Analysis
-
max time kernel
99s -
max time network
112s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
21-10-2022 20:04
Static task
static1
Behavioral task
behavioral1
Sample
8133ac485b0b77131493591ad4636a2c2414f5bcfe6d917bcd344ae1ac70c17a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8133ac485b0b77131493591ad4636a2c2414f5bcfe6d917bcd344ae1ac70c17a.exe
Resource
win10v2004-20220901-en
General
-
Target
8133ac485b0b77131493591ad4636a2c2414f5bcfe6d917bcd344ae1ac70c17a.exe
-
Size
931KB
-
MD5
ef37b75fb8488cd171bf04013a2b6f36
-
SHA1
2bd5c303bb4c30407a3d37f8dee86f6089c0e4b3
-
SHA256
8133ac485b0b77131493591ad4636a2c2414f5bcfe6d917bcd344ae1ac70c17a
-
SHA512
a777ffb11c7197df1036943c4907ac9ad768e01589d274a657ab185c898e2238b5153721c10aac68a6309405c0ceab0d278e78051a2766c66636b938e2500c31
-
SSDEEP
12288:oRWNcr8oxnU1ztrABdy5oQc82UYoi6Cuw78YOJEn1GUEVQqYHQFOH9LPsv5mrNmu:LNBIUDMs+YYowu68GGUEtsh7N18Cf
Malware Config
Signatures
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload 4 IoCs
resource yara_rule behavioral1/memory/1508-68-0x0000000000401180-mapping.dmp family_isrstealer behavioral1/memory/1508-67-0x0000000000400000-0x0000000000442000-memory.dmp family_isrstealer behavioral1/memory/1508-85-0x0000000000400000-0x0000000000442000-memory.dmp family_isrstealer behavioral1/memory/1508-95-0x0000000000400000-0x0000000000442000-memory.dmp family_isrstealer -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" TNRFCpAx.exe -
NirSoft MailPassView 2 IoCs
Password recovery tool for various email clients
resource yara_rule behavioral1/memory/1648-93-0x0000000000400000-0x000000000041F000-memory.dmp MailPassView behavioral1/memory/1648-94-0x0000000000400000-0x000000000041F000-memory.dmp MailPassView -
Nirsoft 2 IoCs
resource yara_rule behavioral1/memory/1648-93-0x0000000000400000-0x000000000041F000-memory.dmp Nirsoft behavioral1/memory/1648-94-0x0000000000400000-0x000000000041F000-memory.dmp Nirsoft -
Executes dropped EXE 1 IoCs
pid Process 752 TNRFCpAx.exe -
resource yara_rule behavioral1/memory/608-74-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/608-78-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/608-80-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/608-81-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/608-82-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/608-83-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/1648-86-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1648-90-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1648-92-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1648-93-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1648-94-0x0000000000400000-0x000000000041F000-memory.dmp upx -
Loads dropped DLL 4 IoCs
