Analysis
-
max time kernel
150s -
max time network
162s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19-11-2022 08:43
Static task
static1
Behavioral task
behavioral1
Sample
61eea36a4fe7a62d5e6c371d13c835f00ed1f96b9237b52f39be66707b558b48.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
61eea36a4fe7a62d5e6c371d13c835f00ed1f96b9237b52f39be66707b558b48.exe
Resource
win10v2004-20221111-en
General
-
Target
61eea36a4fe7a62d5e6c371d13c835f00ed1f96b9237b52f39be66707b558b48.exe
-
Size
939KB
-
MD5
4325caea282be99b605e26754c406830
-
SHA1
a0c95de32751cd5a4defb993a5f556f3544cb7e4
-
SHA256
61eea36a4fe7a62d5e6c371d13c835f00ed1f96b9237b52f39be66707b558b48
-
SHA512
19ab4631739af22256f00d3320dac7d864c68070c695788aeb419952c16af6a25daf40eaa060f1d0dee7df4f00e16a82e3b372e6adeaed98800b8ec50517a17b
-
SSDEEP
12288:NjYlUdVCU5S41Yd2Z+pW/qF9vUi/zr4e56K0AbDcZ2yGTNGNPG8OcXDyHVZgPKpv:jVG46PFFNnH4NPucYNaPVWVZXp/
Malware Config
Extracted
nanocore
1.2.2.0
aje.ddns.net:9991
d86cd23e-85c5-4bd1-aecb-b7be43080c66
-
activate_away_mode
true
-
backup_connection_host
aje.ddns.net
- backup_dns_server
-
buffer_size
65535
-
build_time
2015-03-10T13:36:53.354214636Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
true
-
clear_zone_identifier
true
-
connect_delay
4000
-
connection_port
9991
-
default_group
MILLI
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
d86cd23e-85c5-4bd1-aecb-b7be43080c66
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
aje.ddns.net
- primary_dns_server
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
true
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Signatures
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload 6 IoCs
resource yara_rule behavioral1/memory/1712-64-0x0000000000400000-0x0000000000442000-memory.dmp family_isrstealer behavioral1/memory/1712-66-0x0000000000400000-0x0000000000442000-memory.dmp family_isrstealer behavioral1/memory/1712-67-0x0000000000401180-mapping.dmp family_isrstealer behavioral1/memory/1712-77-0x0000000000400000-0x0000000000442000-memory.dmp family_isrstealer behavioral1/memory/1712-107-0x0000000000400000-0x0000000000442000-memory.dmp family_isrstealer behavioral1/memory/1712-117-0x0000000000400000-0x0000000000442000-memory.dmp family_isrstealer -
NirSoft MailPassView 2 IoCs
Password recovery tool for various email clients
resource yara_rule behavioral1/memory/628-113-0x0000000000400000-0x000000000041F000-memory.dmp MailPassView behavioral1/memory/628-114-0x0000000000400000-0x000000000041F000-memory.dmp MailPassView -
Nirsoft 2 IoCs
resource yara_rule behavioral1/memory/628-113-0x0000000000400000-0x000000000041F000-memory.dmp Nirsoft behavioral1/memory/628-114-0x0000000000400000-0x000000000041F000-memory.dmp Nirsoft -
Executes dropped EXE 3 IoCs
pid Process 1608 DOC.exe 1036 DOC.exe 848 NcbService.exe -
resource yara_rule behavioral1/memory/1012-72-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/1012-76-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/1012-78-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/1012-80-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/1012-104-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/628-108-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/628-112-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/628-113-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/628-114-0x0000000000400000-0x000000000041F000-memory.dmp upx -
