Overview
overview
9Static
static
3windirstat...up.exe
windows11-21h2-x64
9$PLUGINSDI...ns.dll
windows11-21h2-x64
3$PLUGINSDI...em.dll
windows11-21h2-x64
3$PLUGINSDI...al.ini
windows11-21h2-x64
3$PLUGINSDI...rd.bmp
windows11-21h2-x64
3$_5_.exe
windows11-21h2-x64
9Uninstall.exe
windows11-21h2-x64
7$PLUGINSDI...em.dll
windows11-21h2-x64
3shfolder.dll
windows11-21h2-x64
3wdsh0407.chm
windows11-21h2-x64
1wdsh040e.chm
windows11-21h2-x64
1wdsh0415.chm
windows11-21h2-x64
1wdsr0405.dll
windows11-21h2-x64
1wdsr0407.dll
windows11-21h2-x64
1wdsr040a.dll
windows11-21h2-x64
1wdsr040b.dll
windows11-21h2-x64
1wdsr040c.dll
windows11-21h2-x64
1wdsr040e.dll
windows11-21h2-x64
1wdsr0410.dll
windows11-21h2-x64
1wdsr0413.dll
windows11-21h2-x64
1wdsr0415.dll
windows11-21h2-x64
1wdsr0419.dll
windows11-21h2-x64
1wdsr0425.dll
windows11-21h2-x64
1windirstat.chm
windows11-21h2-x64
1windirstat.exe
windows11-21h2-x64
9Analysis
-
max time kernel
432s -
max time network
433s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
06-08-2024 19:31
Static task
static1
Behavioral task
behavioral1
Sample
windirstat1_1_2_setup.exe
Resource
win11-20240802-en
Behavioral task
behavioral2
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win11-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win11-20240802-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/ioSpecial.ini
Resource
win11-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/modern-wizard.bmp
Resource
win11-20240802-en
Behavioral task
behavioral6
Sample
$_5_.exe
Resource
win11-20240802-en
Behavioral task
behavioral7
Sample
Uninstall.exe
Resource
win11-20240802-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win11-20240802-en
Behavioral task
behavioral9
Sample
shfolder.dll
Resource
win11-20240802-en
Behavioral task
behavioral10
Sample
wdsh0407.chm
Resource
win11-20240802-en
Behavioral task
behavioral11
Sample
wdsh040e.chm
Resource
win11-20240802-en
Behavioral task
behavioral12
Sample
wdsh0415.chm
Resource
win11-20240802-en
Behavioral task
behavioral13
Sample
wdsr0405.dll
Resource
win11-20240802-en
Behavioral task
behavioral14
Sample
wdsr0407.dll
Resource
win11-20240802-en
Behavioral task
behavioral15
Sample
wdsr040a.dll
Resource
win11-20240802-en
Behavioral task
behavioral16
Sample
wdsr040b.dll
Resource
win11-20240802-en
Behavioral task
behavioral17
Sample
wdsr040c.dll
Resource
win11-20240802-en
Behavioral task
behavioral18
Sample
wdsr040e.dll
Resource
win11-20240802-en
Behavioral task
behavioral19
Sample
wdsr0410.dll
Resource
win11-20240802-en
Behavioral task
behavioral20
Sample
wdsr0413.dll
Resource
win11-20240802-en
Behavioral task
behavioral21
Sample
wdsr0415.dll
Resource
win11-20240802-en
Behavioral task
behavioral22
Sample
wdsr0419.dll
Resource
win11-20240802-en
Behavioral task
behavioral23
Sample
wdsr0425.dll
Resource
win11-20240802-en
Behavioral task
behavioral24
Sample
windirstat.chm
Resource
win11-20240802-en
Behavioral task
behavioral25
Sample
windirstat.exe
Resource
win11-20240802-en
General
-
Target
windirstat1_1_2_setup.exe
-
Size
630KB
-
MD5
3abf1c149873e25d4e266225fbf37cbf
-
SHA1
6fa92dd2ca691c11dfbfc0a239e34369897a7fab
-
SHA256
370a27a30ee57247faddeb1f99a83933247e07c8760a07ed82e451e1cb5e5cdd
-
SHA512
