Analysis
-
max time kernel
106s -
max time network
94s -
platform
windows11-21h2_x64 -
resource
win11-20240709-en -
resource tags
arch:x64arch:x86image:win11-20240709-enlocale:en-usos:windows11-21h2-x64system -
submitted
25-07-2024 07:59
Static task
static1
Behavioral task
behavioral1
Sample
windirstat1_1_2_setup.exe
Resource
win11-20240709-en
General
-
Target
windirstat1_1_2_setup.exe
-
Size
630KB
-
MD5
3abf1c149873e25d4e266225fbf37cbf
-
SHA1
6fa92dd2ca691c11dfbfc0a239e34369897a7fab
-
SHA256
370a27a30ee57247faddeb1f99a83933247e07c8760a07ed82e451e1cb5e5cdd
-
SHA512
b6d9672a580a02299bc370deb1fd99b5ca10ab86456385870cdae522c185ae51f8d390a7c50fcb5c7898523f52c834bb73515ffc6d0b0bcde210640e815ece9e
-
SSDEEP
12288:yCjeMsiGVBKvjxTNlZaLlcMj+wXZvQpd9nP2+ZMU2tYspZcMwr/GNd35:yCjeTZa7BTsxewXZUTP2HU2yawjY5
Malware Config
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Executes dropped EXE 1 IoCs
Processes:
windirstat.exepid process 1084 windirstat.exe -
Loads dropped DLL 3 IoCs
Processes:
windirstat1_1_2_setup.exepid process 2764 windirstat1_1_2_setup.exe 2764 windirstat1_1_2_setup.exe 2764 windirstat1_1_2_setup.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 2 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
windirstat.exedescription ioc process File opened (read-only) \??\D: windirstat.exe File opened (read-only) \??\F: windirstat.exe -
Drops file in Program Files directory 4 IoCs
Processes:
windirstat1_1_2_setup.exedescription ioc process File created C:\Program Files (x86)\WinDirStat\wdsr040c.dll windirstat1_1_2_setup.exe File created C:\Program Files (x86)\WinDirStat\windirstat.chm windirstat1_1_2_setup.exe File created C:\Program Files (x86)\WinDirStat\Uninstall.exe windirstat1_1_2_setup.exe File created C:\Program Files (x86)\WinDirStat\windirstat.exe windirstat1_1_2_setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
windirstat1_1_2_setup.exewindirstat.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windirstat1_1_2_setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windirstat.exe -
NSIS installer 1 IoCs
Processes:
resource yara_rule C:\Program Files (x86)\WinDirStat\Uninstall.exe nsis_installer_1 -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
windirstat.exedescription pid process Token: SeBackupPrivilege 1084 windirstat.exe Token: SeBackupPrivilege 1084 windirstat.exe Token: SeBackupPrivilege 1084 windirstat.exe Token: SeBackupPrivilege 1084 windirstat.exe Token: SeBackupPrivilege 1084 windirstat.exe Token: SeBackupPrivilege 1084 windirstat.exe Token: SeBackupPrivilege 1084 windirstat.exe Token: SeBackupPrivilege 1084 windirstat.exe Token: SeBackupPrivilege 1084 windirstat.exe Token: SeBackupPrivilege 1084 windirstat.exe Token: SeBackupPrivilege 1084 windirstat.exe Token: SeBackupPrivilege 1084 windirstat.exe Token: SeBackupPrivilege 1084 windirstat.exe Token: SeBackupPrivilege 1084 windirstat.exe Token: SeBackupPrivilege 1084 windirstat.exe Token: SeBackupPrivilege 1084 windirstat.exe Token: SeBackupPrivilege 1084 windirstat.exe Token: SeBackupPrivilege 1084 windirstat.exe Token: SeBackupPrivilege 1084 windirstat.exe Token: SeBackupPrivilege 1084 windirstat.exe Token: SeBackupPrivilege 1084 windirstat.exe Token: SeBackupPrivilege 1084 windirstat.exe Token: SeBackupPrivilege 1084 windirstat.exe Token: SeBackupPrivilege 1084 windirstat.exe Token: SeBackupPrivilege 1084 windirstat.exe Token: SeBackupPrivilege 1084 windirstat.exe Token: SeBackupPrivilege 1084 windirstat.exe Token: SeBackupPrivilege 1084 windirstat.exe Token: SeBackupPrivilege 1084 windirstat.exe Token: SeBackupPrivilege 