Analysis
-
max time kernel
81s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
19-10-2022 16:01
Static task
static1
Behavioral task
behavioral1
Sample
9d1d5139eec7986e3554c669027350b567a1dc868ccdb7769113c116420de733.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
9d1d5139eec7986e3554c669027350b567a1dc868ccdb7769113c116420de733.exe
Resource
win10v2004-20220901-en
General
-
Target
9d1d5139eec7986e3554c669027350b567a1dc868ccdb7769113c116420de733.exe
-
Size
679KB
-
MD5
91f3a7be84c65567899829e17ec42b7c
-
SHA1
5b3d422e2339d4bc7f38a186669f2f74d8a0bd7f
-
SHA256
9d1d5139eec7986e3554c669027350b567a1dc868ccdb7769113c116420de733
-
SHA512
3e5855a2c67b52dc58fa012c23b0d851efde4628276273b2dd86f5d4d6438535c757a57f532b5dbea755cad2c32376192b286fcfa3cc41019875a1971886578f
-
SSDEEP
12288:jhRwPIdIDQUFVO9nOq1ycwfzPprfQiFrL/Tyumdr22AKxX:EXDQUFCbnc7QYFwx
Malware Config
Signatures
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload 3 IoCs
resource yara_rule behavioral2/memory/1964-137-0x0000000000400000-0x0000000000470000-memory.dmp family_isrstealer behavioral2/memory/1964-146-0x0000000000400000-0x0000000000470000-memory.dmp family_isrstealer behavioral2/memory/1964-159-0x0000000000400000-0x0000000000470000-memory.dmp family_isrstealer -
NirSoft MailPassView 2 IoCs
Password recovery tool for various email clients
resource yara_rule behavioral2/memory/4884-163-0x0000000000400000-0x000000000041F000-memory.dmp MailPassView behavioral2/memory/4884-165-0x0000000000400000-0x000000000041F000-memory.dmp MailPassView -
NirSoft WebBrowserPassView 3 IoCs
Password recovery tool for various web browsers
resource yara_rule behavioral2/memory/2620-148-0x0000000000400000-0x0000000000454000-memory.dmp WebBrowserPassView behavioral2/memory/2620-152-0x0000000000400000-0x0000000000454000-memory.dmp WebBrowserPassView behavioral2/memory/2620-161-0x0000000000400000-0x0000000000454000-memory.dmp WebBrowserPassView -
Nirsoft 7 IoCs
resource yara_rule behavioral2/memory/2620-148-0x0000000000400000-0x0000000000454000-memory.dmp Nirsoft behavioral2/memory/2620-152-0x0000000000400000-0x0000000000454000-memory.dmp Nirsoft behavioral2/memory/1944-158-0x0000000000400000-0x0000000000426000-memory.dmp Nirsoft behavioral2/memory/4884-163-0x0000000000400000-0x000000000041F000-memory.dmp Nirsoft behavioral2/memory/1944-164-0x0000000000400000-0x0000000000426000-memory.dmp Nirsoft behavioral2/memory/4884-165-0x0000000000400000-0x000000000041F000-memory.dmp Nirsoft behavioral2/memory/2620-161-0x0000000000400000-0x0000000000454000-memory.dmp Nirsoft -
Executes dropped EXE 1 IoCs
pid Process 2236 MSP Code Generator.exe -
resource yara_rule behavioral2/memory/1944-151-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral2/memory/4884-156-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1944-158-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral2/memory/4884-163-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1944-164-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral2/memory/4884-165-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4884-160-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1944-155-0x0000000000400000-0x0000000000426000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 9d1d5139eec7986e3554c669027350b567a1dc868ccdb7769113c116420de733.exe -
Uses the VBS compiler for execution 1 TTPs
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts vbc.exe -
