Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    121s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    25/08/2024, 11:55

General

  • Target

    $PLUGINSDIR/OWInstaller.exe

  • Size

    304KB

  • MD5

    9bfd26c738baa450016126dc84815849

  • SHA1

    d918f92b295623ab1dbe7ff19c11c8a05714f365

  • SHA256

    d9df18b606346691375924b975854e75173884e8490100e658de07f7d507f56f

  • SHA512

    14cab457149ad37fffd9c1f0dd0e85e8b18bc20efea883d99c36e15edba805873dc1acb9b1ba7a41308afc0bb12e08149fe781230c88920a4bb76bc3a9f4443d

  • SSDEEP

    6144:fJ61PK8mmRY3Z1LdOxO9bKnoSIm9U0WqGq2UfplxZcl:fE5K3/LdsXoS00bcl

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies registry class 34 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\OWInstaller.exe
    "C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\OWInstaller.exe"
    1⤵
    • Modifies Internet Explorer settings
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2136
    • C:\Windows\System32\DxDiag.exe
      "C:\Windows\System32\DxDiag.exe" /tC:\Users\Admin\AppData\Local\Overwolf\Temp\DxDiagOutput.txt
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2788
      • C:\Windows\SysWOW64\dxdiag.exe
        "C:\Windows\SysWOW64\dxdiag.exe" /tC:\Users\Admin\AppData\Local\Overwolf\Temp\DxDiagOutput.txt
        3⤵
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:2640

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\070E0202839D9D67350CD2613E78E416

    Filesize

    1KB

    MD5

    55540a230bdab55187a841cfe1aa1545

    SHA1

    363e4734f757bdeb89868efe94907774a327695e

    SHA256

    d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb

    SHA512

    c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416

    Filesize

    230B

    MD5

    8a22a81847c89b42021612ed52df6b7c

    SHA1

    f3b3758572fbca01edd8ace3135feb9d075c32ce

    SHA256

    49b65b1a9de09b0b5837e3888bf235db83e71d8462abc50daee9ec9f500ac905

    SHA512

    52fb161c0e8cd625a2ae7391a218ff483f1e74df7d6bb4663a943d5d2907d0de05462d5d557b1dd4e7720c19691eb4c549572acb41f1e159eff5014ae06476b7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    b77be5eaa896d20631537e18e86c7ec0

    SHA1

    13bf5c43d6402530d8f7fa6bb465b036c5d5d9cc

    SHA256

    2107966d2022dca6782781c653830c550e763168563ccb1079322b38002f95c7

    SHA512

    6475ebbc4ed876dd446318249449ad964d84624c4ef9cac1a25e5608793211f41c139419b2a46aba1d70ce0b5d68b1d4e137ae30b25119b60ccd4ad79b7ce342

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    2e7e0bc6a872af5c36ce66f3282fbdc7

    SHA1

    e280516b56df11d2b1b1d518abcf686e2e3b607f

    SHA256

    ceeff1ad2d4216e01877490777888d3023d15dcf5953dd4ffebbb81590f2bb5c

    SHA512

    e20acce047e1b97ea3e47c0152dee366d47c4bd5dbeb6bdb5a1e75a45ed4a870770c8ee00842a60a7b646b0cb2d23c39bee00846c24dba5259454c943bd915e3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    e923d33af82cfec1a8278fa16a51d8a9

    SHA1

    18b8259ce825686a759c693868fd7dde1e47bc1a

    SHA256

    7d8e99d16ce1d668dd4f9e49d37d455c206269f41f92791e351a838d9a96750c

    SHA512

    2322c4f95654a37200a0db2ab4047a4d31ab31bbdd2a790b8f5669e301d6d1af277383ef844c37831430acc235e1b7679383e7990879957ae7e67b6ea5c6a7d5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    ea480fe1b92b1138e3325cd3d97b3789

    SHA1

    9db680e177fbf8e83ef8b4f89e8c65a92bd8fc56

    SHA256

    8b032d195731dcedbb52cdc30cc1fcd095bf5de273900a2e402edf6d4ef83769

    SHA512

    3c1b6ae3ff902c5d0d70c82fe25cf7566388355ffc944c427c73478958ea2f92523968a6eab3fdbf78fdd40d89834d57130dd1fb8366d240488bd665a96a7487

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    2f729466657340d8069f7ac44ce9c9a6