Loads dropped DLL 2 IoCs
pid Process 1940 61eea36a4fe7a62d5e6c371d13c835f00ed1f96b9237b52f39be66707b558b48.exe 1608 DOC.exe -
Uses the VBS compiler for execution 1 TTPs
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts vbc.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\Load = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\NcbService.exe" NcbService.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA DOC.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1940 set thread context of 1712 1940 61eea36a4fe7a62d5e6c371d13c835f00ed1f96b9237b52f39be66707b558b48.exe 28 PID 1712 set thread context of 1012 1712 vbc.exe 29 PID 1608 set thread context of 1036 1608 DOC.exe 31 PID 1712 set thread context of 628 1712 vbc.exe 35 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1608 DOC.exe 848 NcbService.exe 1036 DOC.exe 1036 DOC.exe 1036 DOC.exe 1608 DOC.exe 848 NcbService.exe 1608 DOC.exe 848 NcbService.exe 1608 DOC.exe 848 NcbService.exe 1608 DOC.exe 848 NcbService.exe 1608 DOC.exe 848 NcbService.exe 1608 DOC.exe 848 NcbService.exe 1608 DOC.exe 848 NcbService.exe 1608 DOC.exe 848 NcbService.exe 1608 DOC.exe 848 NcbService.exe 1608 DOC.exe 848 NcbService.exe 1608 DOC.exe 848 NcbService.exe 1608 DOC.exe 848 NcbService.exe 1608 DOC.exe 848 NcbService.exe 1608 DOC.exe 848 NcbService.exe 1608 DOC.exe 848 NcbService.exe 1608 DOC.exe 848 NcbService.exe 1608 DOC.exe 848 NcbService.exe 1608 DOC.exe 848 NcbService.exe 1608 DOC.exe 848 NcbService.exe 1608 DOC.exe 848 NcbService.exe 1608 DOC.exe 848 NcbService.exe 1608 DOC.exe 848 NcbService.exe 1608 DOC.exe 848 NcbService.exe 1608 DOC.exe 848 NcbService.exe 1608 DOC.exe 848 NcbService.exe 1608 DOC.exe 848 NcbService.exe 1608 DOC.exe 848 NcbService.exe 1608 DOC.exe 848 NcbService.exe 1608 DOC.exe 848 NcbService.exe 1608 DOC.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1036 DOC.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1940 61eea36a4fe7a62d5e6c371d13c835f00ed1f96b9237b52f39be66707b558b48.exe Token: SeDebugPrivilege 1608 DOC.exe Token: SeDebugPrivilege 848 NcbService.exe Token: SeDebugPrivilege 1036 DOC.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1712 vbc.exe -
Suspicious use of WriteProcessMemory 43 IoCs
description pid Process procid_target PID 1940 wrote to memory of 1608 1940 61eea36a4fe7a62d5e6c371d13c835f00ed1f96b9237b52f39be66707b558b48.exe 27 PID 1940 wrote to memory of 1608 1940 61eea36a4fe7a62d5e6c371d13c835f00ed1f96b9237b52f39be66707b558b48.exe 27 PID 1940 wrote to memory of 1608 1940 61eea36a4fe7a62d5e6c371d13c835f00ed1f96b9237b52f39be66707b558b48.exe 27 PID 1940 wrote to memory of 1608 1940 61eea36a4fe7a62d5e6c371d13c835f00ed1f96b9237b52f39be66707b558b48.exe 27 PID 1940 wrote to memory of 1712 1940 61eea36a4fe7a62d5e6c371d13c835f00ed1f96b9237b52f39be66707b558b48.exe 28 PID 1940 wrote to memory of 1712 1940 