Resubmissions

01-12-2024 18:15

241201-wwd19axqbx 10

01-12-2024 18:07

241201-wqgj7axpct 10

Analysis

  • max time kernel
    147s
  • max time network
    150s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    01-12-2024 18:07

General

  • Target

    $PLUGINSDIR/OWInstaller.exe

  • Size

    305KB

  • MD5

    4d4b3bc910f70b7bb6d7da07a76c7404

  • SHA1

    082d17c125fb2b7dcb13d1a81dc99fbfc5ecbe75

  • SHA256

    d9274e926fd1202f5691d187a694b130c227eafac03ed59f18e019b881ea8454

  • SHA512

    c54d94a25c23eca98927a14728b62b3b8de41b8ec907d4a3ebcbd63db8ba400537b6fb3e59b243c2f2675eeebe70baa78d75b9a21d4c93a5d43b24d7d386ddc0

  • SSDEEP

    6144:BQXk7Ln7TE5+LoUDxO9bNDoSIm9U0COGq2jppldNcQ0:BQf+bkoS00aut

Malware Config

Signatures

  • Drops file in System32 directory 16 IoCs
  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies registry class 35 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\OWInstaller.exe
    "C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\OWInstaller.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3920
    • C:\Windows\System32\DxDiag.exe
      "C:\Windows\System32\DxDiag.exe" /tC:\Users\Admin\AppData\Local\Overwolf\Temp\DxDiagOutput.txt
      2⤵
      • Drops file in System32 directory
      • Checks SCSI registry key(s)
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4584

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Overwolf\Log\InstallerTrace_2024-12-01_18-10_3920.log

    Filesize

    952B

    MD5

    06665882025e3962056b7a80138c747c

    SHA1

    7c7c55acc69a76abf5336669d132af0933b88bd2

    SHA256

    6f3368fb383ec31792e4eeeea20748d5a628687b2e7e2843fc023af3181b907e

    SHA512

    c824bc3ea47b44fa34a957717c6862afea7c47b68eb7712e008c6504b32d02e81b6378ab219685ae223632a270e841a9f01090ef22cc1caa46d84a9eae24fadc

  • C:\Users\Admin\AppData\Local\Overwolf\Settings\SettingsPageBasic.xml

    Filesize

    752B

    MD5

    57fcb5a09bf5e10a271cb13dd24b7d0f

    SHA1

    ed7397e8273931b5b24098fb0a7b4d966c8bc72e

    SHA256

    9e05add9eeed2ee3e4e35458ec3c5a0df33de6e18bd0f2bacaaeee1d5a883200

    SHA512

    a2dc8c9c87726d4ee3fa0328af8cfd29cc61e4a41b0df08f783b8a2ec6d13aa8b35cba4cc7c52894c3def3300ec7b9323a0f7cfc4fcd491cef1c7a9c12401cb4

  • memory/3920-52-0x000001A4F6EE0000-0x000001A4F7686000-memory.dmp

    Filesize

    7.6MB

  • memory/3920-4-0x0000019CF3C30000-0x0000019CF3C76000-memory.dmp

    Filesize

    280KB

  • memory/3920-0-0x00007FF839FF3000-0x00007FF839FF5000-memory.dmp

    Filesize

    8KB

  • memory/3920-12-0x0000019CF3A00000-0x0000019CF3A18000-memory.dmp

    Filesize

    96KB

  • memory/3920-2-0x0000019CF3A40000-0x0000019CF3AE6000-memory.dmp

    Filesize

    664KB

  • memory/3920-15-0x00007FF839FF0000-0x00007FF83AAB2000-memory.dmp

    Filesize

    10.8MB

  • memory/3920-18-0x0000019CF4750000-0x0000019CF4800000-memory.dmp

    Filesize

    704KB

  • memory/3920-1-0x0000019CF1580000-0x0000019CF15CE000-memory.dmp

    Filesize

    312KB

  • memory/3920-44-0x0000019CF3FA0000-0x0000019CF3FC2000-memory.dmp

    Filesize

    136KB

  • memory/3920-47-0x00007FF839FF0000-0x00007FF83AAB2000-memory.dmp

    Filesize

    10.8MB

  • memory/3920-105-0x00007FF839FF0000-0x00007FF83AAB2000-memory.dmp

    Filesize

    10.8MB

  • memory/3920-3-0x0000019CF4020000-0x0000019CF4548000-memory.dmp

    Filesize

    5.2MB

  • memory/4584-54-0x000002D0ADAA0000-0x000002D0ADAA1000-memory.dmp

    Filesize

    4KB

  • memory/4584-55-0x000002D0ADAA0000-0x000002D0ADAA1000-memory.dmp

    Filesize

    4KB

  • memory/4584-63-0x000002D0ADAA0000-0x000002D0ADAA1000-memory.dmp

    Filesize

    4KB

  • memory/4584-65-0x000002D0ADAA0000-0x000002D0ADAA1000-memory.dmp

    Filesize

    4KB

  • memory/4584-64-0x000002D0ADAA0000-0x000002D0ADAA1000-memory.dmp

    Filesize

    4KB

  • memory/4584-61-0x000002D0ADAA0000-0x000002D0ADAA1000-memory.dmp

    Filesize

    4KB

  • memory/4584-60-0x000002D0ADAA0000-0x000002D0ADAA1000-memory.dmp

    Filesize

    4KB

  • memory/4584-59-0x000002D0ADAA0000-0x000002D0ADAA1000-memory.dmp

    Filesize

    4KB

  • memory/4584-62-0x000002D0ADAA0000-0x000002D0ADAA1000-memory.dmp

    Filesize

    4KB

  • memory/4584-53-0x000002D0ADAA0000-0x000002D0ADAA1000-memory.dmp

    Filesize

    4KB