Analysis
-
max time kernel
150s -
max time network
168s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 13:40
Static task
static1
Behavioral task
behavioral1
Sample
9081ed87c8ee12275421cd90edd76ea4aca0daaab8a88441468c4e3f97afd278.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9081ed87c8ee12275421cd90edd76ea4aca0daaab8a88441468c4e3f97afd278.exe
Resource
win10v2004-20221111-en
General
-
Target
9081ed87c8ee12275421cd90edd76ea4aca0daaab8a88441468c4e3f97afd278.exe
-
Size
357KB
-
MD5
bf4fe8d5d9c1eb3025af8d7a751d9c40
-
SHA1
0dc50e178debf85f7e003eb8ead837514ee88a37
-
SHA256
9081ed87c8ee12275421cd90edd76ea4aca0daaab8a88441468c4e3f97afd278
-
SHA512
9735cd0a6c22050b055e9dca4005d900664bc58d51cd4b7af5666e8c4b9efc71de7896a1f85ceceb362a6fb6eb0ed776d1a888d47a52ecca4fc7722c8a5137c9
-
SSDEEP
6144:9120bYng+O40hQTyYVa8ySLSY/wNfDM/H2wVkE5IYAzgo0pKTsuPQ47gXiCKxbWM:P5YgZH2ja8njP2wVkEhMQKTsL5
Malware Config
Signatures
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/2980-135-0x0000000000400000-0x0000000000442000-memory.dmp family_isrstealer behavioral2/memory/2980-143-0x0000000000400000-0x0000000000442000-memory.dmp family_isrstealer behavioral2/memory/2980-152-0x0000000000400000-0x0000000000442000-memory.dmp family_isrstealer -
NirSoft MailPassView 2 IoCs
Password recovery tool for various email clients
Processes:
resource yara_rule behavioral2/memory/4148-151-0x0000000000400000-0x000000000041F000-memory.dmp MailPassView behavioral2/memory/4148-154-0x0000000000400000-0x000000000041F000-memory.dmp MailPassView -
Nirsoft 2 IoCs
Processes:
resource yara_rule behavioral2/memory/4148-151-0x0000000000400000-0x000000000041F000-memory.dmp Nirsoft behavioral2/memory/4148-154-0x0000000000400000-0x000000000041F000-memory.dmp Nirsoft -
Processes:
resource yara_rule behavioral2/memory/4980-141-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral2/memory/4980-144-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral2/memory/4148-146-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4980-147-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral2/memory/4980-148-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral2/memory/4148-150-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4148-151-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4980-153-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral2/memory/4148-154-0x0000000000400000-0x000000000041F000-memory.dmp upx -
Uses the VBS compiler for execution 1 TTPs
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
Processes:
vbc.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts vbc.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
9081ed87c8ee12275421cd90edd76ea4aca0daaab8a88441468c4e3f97afd278.exevbc.exedescription pid process target process PID 2452 set thread context of 2980 2452 9081ed87c8ee12275421cd90edd76ea4aca0daaab8a88441468c4e3f97afd278.exe vbc.exe PID 2980 set thread context of 4980 2980 vbc.exe vbc.exe PID 2980 set thread context of 4148 2980 vbc.exe vbc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
9081ed87c8ee12275421cd90edd76ea4aca0daaab8a88441468c4e3f97afd278.exedescription pid process Token: SeDebugPrivilege 2452 9081ed87c8ee12275421cd90edd76ea4aca0daaab8a88441468c4e3f97afd278.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
vbc.exepid process 2980 vbc.exe -
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
9081ed87c8ee12275421cd90edd76ea4aca0daaab8a88441468c4e3f97afd278.exevbc.exedescription pid process target process PID 2452 wrote to memory of 2980 2452 9081ed87c8ee12275421cd90edd76ea4aca0daaab8a88441468c4e3f97afd278.exe vbc.exe PID 2452 wrote to memory of 2980 2452 9081ed87c8ee12275421cd90edd76ea4aca0daaab8a88441468c4e3f97afd278.exe vbc.exe PID 2452 wrote to memory of 2980 2452 9081ed87c8ee12275421cd90edd76ea4aca0daaab8a88441468c4e3f97afd278.exe vbc.exe PID 2452 wrote to memory of 2980 2452 9081ed87c8ee12275421cd90edd76ea4aca0daaab8a88441468c4e3f97afd278.exe vbc.exe PID 2452 wrote to memory of 2980 2452 9081ed87c8ee12275421cd90edd76ea4aca0daaab8a88441468c4e3f97afd278.exe vbc.exe PID 2452 wrote to memory of 2980 2452 9081ed87c8ee12275421cd90edd76ea4aca0daaab8a88441468c4e3f97afd278.exe vbc.exe PID 2452 wrote to memory of 2980 2452 9081ed87c8ee12275421cd90edd76ea4aca0daaab8a88441468c4e3f97afd278.exe vbc.exe PID 2980 wrote to memory of 4980 2980 vbc.exe vbc.exe PID 2980 wrote to memory of 4980 2980 vbc.exe vbc.exe PID 2980 wrote to memory of 4980 2980 vbc.exe vbc.exe PID 2980 wrote to memory of 4980 2980 vbc.exe vbc.exe PID 2980 wrote to memory of 4980 2980 vbc.exe vbc.exe PID 2980 wrote to memory of 4980 2980 vbc.exe vbc.exe PID 2980 wrote to memory of 4980 2980 vbc.exe vbc.exe PID 2980 wrote to memory of 4980 2980 vbc.exe vbc.exe PID 2980 wrote to memory of 4148 2980 vbc.exe vbc.exe PID 2980 wrote to memory of 4148 2980 vbc.exe vbc.exe PID 2980 wrote to memory of 4148 2980 vbc.exe vbc.exe PID 2980 wrote to memory of 4148 2980 vbc.exe vbc.exe PID 2980 wrote to memory of 4148 2980 vbc.exe vbc.exe PID 2980 wrote to memory of 4148 2980 vbc.exe vbc.exe PID 2980 wrote to memory of 4148 2980 vbc.exe vbc.exe PID 2980 wrote to memory of 4148 2980 vbc.exe vbc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9081ed87c8ee12275421cd90edd76ea4aca0daaab8a88441468c4e3f97afd278.exe"C:\Users\Admin\AppData\Local\Temp\9081ed87c8ee12275421cd90edd76ea4aca0daaab8a88441468c4e3f97afd278.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe/scomma "C:\Users\Admin\AppData\Local\Temp\mfdDjKJST5.ini"3⤵PID:4980
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe/scomma "C:\Users\Admin\AppData\Local\Temp\YULgBd5HF5.ini"3⤵
- Accesses Microsoft Outlook accounts
PID:4148