Analysis
-
max time kernel
105s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30-10-2022 07:47
Static task
static1
Behavioral task
behavioral1
Sample
TT Copy.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
TT Copy.exe
Resource
win10v2004-20220812-en
General
-
Target
TT Copy.exe
-
Size
882KB
-
MD5
b6de2482b98fce903d3692d9c0160ef2
-
SHA1
53d6ffc6c70417c12c67108e68a068d01dc31065
-
SHA256
2c34e7bd53c5880be9898396ead603f70536254c468584b500d8a2e8acf44393
-
SHA512
03fbba2e5e174f105ef70e53824c2a18fc82c49ce7469929a6904be3b98fd151e1c9587a429bb5ba42e4abd50515bdaf7aeb1c495db79e50f8e42328770e44bc
-
SSDEEP
12288:itdhEsXr70C7yHybdfMoclgKYEu9dbJE8arAVycIjtx9RwJ01WPbU7NI51u/33E0:+dh1797tR2gKU68alckZQ9z1Cwolt5
Malware Config
Signatures
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload 2 IoCs
resource yara_rule behavioral2/memory/444-145-0x0000000000400000-0x0000000000442000-memory.dmp family_isrstealer behavioral2/memory/444-146-0x0000000000400000-0x0000000000442000-memory.dmp family_isrstealer -
NirSoft MailPassView 2 IoCs
Password recovery tool for various email clients
resource yara_rule behavioral2/memory/3424-155-0x0000000000400000-0x000000000041F000-memory.dmp MailPassView behavioral2/memory/3424-156-0x0000000000400000-0x000000000041F000-memory.dmp MailPassView -
Nirsoft 2 IoCs
resource yara_rule behavioral2/memory/3424-155-0x0000000000400000-0x000000000041F000-memory.dmp Nirsoft behavioral2/memory/3424-156-0x0000000000400000-0x000000000041F000-memory.dmp Nirsoft -
Executes dropped EXE 2 IoCs
pid Process 1956 AutoIt3-4079.exe 1636 AutoIt3-4079.exe -
resource yara_rule behavioral2/memory/3424-152-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3424-154-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3424-155-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3424-156-0x0000000000400000-0x000000000041F000-memory.dmp upx -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation TT Copy.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation WScript.exe -
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts RegSvcs.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1636 set thread context of 444 1636 AutoIt3-4079.exe 85 PID 444 set thread context of 4720 444 RegSvcs.exe 86 PID 444 set thread context of 3424 444 RegSvcs.exe 90 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 2244 4720 WerFault.exe 86 -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings TT Copy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 444 RegSvcs.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 4496 wrote to memory of 2768 4496 TT Copy.exe 82 PID 4496 wrote to memory of 2768 4496 TT Copy.exe 82 PID 4496 wrote to memory of 2768 4496 TT Copy.exe 82 PID 2768 wrote to memory of 1956 2768 WScript.exe 83 PID 2768 wrote to memory of 1956 2768 WScript.exe 83 PID 2768 wrote to memory of 1956 2768 WScript.exe 83 PID 1956 wrote to memory of 1636 1956 AutoIt3-4079.exe 84 PID 1956 wrote to memory of 1636 1956 AutoIt3-4079.exe 84 PID 1956 wrote to memory of 1636 1956 AutoIt3-4079.exe 84 PID 1636 wrote to memory of 444 1636 AutoIt3-4079.exe 85 PID 1636 wrote to memory of 444 1636 AutoIt3-4079.exe 85 PID 1636 wrote to memory of 444 1636 AutoIt3-4079.exe 85 PID 1636 wrote to memory of 444 1636 AutoIt3-4079.exe 85 PID 1636 wrote to memory of 444 1636 AutoIt3-4079.exe 85 PID 444 wrote to memory of 4720 444 RegSvcs.exe 86 PID 444 wrote to memory of 4720 444 RegSvcs.exe 86 PID 444 wrote to memory of 4720 444 RegSvcs.exe 86 PID 444 wrote to memory of 4720 444 RegSvcs.exe 86 PID 444 wrote to memory of 4720 444 RegSvcs.exe 86 PID 444 wrote to memory of 4720 444 RegSvcs.exe 86 PID 444 wrote to memory of 4720 444 RegSvcs.exe 86 PID 444 wrote to memory of 4720 444 RegSvcs.exe 86 PID 444 wrote to memory of 3424 444 RegSvcs.exe 90 PID 444 wrote to memory of 3424 444 RegSvcs.exe 90 PID 444 wrote to memory of 3424 444 RegSvcs.exe 90 PID 444 wrote to memory of 3424 444 RegSvcs.exe 90 PID 444 wrote to memory of 3424 444 RegSvcs.exe 90 PID 444 wrote to memory of 3424 444 RegSvcs.exe 90 PID 444 wrote to memory of 3424 444 RegSvcs.exe 90 PID 444 wrote to memory of 3424 444 RegSvcs.