1084 windirstat.exe Token: SeBackupPrivilege 1084 windirstat.exe Token: SeBackupPrivilege 1084 windirstat.exe Token: SeBackupPrivilege 1084 windirstat.exe Token: SeBackupPrivilege 1084 windirstat.exe Token: SeBackupPrivilege 1084 windirstat.exe Token: SeBackupPrivilege 1084 windirstat.exe Token: SeBackupPrivilege 1084 windirstat.exe Token: SeBackupPrivilege 1084 windirstat.exe Token: SeBackupPrivilege 1084 windirstat.exe Token: SeBackupPrivilege 1084 windirstat.exe Token: SeBackupPrivilege 1084 windirstat.exe Token: SeBackupPrivilege 1084 windirstat.exe Token: SeBackupPrivilege 1084 windirstat.exe Token: SeBackupPrivilege 1084 windirstat.exe Token: SeBackupPrivilege 1084 windirstat.exe Token: SeBackupPrivilege 1084 windirstat.exe Token: SeBackupPrivilege 1084 windirstat.exe Token: SeBackupPrivilege 1084 windirstat.exe Token: SeBackupPrivilege 1084 windirstat.exe Token: SeBackupPrivilege 1084 windirstat.exe Token: SeBackupPrivilege 1084 windirstat.exe Token: SeBackupPrivilege 1084 windirstat.exe Token: SeBackupPrivilege 1084 windirstat.exe Token: SeBackupPrivilege 1084 windirstat.exe Token: SeBackupPrivilege 1084 windirstat.exe Token: SeBackupPrivilege 1084 windirstat.exe Token: SeBackupPrivilege 1084 windirstat.exe Token: SeBackupPrivilege 1084 windirstat.exe Token: SeBackupPrivilege 1084 windirstat.exe Token: SeBackupPrivilege 1084 windirstat.exe Token: SeBackupPrivilege 1084 windirstat.exe Token: SeBackupPrivilege 1084 windirstat.exe Token: SeBackupPrivilege 1084 windirstat.exe Token: SeBackupPrivilege 1084 windirstat.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
windirstat.exepid process 1084 windirstat.exe 1084 windirstat.exe 1084 windirstat.exe 1084 windirstat.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
windirstat1_1_2_setup.exedescription pid process target process PID 2764 wrote to memory of 1084 2764 windirstat1_1_2_setup.exe windirstat.exe PID 2764 wrote to memory of 1084 2764 windirstat1_1_2_setup.exe windirstat.exe PID 2764 wrote to memory of 1084 2764 windirstat1_1_2_setup.exe windirstat.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\windirstat1_1_2_setup.exe"C:\Users\Admin\AppData\Local\Temp\windirstat1_1_2_setup.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Program Files (x86)\WinDirStat\windirstat.exe"C:\Program Files (x86)\WinDirStat\windirstat.exe"2⤵
- Executes dropped EXE
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1084
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\WinDirStat\Uninstall.exeFilesize
46KB
MD5a127e6118b9dd2f9d5a7cc4d697a0105
SHA19ac17d4dcf0884ceafacf10c42209c0942dfe7a8
SHA256afc864cfce79b2a6add491a27ea672d958233ed7a97a2cbbce60100d2fa1e670
SHA5120e57d2856c02c55d477d9b3cc1d4bf5ffa3650d4b20be18b0a9e614d19143aee325c4cd92ff31bbddf6e93cd3ebeb47d8727de6e25faa366341cc71117122065
-
C:\Program Files (x86)\WinDirStat\wdsr040c.dllFilesize
60KB
MD5ed8a32ce3b4edbd63b6ed2b6d5ff5d5a
SHA1ebb687857dff99fecc532e254445a8f3abb89e6c
SHA256acd0c6b92acb5793a94e820c4d418bd6114c97fe2b9788de73879b8bf220a717
SHA5128b3d9a9d0c684c4b1563abf9c65e511e0b42ac0161e9d4ea811fbee2beed05ece24450f4c997294ebb8330f2ead6688041c8ba528889205ec93ffb50fc8671e9
-
C:\Program Files (x86)\WinDirStat\windirstat.chmFilesize
50KB
MD51bddb8a0e0f9cd90a5b3936ec2c2c4cf
SHA1c8302168fb532fe03e76cb8a82aa53b49ee0bc44
SHA2561e87c07744054709d271337d8ce06929429b334d70875605cb68ecc4c6610cd1
SHA512b857de9026b3eab13f4dbc464e6403835e3a61e5e9e3566735bf1ddd8dedc4ecf08807b27207bd8b385250b71ea234b301dd49e6f3c90f1270ae03868c035472
-
C:\Program Files (x86)\WinDirStat\windirstat.exeFilesize
636KB