b6d9672a580a02299bc370deb1fd99b5ca10ab86456385870cdae522c185ae51f8d390a7c50fcb5c7898523f52c834bb73515ffc6d0b0bcde210640e815ece9e
-
SSDEEP
12288:yCjeMsiGVBKvjxTNlZaLlcMj+wXZvQpd9nP2+ZMU2tYspZcMwr/GNd35:yCjeTZa7BTsxewXZUTP2HU2yawjY5
Malware Config
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Executes dropped EXE 1 IoCs
Processes:
windirstat.exepid process 5076 windirstat.exe -
Loads dropped DLL 3 IoCs
Processes:
windirstat1_1_2_setup.exepid process 3004 windirstat1_1_2_setup.exe 3004 windirstat1_1_2_setup.exe 3004 windirstat1_1_2_setup.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 2 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
windirstat.exedescription ioc process File opened (read-only) \??\D: windirstat.exe File opened (read-only) \??\F: windirstat.exe -
Drops file in Program Files directory 3 IoCs
Processes:
windirstat1_1_2_setup.exedescription ioc process File created C:\Program Files (x86)\WinDirStat\windirstat.chm windirstat1_1_2_setup.exe File created C:\Program Files (x86)\WinDirStat\Uninstall.exe windirstat1_1_2_setup.exe File created C:\Program Files (x86)\WinDirStat\windirstat.exe windirstat1_1_2_setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
windirstat1_1_2_setup.exewindirstat.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windirstat1_1_2_setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windirstat.exe -
NSIS installer 1 IoCs
Processes:
resource yara_rule C:\Program Files (x86)\WinDirStat\Uninstall.exe nsis_installer_1 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
windirstat.exepid process 5076 windirstat.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
windirstat.exedescription pid process Token: SeBackupPrivilege 5076 windirstat.exe Token: SeBackupPrivilege 5076 windirstat.exe Token: SeBackupPrivilege 5076 windirstat.exe Token: SeBackupPrivilege 5076 windirstat.exe Token: SeBackupPrivilege 5076 windirstat.exe Token: SeBackupPrivilege 5076 windirstat.exe Token: SeBackupPrivilege 5076 windirstat.exe Token: SeBackupPrivilege 5076 windirstat.exe Token: SeBackupPrivilege 5076 windirstat.exe Token: SeBackupPrivilege 5076 windirstat.exe Token: SeBackupPrivilege 5076 windirstat.exe Token: SeBackupPrivilege 5076 windirstat.exe Token: SeBackupPrivilege 5076 windirstat.exe Token: SeBackupPrivilege 5076 windirstat.exe Token: SeBackupPrivilege 5076 windirstat.exe Token: SeBackupPrivilege 5076 windirstat.exe Token: SeBackupPrivilege 5076 windirstat.exe Token: SeBackupPrivilege 5076 windirstat.exe Token: SeBackupPrivilege 5076 windirstat.exe Token: SeBackupPrivilege 5076 windirstat.exe Token: SeBackupPrivilege 5076 windirstat.exe Token: SeBackupPrivilege 5076 windirstat.exe Token: SeBackupPrivilege 5076 windirstat.exe Token: SeBackupPrivilege 5076 windirstat.exe Token: SeBackupPrivilege 5076 windirstat.exe Token: SeBackupPrivilege 5076 windirstat.exe Token: SeBackupPrivilege 5076 windirstat.exe Token: SeBackupPrivilege 5076 windirstat.exe Token: SeBackupPrivilege 5076 windirstat.exe Token: SeBackupPrivilege 5076 windirstat.exe Token: SeBackupPrivilege 5076 windirstat.exe Token: SeBackupPrivilege 5076 windirstat.exe Token: SeBackupPrivilege 5076 windirstat.exe Token: SeBackupPrivilege 5076 windirstat.exe Token: SeBackupPrivilege 5076 windirstat.exe Token: SeBackupPrivilege 5076 windirstat.exe