Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/08/2024, 11:55

General

  • Target

    $PLUGINSDIR/OWInstaller.exe

  • Size

    304KB

  • MD5

    9bfd26c738baa450016126dc84815849

  • SHA1

    d918f92b295623ab1dbe7ff19c11c8a05714f365

  • SHA256

    d9df18b606346691375924b975854e75173884e8490100e658de07f7d507f56f

  • SHA512

    14cab457149ad37fffd9c1f0dd0e85e8b18bc20efea883d99c36e15edba805873dc1acb9b1ba7a41308afc0bb12e08149fe781230c88920a4bb76bc3a9f4443d

  • SSDEEP

    6144:fJ61PK8mmRY3Z1LdOxO9bKnoSIm9U0WqGq2UfplxZcl:fE5K3/LdsXoS00bcl

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops file in System32 directory 18 IoCs
  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies registry class 35 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\OWInstaller.exe
    "C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\OWInstaller.exe"
    1⤵
    • Checks computer location settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:868
    • C:\Windows\System32\DxDiag.exe
      "C:\Windows\System32\DxDiag.exe" /tC:\Users\Admin\AppData\Local\Overwolf\Temp\DxDiagOutput.txt
      2⤵
      • Drops file in System32 directory
      • Checks SCSI registry key(s)
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4004

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Overwolf\Settings\SettingsPageBasic.xml

    Filesize

    752B

    MD5

    727a1ebddaab8b5ef40d76165c086fc8

    SHA1

    b5a962ccd6c023a19a0bd7067acf1e078b56ee59

    SHA256

    9466ced91f5e821a16273aa7902bbb2de3a1192da99cbb14440fec4af7b2b7c0

    SHA512

    ad403d9b427c8d27636fa731d33d8ac400c3700da7e8a7a97b06fc0cff7c24440b8ffc9557a31e71c213ce61263e0c5deb9a41408023c03268dbc2fb9d8adaa1

  • memory/868-47-0x000001909F840000-0x000001909FFE6000-memory.dmp

    Filesize

    7.6MB

  • memory/868-48-0x00007FFF6DB60000-0x00007FFF6E621000-memory.dmp

    Filesize

    10.8MB

  • memory/868-3-0x000001889C120000-0x000001889C648000-memory.dmp

    Filesize

    5.2MB

  • memory/868-4-0x00000188832E0000-0x0000018883326000-memory.dmp

    Filesize

    280KB

  • memory/868-5-0x00000188832B0000-0x00000188832C8000-memory.dmp

    Filesize

    96KB

  • memory/868-11-0x00007FFF6DB60000-0x00007FFF6E621000-memory.dmp

    Filesize

    10.8MB

  • memory/868-14-0x000001889C900000-0x000001889C9B0000-memory.dmp

    Filesize

    704KB

  • memory/868-1-0x0000018881660000-0x00000188816AC000-memory.dmp

    Filesize

    304KB

  • memory/868-40-0x000001889C8A0000-0x000001889C8C2000-memory.dmp

    Filesize

    136KB

  • memory/868-0-0x00007FFF6DB63000-0x00007FFF6DB65000-memory.dmp

    Filesize

    8KB

  • memory/868-2-0x000001889BB40000-0x000001889BBE4000-memory.dmp

    Filesize

    656KB

  • memory/4004-51-0x00000299ABF10000-0x00000299ABF11000-memory.dmp

    Filesize

    4KB

  • memory/4004-50-0x00000299ABF10000-0x00000299ABF11000-memory.dmp

    Filesize

    4KB

  • memory/4004-49-0x00000299ABF10000-0x00000299ABF11000-memory.dmp

    Filesize

    4KB

  • memory/4004-55-0x00000299ABF10000-0x00000299ABF11000-memory.dmp

    Filesize

    4KB

  • memory/4004-58-0x00000299ABF10000-0x00000299ABF11000-memory.dmp

    Filesize

    4KB

  • memory/4004-57-0x00000299ABF10000-0x00000299ABF11000-memory.dmp

    Filesize

    4KB

  • memory/4004-56-0x00000299ABF10000-0x00000299ABF11000-memory.dmp

    Filesize

    4KB

  • memory/4004-60-0x00000299ABF10000-0x00000299ABF11000-memory.dmp

    Filesize

    4KB

  • memory/4004-61-0x00000299ABF10000-0x00000299ABF11000-memory.dmp

    Filesize

    4KB

  • memory/4004-59-0x00000299ABF10000-0x00000299ABF11000-memory.dmp

    Filesize

    4KB