Analysis

  • max time kernel
    121s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-02-2025 14:03

General

  • Target

    $PLUGINSDIR/OWInstaller.exe

  • Size

    305KB

  • MD5

    4d4b3bc910f70b7bb6d7da07a76c7404

  • SHA1

    082d17c125fb2b7dcb13d1a81dc99fbfc5ecbe75

  • SHA256

    d9274e926fd1202f5691d187a694b130c227eafac03ed59f18e019b881ea8454

  • SHA512

    c54d94a25c23eca98927a14728b62b3b8de41b8ec907d4a3ebcbd63db8ba400537b6fb3e59b243c2f2675eeebe70baa78d75b9a21d4c93a5d43b24d7d386ddc0

  • SSDEEP

    6144:BQXk7Ln7TE5+LoUDxO9bNDoSIm9U0COGq2jppldNcQ0:BQf+bkoS00aut

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies registry class 34 IoCs
  • Modifies system certificate store 2 TTPs 19 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\OWInstaller.exe
    "C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\OWInstaller.exe"
    1⤵
    • Modifies Internet Explorer settings
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2244
    • C:\Windows\System32\DxDiag.exe
      "C:\Windows\System32\DxDiag.exe" /tC:\Users\Admin\AppData\Local\Overwolf\Temp\DxDiagOutput.txt
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2772
      • C:\Windows\SysWOW64\dxdiag.exe
        "C:\Windows\SysWOW64\dxdiag.exe" /tC:\Users\Admin\AppData\Local\Overwolf\Temp\DxDiagOutput.txt
        3⤵
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:2552

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\070E0202839D9D67350CD2613E78E416

    Filesize

    1KB

    MD5

    55540a230bdab55187a841cfe1aa1545

    SHA1

    363e4734f757bdeb89868efe94907774a327695e

    SHA256

    d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb

    SHA512

    c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\DABA17F5E36CBE65640DD2FE24F104E7

    Filesize

    1KB

    MD5

    c6150925cfea5941ddc7ff2a0a506692

    SHA1

    9e99a48a9960b14926bb7f3b02e22da2b0ab7280

    SHA256

    28689b30e4c306aab53b027b29e36ad6dd1dcf4b953994482ca84bdc1ecac996

    SHA512

    b3bd41385d72148e03f453e76a45fcd2111a22eff3c7f1e78e41f6744735444e058144ed68af88654ee62b0f117949f35739daad6ad765b8cde1cff92ed2d00c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416

    Filesize

    230B

    MD5

    d85dc4f5a8de294d602fbb1fe697e9de

    SHA1

    352f3a1efe88384c78322a12d1937e08ddc6c081

    SHA256

    97e67c9d2c6df4c2a5ab39d1950aef266c1515a0e6a1f4e8f8b405f23d0faf1e

    SHA512

    fc8b4725c87afe42ad10259149488bfd7ef3ce42b083fe2e6b6bd1b2ff99065016efc1324a5a3638c05cbca642f90f3e12053261a5916a871adcfb4eb91b03b6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    38ce83b855b57865cf7c8557dd8bec96

    SHA1

    69d30859a36863d6d68d0e04d44c5fb7ca100006

    SHA256

    3ad1ad334b375f0aaf6a367c45296db21dbf19e602fc01898b1eaca1dea4b956

    SHA512

    b8e0ea83e0fdbd8e82017cf3dc054edab48a740f289fcbdf2eebb5fe935cc0214b04f08020cdc40cbf8e2ee06e3f66886c2aaadd39e240d0917060116b477f02

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ffed8d51ca04967efe1607c4a491e626

    SHA1

    8a4f0ddad149bc6f06d2a964ed501f04f2a85cfc

    SHA256

    6f5378844482bb997f20678da7378a91fa3126b6bce2dc81fe85fe15c230c5f3

    SHA512

    99ce5d7e628e07078195c29d4f1b5205cd5f4b57435f1d782f7afe457e2a14f7bd626aff14b6a3c8e84dcdcf4ac3b36452bdc9dba1af9dbac26e6a7398871e29

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3025779c964fa3120d9f686530d58616

    SHA1

    c7972b5d531307cfe79ae4f4682230ada99805f6

    SHA256

    da50c8901106a1dbdc0322be0f2471fd6e5786ea39ca4e7448ffdfe070359f82

    SHA512

    ffebfd7256a05a39f4afe512a6802e870cf7236bbe3f202ab1b5ce26981003c56e2b269fecc40b6738a5491b93b4991cdc7944c0ad29eca730ab0e858f8efa31

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    df0b02e6f62ad7643ba5559e50a8330d