    SHA1

    5a7434e4a7ff0a8f9942341e7518582f30fc5871

    SHA256

    2c3331029c4d4848f242dcf4dcc59f8f07db53eea636cccb4260ac57c4ff12ba

    SHA512

    8cbead4cd56078c23e58a8b60c9281644d09002e06a7290fe4af9ea591081cf5410037e4f7fa15bf7775d9273566d4a9803f982a668854484110cab1a3b7dda9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    735a9cfe023b439c4ae7005c4f65b03e

    SHA1

    bcc4cdeee8d0a7e4fd68503a701cd28c5124ffc5

    SHA256

    50045eee43e4c313f119adb4aab99af38e986a7da998aed3e9ec319c83258b41

    SHA512

    2a6e2efcc785298b1b0ee8790024fec985a388da1dd80468c54b220ca3f587269c7188532cfbb7e52c3f1523ac072694ff29f3d39c57552f6910b53ce03d4276

  • C:\Users\Admin\AppData\Local\Overwolf\Settings\SettingsPageBasic.xml

    Filesize

    202B

    MD5

    b05f2807b0bd5ee04cd1edb8f57e445a

    SHA1

    2ed8a41c941f83c2f0d8398885dbc872d164cb63

    SHA256

    b130f4fcd8af0968d47c025ea0fa784f06de450cf819f2cc12133fc5738b4a28

    SHA512

    745fd2d72f1fa697c98a399dc854e2988d6de349855f2caa7a6a24e23d213ad7ade56eddc8f25034f14cd29212c5dbd90b91a59d5445115a512178ddf99bcc65

  • C:\Users\Admin\AppData\Local\Overwolf\Temp\DxDiagOutput.txt

    Filesize

    15KB

    MD5

    f6514fe1228234c70e730dda612ce24f

    SHA1

    bda59e3ac0428b27aac00079909c465cc6e4263d

    SHA256

    cd65795464db821acf6ad2c2fd86f1babca0d67533add01f0c15307f56bf0119

    SHA512

    12ad83e18e8cab6291f4dd45008c9ec0e9f26d7400d4cd6e3aa542a10796ced24ae76f3f5666f670d98bee50867c27caedb57ed172b9c0283c56e6b69817edb6

  • C:\Users\Admin\AppData\Local\Temp\CabF6CD.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarF6D0.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2136-57-0x000007FEF5A70000-0x000007FEF645C000-memory.dmp

    Filesize

    9.9MB

  • memory/2136-3-0x0000000000780000-0x00000000007C6000-memory.dmp

    Filesize

    280KB

  • memory/2136-1-0x000000013FCB0000-0x000000013FCFC000-memory.dmp

    Filesize

    304KB

  • memory/2136-2-0x00000000008F0000-0x0000000000994000-memory.dmp

    Filesize

    656KB

  • memory/2136-4-0x000007FEF5A70000-0x000007FEF645C000-memory.dmp

    Filesize

    9.9MB

  • memory/2136-5-0x0000000002190000-0x00000000021A8000-memory.dmp

    Filesize

    96KB

  • memory/2136-38-0x0000000025D00000-0x00000000264A6000-memory.dmp

    Filesize

    7.6MB

  • memory/2136-13-0x000000001BFA0000-0x000000001C050000-memory.dmp

    Filesize

    704KB

  • memory/2136-79-0x000007FEF5A73000-0x000007FEF5A74000-memory.dmp

    Filesize

    4KB

  • memory/2136-0-0x000007FEF5A73000-0x000007FEF5A74000-memory.dmp

    Filesize

    4KB

  • memory/2640-54-0x0000000002280000-0x000000000228A000-memory.dmp

    Filesize

    40KB

  • memory/2640-55-0x0000000002A90000-0x0000000002AEC000-memory.dmp

    Filesize

    368KB

  • memory/2640-58-0x0000000002A90000-0x0000000002AEC000-memory.dmp

    Filesize

    368KB

  • memory/2640-56-0x0000000002A90000-0x0000000002AEC000-memory.dmp

    Filesize

    368KB

  • memory/2640-59-0x0000000002A90000-0x0000000002AEC000-memory.dmp

    Filesize

    368KB

  • memory/2640-258-0x00000000023D0000-0x00000000023FA000-memory.dmp

    Filesize

    168KB

  • memory/2640-257-0x00000000023D0000-0x00000000023FA000-memory.dmp

    Filesize

    168KB

  • memory/2640-40-0x0000000002260000-0x000000000226A000-memory.dmp

    Filesize

    40KB

  • memory/2640-41-0x0000000002260000-0x000000000226A000-memory.dmp

    Filesize

    40KB