Analysis

  • max time kernel
    120s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    08/08/2024, 06:34

General

  • Target

    $PLUGINSDIR/OWInstaller.exe

  • Size

    301KB

  • MD5

    1333393fbfcea0642f3aec0499a44e9a

  • SHA1

    7a1ccf2f5d311b7548938ff51ad85b05e03021fd

  • SHA256

    c6864deca3c3b77500ad86dc3c847a7430efb0992228625f36ab767d1a8f90dc

  • SHA512

    31a565555d0176f0c87248134b3c64ebfc11f92d6cffb8d7968e99a7d7d74004ac32b8dafd05eab8fc5d33750a12da0e1fd076eb10e3aa123c7769aeee977ef2

  • SSDEEP

    6144:rczyBUDsrUODYRVxGxZ9bKFoSIm9u0Uqq2zCpl/ucG:roc4kYoSO0jA

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies registry class 34 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\OWInstaller.exe
    "C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\OWInstaller.exe"
    1⤵
    • Modifies Internet Explorer settings
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2564
    • C:\Windows\System32\DxDiag.exe
      "C:\Windows\System32\DxDiag.exe" /tC:\Users\Admin\AppData\Local\Overwolf\Temp\DxDiagOutput.txt
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2764
      • C:\Windows\SysWOW64\dxdiag.exe
        "C:\Windows\SysWOW64\dxdiag.exe" /tC:\Users\Admin\AppData\Local\Overwolf\Temp\DxDiagOutput.txt
        3⤵
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:2840

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\070E0202839D9D67350CD2613E78E416

          Filesize

          1KB

          MD5

          55540a230bdab55187a841cfe1aa1545

          SHA1

          363e4734f757bdeb89868efe94907774a327695e

          SHA256

          d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb

          SHA512

          c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          304B

          MD5

          7d80589590435c55b1328434093020de

          SHA1

          6269a9faefb0e1e60395dec2171f91c6438e2d5e

          SHA256

          f1b089d4e219dd3a1a93be80dcf6b168316cf7f586f43f9c6216bb0b0a0e9114

          SHA512

          16a458844a228d7ffab5910a870c41eedfee2fe21eee97c0b136fb5b92a46cd3d92d5bc8ce4aea1dab21c6be058aee01a9fdd0d5d47ad607955391feb2564f04

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          304B

          MD5

          7a1843cc6f49a6e78d3f5af68285e69e

          SHA1

          b27b5e7e6e412e194a2997ed3b5412690fd191ce

          SHA256

          55e82a06a3742cd34656c6b623d491e579b4fd0fa3dbfc51a771276764a5c947

          SHA512

          436aac55df39f21bc2abfc811dfa2e1c6b8b4ce96c9020e40ccf4b78c95b4ca8b1e76dc5448ffd25d29c3c7f62ff48b78725240f50e2e307a370db4a4ac0071a

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          304B

          MD5

          e5e1cc89fd1b60ccb523efa4bb32249e

          SHA1

          a149246a6eddebcd230cf009b84835b71d09ebb6

          SHA256

          7983e10349d7959e01bb974e7e61a2d5dfd31489b8cac62e2c9a8a96eb95e013

          SHA512

          173b1e8248110bd6b29f774c115a4a3163755120ab4706b72838667ae72092abda3e3716c40c82c85f27b7458431064aae6539495c68b88e93a5dbbd2ee0d3bc

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          304B

          MD5

          8119122c0337e39b529dcab5a125d090

          SHA1

          8a807f56f9d5876596221b38983d76ffab89b307

          SHA256

          aedd847be9e9a92f014ede797c481d6e71637eb721c5163ea80135bf81f77770

          SHA512

          11c48ca7d9cb9c0f7e04a3c7c03f6c018cc32a182210fc554d3380d5367a8e6ec7b1d0b66f3d169dd7585c22e4d8a26ce98c683ce4b8becf4e99d67de6633a2b

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          304B

          MD5

          11b4edc2f25d2d9b66dc7b9e78284286

          SHA1

          537cdd21e3b6ca79f4c1046f75a0531a01884323

          SHA256

          f3ed430654b9991c4b709ccb3913b502284f28fcce1d792084a13a89c68bf5f3

          SHA512

          82e576fe55ee6cc85398836cb967c10ef09b8b6e5b02d6e8486f7c4fcc7993c3167a33ac64380c11827e4dd034e1f83d753230518bd7222d9753cb34fb60a56d

