Analysis
-
max time kernel
54s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
20-10-2022 09:05
Static task
static1
Behavioral task
behavioral1
Sample
2adb40401a2e732139725aff2a4dc3e8b3ad8c08c197c1bb73313ee5a1539b9f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2adb40401a2e732139725aff2a4dc3e8b3ad8c08c197c1bb73313ee5a1539b9f.exe
Resource
win10v2004-20220812-en
General
-
Target
2adb40401a2e732139725aff2a4dc3e8b3ad8c08c197c1bb73313ee5a1539b9f.exe
-
Size
156KB
-
MD5
8115772851e1fdcf57a48d4b8d4c12fe
-
SHA1
35da657f12a22c2bb8773ba0a4e3e8dff0af4e53
-
SHA256
2adb40401a2e732139725aff2a4dc3e8b3ad8c08c197c1bb73313ee5a1539b9f
-
SHA512
406d7268d5ddd7d9a964a4acd6fa8c39e15d3465b55192c3c768dafccfb2fb5dc689c5ccf73dd31acc44329c9c227b77e32c8eebb56ca7c4b7bc248e25e890db
-
SSDEEP
3072:M1wyHU/zhrXhGoFwrTgj7obINT3guCvp3BMs:MIzhrXhGoyrMPobUT3LCvp3BM
Malware Config
Signatures
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload 7 IoCs
resource yara_rule behavioral2/memory/4928-134-0x0000000000000000-mapping.dmp family_isrstealer behavioral2/memory/4928-135-0x0000000000400000-0x000000000040F000-memory.dmp family_isrstealer behavioral2/memory/4928-141-0x0000000000400000-0x000000000040F000-memory.dmp family_isrstealer behavioral2/memory/4928-146-0x0000000000400000-0x000000000040F000-memory.dmp family_isrstealer behavioral2/memory/2988-148-0x0000000000000000-mapping.dmp family_isrstealer behavioral2/memory/2988-154-0x0000000000400000-0x000000000040F000-memory.dmp family_isrstealer behavioral2/memory/2988-155-0x0000000000400000-0x000000000040F000-memory.dmp family_isrstealer -
Executes dropped EXE 2 IoCs
pid Process 4648 service.exe 2988 service.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 2adb40401a2e732139725aff2a4dc3e8b3ad8c08c197c1bb73313ee5a1539b9f.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows\CurrentVersion\Run service.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\service.exe = "C:\\Users\\Admin\\AppData\\Roaming\\service.exe" service.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run service.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\service.exe = "C:\\Users\\Admin\\AppData\\Roaming\\service.exe" service.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 2adb40401a2e732139725aff2a4dc3e8b3ad8c08c197c1bb73313ee5a1539b9f.exe File opened for modification \??\PhysicalDrive0 service.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 400 set thread context of 4928 400 2adb40401a2e732139725aff2a4dc3e8b3ad8c08c197c1bb73313ee5a1539b9f.exe 82 PID 4648 set thread context of 2988 4648 service.exe 86 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 228 2988 WerFault.exe 86 -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 400 2adb40401a2e732139725aff2a4dc3e8b3ad8c08c197c1bb73313ee5a1539b9f.exe 4928 2adb40401a2e732139725aff2a4dc3e8b3ad8c08c197c1bb73313ee5a1539b9f.exe 4648 service.exe 2988 service.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 400 wrote to memory of 4928 400 2adb40401a2e732139725aff2a4dc3e8b3ad8c08c197c1bb73313ee5a1539b9f.exe 82 PID 400 wrote to memory of 4928 400 2adb40401a2e732139725aff2a4dc3e8b3ad8c08c197c1bb73313ee5a1539b9f.exe 82 PID 400 wrote to memory of 4928 400 2adb40401a2e732139725aff2a4dc3e8b3ad8c08c197c1bb73313ee5a1539b9f.exe 82 PID 400 wrote to memory of 4928 400 2adb40401a2e732139725aff2a4dc3e8b3ad8c08c197c1bb73313ee5a1539b9f.exe 82 PID 400 wrote to memory of 4928 400 2adb40401a2e732139725aff2a4dc3e8b3ad8c08c197c1bb73313ee5a1539b9f.exe 82 PID 400 wrote to memory of 4928 400 2adb40401a2e732139725aff2a4dc3e8b3ad8c08c197c1bb73313ee5a1539b9f.exe 82 PID 400 wrote to memory