Analysis

  • max time kernel
    189s
  • max time network
    165s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-10-2022 19:04

General

  • Target

    1c568e553bca8db87be421b3f41c84421266cc7f75c7efdd25c0102f35b68a84.exe

  • Size

    388KB

  • MD5

    7319389085a33d1019201aec235a5550

  • SHA1

    f554251589c25e095186b7280c235833fa108111

  • SHA256

    1c568e553bca8db87be421b3f41c84421266cc7f75c7efdd25c0102f35b68a84

  • SHA512

    862fc1776660114f67ff31db6f86653e68deed2b47cda22048a48493d122cbf7865a42288b80f607796453613cce8ddda410173afbefac694f79ae83a7091e97

  • SSDEEP

    6144:2QuZspwEc5DzHYMPL3QtaTV5WxtXBD7KEynTM/ZZnIr:2QO4uQtiV54jfKEynQ/Z

Malware Config

Signatures

  • ISR Stealer

    ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

  • ISR Stealer payload 7 IoCs
  • NirSoft MailPassView 3 IoCs

    Password recovery tool for various email clients

  • Nirsoft 3 IoCs
  • Executes dropped EXE 2 IoCs
  • UPX packed file 10 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Uses the VBS compiler for execution 1 TTPs
  • Accesses Microsoft Outlook accounts 1 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 52 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1c568e553bca8db87be421b3f41c84421266cc7f75c7efdd25c0102f35b68a84.exe
    "C:\Users\Admin\AppData\Local\Temp\1c568e553bca8db87be421b3f41c84421266cc7f75c7efdd25c0102f35b68a84.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4300
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3744
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
        /scomma "C:\Users\Admin\AppData\Local\Temp\H4hLTmyY1r.ini"
        3⤵
          PID:3460
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
          /scomma "C:\Users\Admin\AppData\Local\Temp\r0W72UCsdL.ini"
          3⤵
          • Accesses Microsoft Outlook accounts
          PID:4104
      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\NcbService.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\NcbService.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3800
        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\CertPropSvc.exe
          C:\Users\Admin\AppData\Roaming\Microsoft\Windows\CertPropSvc.exe
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4380
          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
            "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"
            4⤵
            • Suspicious use of SetThreadContext
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2980
            • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
              /scomma "C:\Users\Admin\AppData\Local\Temp\WvJpyNtbMQ.ini"
              5⤵
                PID:5028
              • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
                /scomma "C:\Users\Admin\AppData\Local\Temp\9LtnWWjL0x.ini"
                5⤵
                • Accesses Microsoft Outlook accounts
                PID:3960

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D

        Filesize

        2KB

        MD5

        bc68c4ccb08d2c94eb10c1918865ccae

        SHA1

        8256faeec3f3ec799819d5370195a60f0ec2bdb0

        SHA256

        79313c35e9f5655225ab6d4564a396cf9d473d04909c04db10935c27959f677d

        SHA512

        f6baa632cd93126c31a495e340e8f42e3f9b171b0975877e7a6725677fe57c8b51784be5366cedba022fea273cfe9ecfc5fce8546f2a76e1e6516e5865666933

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

        Filesize

        1KB

        MD5

        ee895cd37d1bbafdf7a736b85dd47348

        SHA1

        5c182ae0d6ffc54c386763ad882256cedd8d0e7c

        SHA256

        939346daba2e0757e14e822fd55350189708ac8d2d782b148e1744ee85c49aa5

        SHA512

        b2f86fa2f14864ab155693804f0d5da4f13e0c9257743eb7376d49a6ce77d950f6e98bbda24030386578c0edb58f4ad3e50eaec2dcc10803a7dd314d703cf740

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C6872375A2E1BC120603F5605C3CEC71

        Filesize

        472B

        MD5

        c6dd7d4887a4cfb649b972bffe1dc679

        SHA1

        44ac641d8f349b5192198c129cb9e0aa2228940d

        SHA256

        a3082474fbfa74b1f2be015ffa59e5c632470c0a8472a1bde6c50e3cc56211aa

        SHA512

        728ed5a18b119c285b2670da821e6167b04feea28f61b2fcd203ac8a51661e3b62c6ac2506f00896380cfe504f7d2c06715e7bf8cdb9a78835e1960bc5bbe69c

