Analysis

  • max time kernel
    35s
  • max time network
    42s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    20/10/2022, 09:05

General

  • Target

    2adb40401a2e732139725aff2a4dc3e8b3ad8c08c197c1bb73313ee5a1539b9f.exe

  • Size

    156KB

  • MD5

    8115772851e1fdcf57a48d4b8d4c12fe

  • SHA1

    35da657f12a22c2bb8773ba0a4e3e8dff0af4e53

  • SHA256

    2adb40401a2e732139725aff2a4dc3e8b3ad8c08c197c1bb73313ee5a1539b9f

  • SHA512

    406d7268d5ddd7d9a964a4acd6fa8c39e15d3465b55192c3c768dafccfb2fb5dc689c5ccf73dd31acc44329c9c227b77e32c8eebb56ca7c4b7bc248e25e890db

  • SSDEEP

    3072:M1wyHU/zhrXhGoFwrTgj7obINT3guCvp3BMs:MIzhrXhGoyrMPobUT3LCvp3BM

Malware Config

Signatures

  • ISR Stealer

    ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

  • ISR Stealer payload 7 IoCs
  • Executes dropped EXE 2 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2adb40401a2e732139725aff2a4dc3e8b3ad8c08c197c1bb73313ee5a1539b9f.exe
    "C:\Users\Admin\AppData\Local\Temp\2adb40401a2e732139725aff2a4dc3e8b3ad8c08c197c1bb73313ee5a1539b9f.exe"
    1⤵
    • Writes to the Master Boot Record (MBR)
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1160
    • C:\Users\Admin\AppData\Local\Temp\2adb40401a2e732139725aff2a4dc3e8b3ad8c08c197c1bb73313ee5a1539b9f.exe
      "C:\Users\Admin\AppData\Local\Temp\2adb40401a2e732139725aff2a4dc3e8b3ad8c08c197c1bb73313ee5a1539b9f.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1984
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c C:\Users\Admin\AppData\Local\Temp\melt1.bat
        3⤵
        • Deletes itself
        PID:1956
      • C:\Users\Admin\AppData\Roaming\service.exe
        "C:\Users\Admin\AppData\Roaming\service.exe"
        3⤵
        • Executes dropped EXE
        • Writes to the Master Boot Record (MBR)
        • Suspicious use of SetThreadContext
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:816
        • C:\Users\Admin\AppData\Roaming\service.exe
          "C:\Users\Admin\AppData\Roaming\service.exe"
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1108
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1108 -s 408
            5⤵
            • Loads dropped DLL
            • Program crash
            PID:584

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\melt1.bat

          Filesize

          321B

          MD5

          51780a39adb02e48591523154ae6a7f7

          SHA1

          5ba0cb2b0e85d8d06f419c1ead882a391bebfdfd

          SHA256

          60c5462d2b7b8f1a46fa174d435a57df6cd0fd4a7963139debd8870379185e40

          SHA512

          516fb0be17358c5ea3c602e12ec52e63474abc739f1d12df015d09c70247195f0e462e937a0341d46377ee025b212f3c96cb051e73549b9e8a7ac6908c3f7b3d

        • C:\Users\Admin\AppData\Roaming\service.exe

          Filesize

          156KB

          MD5

          8115772851e1fdcf57a48d4b8d4c12fe

          SHA1

          35da657f12a22c2bb8773ba0a4e3e8dff0af4e53

          SHA256

          2adb40401a2e732139725aff2a4dc3e8b3ad8c08c197c1bb73313ee5a1539b9f

          SHA512

          406d7268d5ddd7d9a964a4acd6fa8c39e15d3465b55192c3c768dafccfb2fb5dc689c5ccf73dd31acc44329c9c227b77e32c8eebb56ca7c4b7bc248e25e890db

        • C:\Users\Admin\AppData\Roaming\service.exe

          Filesize

          156KB

          MD5

          8115772851e1fdcf57a48d4b8d4c12fe

          SHA1

          35da657f12a22c2bb8773ba0a4e3e8dff0af4e53

          SHA256

          2adb40401a2e732139725aff2a4dc3e8b3ad8c08c197c1bb73313ee5a1539b9f

          SHA512

          406d7268d5ddd7d9a964a4acd6fa8c39e15d3465b55192c3c768dafccfb2fb5dc689c5ccf73dd31acc44329c9c227b77e32c8eebb56ca7c4b7bc248e25e890db

        • C:\Users\Admin\AppData\Roaming\service.exe

          Filesize

          156KB

          MD5

          8115772851e1fdcf57a48d4b8d4c12fe

          SHA1

          35da657f12a22c2bb8773ba0a4e3e8dff0af4e53

          SHA256

          2adb40401a2e732139725aff2a4dc3e8b3ad8c08c197c1bb73313ee5a1539b9f

          SHA512

          406d7268d5ddd7d9a964a4acd6fa8c39e15d3465b55192c3c768dafccfb2fb5dc689c5ccf73dd31acc44329c9c227b77e32c8eebb56ca7c4b7bc248e25e890db