pid Process 1004 8133ac485b0b77131493591ad4636a2c2414f5bcfe6d917bcd344ae1ac70c17a.exe 1004 8133ac485b0b77131493591ad4636a2c2414f5bcfe6d917bcd344ae1ac70c17a.exe 1004 8133ac485b0b77131493591ad4636a2c2414f5bcfe6d917bcd344ae1ac70c17a.exe 1004 8133ac485b0b77131493591ad4636a2c2414f5bcfe6d917bcd344ae1ac70c17a.exe -
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts RegSvcs.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce TNRFCpAx.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\3ps7rwa4zwf456 = "C:\\Users\\Admin\\3ps7rwa4zwf456\\33875.vbs" TNRFCpAx.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA TNRFCpAx.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 752 set thread context of 1508 752 TNRFCpAx.exe 29 PID 1508 set thread context of 608 1508 RegSvcs.exe 30 PID 1508 set thread context of 1648 1508 RegSvcs.exe 33 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 752 TNRFCpAx.exe 752 TNRFCpAx.exe 752 TNRFCpAx.exe 752 TNRFCpAx.exe 752 TNRFCpAx.exe 752 TNRFCpAx.exe 752 TNRFCpAx.exe 752 TNRFCpAx.exe 752 TNRFCpAx.exe 752 TNRFCpAx.exe 752 TNRFCpAx.exe 752 TNRFCpAx.exe 752 TNRFCpAx.exe 752 TNRFCpAx.exe 752 TNRFCpAx.exe 752 TNRFCpAx.exe 752 TNRFCpAx.exe 752 TNRFCpAx.exe 752 TNRFCpAx.exe 752 TNRFCpAx.exe 752 TNRFCpAx.exe 752 TNRFCpAx.exe 752 TNRFCpAx.exe 752 TNRFCpAx.exe 752 TNRFCpAx.exe 752 TNRFCpAx.exe 752 TNRFCpAx.exe 752 TNRFCpAx.exe 752 TNRFCpAx.exe 752 TNRFCpAx.exe 752 TNRFCpAx.exe 752 TNRFCpAx.exe 752 TNRFCpAx.exe 752 TNRFCpAx.exe 752 TNRFCpAx.exe 752 TNRFCpAx.exe 752 TNRFCpAx.exe 752 TNRFCpAx.exe 752 TNRFCpAx.exe 752 TNRFCpAx.exe 752 TNRFCpAx.exe 752 TNRFCpAx.exe 752 TNRFCpAx.exe 752 TNRFCpAx.exe 752 TNRFCpAx.exe 752 TNRFCpAx.exe 752 TNRFCpAx.exe 752 TNRFCpAx.exe 752 TNRFCpAx.exe 752 TNRFCpAx.exe 752 TNRFCpAx.exe 752 TNRFCpAx.exe 752 TNRFCpAx.exe 752 TNRFCpAx.exe 752 TNRFCpAx.exe 752 TNRFCpAx.exe 752 TNRFCpAx.exe 752 TNRFCpAx.exe 752 TNRFCpAx.exe 752 TNRFCpAx.exe 752 TNRFCpAx.exe 752 TNRFCpAx.exe 752 TNRFCpAx.exe 752 TNRFCpAx.exe -
Suspicious use of AdjustPrivilegeToken 49 IoCs
description pid Process Token: SeDebugPrivilege 752 TNRFCpAx.exe Token: SeDebugPrivilege 752 TNRFCpAx.exe Token: SeDebugPrivilege 752 TNRFCpAx.exe Token: SeDebugPrivilege 752 TNRFCpAx.exe Token: SeDebugPrivilege 752 TNRFCpAx.exe Token: SeDebugPrivilege 752 TNRFCpAx.exe Token: SeDebugPrivilege 752 TNRFCpAx.exe Token: SeDebugPrivilege 752 TNRFCpAx.exe Token: SeDebugPrivilege 752 TNRFCpAx.exe Token: SeDebugPrivilege 752 TNRFCpAx.exe Token: SeDebugPrivilege 752 TNRFCpAx.exe Token: SeDebugPrivilege 752 TNRFCpAx.exe Token: SeDebugPrivilege 752 TNRFCpAx.exe Token: SeDebugPrivilege 752 TNRFCpAx.exe Token: SeDebugPrivilege 752 TNRFCpAx.exe Token: SeDebugPrivilege 752 TNRFCpAx.exe Token: SeDebugPrivilege 752 TNRFCpAx.exe Token: SeDebugPrivilege 752 TNRFCpAx.exe Token: SeDebugPrivilege 752 TNRFCpAx.exe Token: SeDebugPrivilege 752 TNRFCpAx.exe Token: SeDebugPrivilege 