Analysis

  • max time kernel
    151s
  • max time network
    138s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-07-2024 06:51

General

  • Target

    windirstat1_1_2_setup.exe

  • Size

    630KB

  • MD5

    3abf1c149873e25d4e266225fbf37cbf

  • SHA1

    6fa92dd2ca691c11dfbfc0a239e34369897a7fab

  • SHA256

    370a27a30ee57247faddeb1f99a83933247e07c8760a07ed82e451e1cb5e5cdd

  • SHA512

    b6d9672a580a02299bc370deb1fd99b5ca10ab86456385870cdae522c185ae51f8d390a7c50fcb5c7898523f52c834bb73515ffc6d0b0bcde210640e815ece9e

  • SSDEEP

    12288:yCjeMsiGVBKvjxTNlZaLlcMj+wXZvQpd9nP2+ZMU2tYspZcMwr/GNd35:yCjeTZa7BTsxewXZUTP2HU2yawjY5

Malware Config

Signatures

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Credentials from Password Stores: Windows Credential Manager 1 TTPs

    Suspicious access to Credentials History.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 2 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 3 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • NSIS installer 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\windirstat1_1_2_setup.exe
    "C:\Users\Admin\AppData\Local\Temp\windirstat1_1_2_setup.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3476
    • C:\Program Files (x86)\WinDirStat\windirstat.exe
      "C:\Program Files (x86)\WinDirStat\windirstat.exe"
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:2460

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\WinDirStat\Uninstall.exe
    Filesize

    46KB

    MD5

    a127e6118b9dd2f9d5a7cc4d697a0105

    SHA1

    9ac17d4dcf0884ceafacf10c42209c0942dfe7a8

    SHA256

    afc864cfce79b2a6add491a27ea672d958233ed7a97a2cbbce60100d2fa1e670

    SHA512

    0e57d2856c02c55d477d9b3cc1d4bf5ffa3650d4b20be18b0a9e614d19143aee325c4cd92ff31bbddf6e93cd3ebeb47d8727de6e25faa366341cc71117122065

  • C:\Program Files (x86)\WinDirStat\windirstat.chm
    Filesize

    50KB

    MD5

    1bddb8a0e0f9cd90a5b3936ec2c2c4cf

    SHA1

    c8302168fb532fe03e76cb8a82aa53b49ee0bc44

    SHA256

    1e87c07744054709d271337d8ce06929429b334d70875605cb68ecc4c6610cd1

    SHA512

    b857de9026b3eab13f4dbc464e6403835e3a61e5e9e3566735bf1ddd8dedc4ecf08807b27207bd8b385250b71ea234b301dd49e6f3c90f1270ae03868c035472

  • C:\Program Files (x86)\WinDirStat\windirstat.exe
    Filesize

    636KB

    MD5

    24cd9a82fcfc658dd3ae7ba25c958ffb

    SHA1

    26e14a532e1e050eb20755a0b7a5fea99dd80588

    SHA256

    cc3ee246f2710dc9ba9e2a88e3192b88f1db4caa2eefb8641642a33df04e585c

    SHA512

    4de675be1f7d618d133ef24765a027840473e0c5bc93550d5e5fdbf078edc74c2241e6e3cd8753517e2954c7f09b9909028de7b727294d723fb5700658c7979d

  • C:\Users\Admin\AppData\Local\Temp\nssA615.tmp\InstallOptions.dll
    Filesize

    14KB

    MD5

    9b2ad0546fd834c01a3bdcbfbc95da7d

    SHA1

    4f92f5a6b269d969ba3340f1c1978d337992a62c

    SHA256

    7e08cb4ff81dbb0573c672301681e31b2042682e9a2204673f811455f823dd37

    SHA512

    5b374fe7cc8d6ff8b93cfcc8deae23f2313f8240c998d04d3e65c196b33c7d36a33930ffd481cdd6d30aa4c73dd2a1c6fe43791e9bf10bd71b33321a8e71c6b8

  • C:\Users\Admin\AppData\Local\Temp\nssA615.tmp\System.dll
    Filesize

    10KB

    MD5

    4125926391466fdbe8a4730f2374b033

    SHA1

    fdd23034ada72d2537939ac6755d7f7c0e9b3f0e

    SHA256

    6692bd93bcd04146831652780c1170da79aa3784c3c070d95fb1580e339de6c5

    SHA512

    32a1cf96842454b3c3641316ee39051ae024bdce9e88ac236eadad531f2c0a08d46b77d525f7d994c9a5af4cc9a391d30ee92b9ec782b7fb9a42c76f0f52a008