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          304B

          MD5

          56861987c8e8a998bbd1faa84b730257

          SHA1

          41ee285ef427b405f20a7118db9d25cc61055112

          SHA256

          8270b2ae35e502d5e5f50e9d5c4011f8f0fde6de8d62b89b05812adac127edbc

          SHA512

          430e571aec47e6369e5e057dcf4a033b900b28bfc34bd880c3a89fc7ea9707c4490c9972e16d608db20de42a51cec0b6c262e68b8bd7520ae55e953b0a7bb0e7

        • C:\Users\Admin\AppData\Local\Overwolf\Settings\SettingsPageBasic.xml

          Filesize

          752B

          MD5

          508a8e265b93756abb2ba41a8a07c58d

          SHA1

          edf91cd412f4aca7ed7ac71e372169c389e2dec7

          SHA256

          9bf28f6ff98bbb691113657cff9c9450d347dfa8a68b1785f11b05fbb08f7f65

          SHA512

          0b71328b9f675645577f882d0c2baf0590256be50a4bb7acc4d2485ed502ba4b9c7dde082574bb935a3be86e0552f196cd8d9d96742903c72af5957139aff0df

        • C:\Users\Admin\AppData\Local\Overwolf\Temp\DxDiagOutput.txt

          Filesize

          15KB

          MD5

          64dccfa452b0c9499ac3a9714cde48ce

          SHA1

          cb02a31f07996c03654594c046f4af4b2825faf2

          SHA256

          a57ace4943254f52c4a8477083b6add3f08eccc372b38e8d00ce6097411f4b4a

          SHA512

          c68fdf2faa8d7863da336fcf1a0db246a9c9a98a14b3eb1f92d90796e5351d85bf675462b84f21826f5b6508059a84738f36843a5308f395bef155a981863bf0

        • C:\Users\Admin\AppData\Local\Temp\Cab84F8.tmp

          Filesize

          70KB

          MD5

          49aebf8cbd62d92ac215b2923fb1b9f5

          SHA1

          1723be06719828dda65ad804298d0431f6aff976

          SHA256

          b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

          SHA512

          bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

        • C:\Users\Admin\AppData\Local\Temp\Tar84FB.tmp

          Filesize

          181KB

          MD5

          4ea6026cf93ec6338144661bf1202cd1

          SHA1

          a1dec9044f750ad887935a01430bf49322fbdcb7

          SHA256

          8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

          SHA512

          6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

        • memory/2564-2-0x000000001AC60000-0x000000001AD04000-memory.dmp

          Filesize

          656KB

        • memory/2564-1-0x000000013F200000-0x000000013F24C000-memory.dmp

          Filesize

          304KB

        • memory/2564-363-0x000007FEF5010000-0x000007FEF59FC000-memory.dmp

          Filesize

          9.9MB

        • memory/2564-362-0x000007FEF5013000-0x000007FEF5014000-memory.dmp

          Filesize

          4KB

        • memory/2564-38-0x0000000025940000-0x00000000260E6000-memory.dmp

          Filesize

          7.6MB

        • memory/2564-3-0x0000000002460000-0x00000000024A6000-memory.dmp

          Filesize

          280KB

        • memory/2564-0-0x000007FEF5013000-0x000007FEF5014000-memory.dmp

          Filesize

          4KB

        • memory/2564-4-0x000007FEF5010000-0x000007FEF59FC000-memory.dmp

          Filesize

          9.9MB

        • memory/2564-13-0x000000001CFE0000-0x000000001D090000-memory.dmp

          Filesize

          704KB

        • memory/2564-8-0x000000001B1A0000-0x000000001B1B8000-memory.dmp

          Filesize

          96KB

        • memory/2840-39-0x00000000004B0000-0x00000000004BA000-memory.dmp

          Filesize

          40KB

        • memory/2840-55-0x00000000004E0000-0x00000000004EA000-memory.dmp

          Filesize

          40KB

        • memory/2840-58-0x0000000002A10000-0x0000000002A6C000-memory.dmp

          Filesize

          368KB

        • memory/2840-54-0x00000000004E0000-0x00000000004EA000-memory.dmp

          Filesize

          40KB

        • memory/2840-330-0x0000000002400000-0x000000000242A000-memory.dmp

          Filesize

          168KB

        • memory/2840-329-0x0000000002400000-0x000000000242A000-memory.dmp

          Filesize

          168KB

        • memory/2840-331-0x00000000004B0000-0x00000000004B5000-memory.dmp

          Filesize

          20KB

        • memory/2840-40-0x00000000004B0000-0x00000000004BA000-memory.dmp

          Filesize

          40KB

        • memory/2840-57-0x0000000002A10000-0x0000000002A6C000-memory.dmp

          Filesize

          368KB

        • memory/2840-56-0x0000000002A10000-0x0000000002A6C000-memory.dmp

          Filesize

          368KB