752 TNRFCpAx.exe Token: SeDebugPrivilege 752 TNRFCpAx.exe Token: SeDebugPrivilege 752 TNRFCpAx.exe Token: SeDebugPrivilege 752 TNRFCpAx.exe Token: SeDebugPrivilege 752 TNRFCpAx.exe Token: SeDebugPrivilege 752 TNRFCpAx.exe Token: SeDebugPrivilege 752 TNRFCpAx.exe Token: SeDebugPrivilege 752 TNRFCpAx.exe Token: SeDebugPrivilege 752 TNRFCpAx.exe Token: SeDebugPrivilege 752 TNRFCpAx.exe Token: SeDebugPrivilege 752 TNRFCpAx.exe Token: SeDebugPrivilege 752 TNRFCpAx.exe Token: SeDebugPrivilege 752 TNRFCpAx.exe Token: SeDebugPrivilege 752 TNRFCpAx.exe Token: SeDebugPrivilege 752 TNRFCpAx.exe Token: SeDebugPrivilege 752 TNRFCpAx.exe Token: SeDebugPrivilege 752 TNRFCpAx.exe Token: SeDebugPrivilege 752 TNRFCpAx.exe Token: SeDebugPrivilege 752 TNRFCpAx.exe Token: SeDebugPrivilege 752 TNRFCpAx.exe Token: SeDebugPrivilege 752 TNRFCpAx.exe Token: SeDebugPrivilege 752 TNRFCpAx.exe Token: SeDebugPrivilege 752 TNRFCpAx.exe Token: SeDebugPrivilege 752 TNRFCpAx.exe Token: SeDebugPrivilege 752 TNRFCpAx.exe Token: SeDebugPrivilege 752 TNRFCpAx.exe Token: SeDebugPrivilege 752 TNRFCpAx.exe Token: SeDebugPrivilege 752 TNRFCpAx.exe Token: SeDebugPrivilege 752 TNRFCpAx.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1508 RegSvcs.exe -
Suspicious use of WriteProcessMemory 54 IoCs
description pid Process procid_target PID 1004 wrote to memory of 752 1004 8133ac485b0b77131493591ad4636a2c2414f5bcfe6d917bcd344ae1ac70c17a.exe 28 PID 1004 wrote to memory of 752 1004 8133ac485b0b77131493591ad4636a2c2414f5bcfe6d917bcd344ae1ac70c17a.exe 28 PID 1004 wrote to memory of 752 1004 8133ac485b0b77131493591ad4636a2c2414f5bcfe6d917bcd344ae1ac70c17a.exe 28 PID 1004 wrote to memory of 752 1004 8133ac485b0b77131493591ad4636a2c2414f5bcfe6d917bcd344ae1ac70c17a.exe 28 PID 1004 wrote to memory of 752 1004 8133ac485b0b77131493591ad4636a2c2414f5bcfe6d917bcd344ae1ac70c17a.exe 28 PID 1004 wrote to memory of 752 1004 8133ac485b0b77131493591ad4636a2c2414f5bcfe6d917bcd344ae1ac70c17a.exe 28 PID 1004 wrote to memory of 752 1004 8133ac485b0b77131493591ad4636a2c2414f5bcfe6d917bcd344ae1ac70c17a.exe 28 PID 752 wrote to memory of 1508 752 TNRFCpAx.exe 29 PID 752 wrote to memory of 1508 752 TNRFCpAx.exe 29 PID 752 wrote to memory of 1508 752 TNRFCpAx.exe 29 PID 752 wrote to memory of 1508 752 TNRFCpAx.exe 29 PID 752 wrote to memory of 1508 752 TNRFCpAx.exe 29 PID 752 wrote to memory of 1508 752 TNRFCpAx.exe 29 PID 752 wrote to memory of 1508 752 TNRFCpAx.exe 29 PID 752 wrote to memory of 1508 752 TNRFCpAx.exe 29 PID 752 wrote to memory of 1508 752 TNRFCpAx.exe 29 PID 1508 wrote to memory of 608 1508 RegSvcs.exe 30 PID 1508 wrote to memory of 608 1508 RegSvcs.exe 30 PID 1508 wrote to memory of 608 1508 RegSvcs.exe 30 PID 1508 wrote to memory of 608 1508 RegSvcs.exe 30 PID 1508 wrote to memory of 608 1508 RegSvcs.exe 30 