    SHA1

    f073b74352dd3abbce77d357d56caeb57848891f

    SHA256

    821abbd30a3043bb9abfc5e34191e0d6d5c248aa1753aaa0c9a1fe223ddaf5b7

    SHA512

    04bbb1f27c93f95ba523cd87549578bd916d953de922baa5089dca87f190e9102d31b5b3c7647fdb211b81ee9b5556abbe55d8e495d571bed631f4086ab057d2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    af1cf2a6895f07e32dd0bfc5f614b8d2

    SHA1

    7f9c7036cd04eddff948a4d6dc9b6261d2f48fdd

    SHA256

    79463439d10cdf3835d27432aa063cf4ae20dace657cccc6b7106d429c4cfc08

    SHA512

    7227d09ebf0abf8fa34d9b05e482b5849e7c26c80f1b3e2d9114510694a3d7805dfdef36d98a9fab402acf166f499951e443ca98ec461197440fdd0d085a896f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7cc5cf2948c3e97d85ef7f356c24900b

    SHA1

    6dfc9a1713dd114bccc7b814abc89764d147b568

    SHA256

    79dfca8bee9c0488ca04b41a74cac1adac2f3bd3f91a98af5aed4dea0b49e769

    SHA512

    e6b8f48cb8e2b8f98d1afe404363aed6b55108d0e877331c8f0b59a650aaddeb6b5fce7313f5a2889ed8aaf13aa8efe0597d29e7f17d83bd0d428694df50d00d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\DABA17F5E36CBE65640DD2FE24F104E7

    Filesize

    276B

    MD5

    149f6bfeca9460acd90a9e687e155237

    SHA1

    4c1cfbf4d60affc672003b086d1c877dd3a5afa4

    SHA256

    4a1a9655991e86a6e54541d2d42e3af2135c16c2db29b081df0ccf36bd4dab49

    SHA512

    9576da9445ba19f46f62546fbbd6588111d1bb3815312c6f8446fc59d071d411e40664893662db4f136995c05598a5a5ec499655879de83e286a3f8c32dda51c

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\7CNUR30T\fonts[1].css

    Filesize

    2KB

    MD5

    2778c70161bb0aec49f4207e1430bf63

    SHA1

    7d74122bf734778e2cf11f41836420003bd02b24

    SHA256

    086aa3af6429d74fcf04ec1f5e870145cc6309a6c4c0c22c2d46f3560d7d587d

    SHA512

    73c1d980ddaf682340cb98d5dfd4a34e0d29e9a41035295ea76f104ef659881bd783e1bb38b40281edb588616d8a59d4433fa015a0f4aa5c398f5b65e614288c

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\D6V88JEY\style[1].css

    Filesize

    1KB

    MD5

    bde238bc90d90deecbdfebadafbac483

    SHA1

    b406e2a9766130621a3ba8f23bc6f302164b915d

    SHA256

    06fa8be623a7a52f8a45976fae5209b9d539b1e849755d50de9a3d2de0b9881b

    SHA512

    126eab9624db7093b7000abf3f01f6923ad243a5dfa4a7cba016164f540d2e0ea8480a8e9ce0e037120872a84c2f38da2a929713b85dda00888f185085790681

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\M4TQDAHL\reset[1].css

    Filesize

    427B

    MD5

    d29f1cfab4739a8757e86b90ee9a745f

    SHA1

    9f36d9336ed6a90beca34bfc7d5cee28adc3aa44

    SHA256

    a5d4254113dc8ec027bc30da0df9dde7c39583b024660fccca1e949d1db70f90

    SHA512

    56ce5d8cee435b2d9a1b9626e8ffdb449b5e1813d24468dc5808f31271d5b8adb9fa143f17743a48f5c081f67325e08ae8c881ae1acdf8dec4c3cea36fc2fa4e

  • C:\Users\Admin\AppData\Local\Overwolf\Log\InstallerTrace_2025-02-19_14-04_2244.log

    Filesize

    645B

    MD5

    2e1688f67a4ea86d6af26ab6ca89ff86

    SHA1

    b7dc833a29baf2abd2e9d1bc217574828baad26f

    SHA256

    15df78b23057734f08d1b2de82947fdcee2974b248be601c41cc57dec33a22a8

    SHA512

    37f5504a1fd2df6835e411b750c7aff39a2d0d2a67431f17bef355cc1aa422dea3f8b2ed86891eb21d1dd1ba3b029c552dfc4f498ab1274933380eae20f71565

