Analysis
-
max time kernel
40s -
max time network
43s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
21-11-2022 23:29
Static task
static1
Behavioral task
behavioral1
Sample
bb9e8fb1a954a00fffa3c29dca8807d09e6c31a44d597e3d278ad98d0ed4b80b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bb9e8fb1a954a00fffa3c29dca8807d09e6c31a44d597e3d278ad98d0ed4b80b.exe
Resource
win10v2004-20221111-en
General
-
Target
bb9e8fb1a954a00fffa3c29dca8807d09e6c31a44d597e3d278ad98d0ed4b80b.exe
-
Size
352KB
-
MD5
c8c6cdeaea4f3940144b5e2fb282f234
-
SHA1
37afce95c7db06c3d13c80a826bcf53be566f030
-
SHA256
bb9e8fb1a954a00fffa3c29dca8807d09e6c31a44d597e3d278ad98d0ed4b80b
-
SHA512
54dd1f2bf8d5db6b14ab6daa19125515ff663623300c5a8c815538c761249a190f4c14b589b227d21313516c263f949a525771ebfe6fd1268ab643ce718cf7a5
-
SSDEEP
6144:gAsItRdQwMQvw0TLtSv1zzM69R27oQ+O15i+S+BsA9vOD/3xHRJ:gNI/+wNltSb9R28QH15J/m73xxJ
Malware Config
Signatures
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload 11 IoCs
resource yara_rule behavioral1/memory/1684-65-0x0000000000400000-0x0000000000442000-memory.dmp family_isrstealer behavioral1/memory/1684-69-0x0000000000400000-0x0000000000442000-memory.dmp family_isrstealer behavioral1/memory/1684-71-0x0000000000401180-mapping.dmp family_isrstealer behavioral1/memory/948-84-0x0000000000401180-mapping.dmp family_isrstealer behavioral1/memory/1584-97-0x0000000000401180-mapping.dmp family_isrstealer behavioral1/memory/800-110-0x0000000000401180-mapping.dmp family_isrstealer behavioral1/memory/2004-123-0x0000000000401180-mapping.dmp family_isrstealer behavioral1/memory/1492-136-0x0000000000401180-mapping.dmp family_isrstealer behavioral1/memory/564-149-0x0000000000401180-mapping.dmp family_isrstealer behavioral1/memory/632-162-0x0000000000401180-mapping.dmp family_isrstealer behavioral1/memory/1872-175-0x0000000000401180-mapping.dmp family_isrstealer -
Executes dropped EXE 10 IoCs
pid Process 1168 winlogon.exe 1684 winlogon.exe 948 winlogon.exe 1584 winlogon.exe 800 winlogon.exe 2004 winlogon.exe 1492 winlogon.exe 564 winlogon.exe 632 winlogon.exe 1872 winlogon.exe -
Adds Run key to start application 2 TTPs 20 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\Winlogon = "C:\\Users\\Admin\\AppData\\Roaming\\SubFolder\\SubFolder\\winlogon.exe" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\Winlogon = "C:\\Users\\Admin\\AppData\\Roaming\\SubFolder\\SubFolder\\winlogon.exe" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\Winlogon = "C:\\Users\\Admin\\AppData\\Roaming\\SubFolder\\SubFolder\\winlogon.exe" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Winlogon = "C:\\Users\\Admin\\AppData\\Roaming\\SubFolder\\SubFolder\\winlogon.exe" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\Winlogon = "C:\\Users\\Admin\\AppData\\Roaming\\SubFolder\\SubFolder\\winlogon.exe" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\Winlogon = "C:\\Users\\Admin\\AppData\\Roaming\\SubFolder\\SubFolder\\winlogon.exe" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Winlogon = "C:\\Users\\Admin\\AppData\\Roaming\\SubFolder\\SubFolder\\winlogon.exe" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Winlogon = "C:\\Users\\Admin\\AppData\\Roaming\\SubFolder\\SubFolder\\winlogon.exe" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Winlogon = "C:\\Users\\Admin\\AppData\\Roaming\\SubFolder\\SubFolder\\winlogon.exe" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\Winlogon = "C:\\Users\\Admin\\AppData\\Roaming\\SubFolder\\SubFolder\\winlogon.exe" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Winlogon = "C:\\Users\\Admin\\AppData\\Roaming\\SubFolder\\SubFolder\\winlogon.exe" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Winlogon = "C:\\Users\\Admin\\AppData\\Roaming\\SubFolder\\SubFolder\\winlogon.exe" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\Winlogon = "C:\\Users\\Admin\\AppData\\Roaming\\SubFolder\\SubFolder\\winlogon.exe" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\Winlogon = "C:\\Users\\Admin\\AppData\\Roaming\\SubFolder\\SubFolder\\winlogon.exe" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Winlogon = "C:\\Users\\Admin\\AppData\\Roaming\\SubFolder\\SubFolder\\winlogon.exe" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\Winlogon = "C:\\Users\\Admin\\AppData\\Roaming\\SubFolder\\SubFolder\\winlogon.exe" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Winlogon = "C:\\Users\\Admin\\AppData\\Roaming\\SubFolder\\SubFolder\\winlogon.exe" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Winlogon = "C:\\Users\\Admin\\AppData\\Roaming\\SubFolder\\SubFolder\\winlogon.exe" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\Winlogon = "C:\\Users\\Admin\\AppData\\Roaming\\SubFolder\\SubFolder\\winlogon.exe" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Winlogon = "C:\\Users\\Admin\\AppData\\Roaming\\SubFolder\\SubFolder\\winlogon.exe" winlogon.exe -
Suspicious use of SetThreadContext 9 IoCs
description pid Process procid_target PID 1168 set thread context of 1684 1168 winlogon.exe 28 PID 1684 set thread context of 948 1684 winlogon.exe 29 PID 948 set thread context of 1584 948 winlogon.exe 30 PID 1584 set thread context of 800 1584 winlogon.exe 31 PID 800 set thread context of 2004 800 winlogon.exe 32 PID 2004 set thread context of 1492 2004 winlogon.exe 33 PID 1492 set thread context of 564 1492 winlogon.exe 34 PID 564 set thread context of 632 564 winlogon.exe 35 PID 632 set thread context of 1872 632 winlogon.exe 36 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 1516 wrote to memory of 1168 1516 bb9e8fb1a954a00fffa3c29dca8807d09e6c31a44d597e3d278ad98d0ed4b80b.exe 27 PID 1516 wrote to memory of 1168 1516 bb9e8fb1a954a00fffa3c29dca8807d09e6c31a44d597e3d278ad98d0ed4b80b.exe 27 PID 1516 wrote to memory of 1168 1516 bb9e8fb1a954a00fffa3c29dca8807d09e6c31a44d597e3d278ad98d0ed4b80b.exe 27 PID 1168 wrote to memory of 1684 1168 winlogon.exe 28 PID 1168 wrote to memory of 1684 1168 winlogon.exe 28 PID 1168 wrote to memory of 1684 1168 winlogon.exe 28 PID 1168 wrote to memory of 1684 1168 winlogon.exe 28 PID 1168 wrote to memory of 1684 1168 winlogon.exe 28 PID 1168 wrote to memory of 1684 1168 winlogon.exe 28 PID 1684 wrote to memory of 948 1684 winlogon.exe 29 PID 1684 wrote to memory of 948 1684 winlogon.exe 29 PID 1684 wrote to memory of 948 1684 winlogon.exe 29 PID 1684 wrote to memory of 948 1684 winlogon.exe 29 PID 1684 wrote to memory of 948 1684 winlogon.exe 29 PID 1684 wrote to memory of 948 1684 winlogon.exe 29 PID 948 wrote to memory of 1584 948 winlogon.exe 30 PID 948 wrote to memory of 1584 948 winlogon.exe 30 PID 948 wrote to memory of 1584 948 winlogon.exe 30 PID 948 wrote to memory of 1584 948 winlogon.exe 30 PID 948 wrote to memory of 1584 948 winlogon.exe 30 PID 948 wrote to memory of 1584 948 winlogon.exe 30 PID 1584 wrote to memory of 800 1584 winlogon.exe 31 PID 1584 wrote to memory of 800 1584 winlogon.exe 31 PID 1584 wrote to memory of 800 1584 winlogon.exe 31 PID 1584 wrote to memory of 800 1584 winlogon.exe 31 PID 1584 wrote to memory of 800 1584 winlogon.exe 31 PID 1584 wrote to memory of 800 1584 winlogon.exe 31 PID 800 wrote to memory of 2004 800 winlogon.exe 32 PID 800 wrote to memory of 2004 800 winlogon.exe 32 PID 800 wrote to memory of 2004 800 winlogon.exe 32 PID 800 wrote to memory of 2004 800 winlogon.exe 32 PID 800 wrote to memory