PID 1508 wrote to memory of 608 1508 RegSvcs.exe 30 PID 1508 wrote to memory of 608 1508 RegSvcs.exe 30 PID 1508 wrote to memory of 608 1508 RegSvcs.exe 30 PID 1508 wrote to memory of 608 1508 RegSvcs.exe 30 PID 1508 wrote to memory of 608 1508 RegSvcs.exe 30 PID 1508 wrote to memory of 608 1508 RegSvcs.exe 30 PID 1508 wrote to memory of 608 1508 RegSvcs.exe 30 PID 1508 wrote to memory of 1648 1508 RegSvcs.exe 33 PID 1508 wrote to memory of 1648 1508 RegSvcs.exe 33 PID 1508 wrote to memory of 1648 1508 RegSvcs.exe 33 PID 1508 wrote to memory of 1648 1508 RegSvcs.exe 33 PID 1508 wrote to memory of 1648 1508 RegSvcs.exe 33 PID 1508 wrote to memory of 1648 1508 RegSvcs.exe 33 PID 1508 wrote to memory of 1648 1508 RegSvcs.exe 33 PID 1508 wrote to memory of 1648 1508 RegSvcs.exe 33 PID 1508 wrote to memory of 1648 1508 RegSvcs.exe 33 PID 1508 wrote to memory of 1648 1508 RegSvcs.exe 33 PID 1508 wrote to memory of 1648 1508 RegSvcs.exe 33 PID 1508 wrote to memory of 1648 1508 RegSvcs.exe 33 PID 752 wrote to memory of 564 752 TNRFCpAx.exe 34 PID 752 wrote to memory of 564 752 TNRFCpAx.exe 34 PID 752 wrote to memory of 564 752 TNRFCpAx.exe 34 PID 752 wrote to memory of 564 752 TNRFCpAx.exe 34 PID 752 wrote to memory of 564 752 TNRFCpAx.exe 34 PID 752 wrote to memory of 564 752 TNRFCpAx.exe 34 PID 752 wrote to memory of 564 752 TNRFCpAx.exe 34 PID 752 wrote to memory of 1368 752 TNRFCpAx.exe 35 PID 752 wrote to memory of 1368 752 TNRFCpAx.exe 35 PID 752 wrote to memory of 1368 752 TNRFCpAx.exe 35 PID 752 wrote to memory of 1368 752 TNRFCpAx.exe 35 PID 752 wrote to memory of 1368 752 TNRFCpAx.exe 35 PID 752 wrote to memory of 1368 752 TNRFCpAx.exe 35 PID 752 wrote to memory of 1368 752 TNRFCpAx.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\8133ac485b0b77131493591ad4636a2c2414f5bcfe6d917bcd344ae1ac70c17a.exe"C:\Users\Admin\AppData\Local\Temp\8133ac485b0b77131493591ad4636a2c2414f5bcfe6d917bcd344ae1ac70c17a.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1004 -
C:\Users\Admin\3ps7rwa4zwf456\TNRFCpAx.exe"C:\Users\Admin\3ps7rwa4zwf456\TNRFCpAx.exe" XarYxpEoyJ.CQK2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe/scomma "C:\Users\Admin\AppData\Local\Temp\ADq3qD1KvS.ini"4⤵PID:608
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe/scomma "C:\Users\Admin\AppData\Local\Temp\az5ok0fNR6.ini"4⤵
- Accesses Microsoft Outlook accounts
PID:1648
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\3PS7RW~1\run.vbs"3⤵PID:564
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\3PS7RW~1\run.vbs"3⤵PID:1368
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
260KB
MD5ad30e95fa8c6bf98548540b405c70e55
SHA1db9c0c44ba0fc5fe57bfa88c9dad759fc73ec02d
SHA256ce7f8806461396d880cc640d4ffe809003d47b9dbe3c9f39ee9f0406aadc9b26
