Analysis
-
max time kernel
4294181s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20220223-en -
submitted
07-03-2022 22:35
Static task
static1
Behavioral task
behavioral1
Sample
f49ff3a304be95d48136926d0750c81a7a09ca9905e7345c7cd60ac1e799f62f.exe
Resource
win7-20220223-en
Behavioral task
behavioral2
Sample
f49ff3a304be95d48136926d0750c81a7a09ca9905e7345c7cd60ac1e799f62f.exe
Resource
win10v2004-en-20220113
General
-
Target
f49ff3a304be95d48136926d0750c81a7a09ca9905e7345c7cd60ac1e799f62f.exe
-
Size
260KB
-
MD5
81073c86d6de7a5f189ffdc9c1e8b197
-
SHA1
07b9ee45dd7ffb6c50b99ec6499da72b47a3b42e
-
SHA256
f49ff3a304be95d48136926d0750c81a7a09ca9905e7345c7cd60ac1e799f62f
-
SHA512
efae0141a7f6e3b7859d321931bed78f8376f5ba80cdfe0e33f26dd188d4b4c448bce013f8d34c61bfb704f9e10b811a557c105ed4386adbba77e96c9c4f04d5
Malware Config
Signatures
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
NirSoft MailPassView 1 IoCs
Password recovery tool for various email clients
resource yara_rule behavioral1/memory/1928-67-0x0000000000400000-0x000000000041F000-memory.dmp MailPassView -
Nirsoft 1 IoCs
resource yara_rule behavioral1/memory/1928-67-0x0000000000400000-0x000000000041F000-memory.dmp Nirsoft -
resource yara_rule behavioral1/memory/1956-56-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/1956-59-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/1956-60-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/1928-63-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1928-66-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1928-67-0x0000000000400000-0x000000000041F000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts f49ff3a304be95d48136926d0750c81a7a09ca9905e7345c7cd60ac1e799f62f.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1112 set thread context of 1956 1112 f49ff3a304be95d48136926d0750c81a7a09ca9905e7345c7cd60ac1e799f62f.exe 27 PID 1112 set thread context of 1928 1112 f49ff3a304be95d48136926d0750c81a7a09ca9905e7345c7cd60ac1e799f62f.exe 30 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1112 f49ff3a304be95d48136926d0750c81a7a09ca9905e7345c7cd60ac1e799f62f.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1112 wrote to memory of 1956 1112 f49ff3a304be95d48136926d0750c81a7a09ca9905e7345c7cd60ac1e799f62f.exe 27 PID 1112 wrote to memory of 1956 1112 f49ff3a304be95d48136926d0750c81a7a09ca9905e7345c7cd60ac1e799f62f.exe 27 PID 1112 wrote to memory of 1956 1112 f49ff3a304be95d48136926d0750c81a7a09ca9905e7345c7cd60ac1e799f62f.exe 27 PID 1112 wrote to memory of 1956 1112 f49ff3a304be95d48136926d0750c81a7a09ca9905e7345c7cd60ac1e799f62f.exe 27 PID 1112 wrote to memory of 1956 1112 f49ff3a304be95d48136926d0750c81a7a09ca9905e7345c7cd60ac1e799f62f.exe 27 PID 1112 wrote to memory of 1956 1112 f49ff3a304be95d48136926d0750c81a7a09ca9905e7345c7cd60ac1e799f62f.exe 27 PID 1112 wrote to memory of 1956 1112 f49ff3a304be95d48136926d0750c81a7a09ca9905e7345c7cd60ac1e799f62f.exe 27 PID 1112 wrote to memory of 1956 1112 f49ff3a304be95d48136926d0750c81a7a09ca9905e7345c7cd60ac1e799f62f.exe 27 PID 1112 wrote to memory of 1956 1112 f49ff3a304be95d48136926d0750c81a7a09ca9905e7345c7cd60ac1e799f62f.exe 27 PID 1112 wrote to memory of 1928 1112 f49ff3a304be95d48136926d0750c81a7a09ca9905e7345c7cd60ac1e799f62f.exe 30 PID 1112 wrote to memory of 1928 1112 f49ff3a304be95d48136926d0750c81a7a09ca9905e7345c7cd60ac1e799f62f.exe 30 PID 1112 wrote to memory of 1928 1112 f49ff3a304be95d48136926d0750c81a7a09ca9905e7345c7cd60ac1e799f62f.exe 30 PID 1112 wrote to memory of 1928 1112 f49ff3a304be95d48136926d0750c81a7a09ca9905e7345c7cd60ac1e799f62f.exe 30 PID 1112 wrote to memory of 1928 1112 f49ff3a304be95d48136926d0750c81a7a09ca9905e7345c7cd60ac1e799f62f.exe 30 PID 1112 wrote to memory of 1928 1112 f49ff3a304be95d48136926d0750c81a7a09ca9905e7345c7cd60ac1e799f62f.exe 30 PID 1112 wrote to memory of 1928 1112 f49ff3a304be95d48136926d0750c81a7a09ca9905e7345c7cd60ac1e799f62f.exe 30 PID 1112 wrote to memory of 1928 1112 f49ff3a304be95d48136926d0750c81a7a09ca9905e7345c7cd60ac1e799f62f.exe 30 PID 1112 wrote to memory of 1928 1112 f49ff3a304be95d48136926d0750c81a7a09ca9905e7345c7cd60ac1e799f62f.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\f49ff3a304be95d48136926d0750c81a7a09ca9905e7345c7cd60ac1e799f62f.exe"C:\Users\Admin\AppData\Local\Temp\f49ff3a304be95d48136926d0750c81a7a09ca9905e7345c7cd60ac1e799f62f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Users\Admin\AppData\Local\Temp\f49ff3a304be95d48136926d0750c81a7a09ca9905e7345c7cd60ac1e799f62f.exe/scomma "C:\Users\Admin\AppData\Local\Temp\k5RbAMHMJs.ini"2⤵PID:1956
-
-
C:\Users\Admin\AppData\Local\Temp\f49ff3a304be95d48136926d0750c81a7a09ca9905e7345c7cd60ac1e799f62f.exe/scomma "C:\Users\Admin\AppData\Local\Temp\6gIH0E25i0.ini"2⤵
- Accesses Microsoft Outlook accounts
PID:1928
-