of 2004 800 winlogon.exe 32 PID 800 wrote to memory of 2004 800 winlogon.exe 32 PID 2004 wrote to memory of 1492 2004 winlogon.exe 33 PID 2004 wrote to memory of 1492 2004 winlogon.exe 33 PID 2004 wrote to memory of 1492 2004 winlogon.exe 33 PID 2004 wrote to memory of 1492 2004 winlogon.exe 33 PID 2004 wrote to memory of 1492 2004 winlogon.exe 33 PID 2004 wrote to memory of 1492 2004 winlogon.exe 33 PID 1492 wrote to memory of 564 1492 winlogon.exe 34 PID 1492 wrote to memory of 564 1492 winlogon.exe 34 PID 1492 wrote to memory of 564 1492 winlogon.exe 34 PID 1492 wrote to memory of 564 1492 winlogon.exe 34 PID 1492 wrote to memory of 564 1492 winlogon.exe 34 PID 1492 wrote to memory of 564 1492 winlogon.exe 34 PID 564 wrote to memory of 632 564 winlogon.exe 35 PID 564 wrote to memory of 632 564 winlogon.exe 35 PID 564 wrote to memory of 632 564 winlogon.exe 35 PID 564 wrote to memory of 632 564 winlogon.exe 35 PID 564 wrote to memory of 632 564 winlogon.exe 35 PID 564 wrote to memory of 632 564 winlogon.exe 35 PID 632 wrote to memory of 1872 632 winlogon.exe 36 PID 632 wrote to memory of 1872 632 winlogon.exe 36 PID 632 wrote to memory of 1872 632 winlogon.exe 36 PID 632 wrote to memory of 1872 632 winlogon.exe 36 PID 632 wrote to memory of 1872 632 winlogon.exe 36 PID 632 wrote to memory of 1872 632 winlogon.exe 36 PID 1872 wrote to memory of 1728 1872 winlogon.exe 37 PID 1872 wrote to memory of 1728 1872 winlogon.exe 37 PID 1872 wrote to memory of 1728 1872 winlogon.exe 37 PID 948 wrote to memory of 1824 948 winlogon.exe 38 PID 948 wrote to memory of 1824 948 winlogon.exe 38 PID 948 wrote to memory of 1824 948 winlogon.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\bb9e8fb1a954a00fffa3c29dca8807d09e6c31a44d597e3d278ad98d0ed4b80b.exe"C:\Users\Admin\AppData\Local\Temp\bb9e8fb1a954a00fffa3c29dca8807d09e6c31a44d597e3d278ad98d0ed4b80b.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Users\Admin\AppData\Roaming\SubFolder\SubFolder\winlogon.exe"C:\Users\Admin\AppData\Roaming\SubFolder\SubFolder\winlogon.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Users\Admin\AppData\Roaming\SubFolder\SubFolder\winlogon.exe"C:\Users\Admin\AppData\Roaming\SubFolder\SubFolder\winlogon.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Users\Admin\AppData\Roaming\SubFolder\SubFolder\winlogon.exe"C:\Users\Admin\AppData\Roaming\SubFolder\SubFolder\winlogon.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Users\Admin\AppData\Roaming\SubFolder\SubFolder\winlogon.exe"C:\Users\Admin\AppData\Roaming\SubFolder\SubFolder\winlogon.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Users\Admin\AppData\Roaming\SubFolder\SubFolder\winlogon.exe"C:\Users\Admin\AppData\Roaming\SubFolder\SubFolder\winlogon.exe"6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:800 -
C:\Users\Admin\AppData\Roaming\SubFolder\SubFolder\winlogon.exe"C:\Users\Admin\AppData\Roaming\SubFolder\SubFolder\winlogon.exe"7⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Users\Admin\AppData\Roaming\SubFolder\SubFolder\winlogon.exe"C:\Users\Admin\AppData\Roaming\SubFolder\SubFolder\winlogon.exe"8⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Users\Admin\AppData\Roaming\SubFolder\SubFolder\winlogon.exe"C:\Users\Admin\AppData\Roaming\SubFolder\SubFolder\winlogon.exe"9⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:564 -
C:\Users\Admin\AppData\Roaming\SubFolder\SubFolder\winlogon.exe"C:\Users\Admin\AppData\Roaming\SubFolder\SubFolder\winlogon.exe"10⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Users\Admin\AppData\Roaming\SubFolder\SubFolder\winlogon.exe"C:\Users\Admin\AppData\Roaming\SubFolder\SubFolder\winlogon.exe"11⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Users\Admin\AppData\Roaming\SubFolder\SubFolder\winlogon.exe"C:\Users\Admin\AppData\Roaming\SubFolder\SubFolder\winlogon.exe"12⤵PID:1728