61eea36a4fe7a62d5e6c371d13c835f00ed1f96b9237b52f39be66707b558b48.exe 28 PID 1940 wrote to memory of 1712 1940 61eea36a4fe7a62d5e6c371d13c835f00ed1f96b9237b52f39be66707b558b48.exe 28 PID 1940 wrote to memory of 1712 1940 61eea36a4fe7a62d5e6c371d13c835f00ed1f96b9237b52f39be66707b558b48.exe 28 PID 1940 wrote to memory of 1712 1940 61eea36a4fe7a62d5e6c371d13c835f00ed1f96b9237b52f39be66707b558b48.exe 28 PID 1940 wrote to memory of 1712 1940 61eea36a4fe7a62d5e6c371d13c835f00ed1f96b9237b52f39be66707b558b48.exe 28 PID 1940 wrote to memory of 1712 1940 61eea36a4fe7a62d5e6c371d13c835f00ed1f96b9237b52f39be66707b558b48.exe 28 PID 1940 wrote to memory of 1712 1940 61eea36a4fe7a62d5e6c371d13c835f00ed1f96b9237b52f39be66707b558b48.exe 28 PID 1712 wrote to memory of 1012 1712 vbc.exe 29 PID 1712 wrote to memory of 1012 1712 vbc.exe 29 PID 1712 wrote to memory of 1012 1712 vbc.exe 29 PID 1712 wrote to memory of 1012 1712 vbc.exe 29 PID 1712 wrote to memory of 1012 1712 vbc.exe 29 PID 1712 wrote to memory of 1012 1712 vbc.exe 29 PID 1712 wrote to memory of 1012 1712 vbc.exe 29 PID 1712 wrote to memory of 1012 1712 vbc.exe 29 PID 1712 wrote to memory of 1012 1712 vbc.exe 29 PID 1608 wrote to memory of 1036 1608 DOC.exe 31 PID 1608 wrote to memory of 1036 1608 DOC.exe 31 PID 1608 wrote to memory of 1036 1608 DOC.exe 31 PID 1608 wrote to memory of 1036 1608 DOC.exe 31 PID 1608 wrote to memory of 1036 1608 DOC.exe 31 PID 1608 wrote to memory of 1036 1608 DOC.exe 31 PID 1608 wrote to memory of 1036 1608 DOC.exe 31 PID 1608 wrote to memory of 1036 1608 DOC.exe 31 PID 1608 wrote to memory of 1036 1608 DOC.exe 31 PID 1608 wrote to memory of 848 1608 DOC.exe 32 PID 1608 wrote to memory of 848 1608 DOC.exe 32 PID 1608 wrote to memory of 848 1608 DOC.exe 32 PID 1608 wrote to memory of 848 1608 DOC.exe 32 PID 1712 wrote to memory of 628 1712 vbc.exe 35 PID 1712 wrote to memory of 628 1712 vbc.exe 35 PID 1712 wrote to memory of 628 1712 vbc.exe 35 PID 1712 wrote to memory of 628 1712 vbc.exe 35 PID 1712 wrote to memory of 628 1712 vbc.exe 35 PID 1712 wrote to memory of 628 1712 vbc.exe 35 PID 1712 wrote to memory of 628 1712 vbc.exe 35 PID 1712 wrote to memory of 628 1712 vbc.exe 35 PID 1712 wrote to memory of 628 1712 vbc.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\61eea36a4fe7a62d5e6c371d13c835f00ed1f96b9237b52f39be66707b558b48.exe"C:\Users\Admin\AppData\Local\Temp\61eea36a4fe7a62d5e6c371d13c835f00ed1f96b9237b52f39be66707b558b48.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Users\Admin\Desktop\DOC.exe"C:\Users\Admin\Desktop\DOC.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Users\Admin\Desktop\DOC.exe"C:\Users\Admin\Desktop\DOC.exe"3⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:1036
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\NcbService.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\NcbService.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:848
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe/scomma "C:\Users\Admin\AppData\Local\Temp\s73i1EOzdM.ini"3⤵PID:1012
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe/scomma "C:\Users\Admin\AppData\Local\Temp\p0mVQjFMES.ini"3⤵