of 4928 400 2adb40401a2e732139725aff2a4dc3e8b3ad8c08c197c1bb73313ee5a1539b9f.exe 82 PID 400 wrote to memory of 4928 400 2adb40401a2e732139725aff2a4dc3e8b3ad8c08c197c1bb73313ee5a1539b9f.exe 82 PID 4928 wrote to memory of 1256 4928 2adb40401a2e732139725aff2a4dc3e8b3ad8c08c197c1bb73313ee5a1539b9f.exe 83 PID 4928 wrote to memory of 1256 4928 2adb40401a2e732139725aff2a4dc3e8b3ad8c08c197c1bb73313ee5a1539b9f.exe 83 PID 4928 wrote to memory of 1256 4928 2adb40401a2e732139725aff2a4dc3e8b3ad8c08c197c1bb73313ee5a1539b9f.exe 83 PID 4928 wrote to memory of 4648 4928 2adb40401a2e732139725aff2a4dc3e8b3ad8c08c197c1bb73313ee5a1539b9f.exe 85 PID 4928 wrote to memory of 4648 4928 2adb40401a2e732139725aff2a4dc3e8b3ad8c08c197c1bb73313ee5a1539b9f.exe 85 PID 4928 wrote to memory of 4648 4928 2adb40401a2e732139725aff2a4dc3e8b3ad8c08c197c1bb73313ee5a1539b9f.exe 85 PID 4648 wrote to memory of 2988 4648 service.exe 86 PID 4648 wrote to memory of 2988 4648 service.exe 86 PID 4648 wrote to memory of 2988 4648 service.exe 86 PID 4648 wrote to memory of 2988 4648 service.exe 86 PID 4648 wrote to memory of 2988 4648 service.exe 86 PID 4648 wrote to memory of 2988 4648 service.exe 86 PID 4648 wrote to memory of 2988 4648 service.exe 86 PID 4648 wrote to memory of 2988 4648 service.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\2adb40401a2e732139725aff2a4dc3e8b3ad8c08c197c1bb73313ee5a1539b9f.exe"C:\Users\Admin\AppData\Local\Temp\2adb40401a2e732139725aff2a4dc3e8b3ad8c08c197c1bb73313ee5a1539b9f.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:400 -
C:\Users\Admin\AppData\Local\Temp\2adb40401a2e732139725aff2a4dc3e8b3ad8c08c197c1bb73313ee5a1539b9f.exe"C:\Users\Admin\AppData\Local\Temp\2adb40401a2e732139725aff2a4dc3e8b3ad8c08c197c1bb73313ee5a1539b9f.exe"2⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4928 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\melt1.bat3⤵PID:1256
-
-
C:\Users\Admin\AppData\Roaming\service.exe"C:\Users\Admin\AppData\Roaming\service.exe"3⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4648 -
C:\Users\Admin\AppData\Roaming\service.exe"C:\Users\Admin\AppData\Roaming\service.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:2988 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2988 -s 7645⤵
- Program crash
PID:228
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2988 -ip 29881⤵PID:2420
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
321B
MD551780a39adb02e48591523154ae6a7f7
SHA15ba0cb2b0e85d8d06f419c1ead882a391bebfdfd
SHA25660c5462d2b7b8f1a46fa174d435a57df6cd0fd4a7963139debd8870379185e40
SHA512516fb0be17358c5ea3c602e12ec52e63474abc739f1d12df015d09c70247195f0e462e937a0341d46377ee025b212f3c96cb051e73549b9e8a7ac6908c3f7b3d
-
Filesize
156KB
MD58115772851e1fdcf57a48d4b8d4c12fe
SHA135da657f12a22c2bb8773ba0a4e3e8dff0af4e53
SHA2562adb40401a2e732139725aff2a4dc3e8b3ad8c08c197c1bb73313ee5a1539b9f
SHA512406d7268d5ddd7d9a964a4acd6fa8c39e15d3465b55192c3c768dafccfb2fb5dc689c5ccf73dd31acc44329c9c227b77e32c8eebb56ca7c4b7bc248e25e890db
-
Filesize
156KB
MD58115772851e1fdcf57a48d4b8d4c12fe
SHA135da657f12a22c2bb8773ba0a4e3e8dff0af4e53
SHA2562adb40401a2e732139725aff2a4dc3e8b3ad8c08c197c1bb73313ee5a1539b9f
SHA512406d7268d5ddd7d9a964a4acd6fa8c39e15d3465b55192c3c768dafccfb2fb5dc689c5ccf73dd31acc44329c9c227b77e32c8eebb56ca7c4b7bc248e25e890db
-
Filesize
156KB
MD58115772851e1fdcf57a48d4b8d4c12fe
SHA135da657f12a22c2bb8773ba0a4e3e8dff0af4e53
SHA2562adb40401a2e732139725aff2a4dc3e8b3ad8c08c197c1bb73313ee5a1539b9f
SHA512406d7268d5ddd7d9a964a4acd6fa8c39e15d3465b55192c3c768dafccfb2fb5dc689c5ccf73dd31acc44329c9c227b77e32c8eebb56ca7c4b7bc248e25e890db