        • \Users\Admin\AppData\Roaming\service.exe

          Filesize

          156KB

          MD5

          8115772851e1fdcf57a48d4b8d4c12fe

          SHA1

          35da657f12a22c2bb8773ba0a4e3e8dff0af4e53

          SHA256

          2adb40401a2e732139725aff2a4dc3e8b3ad8c08c197c1bb73313ee5a1539b9f

          SHA512

          406d7268d5ddd7d9a964a4acd6fa8c39e15d3465b55192c3c768dafccfb2fb5dc689c5ccf73dd31acc44329c9c227b77e32c8eebb56ca7c4b7bc248e25e890db

        • \Users\Admin\AppData\Roaming\service.exe

          Filesize

          156KB

          MD5

          8115772851e1fdcf57a48d4b8d4c12fe

          SHA1

          35da657f12a22c2bb8773ba0a4e3e8dff0af4e53

          SHA256

          2adb40401a2e732139725aff2a4dc3e8b3ad8c08c197c1bb73313ee5a1539b9f

          SHA512

          406d7268d5ddd7d9a964a4acd6fa8c39e15d3465b55192c3c768dafccfb2fb5dc689c5ccf73dd31acc44329c9c227b77e32c8eebb56ca7c4b7bc248e25e890db

        • \Users\Admin\AppData\Roaming\service.exe

          Filesize

          156KB

          MD5

          8115772851e1fdcf57a48d4b8d4c12fe

          SHA1

          35da657f12a22c2bb8773ba0a4e3e8dff0af4e53

          SHA256

          2adb40401a2e732139725aff2a4dc3e8b3ad8c08c197c1bb73313ee5a1539b9f

          SHA512

          406d7268d5ddd7d9a964a4acd6fa8c39e15d3465b55192c3c768dafccfb2fb5dc689c5ccf73dd31acc44329c9c227b77e32c8eebb56ca7c4b7bc248e25e890db

        • \Users\Admin\AppData\Roaming\service.exe

          Filesize

          156KB

          MD5

          8115772851e1fdcf57a48d4b8d4c12fe

          SHA1

          35da657f12a22c2bb8773ba0a4e3e8dff0af4e53

          SHA256

          2adb40401a2e732139725aff2a4dc3e8b3ad8c08c197c1bb73313ee5a1539b9f

          SHA512

          406d7268d5ddd7d9a964a4acd6fa8c39e15d3465b55192c3c768dafccfb2fb5dc689c5ccf73dd31acc44329c9c227b77e32c8eebb56ca7c4b7bc248e25e890db

        • \Users\Admin\AppData\Roaming\service.exe

          Filesize

          156KB

          MD5

          8115772851e1fdcf57a48d4b8d4c12fe

          SHA1

          35da657f12a22c2bb8773ba0a4e3e8dff0af4e53

          SHA256

          2adb40401a2e732139725aff2a4dc3e8b3ad8c08c197c1bb73313ee5a1539b9f

          SHA512

          406d7268d5ddd7d9a964a4acd6fa8c39e15d3465b55192c3c768dafccfb2fb5dc689c5ccf73dd31acc44329c9c227b77e32c8eebb56ca7c4b7bc248e25e890db

        • \Users\Admin\AppData\Roaming\service.exe

          Filesize

          156KB

          MD5

          8115772851e1fdcf57a48d4b8d4c12fe

          SHA1

          35da657f12a22c2bb8773ba0a4e3e8dff0af4e53

          SHA256

          2adb40401a2e732139725aff2a4dc3e8b3ad8c08c197c1bb73313ee5a1539b9f

          SHA512

          406d7268d5ddd7d9a964a4acd6fa8c39e15d3465b55192c3c768dafccfb2fb5dc689c5ccf73dd31acc44329c9c227b77e32c8eebb56ca7c4b7bc248e25e890db

        • \Users\Admin\AppData\Roaming\service.exe

          Filesize

          156KB

          MD5

          8115772851e1fdcf57a48d4b8d4c12fe

          SHA1

          35da657f12a22c2bb8773ba0a4e3e8dff0af4e53

          SHA256

          2adb40401a2e732139725aff2a4dc3e8b3ad8c08c197c1bb73313ee5a1539b9f

          SHA512

          406d7268d5ddd7d9a964a4acd6fa8c39e15d3465b55192c3c768dafccfb2fb5dc689c5ccf73dd31acc44329c9c227b77e32c8eebb56ca7c4b7bc248e25e890db

        • memory/1108-94-0x0000000000400000-0x000000000040F000-memory.dmp

          Filesize

          60KB

        • memory/1984-65-0x0000000075A91000-0x0000000075A93000-memory.dmp

          Filesize

          8KB

        • memory/1984-56-0x0000000000400000-0x000000000040F000-memory.dmp

          Filesize

          60KB

        • memory/1984-60-0x0000000000400000-0x000000000040F000-memory.dmp

          Filesize

          60KB

        • memory/1984-59-0x0000000000400000-0x000000000040F000-memory.dmp

          Filesize

          60KB

        • memory/1984-57-0x0000000000400000-0x000000000040F000-memory.dmp

          Filesize

          60KB

        • memory/1984-75-0x0000000000400000-0x000000000040F000-memory.dmp

          Filesize

          60KB

        • memory/1984-67-0x0000000000400000-0x000000000040F000-memory.dmp

          Filesize

          60KB