Analysis
-
max time kernel
121s -
max time network
42s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 13:40
Static task
static1
Behavioral task
behavioral1
Sample
9081ed87c8ee12275421cd90edd76ea4aca0daaab8a88441468c4e3f97afd278.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9081ed87c8ee12275421cd90edd76ea4aca0daaab8a88441468c4e3f97afd278.exe
Resource
win10v2004-20221111-en
General
-
Target
9081ed87c8ee12275421cd90edd76ea4aca0daaab8a88441468c4e3f97afd278.exe
-
Size
357KB
-
MD5
bf4fe8d5d9c1eb3025af8d7a751d9c40
-
SHA1
0dc50e178debf85f7e003eb8ead837514ee88a37
-
SHA256
9081ed87c8ee12275421cd90edd76ea4aca0daaab8a88441468c4e3f97afd278
-
SHA512
9735cd0a6c22050b055e9dca4005d900664bc58d51cd4b7af5666e8c4b9efc71de7896a1f85ceceb362a6fb6eb0ed776d1a888d47a52ecca4fc7722c8a5137c9
-
SSDEEP
6144:9120bYng+O40hQTyYVa8ySLSY/wNfDM/H2wVkE5IYAzgo0pKTsuPQ47gXiCKxbWM:P5YgZH2ja8njP2wVkEhMQKTsL5
Malware Config
Signatures
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload 5 IoCs
resource yara_rule behavioral1/memory/1524-60-0x0000000000400000-0x0000000000442000-memory.dmp family_isrstealer behavioral1/memory/1524-63-0x0000000000401180-mapping.dmp family_isrstealer behavioral1/memory/1524-62-0x0000000000400000-0x0000000000442000-memory.dmp family_isrstealer behavioral1/memory/1524-73-0x0000000000400000-0x0000000000442000-memory.dmp family_isrstealer behavioral1/memory/1524-85-0x0000000000400000-0x0000000000442000-memory.dmp family_isrstealer -
NirSoft MailPassView 3 IoCs
Password recovery tool for various email clients
resource yara_rule behavioral1/memory/1760-82-0x0000000000400000-0x000000000041F000-memory.dmp MailPassView behavioral1/memory/1760-83-0x0000000000400000-0x000000000041F000-memory.dmp MailPassView behavioral1/memory/1760-84-0x0000000000400000-0x000000000041F000-memory.dmp MailPassView -
Nirsoft 3 IoCs
resource yara_rule behavioral1/memory/1760-82-0x0000000000400000-0x000000000041F000-memory.dmp Nirsoft behavioral1/memory/1760-83-0x0000000000400000-0x000000000041F000-memory.dmp Nirsoft behavioral1/memory/1760-84-0x0000000000400000-0x000000000041F000-memory.dmp Nirsoft -
resource yara_rule behavioral1/memory/1916-68-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/1916-72-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/1916-74-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/1916-75-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/1916-77-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/1760-76-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1760-81-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1760-82-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1760-83-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1760-84-0x0000000000400000-0x000000000041F000-memory.dmp upx -
Uses the VBS compiler for execution 1 TTPs
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts vbc.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1992 set thread context of 1524 1992 9081ed87c8ee12275421cd90edd76ea4aca0daaab8a88441468c4e3f97afd278.exe 26 PID 1524 set thread context of 1916 1524 vbc.exe 27 PID 1524 set thread context of 1760 1524 vbc.exe 28 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1992 9081ed87c8ee12275421cd90edd76ea4aca0daaab8a88441468c4e3f97afd278.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1524 vbc.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 1992 wrote to memory of 1524 1992 9081ed87c8ee12275421cd90edd76ea4aca0daaab8a88441468c4e3f97afd278.exe 26 PID 1992 wrote to memory of 1524 1992 9081ed87c8ee12275421cd90edd76ea4aca0daaab8a88441468c4e3f97afd278.exe 26 PID 1992 wrote to memory of 1524 1992 9081ed87c8ee12275421cd90edd76ea4aca0daaab8a88441468c4e3f97afd278.exe 26 PID 1992 wrote to memory of 1524 1992 9081ed87c8ee12275421cd90edd76ea4aca0daaab8a88441468c4e3f97afd278.exe 26 PID 1992 wrote to memory of 1524 1992 9081ed87c8ee12275421cd90edd76ea4aca0daaab8a88441468c4e3f97afd278.exe 26 PID 1992 wrote to memory of 1524 1992 9081ed87c8ee12275421cd90edd76ea4aca0daaab8a88441468c4e3f97afd278.exe 26 PID 1992 wrote to memory of 1524 1992 9081ed87c8ee12275421cd90edd76ea4aca0daaab8a88441468c4e3f97afd278.exe 26 PID 1992 wrote to memory of 1524 1992 9081ed87c8ee12275421cd90edd76ea4aca0daaab8a88441468c4e3f97afd278.exe 26 PID 1524 wrote to memory of 1916 1524 vbc.exe 27 PID 1524 wrote to memory of 1916 1524 vbc.exe 27 PID 1524 wrote to memory of 1916 1524 vbc.exe 27 PID 1524 wrote to memory of 1916 1524 vbc.exe 27 PID 1524 wrote to memory of 1916 1524 vbc.exe 27 PID 1524 wrote to memory of 1916 1524 vbc.exe 27 PID 1524 wrote to memory of 1916 1524 vbc.exe 27 PID 1524 wrote to memory of 1916 1524 vbc.exe 27 PID 1524 wrote to memory of 1916 1524 vbc.exe 27 PID 1524 wrote to memory of 1760 1524 vbc.exe 28 PID 1524 wrote to memory of 1760 1524 vbc.exe 28 PID 1524 wrote to memory of 1760 1524 vbc.exe 28 PID 1524 wrote to memory of 1760 1524 vbc.exe 28 PID 1524 wrote to memory of 1760 1524 vbc.exe 28 PID 1524 wrote to memory of 1760 1524 vbc.exe 28 PID 1524 wrote to memory of 1760 1524 vbc.exe 28 PID 1524 wrote to memory of 1760 1524 vbc.exe 28 PID 1524 wrote to memory of 1760 1524 vbc.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\9081ed87c8ee12275421cd90edd76ea4aca0daaab8a88441468c4e3f97afd278.exe"C:\Users\Admin\AppData\Local\Temp\9081ed87c8ee12275421cd90edd76ea4aca0daaab8a88441468c4e3f97afd278.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe/scomma "C:\Users\Admin\AppData\Local\Temp\ijlpq7W5la.ini"3⤵PID:1916
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe/scomma "C:\Users\Admin\AppData\Local\Temp\YeTafZ7fXq.ini"3⤵
- Accesses Microsoft Outlook accounts
PID:1760
-
-