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D

        Filesize

        488B

        MD5

        ffae83da9213ec0a1111f590b48653e4

        SHA1

        c56ef41a6e6fcd149369bc713e182f631bac448d

        SHA256

        9f4d95332253d29e705146a99750cc86aa96273bd4b06489dbeb78e99d533e02

        SHA512

        e9ae54a2e2d8eac57b15d4c99da6c156ce4cc2bce5b2a1d035c93d70497fbcd97b8282775212ed0013cecf319e369091ef48b88f863991e3ebf4c648d8930e56

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

        Filesize

        482B

        MD5

        70df02d04c5d83a3f06d477a1c22fae2

        SHA1

        0a2ad2018ef2b67ced9f8628c65a69d9a31c2b48

        SHA256

        88e81b4894d47b5ccebf8a6668a555fc8645abca8e820e3591171f0c2acbbfaf

        SHA512

        8c90d4e05a84893f3695757c55369d46426dba24e382188bd59208a10f211324b6438bdf00dc2230da7436f88733a38e9ab3816b8df6d1bbd006356b67cc5c44

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C6872375A2E1BC120603F5605C3CEC71

        Filesize

        484B

        MD5

        565329823edb21cb36b012f5adcc6064

        SHA1

        887a7b20e9944e81e350a7064935ce82e9fa014f

        SHA256

        6151d90c29f06226a54a79275694ed5594a1f770cc5fe8a4880cf99b4d448ac2

        SHA512

        5895b703c3d34014291e76515958b0be9bb3b9d57a7715003abbc87ab65053f1aeb2fc7c7b7c62ceb3b9a7d49990bae5804d15392ffad2dcd8955080fcac2ef8

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\S58XVZL8\index[1].htm

        Filesize

        162B

        MD5

        4f8e702cc244ec5d4de32740c0ecbd97

        SHA1

        3adb1f02d5b6054de0046e367c1d687b6cdf7aff

        SHA256

        9e17cb15dd75bbbd5dbb984eda674863c3b10ab72613cf8a39a00c3e11a8492a

        SHA512

        21047fea5269fee75a2a187aa09316519e35068cb2f2f76cfaf371e5224445e9d5c98497bd76fb9608d2b73e9dac1a3f5bfadfdc4623c479d53ecf93d81d3c9f

      • C:\Users\Admin\AppData\Local\Temp\H4hLTmyY1r.ini

        Filesize

        5B

        MD5

        d1ea279fb5559c020a1b4137dc4de237

        SHA1

        db6f8988af46b56216a6f0daf95ab8c9bdb57400

        SHA256

        fcdcc2c46896915a1c695d6231f0fee336a668531b7a3da46178c80362546dba

        SHA512

        720e9c284f0559015312df7fe977563e5e16f48d3506e51eb4016adf7971924d352f740b030aa3adc81b6f65fd1dba12df06d10fa6c115074e5097e7ee0f08b3

      • C:\Users\Admin\AppData\Local\Temp\WvJpyNtbMQ.ini

        Filesize

        5B

        MD5

        d1ea279fb5559c020a1b4137dc4de237

        SHA1

        db6f8988af46b56216a6f0daf95ab8c9bdb57400

        SHA256

        fcdcc2c46896915a1c695d6231f0fee336a668531b7a3da46178c80362546dba

        SHA512

        720e9c284f0559015312df7fe977563e5e16f48d3506e51eb4016adf7971924d352f740b030aa3adc81b6f65fd1dba12df06d10fa6c115074e5097e7ee0f08b3

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\CertPropSvc.exe

        Filesize

        388KB

        MD5

        7319389085a33d1019201aec235a5550

        SHA1

        f554251589c25e095186b7280c235833fa108111

        SHA256

        1c568e553bca8db87be421b3f41c84421266cc7f75c7efdd25c0102f35b68a84

        SHA512

        862fc1776660114f67ff31db6f86653e68deed2b47cda22048a48493d122cbf7865a42288b80f607796453613cce8ddda410173afbefac694f79ae83a7091e97

