z

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies registry class 34 IoCs
  • Modifies system certificate store 2 TTPs 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\OWInstaller.exe
    "C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\OWInstaller.exe"
    1⤵
    • Modifies Internet Explorer settings
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2352
    • C:\Windows\System32\DxDiag.exe
      "C:\Windows\System32\DxDiag.exe" /tC:\Users\Admin\AppData\Local\Overwolf\Temp\DxDiagOutput.txt
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2608
      • C:\Windows\SysWOW64\dxdiag.exe
        "C:\Windows\SysWOW64\dxdiag.exe" /tC:\Users\Admin\AppData\Local\Overwolf\Temp\DxDiagOutput.txt
        3⤵
        • Drops file in Windows directory
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:2560

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    39a1d179a688a76c77abfead3fa27374

    SHA1

    b0e5409fcbb4437d416dc2ee7b128ed26604324e

    SHA256

    e1f78da61256bdfb7ab6c27e8c9105ebead8bd9e1645268000d49dbe8a0f8bf5

    SHA512

    a448661542ed067e6e6057cfbb6f38b092b42ab935b0f4ae0b55c6660f66e5027b38d9435926d791031d667324c51cdd6e31dc4810e46f14e3a35c5cf5990147

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f12d71ab75d91a5c6fed9b25e74953e1

    SHA1

    b8dd926bb912f4ce8c7fc8ea96017c0e2e78268c

    SHA256

    51a7d2cccc758ca276c43ffefbae1809e3b10b3f257cf680b33bf1588d3ce284

    SHA512

    3a436bd084c8b578694302941b05734d2f812bd32427899c6467ba27aaca655892bc9e872ff6d61e613ea49b48fabfa74a878baba3c0195de355011f910e4f8a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6d7d36a54b840875821641380a751afc

    SHA1

    40c122f22c895c97bd4e26b026dbe1edd02d251b

    SHA256

    783163e11e1311ac46584cdd1a25d2a7ecddae66fff6ff4b9906a6c839abb778

    SHA512

    7c8e13f74e3ddadbf1c88a77bdd83c068bf10d3468ff0204a1a3e6da79ec4d763d93f247ea7712d6422c6ccce43193953d79d823825155bd8491e938f447732e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6e286a292ef16b51afe1c33103ce02bf

    SHA1

    c4939de421ff969a7dcb7101cd4e4aa63dd38824

    SHA256

    437781ad30b4a05b76905eb5ccd62117476b81e21a9f89abc96a2c964a5b67a2

    SHA512

    eccb39616f42a91c6b886ade06fae2057d7dd2465575e95a47f51b6f3b8920fb6fd962e2369d4728d76f03756847eb5429baf7b4167751163ffe1ba1f97046aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4da3b736552eb2b2e9ba3be8ba6e9123

    SHA1

    c4040daad91c67d4ea97ef5e6f3db330a2918231

    SHA256

    d53370ff34100a35eb2d4df55a1bca1fc90650aae243123572e1122677e5bdda

    SHA512

    0a5920aeb3587859aa446a11b70e861ffa8ab668da04db5647e72af0699ed534a04285f50aad6fa31ec4e4190eb8788d8d1ef06c61610459696e22d07ab9957d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4ec73a3663d84bdb76d51d125ae11d38

    SHA1

    a3eb28d9e72428171b537cf35a0f75c569e8f1d7

    SHA256

    bdaafa28311fe6c406267b09c504fa38006b0ff7643eb82b9e53bef7c6ab53d8

    SHA512

    4b71a626cfaf6b846987243634f325c96d35b7ca8dd3f0a6579b0e23a1da6211cd3e642ec766e5fea9875584f6706bb75013dab24b141695e93535e0e294bf02

  • C:\Users\Admin\AppData\Local\Overwolf\Settings\SettingsPageBasic.xml

    Filesize

    752B

    MD5

    d3048baf243fef6b8b5fe4c95bd47872

    SHA1

    07c337911467213dc2ed073ce41d48cf4ab794a8

    SHA256

    c487e8c78a560d60b1bbc9c872950dbdc752a445a9c93e2501fe41267d71ba05

    SHA512

    151032eef30de9369e198d95212c6870621e3635e23475896bc100fdb519a6ef13de485299f97b9d94f07cc6f8f321d8ae42868521166678d910739bf091397b

  • C:\Users\Admin\AppData\Local\Overwolf\Temp\DxDiagOutput.txt

    Filesize

    15KB

    MD5

    6fba0808ebfefd45e8af17deb825d14a

    SHA1

    7b57506369a8cc6f516cbe5a51ac0141e1cb7234

    SHA256

    2a57c93e5bbfef22e566333dc5c5f807672e273a38a6418f555bf7aa14851ca9

    SHA512

    f8a349c2647b76107c34590b2bf145a5c8f79946cc84b759ce6726ebafd9557496bb27992e8ad04cb3c68e9defa5f892e79fc612127c4c500c8b528857f616c4

  • C:\Users\Admin\AppData\Local\Temp\Cab3046.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar3068.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2352-495-0x000007FEF56D3000-0x000007FEF56D4000-memory.dmp

    Filesize

    4KB

  • memory/2352-130-0x00000000275F0000-0x0000000027D96000-memory.dmp

    Filesize

    7.6MB

  • memory/2352-496-0x000007FEF56D0000-0x000007FEF60BC000-memory.dmp

    Filesize

    9.9MB

  • memory/2352-2-0x0000000002190000-0x0000000002234000-memory.dmp

    Filesize

    656KB

  • memory/2352-5-0x00000000024B0000-0x00000000024C8000-memory.dmp

    Filesize

    96KB

  • memory/2352-4-0x000007FEF56D0000-0x000007FEF60BC000-memory.dmp

    Filesize

    9.9MB

  • memory/2352-3-0x0000000002410000-0x0000000002456000-memory.dmp

    Filesize

    280KB

  • memory/2352-0-0x000007FEF56D3000-0x000007FEF56D4000-memory.dmp

    Filesize

    4KB

  • memory/2352-13-0x000000001C090000-0x000000001C140000-memory.dmp

    Filesize

    704KB

  • memory/2352-1-0x000000013F460000-0x000000013F4AC000-memory.dmp

    Filesize

    304KB

  • memory/2560-248-0x0000000001E20000-0x0000000001E2A000-memory.dmp

    Filesize

    40KB

  • memory/2560-269-0x0000000002F50000-0x0000000002FAC000-memory.dmp

    Filesize

    368KB

  • memory/2560-267-0x0000000002F50000-0x0000000002FAC000-memory.dmp

    Filesize

    368KB

  • memory/2560-268-0x0000000002F50000-0x0000000002FAC000-memory.dmp

    Filesize

    368KB

  • memory/2560-266-0x0000000002F50000-0x0000000002FAC000-memory.dmp

    Filesize

    368KB

  • memory/2560-489-0x0000000002320000-0x000000000234A000-memory.dmp

    Filesize

    168KB

  • memory/2560-488-0x0000000002320000-0x000000000234A000-memory.dmp

    Filesize

    168KB

  • memory/2560-247-0x0000000001E20000-0x0000000001E2A000-memory.dmp

    Filesize

    40KB

  • memory/2560-149-0x0000000000550000-0x000000000055A000-memory.dmp

    Filesize

    40KB

  • memory/2560-150-0x0000000000550000-0x000000000055A000-memory.dmp

    Filesize

    40KB