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\TT Copy.exe"C:\Users\Admin\AppData\Local\Temp\TT Copy.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\CNHRO\run.vbs"2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Users\Admin\CNHRO\AutoIt3-4079.exe"C:\Users\Admin\CNHRO\AutoIt3-4079.exe" 318196.dat3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Users\Admin\CNHRO\AutoIt3-4079.exeAutoIt3-4079.exe QCLVVEIO.dat4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"5⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:444 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe/scomma "C:\Users\Admin\AppData\Local\Temp\GlnXRFSI6k.ini"6⤵PID:4720
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4720 -s 807⤵
- Program crash
PID:2244
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe/scomma "C:\Users\Admin\AppData\Local\Temp\L24XZdfmyH.ini"6⤵
- Accesses Microsoft Outlook accounts
PID:3424
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4720 -ip 47201⤵PID:4068
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD5a2cd599138665c5e9ee496357bd2e58a
SHA1647cbf3d81d594590efe03fbf60f7eda05c2fa2f
SHA256aeeb66086166d68c9e2d08bfdcbd5c32c1566f4019efd1a530121585c3c0f168
SHA512eef51998dec27418df9ada527914d823d047a88cd3b066f94ebe3adb008889d7ca75e54cdce28fbdf1d775873b61f26b05ee57bf9da80e0d7be375ba0309e4a2
-
Filesize
260KB
MD5093c324e68cbb8bc44b9e6a4e8c4cf6c
SHA1e127e98a51538420dd823d726ee143584cf0aca7
SHA256eedc0bd0c5fdab6cca78ddfc9c081076dbb09f4408a1604d2af0d7912cf88f05
SHA512c74eb71ba0e098059fa14c37dacbb425c44b500b0418aebd1803aef5f2cbc85015b969354c8c6a0e74eb8131f03a7600306bec4abf7cf9d55e676236736bf29a
-
Filesize
25KB
MD55ee5144e5ed4b5866efc1154509a8934
SHA13eca43cd0c8bba3c4599b738bdbbb20f89439b49
SHA256fe717269010d36f1b69d0689841eabc301cc18da6921d2eef8221b63f3733e43
SHA51242099be5a9740947ee19252d09fa493e34b0cbdbc266be93fecbbb0c034f2a32cca7cb0cbb126949b8deb469c8bb31f448a8987d86bfc3fb1702a90f0585bb93
-
Filesize
732KB
MD571d8f6d5dc35517275bc38ebcc815f9f
SHA1cae4e8c730de5a01d30aabeb3e5cb2136090ed8d
SHA256fb73a819b37523126c7708a1d06f3b8825fa60c926154ab2d511ba668f49dc4b
SHA5124826f45000ea50d9044e3ef11e83426281fbd5f3f5a25f9786c2e487b4cf26b04f6f900ca6e70440644c9d75f700a4c908ab6f398f59c65ee1bff85dfef4ce59
-
Filesize
732KB
MD571d8f6d5dc35517275bc38ebcc815f9f
SHA1cae4e8c730de5a01d30aabeb3e5cb2136090ed8d
SHA256fb73a819b37523126c7708a1d06f3b8825fa60c926154ab2d511ba668f49dc4b
SHA5124826f45000ea50d9044e3ef11e83426281fbd5f3f5a25f9786c2e487b4cf26b04f6f900ca6e70440644c9d75f700a4c908ab6f398f59c65ee1bff85dfef4ce59
-
Filesize
732KB
MD571d8f6d5dc35517275bc38ebcc815f9f
SHA1cae4e8c730de5a01d30aabeb3e5cb2136090ed8d
SHA256fb73a819b37523126c7708a1d06f3b8825fa60c926154ab2d511ba668f49dc4b
SHA5124826f45000ea50d9044e3ef11e83426281fbd5f3f5a25f9786c2e487b4cf26b04f6f900ca6e70440644c9d75f700a4c908ab6f398f59c65ee1bff85dfef4ce59
-
Filesize
25KB
MD5327d7da1fb77f05b9ec59f08df90d6d0
SHA163b5c37aef582bd320d33e33f4bb69716b5fdca5
SHA256562fd103d177f14a973a23cc07dc679b008b80f933059b9c6ea6466a2bca2ebb
SHA512296b210dda77360c1edfc08c8bdcc8098febb2454a6e8f58e36214ba6d8aaa1e22e31c1ca5c0eca45041383743d2fbc9fb536f1dc28a015509e73a9d745b5377
-
Filesize
63B
MD5dbd84a94ae505a5ece3108a6de53161e
SHA1a3f2a48b67de94d7a49ac9ef3dd23d1c1d3df4ce
SHA256d0500f159f93f27b4f39c57eed8bb076d3906f6d7bbc8ad7082c801b3b24d168
SHA512c4fc9c48570cfcf4a4f088513076c0934abd1738139e5f441f48df481f98fd5f4fb1dfa4557f6a0851e6c52b6e57d70248650593d78460202f5bbbcbf767274a
-
Filesize
103B
MD5ee3d0f1203aad6c23f80ec36ea3696d3
SHA143bac47bd25876670f66f7f52ff1540165bef95a
SHA25644a4dbdce6ba9d5caa4794ce67e7a9f6813c9d8486fe9b06495b33459b7cd17b
SHA51282b08bfccb0a16c00f5071a77a0a930fcab35c98cb661762d851c8825ca96fbb7f1904a74f878d1720787754b20b4d04c02597a9b8f70790e39dcb8843f3c25f