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 2236 set thread context of 1964 2236 MSP Code Generator.exe 85 PID 1964 set thread context of 2300 1964 vbc.exe 86 PID 2300 set thread context of 2620 2300 vbc.exe 87 PID 2300 set thread context of 1944 2300 vbc.exe 88 PID 2300 set thread context of 4884 2300 vbc.exe 89 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1964 vbc.exe 1964 vbc.exe 1964 vbc.exe 1964 vbc.exe 1964 vbc.exe 1964 vbc.exe 1964 vbc.exe 1964 vbc.exe 1944 vbc.exe 1944 vbc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1944 vbc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1964 vbc.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 4300 wrote to memory of 2236 4300 9d1d5139eec7986e3554c669027350b567a1dc868ccdb7769113c116420de733.exe 84 PID 4300 wrote to memory of 2236 4300 9d1d5139eec7986e3554c669027350b567a1dc868ccdb7769113c116420de733.exe 84 PID 4300 wrote to memory of 2236 4300 9d1d5139eec7986e3554c669027350b567a1dc868ccdb7769113c116420de733.exe 84 PID 2236 wrote to memory of 1964 2236 MSP Code Generator.exe 85 PID 2236 wrote to memory of 1964 2236 MSP Code Generator.exe 85 PID 2236 wrote to memory of 1964 2236 MSP Code Generator.exe 85 PID 2236 wrote to memory of 1964 2236 MSP Code Generator.exe 85 PID 2236 wrote to memory of 1964 2236 MSP Code Generator.exe 85 PID 2236 wrote to memory of 1964 2236 MSP Code Generator.exe 85 PID 2236 wrote to memory of 1964 2236 MSP Code Generator.exe 85 PID 2236 wrote to memory of 1964 2236 MSP Code Generator.exe 85 PID 1964 wrote to memory of 2300 1964 vbc.exe 86 PID 1964 wrote to memory of 2300 1964 vbc.exe 86 PID 1964 wrote to memory of 2300 1964 vbc.exe 86 PID 1964 wrote to memory of 2300 1964 vbc.exe 86 PID 1964 wrote to memory of 2300 1964 vbc.exe 86 PID 1964 wrote to memory of 2300 1964 vbc.exe 86 PID 1964 wrote to memory of 2300 1964 vbc.exe 86 PID 1964 wrote to memory of 2300 1964 vbc.exe 86 PID 1964 wrote to memory of 2300 1964 vbc.exe 86 PID 1964 wrote to memory of 2300 1964 vbc.exe 86 PID 1964 wrote to memory of 2300 1964 vbc.exe 86 PID 1964 wrote to memory of 2300 1964 vbc.exe 86 PID 1964 wrote to memory of 2300 1964 vbc.exe 86 PID 2300 wrote to memory of 2620 2300 vbc.exe 87 PID 2300 wrote to memory of 2620 2300 vbc.exe 87 PID 2300 wrote to memory of 2620 2300 vbc.exe 87 PID 2300 wrote to memory of 2620 2300 vbc.exe 87 PID 2300 wrote to memory of 2620 2300 vbc.exe 87 PID 2300 wrote to memory of 1944 2300 vbc.exe 88 PID 2300 wrote to memory of 1944 2300 vbc.exe 88 PID 2300 wrote to memory of 1944 2300 vbc.exe 88 PID 2300 wrote to memory of 1944 2300 vbc.exe 88 PID 2300 wrote to memory of 1944 2300 vbc.exe 88 PID 2300 wrote to memory of 4884 2300 vbc.exe 89 PID 2300 wrote to memory of 4884 2300 vbc.exe 89 PID 2300 wrote to memory of 4884 2300 vbc.exe 89 PID 2300 wrote to memory of 4884 2300 vbc.exe 89 PID 2300 wrote to memory of 4884 2300 vbc.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\9d1d5139eec7986e3554c669027350b567a1dc868ccdb7769113c116420de733.exe"C:\Users\Admin\AppData\Local\Temp\9d1d5139eec7986e3554c669027350b567a1dc868ccdb7769113c116420de733.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4300 -
C:\Users\Admin\AppData\Local\Temp\MSP Code Generator.exe"C:\Users\Admin\AppData\Local\Temp\MSP Code Generator.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"4⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp5⤵PID:2620
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1944
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp5⤵
- Accesses Microsoft Outlook accounts
PID:4884
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
608KB
MD5a034902b1c3c004ac6bf644b3a80b032
SHA1ff870df2a0ad71ce52fc36b9149cf2803c69805c
SHA2567f05710ced5bc4111bad29e153fc3358bd244a389d3174037e9a2f5c2062388e
SHA5128b86d642113c4fa6c142cea03bc8ec76f7849d495b0be8554d123caa26998778c86c4ae5645b9717781980f09603dd814f0ddef5695662d3f6ab897a2f10dce7
-
Filesize
608KB
MD5a034902b1c3c004ac6bf644b3a80b032
SHA1ff870df2a0ad71ce52fc36b9149cf2803c69805c
SHA2567f05710ced5bc4111bad29e153fc3358bd244a389d3174037e9a2f5c2062388e
SHA5128b86d642113c4fa6c142cea03bc8ec76f7849d495b0be8554d123caa26998778c86c4ae5645b9717781980f09603dd814f0ddef5695662d3f6ab897a2f10dce7