-
-
-
-
-
-
-
-
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exedw20.exe -x -s 4645⤵PID:1824
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
352KB
MD5c8c6cdeaea4f3940144b5e2fb282f234
SHA137afce95c7db06c3d13c80a826bcf53be566f030
SHA256bb9e8fb1a954a00fffa3c29dca8807d09e6c31a44d597e3d278ad98d0ed4b80b
SHA51254dd1f2bf8d5db6b14ab6daa19125515ff663623300c5a8c815538c761249a190f4c14b589b227d21313516c263f949a525771ebfe6fd1268ab643ce718cf7a5
-
Filesize
352KB
MD5c8c6cdeaea4f3940144b5e2fb282f234
SHA137afce95c7db06c3d13c80a826bcf53be566f030
SHA256bb9e8fb1a954a00fffa3c29dca8807d09e6c31a44d597e3d278ad98d0ed4b80b
SHA51254dd1f2bf8d5db6b14ab6daa19125515ff663623300c5a8c815538c761249a190f4c14b589b227d21313516c263f949a525771ebfe6fd1268ab643ce718cf7a5
-
Filesize
352KB
MD5c8c6cdeaea4f3940144b5e2fb282f234
SHA137afce95c7db06c3d13c80a826bcf53be566f030
SHA256bb9e8fb1a954a00fffa3c29dca8807d09e6c31a44d597e3d278ad98d0ed4b80b
SHA51254dd1f2bf8d5db6b14ab6daa19125515ff663623300c5a8c815538c761249a190f4c14b589b227d21313516c263f949a525771ebfe6fd1268ab643ce718cf7a5
-
Filesize
352KB
MD5c8c6cdeaea4f3940144b5e2fb282f234
SHA137afce95c7db06c3d13c80a826bcf53be566f030
SHA256bb9e8fb1a954a00fffa3c29dca8807d09e6c31a44d597e3d278ad98d0ed4b80b
SHA51254dd1f2bf8d5db6b14ab6daa19125515ff663623300c5a8c815538c761249a190f4c14b589b227d21313516c263f949a525771ebfe6fd1268ab643ce718cf7a5
-
Filesize
352KB
MD5c8c6cdeaea4f3940144b5e2fb282f234
SHA137afce95c7db06c3d13c80a826bcf53be566f030
SHA256bb9e8fb1a954a00fffa3c29dca8807d09e6c31a44d597e3d278ad98d0ed4b80b
SHA51254dd1f2bf8d5db6b14ab6daa19125515ff663623300c5a8c815538c761249a190f4c14b589b227d21313516c263f949a525771ebfe6fd1268ab643ce718cf7a5
-
Filesize
352KB
MD5c8c6cdeaea4f3940144b5e2fb282f234
SHA137afce95c7db06c3d13c80a826bcf53be566f030
SHA256bb9e8fb1a954a00fffa3c29dca8807d09e6c31a44d597e3d278ad98d0ed4b80b
SHA51254dd1f2bf8d5db6b14ab6daa19125515ff663623300c5a8c815538c761249a190f4c14b589b227d21313516c263f949a525771ebfe6fd1268ab643ce718cf7a5
-
Filesize
352KB
MD5c8c6cdeaea4f3940144b5e2fb282f234
SHA137afce95c7db06c3d13c80a826bcf53be566f030
SHA256bb9e8fb1a954a00fffa3c29dca8807d09e6c31a44d597e3d278ad98d0ed4b80b
SHA51254dd1f2bf8d5db6b14ab6daa19125515ff663623300c5a8c815538c761249a190f4c14b589b227d21313516c263f949a525771ebfe6fd1268ab643ce718cf7a5
-
Filesize
352KB
MD5c8c6cdeaea4f3940144b5e2fb282f234
SHA137afce95c7db06c3d13c80a826bcf53be566f030
SHA256bb9e8fb1a954a00fffa3c29dca8807d09e6c31a44d597e3d278ad98d0ed4b80b
SHA51254dd1f2bf8d5db6b14ab6daa19125515ff663623300c5a8c815538c761249a190f4c14b589b227d21313516c263f949a525771ebfe6fd1268ab643ce718cf7a5
-
Filesize
352KB
MD5c8c6cdeaea4f3940144b5e2fb282f234
SHA137afce95c7db06c3d13c80a826bcf53be566f030
SHA256bb9e8fb1a954a00fffa3c29dca8807d09e6c31a44d597e3d278ad98d0ed4b80b
SHA51254dd1f2bf8d5db6b14ab6daa19125515ff663623300c5a8c815538c761249a190f4c14b589b227d21313516c263f949a525771ebfe6fd1268ab643ce718cf7a5
-
Filesize
352KB
MD5c8c6cdeaea4f3940144b5e2fb282f234
SHA137afce95c7db06c3d13c80a826bcf53be566f030
SHA256bb9e8fb1a954a00fffa3c29dca8807d09e6c31a44d597e3d278ad98d0ed4b80b
SHA51254dd1f2bf8d5db6b14ab6daa19125515ff663623300c5a8c815538c761249a190f4c14b589b227d21313516c263f949a525771ebfe6fd1268ab643ce718cf7a5
-
Filesize
352KB
MD5c8c6cdeaea4f3940144b5e2fb282f234
SHA137afce95c7db06c3d13c80a826bcf53be566f030
SHA256bb9e8fb1a954a00fffa3c29dca8807d09e6c31a44d597e3d278ad98d0ed4b80b
SHA51254dd1f2bf8d5db6b14ab6daa19125515ff663623300c5a8c815538c761249a190f4c14b589b227d21313516c263f949a525771ebfe6fd1268ab643ce718cf7a5