Token: SeBackupPrivilege 5076 windirstat.exe Token: SeBackupPrivilege 5076 windirstat.exe Token: SeBackupPrivilege 5076 windirstat.exe Token: SeBackupPrivilege 5076 windirstat.exe Token: SeBackupPrivilege 5076 windirstat.exe Token: SeBackupPrivilege 5076 windirstat.exe Token: SeBackupPrivilege 5076 windirstat.exe Token: SeBackupPrivilege 5076 windirstat.exe Token: SeBackupPrivilege 5076 windirstat.exe Token: SeBackupPrivilege 5076 windirstat.exe Token: SeBackupPrivilege 5076 windirstat.exe Token: SeBackupPrivilege 5076 windirstat.exe Token: SeBackupPrivilege 5076 windirstat.exe Token: SeBackupPrivilege 5076 windirstat.exe Token: SeBackupPrivilege 5076 windirstat.exe Token: SeBackupPrivilege 5076 windirstat.exe Token: SeBackupPrivilege 5076 windirstat.exe Token: SeBackupPrivilege 5076 windirstat.exe Token: SeBackupPrivilege 5076 windirstat.exe Token: SeBackupPrivilege 5076 windirstat.exe Token: SeBackupPrivilege 5076 windirstat.exe Token: SeBackupPrivilege 5076 windirstat.exe Token: SeBackupPrivilege 5076 windirstat.exe Token: SeBackupPrivilege 5076 windirstat.exe Token: SeBackupPrivilege 5076 windirstat.exe Token: SeBackupPrivilege 5076 windirstat.exe Token: SeBackupPrivilege 5076 windirstat.exe Token: SeBackupPrivilege 5076 windirstat.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
windirstat.exepid process 5076 windirstat.exe 5076 windirstat.exe 5076 windirstat.exe 5076 windirstat.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
windirstat1_1_2_setup.exedescription pid process target process PID 3004 wrote to memory of 5076 3004 windirstat1_1_2_setup.exe windirstat.exe PID 3004 wrote to memory of 5076 3004 windirstat1_1_2_setup.exe windirstat.exe PID 3004 wrote to memory of 5076 3004 windirstat1_1_2_setup.exe windirstat.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\windirstat1_1_2_setup.exe"C:\Users\Admin\AppData\Local\Temp\windirstat1_1_2_setup.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Program Files (x86)\WinDirStat\windirstat.exe"C:\Program Files (x86)\WinDirStat\windirstat.exe"2⤵
- Executes dropped EXE
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:5076
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\WinDirStat\Uninstall.exeFilesize
46KB
MD5a127e6118b9dd2f9d5a7cc4d697a0105
SHA19ac17d4dcf0884ceafacf10c42209c0942dfe7a8
SHA256afc864cfce79b2a6add491a27ea672d958233ed7a97a2cbbce60100d2fa1e670
SHA5120e57d2856c02c55d477d9b3cc1d4bf5ffa3650d4b20be18b0a9e614d19143aee325c4cd92ff31bbddf6e93cd3ebeb47d8727de6e25faa366341cc71117122065
-
C:\Program Files (x86)\WinDirStat\windirstat.chmFilesize
50KB
MD51bddb8a0e0f9cd90a5b3936ec2c2c4cf
SHA1c8302168fb532fe03e76cb8a82aa53b49ee0bc44
SHA2561e87c07744054709d271337d8ce06929429b334d70875605cb68ecc4c6610cd1
SHA512b857de9026b3eab13f4dbc464e6403835e3a61e5e9e3566735bf1ddd8dedc4ecf08807b27207bd8b385250b71ea234b301dd49e6f3c90f1270ae03868c035472
-
C:\Program Files (x86)\WinDirStat\windirstat.exeFilesize
636KB
MD524cd9a82fcfc658dd3ae7ba25c958ffb
SHA126e14a532e1e050eb20755a0b7a5fea99dd80588
SHA256cc3ee246f2710dc9ba9e2a88e3192b88f1db4caa2eefb8641642a33df04e585c
SHA5124de675be1f7d618d133ef24765a027840473e0c5bc93550d5e5fdbf078edc74c2241e6e3cd8753517e2954c7f09b9909028de7b727294d723fb5700658c7979d
-
C:\Users\Admin\AppData\Local\Temp\nspACEB.tmp\InstallOptions.dllFilesize