  • C:\Users\Admin\AppData\Local\Overwolf\Settings\SettingsPageBasic.xml

    Filesize

    202B

    MD5

    366c361b2014d84f5ce51707fd50ba68

    SHA1

    f1e0355697640952d32740b22607ddb48a45125c

    SHA256

    f1a8f79c97d786a37def066787027b37b7b07b25776604ce4d5e1c0b9606006c

    SHA512

    ee89130309db8e1ffcdc2ca021f74c89bfb07eb67805bfd81afbb9154ba253118b1ffbe9abf34d88af2562a22fcc2cb9d6675fffddb75a7e90013feffdeda9f3

  • C:\Users\Admin\AppData\Local\Overwolf\Settings\SettingsPageBasic.xml

    Filesize

    752B

    MD5

    7789024559d47e7ef2d461098e1111c5

    SHA1

    f0aa1faa1d9381d4fc909a954c9993c6536f77c1

    SHA256

    0e61a5f7051ac1b8d28d42b6f37b199720dbc6958699a7e7ef11dcdbd6ab68a7

    SHA512

    391b7b270b315a14b6256a0d4a09e32ea09b178ba2bbb298fd7976360e03c893ded943ad00783895389460482695793bc5e052b268d6fec6e34a7cb9b8441f2e

  • C:\Users\Admin\AppData\Local\Overwolf\Temp\DxDiagOutput.txt

    Filesize

    15KB

    MD5

    0a59a08a0c4c28b29858494c6d75a0db

    SHA1

    a04d7492fa481f11dbd996c010567c0afb5acf11

    SHA256

    4801bdf8f515dc839baae928f97e40827b26769411df98f0fa543a63c22c036e

    SHA512

    97a25e2fec0ceb92ed3651462ae492b3c617f147de96c2310349d0b11041b8505dff859b0822478ecf12bbe6dd35614e88d44b0c4e0e8abf019d72f374898308

  • C:\Users\Admin\AppData\Local\Temp\Cab1C5.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar1E7.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2244-42-0x0000000026300000-0x0000000026AA6000-memory.dmp

    Filesize

    7.6MB

  • memory/2244-0-0x000007FEF4E33000-0x000007FEF4E34000-memory.dmp

    Filesize

    4KB

  • memory/2244-64-0x000007FEF4E33000-0x000007FEF4E34000-memory.dmp

    Filesize

    4KB

  • memory/2244-1-0x000000013F7F0000-0x000000013F83E000-memory.dmp

    Filesize

    312KB

  • memory/2244-2-0x00000000009A0000-0x0000000000A46000-memory.dmp

    Filesize

    664KB

  • memory/2244-3-0x0000000002230000-0x0000000002276000-memory.dmp

    Filesize

    280KB

  • memory/2244-62-0x000007FEF4E30000-0x000007FEF581C000-memory.dmp

    Filesize

    9.9MB

  • memory/2244-4-0x000007FEF4E30000-0x000007FEF581C000-memory.dmp

    Filesize

    9.9MB

  • memory/2244-12-0x00000000006D0000-0x00000000006E8000-memory.dmp

    Filesize

    96KB

  • memory/2244-17-0x000000001BB60000-0x000000001BC10000-memory.dmp

    Filesize

    704KB

  • memory/2552-61-0x0000000002E10000-0x0000000002E6C000-memory.dmp

    Filesize

    368KB

  • memory/2552-44-0x00000000009C0000-0x00000000009CA000-memory.dmp

    Filesize

    40KB

  • memory/2552-43-0x00000000009C0000-0x00000000009CA000-memory.dmp

    Filesize

    40KB

  • memory/2552-59-0x0000000000A00000-0x0000000000A0A000-memory.dmp

    Filesize

    40KB

  • memory/2552-385-0x0000000000B40000-0x0000000000B6A000-memory.dmp

    Filesize

    168KB

  • memory/2552-384-0x00000000009C0000-0x00000000009CA000-memory.dmp

    Filesize

    40KB

  • memory/2552-383-0x00000000009C0000-0x00000000009CA000-memory.dmp

    Filesize

    40KB

  • memory/2552-393-0x00000000009C0000-0x00000000009C5000-memory.dmp

    Filesize

    20KB

  • memory/2552-58-0x0000000000A00000-0x0000000000A0A000-memory.dmp

    Filesize

    40KB

  • memory/2552-60-0x0000000002E10000-0x0000000002E6C000-memory.dmp

    Filesize

    368KB

  • memory/2552-63-0x0000000002E10000-0x0000000002E6C000-memory.dmp

    Filesize

    368KB

  • memory/2552-65-0x0000000002E10000-0x0000000002E6C000-memory.dmp

    Filesize

    368KB