  • C:\Users\Admin\AppData\Local\Temp\nssA615.tmp\ioSpecial.ini
    Filesize

    799B

    MD5

    34d83c73e59063d01d0f298b8c6a58ad

    SHA1

    2107eea5cf60312b66b05bb15ce3c313b2ccccb9

    SHA256

    b976744819eeb581dc6d0f2d275dc4343fc66774489c7b912b2acaad99289747

    SHA512

    0a1c6a3cd1bb1449745553144e1c3a04f0b998ccdf93db0937f99de8916123405ed708963258ed33193e59e01b577e27b8f68d9735b7482659241b4dbcc72768

  • C:\Users\Admin\AppData\Local\Temp\nssA615.tmp\ioSpecial.ini
    Filesize

    725B

    MD5

    0b4a5b0f371fbdc557d7e51e2843ee1b

    SHA1

    7452171ceb59bd67db7b8fa3d04d14e99bac6c21

    SHA256

    711ad346c78dce38cc75e98fc58c1f44f6946396d604ba879110c5b04369d27f

    SHA512

    d6bfa1b5e9fe3f130f65d0b50721c32deb68befc63cda81fb890201fa965e6114177d48c890695bd138abc96e81107379955de747446be31fbf912b2c5b6a2e6

  • C:\Users\Admin\AppData\Local\Temp\nssA615.tmp\ioSpecial.ini
    Filesize

    751B

    MD5

    2579c7da823c3340db703144b85f6434

    SHA1

    ade0f2c86258b488d2516139264a1327c649cfd0

    SHA256

    760b92e728dcd5182467f8a5e2ff4183f8b0de84b3496d3510817f56a86651b5

    SHA512

    928ad899e09f761e05cf1e7dbd621bf3d710c495b9998114c738a35a522cad5eac170fcec352fd460951b12d917ebf99b3f727082baaafccf1f686c2df203622

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\WinDirStat\Help (ENG).lnk
    Filesize

    1KB

    MD5

    b72fb5543f7f7c5d2bcc7e490725b892

    SHA1

    31cc3760ebdea7d9d2626d4acb0d1b51d28d3a15

    SHA256

    7cd9cffbc5d1e4f676b0428f2eab6869517a70ab2a221184bcb7138192514516

    SHA512

    1e62b4fa76adc10e341ee1ea4f80b0cf56df22f5ac4fa34e4585f9d76481f06fa6786e36872584c44d77f898310bad45391f11221a40deb5166d653e0eda8deb

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\WinDirStat\Uninstall WinDirStat.lnk
    Filesize

    1KB

    MD5

    0794d5e8e13e812586133cb8f1edf62f

    SHA1

    fb48efacbd975daab51e7fe39db5608ce2f7aa30

    SHA256

    d9c21ecc04edcddc3845ca06fca4966d2f6c8c7e8a3315095ef6a62eb8e27b44

    SHA512

    12c91442a9e9e9be2a7026ddf559230325e0b19e7562d5a54c3e7444cc6d24b68183238cc9c2e37c2640822ca3df53fd1a8c8b3bd6573c5d88dcc76c69b2b94d

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\WinDirStat\WinDirStat.lnk
    Filesize

    1KB

    MD5

    c444944cac0140a7f352e513bfd95afc

    SHA1

    9b0965baf67d8ad20464f48b12967c04d8a26aca

    SHA256

    916350df81db1dc8025bbc3adeab35f42c0116a7a594de9a59f63e490a15cf01

    SHA512

    446310731b54fd10be0cc7fee0f2352b1c40b4e24977a2904440f4bf07b9965af5b817fa04c9f2c53b8d02dc1ed941ee1e10220ed759116864e44a9f6da3d5be

  • C:\Users\Admin\Desktop\WinDirStat.lnk
    Filesize

    1KB

    MD5

    684f490c3c4c5136215931d5446abe6b

    SHA1

    524e95dee84fd18cc5faf0ae31ead4658c04a3fe

    SHA256

    9455c8df50ac65cd5292c5ae01c92eb0ffec6c912ec4e5dc35e45a594920066e

    SHA512

    b722e00b2fd323eb01f15f051ff04e9ddb61e059bb6e58cd6cfa776118948958e4af9dab2fae5ccee28012ff763c4c31a0071117197e9466aab50153fac1311b