SHA512d8d6de5baa325e87cf325ff17243cac07618329338d57be57d64076a95645c0ec9265568d53043df751c14a7107c7e144a9db1fc7db61904a56d9e8ea2f4371e
-
Filesize
203B
MD566bded59cc9ee1febd473f8b7777cc4f
SHA11d53b1c5f29a16f110edb65f1de9b2045efcbec2
SHA256cfee2deff57e7ee1d086c673cad28a38a3e8ac20c73b001b501c8ce53cc413f0
SHA5123241055681a4c5b91f10ca7dd47144ddc1a7b2142110686cdc1e3cb950a3a6229266e4a444d5c00a845e6c655a234b0dcd664cd4b309b1ed70ed51929ec27119
-
Filesize
95B
MD54f34f3e4169e14bf98aaa33a5d2ddfb3
SHA13a62ecbce07144ea2cfce90e5daa77f2d3158505
SHA256c541b6af6dd1330539c8f97e6e4c0dbc37bc85baa1bfa5094648a370bae61b85
SHA512488a0a2dc763f42ece77b3c6aa513b2933a1ceb93889d0f603fd552267869baff2692813e43e61c6277f09fc9f51d93e162f50cf9f1cc2e7fd6644c5d76b9408
-
Filesize
915KB
MD5e01ced5c12390ff5256694eda890b33a
SHA10bb74a9d3154d1269e5e456aa41e94b60f753f78
SHA25666c1f3e71685f81f836e29e77844c737ceaa47ff787d6b233b05166973fa73ba
SHA51293a35ef3749826c1256c4de0fffe099374dbc5cd3d8eccf22690cf2a4c7e63b508ddbe4e412758a84f9c6e9478b5173a6cf93606779af18542d5a2937183219d
-
Filesize
35.3MB
MD58f78285e5f584a9b613a368eb48edeaa
SHA1d5dd45fad71be65a0321fa4fe5e12c0776daa5c7
SHA2562681dfee81b7024cc64940f458e524e3d9f8235b540f8ff5d8a882986013a076
SHA51277937b61e6c6f89a014e05b3754443f5e074ec38d1a4a183100334d777f549cfae4c1e0d8c08fe72aa28c2706680e50556f2463ee185eaf8ecaf4ee1d33ca60c
-
Filesize
5B
MD5d1ea279fb5559c020a1b4137dc4de237
SHA1db6f8988af46b56216a6f0daf95ab8c9bdb57400
SHA256fcdcc2c46896915a1c695d6231f0fee336a668531b7a3da46178c80362546dba
SHA512720e9c284f0559015312df7fe977563e5e16f48d3506e51eb4016adf7971924d352f740b030aa3adc81b6f65fd1dba12df06d10fa6c115074e5097e7ee0f08b3
-
Filesize
915KB
MD5e01ced5c12390ff5256694eda890b33a
SHA10bb74a9d3154d1269e5e456aa41e94b60f753f78
SHA25666c1f3e71685f81f836e29e77844c737ceaa47ff787d6b233b05166973fa73ba
SHA51293a35ef3749826c1256c4de0fffe099374dbc5cd3d8eccf22690cf2a4c7e63b508ddbe4e412758a84f9c6e9478b5173a6cf93606779af18542d5a2937183219d
-
Filesize
915KB
MD5e01ced5c12390ff5256694eda890b33a
SHA10bb74a9d3154d1269e5e456aa41e94b60f753f78
SHA25666c1f3e71685f81f836e29e77844c737ceaa47ff787d6b233b05166973fa73ba
SHA51293a35ef3749826c1256c4de0fffe099374dbc5cd3d8eccf22690cf2a4c7e63b508ddbe4e412758a84f9c6e9478b5173a6cf93606779af18542d5a2937183219d
-
Filesize
915KB
MD5e01ced5c12390ff5256694eda890b33a
SHA10bb74a9d3154d1269e5e456aa41e94b60f753f78
SHA25666c1f3e71685f81f836e29e77844c737ceaa47ff787d6b233b05166973fa73ba
SHA51293a35ef3749826c1256c4de0fffe099374dbc5cd3d8eccf22690cf2a4c7e63b508ddbe4e412758a84f9c6e9478b5173a6cf93606779af18542d5a2937183219d
-
Filesize
915KB
MD5e01ced5c12390ff5256694eda890b33a
SHA10bb74a9d3154d1269e5e456aa41e94b60f753f78
SHA25666c1f3e71685f81f836e29e77844c737ceaa47ff787d6b233b05166973fa73ba
SHA51293a35ef3749826c1256c4de0fffe099374dbc5cd3d8eccf22690cf2a4c7e63b508ddbe4e412758a84f9c6e9478b5173a6cf93606779af18542d5a2937183219d