14KB
MD59b2ad0546fd834c01a3bdcbfbc95da7d
SHA14f92f5a6b269d969ba3340f1c1978d337992a62c
SHA2567e08cb4ff81dbb0573c672301681e31b2042682e9a2204673f811455f823dd37
SHA5125b374fe7cc8d6ff8b93cfcc8deae23f2313f8240c998d04d3e65c196b33c7d36a33930ffd481cdd6d30aa4c73dd2a1c6fe43791e9bf10bd71b33321a8e71c6b8
-
C:\Users\Admin\AppData\Local\Temp\nspACEB.tmp\System.dllFilesize
10KB
MD54125926391466fdbe8a4730f2374b033
SHA1fdd23034ada72d2537939ac6755d7f7c0e9b3f0e
SHA2566692bd93bcd04146831652780c1170da79aa3784c3c070d95fb1580e339de6c5
SHA51232a1cf96842454b3c3641316ee39051ae024bdce9e88ac236eadad531f2c0a08d46b77d525f7d994c9a5af4cc9a391d30ee92b9ec782b7fb9a42c76f0f52a008
-
C:\Users\Admin\AppData\Local\Temp\nspACEB.tmp\ioSpecial.iniFilesize
799B
MD527821302cfb3ee69df01fa9dede30b08
SHA137c3d6024f89e3ef2be550a1041fbf61bc7def4a
SHA2561febf204a4c54c0152b188ddb4850250e23fac7b9aa40181c528c77100754dd0
SHA5120bdca7e4ac5cbe8cb2bdda57f986456f7c0fd11109e63a8bdb68033d2ecfd9a05c7ce7415f6428693c0e33af56c26e561c30646bcbcaf0e756df7e5375ed50e6
-
C:\Users\Admin\AppData\Local\Temp\nspACEB.tmp\ioSpecial.iniFilesize
725B
MD5d2eaa8438f6642a4c364f83f42f20272
SHA18f3d3f9bcce2f5bc18c6e8cdf9d359cda70908b5
SHA256507a37bb1e66f60ad72c70659470f964e82ca4e3b5f6ede6cfa14655b24239c9
SHA5121d5befa22cbe3cf06d6032388fef1db52557e8326d2390c002583377c8efc3e515adb846e5fa06e1ee00caabb3b7c1dd270d7ca50941b6ca5e5bda941a003b0a
-
C:\Users\Admin\AppData\Local\Temp\nspACEB.tmp\ioSpecial.iniFilesize
790B
MD5dceb5f9b563af95b7feccb7a5eb50ae2
SHA11334f783159166bb94107b96d54273f4936c6e82
SHA256c5b0ec9087c9a0df1166f7ddff8021c0fedcff54fd63ef283b725d73f0f05b69
SHA512141556209a00a23b163280867b9ff1dde1cee662048d85b8c71667394c66bdda975a823a143578c13ea625afbfa4f5a9f5f4f4314e014ce63cb8fb23cf769a60
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\WinDirStat\Help (ENG).lnkFilesize
1KB
MD5489480315f81075e8094bf232580270a
SHA127e26bada85990a94ee7656f05b60bf73fa6fb2a
SHA25677d091a32ab53ec186084ece3a661fbfd7346e0fa06d357f606aca60ba0d13eb
SHA512293222530e6883503c5ba88658cbd3b4f7f8b795c920dd17d1cd07fad98896d793ea7d631cea10f0316714887fbb1052657942fc896c8cacdd90da5da49f26bc
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\WinDirStat\Uninstall WinDirStat.lnkFilesize
1KB
MD53072518e83fe996185699a9e8213d610
SHA12f18262402b19cc65da8be3a042c5a4d879bafcc
SHA2564393b92150ccb56ee23457afbd95e5bc9d9f2d3fcfd8551f430ac35d86ce1158
SHA5124337e3a4e25f90131d27e918b69d441a2c905122e1239c50a961e9e7a9ace09a964655700bff5ad55cb8c441d0bcf6be2211af9c381134dc5368c539f10dd750
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\WinDirStat\WinDirStat.lnkFilesize
1KB
MD589aca80a34b15d97294ac58fa41e9b21
SHA1015f4da302166bb72d479400aa04ca2109f1177b
SHA2568205797cd44fbb40823b0210bb3ad9d534ddca71557c31ceada251356866c896
SHA5121ab2df42ef39681c14ef02b46ba92ef5c3493f780680b4a7b9044c065bdcce2e420fa82125cdb253a7edd2f2006825b0fa44afdb933fc0a231e03bb7a51cc43c
-
C:\Users\Admin\Desktop\WinDirStat.lnkFilesize
1KB
MD5409cd5f39ca6adaaeca8d7649b493c84
SHA1bf448684724c1fa90c607558fd7a29a39acf8bd7
SHA2564768438cea1c603e3c220ce94427829677541c05463810d8b5650407faa44c75
SHA5121b5d6a57146fcc939698aef12b3cb0873277f4048cfa9ac7554bd851c15a9f925fcccef6e1ffd2d1ca6343512ea368e5c62f3af67db06be146eda8e65570200d