MD524cd9a82fcfc658dd3ae7ba25c958ffb
SHA126e14a532e1e050eb20755a0b7a5fea99dd80588
SHA256cc3ee246f2710dc9ba9e2a88e3192b88f1db4caa2eefb8641642a33df04e585c
SHA5124de675be1f7d618d133ef24765a027840473e0c5bc93550d5e5fdbf078edc74c2241e6e3cd8753517e2954c7f09b9909028de7b727294d723fb5700658c7979d
-
C:\Users\Admin\AppData\Local\Temp\nsd8119.tmp\InstallOptions.dllFilesize
14KB
MD59b2ad0546fd834c01a3bdcbfbc95da7d
SHA14f92f5a6b269d969ba3340f1c1978d337992a62c
SHA2567e08cb4ff81dbb0573c672301681e31b2042682e9a2204673f811455f823dd37
SHA5125b374fe7cc8d6ff8b93cfcc8deae23f2313f8240c998d04d3e65c196b33c7d36a33930ffd481cdd6d30aa4c73dd2a1c6fe43791e9bf10bd71b33321a8e71c6b8
-
C:\Users\Admin\AppData\Local\Temp\nsd8119.tmp\System.dllFilesize
10KB
MD54125926391466fdbe8a4730f2374b033
SHA1fdd23034ada72d2537939ac6755d7f7c0e9b3f0e
SHA2566692bd93bcd04146831652780c1170da79aa3784c3c070d95fb1580e339de6c5
SHA51232a1cf96842454b3c3641316ee39051ae024bdce9e88ac236eadad531f2c0a08d46b77d525f7d994c9a5af4cc9a391d30ee92b9ec782b7fb9a42c76f0f52a008
-
C:\Users\Admin\AppData\Local\Temp\nsd8119.tmp\ioSpecial.iniFilesize
790B
MD57d32761f8224f5028ac2df5e91031653
SHA1e6ac2ff3b62b0ba91ec7bc7cbf551b90bfdaba0d
SHA256604160a4890cbe94132071aad873cb757c20b5df7cd46b5313ffb48cd2d634a4
SHA512ff2b077c6cabbf6abe803f42d7bf3cc1d84cde2e4a9ac75c0f2bb858f9e68ddeadd6e43a165b6337966c1061627ddbd22a58f08f6bcf6a9bc88f98b79db9fdf3
-
C:\Users\Admin\AppData\Local\Temp\nsd8119.tmp\ioSpecial.iniFilesize
799B
MD596cdb46eba8e017f8f058a183f425c00
SHA1aa46eef21d3248020b25b3bb49139b7adec084c9
SHA2561d13f8866a70ca3b4331baee208768837210acac15eb7bbee8a36e5934aef050
SHA512fd2de2d983892cd3cbfa6781ac332cd70b34ce8d02cd412a35b4660296c4c1cecb4d1199bb5751f8508cd54d6560685584e5357d035344faf32cef107e176c16
-
C:\Users\Admin\AppData\Local\Temp\nsd8119.tmp\ioSpecial.iniFilesize
725B
MD5608cb162176dd1b3a7de979d2b8205ae
SHA1ce056b877770154da85e40c3e4fcb138077b98ca
SHA25603a04d92346a9d892fae5670b4866fc092f9a80ddbba6cd78cf45218478e4810
SHA51205635a3fd8797a7d177735a402b5f30d3559d92fefab95b3bbd7bc27a965e561f0d24d5ff2f1c47ab7668c88419267a178e39514f3f28abc16ae171e0f3e4b4c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\WinDirStat\Help (ENG).lnkFilesize
1KB
MD57d7d17b29bd926c4b0a38522da71acc2
SHA1343891e3a105e22017c2f35299bc8df2ed6d19eb
SHA2560cee21c8ab4d164b5394ba94b627315153968fa807ad02df3ee730f5c1dee929
SHA51263004e5b30471aaa5a00ff6549100e5fd0cfb8286958e93642601e5499cafe4f79c625c531d55fc0c22e1a1b86a4bb77d4f3703eae9e6d0ce84c72c4279ae22b
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\WinDirStat\Uninstall WinDirStat.lnkFilesize
1KB
MD5159e15c8f2282d9508bba491e964c661
SHA1fb8ea54f61873a298bb2581fbf46a0308bb1d844
SHA25646ccb1310b2f4fcc827cad325a816ec1f44fe3d2a54fcc04a15ca40cbe649a90
SHA5128cdd4e31ac0e392975a222ad2f9d86e658bb8e3fd1fe543b7be9b13a9e9af9228a3b474448cdfbe271a16c022fe2e57ea5b112b5fbefcd364163ec7f51eecaaa
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\WinDirStat\WinDirStat.lnkFilesize
1KB
MD5adf3832ea0fce9d7a826b1e8bcaf0648
SHA119dba4037b5d20687efd595954d8ea881df0f4ee
SHA25632d9c78205e60cef00854348727116878bf9b84fd09b38be3644177c352cbb9f
SHA512bd43eaab9c57785017d070e0f6c1c9dc7efaa9ba9f6bccc3d950f977fc19aa48878a8dfbb7b233e60a0d6f439bde55a4ee704ea4e108500bbcd0f51896d6cfb6
-
C:\Users\Admin\Desktop\WinDirStat.lnkFilesize
1KB
MD56d93d9b1577ee35d9c8c04c225d7ecb8
SHA1b94b96aa45b80307041593029c19c98d18ba8358
SHA256a08f5746fb16cccb0d864441f339f14bd8ce64b099176836cae27847a80ff493
SHA5128c3f0d61f5386f04e9d52410b86c702c8fb824e8065093321fbec56daf8d49b0b4e2bd606eb5de4624f3dd26ba1d083603bb6541129e03ea4c75f54fb082e411