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\CertPropSvc.exe

        Filesize

        388KB

        MD5

        7319389085a33d1019201aec235a5550

        SHA1

        f554251589c25e095186b7280c235833fa108111

        SHA256

        1c568e553bca8db87be421b3f41c84421266cc7f75c7efdd25c0102f35b68a84

        SHA512

        862fc1776660114f67ff31db6f86653e68deed2b47cda22048a48493d122cbf7865a42288b80f607796453613cce8ddda410173afbefac694f79ae83a7091e97

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\NcbService.exe

        Filesize

        9KB

        MD5

        6a52b1cbd6a9da69b28b0bd3ddf7b315

        SHA1

        586b0645577b0a6a5b34a69dc8b024c40cc656b7

        SHA256

        1d9bb51617c01fed2c9374ecb48292bc70c2829d67724621a32280850b090175

        SHA512

        90b56bc30080acae049bb972e71634c906d96f19944f22284af5646fbc2b78ecdd74fb40469d110967fdb8cc5959e77851078e7ef72d2daacfe8c3d89739883e

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\NcbService.exe

        Filesize

        9KB

        MD5

        6a52b1cbd6a9da69b28b0bd3ddf7b315

        SHA1

        586b0645577b0a6a5b34a69dc8b024c40cc656b7

        SHA256

        1d9bb51617c01fed2c9374ecb48292bc70c2829d67724621a32280850b090175

        SHA512

        90b56bc30080acae049bb972e71634c906d96f19944f22284af5646fbc2b78ecdd74fb40469d110967fdb8cc5959e77851078e7ef72d2daacfe8c3d89739883e

      • memory/2980-177-0x0000000000400000-0x0000000000442000-memory.dmp

        Filesize

        264KB

      • memory/2980-193-0x0000000000400000-0x0000000000442000-memory.dmp

        Filesize

        264KB

      • memory/2980-192-0x0000000000400000-0x0000000000442000-memory.dmp

        Filesize

        264KB

      • memory/3460-143-0x0000000000400000-0x0000000000453000-memory.dmp

        Filesize

        332KB

      • memory/3460-144-0x0000000000400000-0x0000000000453000-memory.dmp

        Filesize

        332KB

      • memory/3460-142-0x0000000000400000-0x0000000000453000-memory.dmp

        Filesize

        332KB

      • memory/3460-140-0x0000000000400000-0x0000000000453000-memory.dmp

        Filesize

        332KB

      • memory/3744-135-0x0000000000400000-0x0000000000442000-memory.dmp

        Filesize

        264KB

      • memory/3744-161-0x0000000000400000-0x0000000000442000-memory.dmp

        Filesize

        264KB

      • memory/3744-163-0x0000000000400000-0x0000000000442000-memory.dmp

        Filesize

        264KB

      • memory/3744-148-0x0000000000400000-0x0000000000442000-memory.dmp

        Filesize

        264KB

      • memory/3800-162-0x0000000074AB0000-0x0000000075061000-memory.dmp

        Filesize

        5.7MB

      • memory/3800-149-0x0000000074AB0000-0x0000000075061000-memory.dmp

        Filesize

        5.7MB

      • memory/3960-191-0x0000000000400000-0x000000000041F000-memory.dmp

        Filesize

        124KB

      • memory/4104-156-0x0000000000400000-0x000000000041F000-memory.dmp

        Filesize

        124KB

      • memory/4104-160-0x0000000000400000-0x000000000041F000-memory.dmp

        Filesize

        124KB

      • memory/4104-159-0x0000000000400000-0x000000000041F000-memory.dmp

        Filesize

        124KB

      • memory/4104-158-0x0000000000400000-0x000000000041F000-memory.dmp

        Filesize

        124KB

      • memory/4300-165-0x0000000074AB0000-0x0000000075061000-memory.dmp

        Filesize

        5.7MB

      • memory/4300-133-0x0000000074AB0000-0x0000000075061000-memory.dmp

        Filesize

        5.7MB

      • memory/4300-132-0x0000000074AB0000-0x0000000075061000-memory.dmp

        Filesize

        5.7MB

      • memory/4380-164-0x0000000074AB0000-0x0000000075061000-memory.dmp

        Filesize

        5.7MB

      • memory/4380-153-0x0000000074AB0000-0x0000000075061000-memory.dmp

        Filesize

        5.7MB

      • memory/5028-176-0x0000000000400000-0x0000000000453000-memory.dmp

        Filesize

        332KB