Analysis
-
max time kernel
170s -
max time network
36s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 17:15
Static task
static1
Behavioral task
behavioral1
Sample
4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe
Resource
win10v2004-20221111-en
General
-
Target
4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe
-
Size
653KB
-
MD5
6549791f95f9aef9b36bdc610e164544
-
SHA1
100124afab447d183bfa86dcab523d9b5e8e0eff
-
SHA256
4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee
-
SHA512
2701d24098a89c96808ae23d22581f113abeb15c26c70eb85ecdd859e7ae1a1846f543f5ce7f1a6e066664a228cfe41c273aae9b7470a853fe35f459582131eb
-
SSDEEP
12288:8yizl10AJba1TfklX/Sns/SF5lwEhTjRUC3so0bJ2OxNJ4xiJ48E:pEJbaZklKs/SrnJjR7sT76iJ
Malware Config
Signatures
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/468-55-0x0000000000000000-mapping.dmp family_isrstealer behavioral1/memory/668-58-0x0000000000000000-mapping.dmp family_isrstealer behavioral1/memory/1364-60-0x0000000000000000-mapping.dmp family_isrstealer -
Suspicious use of SetThreadContext 6 IoCs
Processes:
4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exedescription pid process target process PID 1340 set thread context of 468 1340 4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe 4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe PID 468 set thread context of 668 468 4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe 4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe PID 668 set thread context of 1364 668 4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe 4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe PID 1364 set thread context of 1300 1364 4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe 4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe PID 1300 set thread context of 940 1300 4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe 4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe PID 940 set thread context of 1880 940 4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe 4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exedescription pid process Token: SeDebugPrivilege 1340 4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe Token: SeDebugPrivilege 468 4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe Token: SeDebugPrivilege 668 4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe Token: SeDebugPrivilege 1364 4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe Token: SeDebugPrivilege 1300 4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe Token: SeDebugPrivilege 940 4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe -
Suspicious use of WriteProcessMemory 48 IoCs
Processes:
4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exedescription pid process target process PID 1340 wrote to memory of 468 1340 4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe 4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe PID 1340 wrote to memory of 468 1340 4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe 4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe PID 1340 wrote to memory of 468 1340 4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe 4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe PID 1340 wrote to memory of 468 1340 4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe 4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe PID 1340 wrote to memory of 468 1340 4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe 4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe PID 1340 wrote to memory of 468 1340 4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe 4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe PID 1340 wrote to memory of 468 1340 4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe 4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe PID 1340 wrote to memory of 468 1340 4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe 4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe PID 468 wrote to memory of 668 468 4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe 4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe PID 468 wrote to memory of 668 468 4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe 4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe PID 468 wrote to memory of 668 468 4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe 4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe PID 468 wrote to memory of 668 468 4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe 4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe PID 468 wrote to memory of 668 468 4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe 4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe PID 468 wrote to memory of 668 468 4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe 4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe PID 468 wrote to memory of 668 468 4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe 4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe PID 468 wrote to memory of 668 468 4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe 4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe PID 668 wrote to memory of 1364 668 4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe 4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe PID 668 wrote to memory of 1364 668 4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe 4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe PID 668 wrote to memory of 1364 668 4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe 4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe PID 668 wrote to memory of 1364 668 4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe 4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe PID 668 wrote to memory of 1364 668 4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe 4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe PID 668 wrote to memory of 1364 668 4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe 4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe PID 668 wrote to memory of 1364 668 4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe 4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe PID 668 wrote to memory of 1364 668 4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe 4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe PID 1364 wrote to memory of 1300 1364 4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe 4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe PID 1364 wrote to memory of 1300 1364 4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe 4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe PID 1364 wrote to memory of 1300 1364 4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe 4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe PID 1364 wrote to memory of 1300 1364 4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe 4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe PID 1364 wrote to memory of 1300 1364 4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe 4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe PID 1364 wrote to memory of 1300 1364 4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe 4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe PID 1364 wrote to memory of 1300 1364 4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe 4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe PID 1364 wrote to memory of 1300 1364 4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe 4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe PID 1300 wrote to memory of 940 1300 4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe 4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe PID 1300 wrote to memory of 940 1300 4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe 4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe PID 1300 wrote to memory of 940 1300 4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe 4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe PID 1300 wrote to memory of 940 1300 4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe 4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe PID 1300 wrote to memory of 940 1300 4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe 4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe PID 1300 wrote to memory of 940 1300 4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe 4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe PID 1300 wrote to memory of 940 1300 4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe 4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe PID 1300 wrote to memory of 940 1300 4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe 4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe PID 940 wrote to memory of 1880 940 4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe 4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe PID 940 wrote to memory of 1880 940 4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe 4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe PID 940 wrote to memory of 1880 940 4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe 4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe PID 940 wrote to memory of 1880 940 4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe 4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe PID 940 wrote to memory of 1880 940 4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe 4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe PID 940 wrote to memory of 1880 940 4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe 4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe PID 940 wrote to memory of 1880 940 4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe 4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe PID 940 wrote to memory of 1880 940 4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe 4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe"C:\Users\Admin\AppData\Local\Temp\4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Users\Admin\AppData\Local\Temp\4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exeC:\Users\Admin\AppData\Local\Temp\4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe2⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Users\Admin\AppData\Local\Temp\4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exeC:\Users\Admin\AppData\Local\Temp\4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe3⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:668 -
C:\Users\Admin\AppData\Local\Temp\4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exeC:\Users\Admin\AppData\Local\Temp\4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe4⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Users\Admin\AppData\Local\Temp\4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exeC:\Users\Admin\AppData\Local\Temp\4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe5⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Users\Admin\AppData\Local\Temp\4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exeC:\Users\Admin\AppData\Local\Temp\4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe6⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:940 -
C:\Users\Admin\AppData\Local\Temp\4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exeC:\Users\Admin\AppData\Local\Temp\4e093ee10067fc626d554b03a382c773997cfb438997f4f639a9aaec9e6964ee.exe7⤵PID:1880