Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/08/2024, 06:34

General

  • Target

    $PLUGINSDIR/OWInstaller.exe

  • Size

    301KB

  • MD5

    1333393fbfcea0642f3aec0499a44e9a

  • SHA1

    7a1ccf2f5d311b7548938ff51ad85b05e03021fd

  • SHA256

    c6864deca3c3b77500ad86dc3c847a7430efb0992228625f36ab767d1a8f90dc

  • SHA512

    31a565555d0176f0c87248134b3c64ebfc11f92d6cffb8d7968e99a7d7d74004ac32b8dafd05eab8fc5d33750a12da0e1fd076eb10e3aa123c7769aeee977ef2

  • SSDEEP

    6144:rczyBUDsrUODYRVxGxZ9bKFoSIm9u0Uqq2zCpl/ucG:roc4kYoSO0jA

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops file in System32 directory 18 IoCs
  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies registry class 35 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\OWInstaller.exe
    "C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\OWInstaller.exe"
    1⤵
    • Checks computer location settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2780
    • C:\Windows\System32\DxDiag.exe
      "C:\Windows\System32\DxDiag.exe" /tC:\Users\Admin\AppData\Local\Overwolf\Temp\DxDiagOutput.txt
      2⤵
      • Drops file in System32 directory
      • Checks SCSI registry key(s)
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4332

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Overwolf\Settings\SettingsPageBasic.xml

          Filesize

          752B

          MD5

          ca3c2f58070a9f631467d2790fddc863

          SHA1

          27a717332dc68aafabe50d7cd9d5138199379013

          SHA256

          a10a994e5eac25c96703c575ad595f2ced895494b0616942fefc5f76caf1ab57

          SHA512

          7f0201f0270b00b948481a6dd8defcb3abac2e4c04a16d51f620712481d44ebe577f28fc5794e6852635e929c40554d2851cbe1f53f17179936879d3fd77f204

        • memory/2780-47-0x00000286AA8B0000-0x00000286AB056000-memory.dmp

          Filesize

          7.6MB

        • memory/2780-48-0x00007FFF71100000-0x00007FFF71BC1000-memory.dmp

          Filesize

          10.8MB

        • memory/2780-3-0x0000027EA6A00000-0x0000027EA6F28000-memory.dmp

          Filesize

          5.2MB

        • memory/2780-4-0x0000027E8DD00000-0x0000027E8DD46000-memory.dmp

          Filesize

          280KB

        • memory/2780-8-0x0000027E8DB60000-0x0000027E8DB78000-memory.dmp

          Filesize

          96KB

        • memory/2780-11-0x00007FFF71100000-0x00007FFF71BC1000-memory.dmp

          Filesize

          10.8MB

        • memory/2780-14-0x0000027EA6930000-0x0000027EA69E0000-memory.dmp

          Filesize

          704KB

        • memory/2780-1-0x0000027E8BF50000-0x0000027E8BF9C000-memory.dmp

          Filesize

          304KB

        • memory/2780-40-0x0000027EA7B20000-0x0000027EA7B42000-memory.dmp

          Filesize

          136KB

        • memory/2780-0-0x00007FFF71103000-0x00007FFF71105000-memory.dmp

          Filesize

          8KB

        • memory/2780-2-0x0000027EA6420000-0x0000027EA64C4000-memory.dmp

          Filesize

          656KB

        • memory/4332-49-0x000002AD6C5E0000-0x000002AD6C5E1000-memory.dmp

          Filesize

          4KB

        • memory/4332-51-0x000002AD6C5E0000-0x000002AD6C5E1000-memory.dmp

          Filesize

          4KB

        • memory/4332-50-0x000002AD6C5E0000-0x000002AD6C5E1000-memory.dmp

          Filesize

          4KB

        • memory/4332-61-0x000002AD6C5E0000-0x000002AD6C5E1000-memory.dmp

          Filesize

          4KB

        • memory/4332-60-0x000002AD6C5E0000-0x000002AD6C5E1000-memory.dmp

          Filesize

          4KB

        • memory/4332-59-0x000002AD6C5E0000-0x000002AD6C5E1000-memory.dmp

          Filesize

          4KB

        • memory/4332-58-0x000002AD6C5E0000-0x000002AD6C5E1000-memory.dmp

          Filesize

          4KB

        • memory/4332-57-0x000002AD6C5E0000-0x000002AD6C5E1000-memory.dmp

          Filesize

          4KB

        • memory/4332-56-0x000002AD6C5E0000-0x000002AD6C5E1000-memory.dmp

          Filesize

          4KB

        • memory/4332-55-0x000002AD6C5E0000-0x000002AD6C5E1000-memory.dmp

          Filesize

          4KB