- Accesses Microsoft Outlook accounts
PID:628
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5B
MD5d1ea279fb5559c020a1b4137dc4de237
SHA1db6f8988af46b56216a6f0daf95ab8c9bdb57400
SHA256fcdcc2c46896915a1c695d6231f0fee336a668531b7a3da46178c80362546dba
SHA512720e9c284f0559015312df7fe977563e5e16f48d3506e51eb4016adf7971924d352f740b030aa3adc81b6f65fd1dba12df06d10fa6c115074e5097e7ee0f08b3
-
Filesize
939KB
MD54325caea282be99b605e26754c406830
SHA1a0c95de32751cd5a4defb993a5f556f3544cb7e4
SHA25661eea36a4fe7a62d5e6c371d13c835f00ed1f96b9237b52f39be66707b558b48
SHA51219ab4631739af22256f00d3320dac7d864c68070c695788aeb419952c16af6a25daf40eaa060f1d0dee7df4f00e16a82e3b372e6adeaed98800b8ec50517a17b
-
Filesize
9KB
MD548628262e75352bc581317d1a6c3a96d
SHA1fb09a89eb6e51aac584b3866f6be347e32c8651e
SHA256572f5216d3428ab7bdceb4761d7144bf9754f0b37dcad1f5c649b7220d464da8
SHA5124278fb2ce5523e2cc791c775886c8b0c0ed2417bb12f55445f61cd6520559ba2a929009b591aaafdb207e340bc63fecd8b33c10fe30f2d14d48e4c655f82aaf8
-
Filesize
9KB
MD548628262e75352bc581317d1a6c3a96d
SHA1fb09a89eb6e51aac584b3866f6be347e32c8651e
SHA256572f5216d3428ab7bdceb4761d7144bf9754f0b37dcad1f5c649b7220d464da8
SHA5124278fb2ce5523e2cc791c775886c8b0c0ed2417bb12f55445f61cd6520559ba2a929009b591aaafdb207e340bc63fecd8b33c10fe30f2d14d48e4c655f82aaf8
-
Filesize
9KB
MD548628262e75352bc581317d1a6c3a96d
SHA1fb09a89eb6e51aac584b3866f6be347e32c8651e
SHA256572f5216d3428ab7bdceb4761d7144bf9754f0b37dcad1f5c649b7220d464da8
SHA5124278fb2ce5523e2cc791c775886c8b0c0ed2417bb12f55445f61cd6520559ba2a929009b591aaafdb207e340bc63fecd8b33c10fe30f2d14d48e4c655f82aaf8
-
Filesize
432KB
MD5f911d515cab24e5e3301a82d4b380054
SHA1c0bf9ca5fb68b2fe480d79c1f7df661911a6a40c
SHA2561850c85ee0a0adc587166ec9e41d01bc0363f4442c0c1e99ebe553b091dccc4f
SHA51289ba790e8e79d0b484f1f8f425986497cac8756da752e25cbed9bceeb4dc8dd4e9f94593e00fb3dfb26b4330830d07fc3db3d7cc6c2a0ece44144da0a3ef5a88
-
Filesize
432KB
MD5f911d515cab24e5e3301a82d4b380054
SHA1c0bf9ca5fb68b2fe480d79c1f7df661911a6a40c
SHA2561850c85ee0a0adc587166ec9e41d01bc0363f4442c0c1e99ebe553b091dccc4f
SHA51289ba790e8e79d0b484f1f8f425986497cac8756da752e25cbed9bceeb4dc8dd4e9f94593e00fb3dfb26b4330830d07fc3db3d7cc6c2a0ece44144da0a3ef5a88
-
Filesize
432KB
MD5f911d515cab24e5e3301a82d4b380054
SHA1c0bf9ca5fb68b2fe480d79c1f7df661911a6a40c
SHA2561850c85ee0a0adc587166ec9e41d01bc0363f4442c0c1e99ebe553b091dccc4f
SHA51289ba790e8e79d0b484f1f8f425986497cac8756da752e25cbed9bceeb4dc8dd4e9f94593e00fb3dfb26b4330830d07fc3db3d7cc6c2a0ece44144da0a3ef5a88
-
Filesize
9KB
MD548628262e75352bc581317d1a6c3a96d
SHA1fb09a89eb6e51aac584b3866f6be347e32c8651e
SHA256572f5216d3428ab7bdceb4761d7144bf9754f0b37dcad1f5c649b7220d464da8
SHA5124278fb2ce5523e2cc791c775886c8b0c0ed2417bb12f55445f61cd6520559ba2a929009b591aaafdb207e340bc63fecd8b33c10fe30f2d14d48e4c655f82aaf8
-
Filesize
432KB
MD5f911d515cab24e5e3301a82d4b380054
SHA1c0bf9ca5fb68b2fe480d79c1f7df661911a6a40c
SHA2561850c85ee0a0adc587166ec9e41d01bc0363f4442c0c1e99ebe553b091dccc4f
SHA51289ba790e8e79d0b484f1f8f425986497cac8756da752e25cbed9bceeb4dc8dd4e9f94593e00fb3dfb26b4330830d07fc3db3d7cc6c2a0ece44144da0a3ef5a88