Analysis
-
max time kernel
89s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
27-11-2022 01:34
Static task
static1
Behavioral task
behavioral1
Sample
1a44a0bc93d4f829404adb03337d66684593f764c8cc959f2a0c80d6cd56bbba.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
1a44a0bc93d4f829404adb03337d66684593f764c8cc959f2a0c80d6cd56bbba.exe
Resource
win10v2004-20221111-en
General
-
Target
1a44a0bc93d4f829404adb03337d66684593f764c8cc959f2a0c80d6cd56bbba.exe
-
Size
452KB
-
MD5
6310da29e3c9d8606ce05e96ae4fbcff
-
SHA1
a75c9e7c7b3fa2988c960260f01ab746ea3ba228
-
SHA256
1a44a0bc93d4f829404adb03337d66684593f764c8cc959f2a0c80d6cd56bbba
-
SHA512
aa8ad9036e165afec6b91c2757c2af60c9e0937cf08231d537b344d2d0804cb5b396858d0b2eadf3ccaf914ce23ae371ed8859dc6f176fe15d5c40a9322b798f
-
SSDEEP
6144:jSrawA/kU4eYKLBa0eqWeOUb2qdjYbMIOL1B41uAXROPoBJOpOnnnnnnnnnnnnnC:jSrLA/9jeqaUb2quMIOL741uHQBQ
Malware Config
Signatures
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload 6 IoCs
resource yara_rule behavioral1/memory/1864-61-0x0000000000400000-0x0000000000442000-memory.dmp family_isrstealer behavioral1/memory/1864-63-0x0000000000400000-0x0000000000442000-memory.dmp family_isrstealer behavioral1/memory/1864-64-0x0000000000401180-mapping.dmp family_isrstealer behavioral1/memory/1864-77-0x0000000000400000-0x0000000000442000-memory.dmp family_isrstealer behavioral1/memory/1864-87-0x0000000000400000-0x0000000000442000-memory.dmp family_isrstealer behavioral1/memory/1864-88-0x0000000000400000-0x0000000000442000-memory.dmp family_isrstealer -
NirSoft MailPassView 3 IoCs
Password recovery tool for various email clients
resource yara_rule behavioral1/memory/1756-83-0x0000000000400000-0x000000000041F000-memory.dmp MailPassView behavioral1/memory/1756-84-0x0000000000400000-0x000000000041F000-memory.dmp MailPassView behavioral1/memory/1756-85-0x0000000000400000-0x000000000041F000-memory.dmp MailPassView -
Nirsoft 3 IoCs
resource yara_rule behavioral1/memory/1756-83-0x0000000000400000-0x000000000041F000-memory.dmp Nirsoft behavioral1/memory/1756-84-0x0000000000400000-0x000000000041F000-memory.dmp Nirsoft behavioral1/memory/1756-85-0x0000000000400000-0x000000000041F000-memory.dmp Nirsoft -
resource yara_rule behavioral1/memory/1668-70-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/1668-74-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/1668-75-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/1668-76-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/1756-78-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1756-82-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1756-83-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1756-84-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1756-85-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1668-86-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/1668-89-0x0000000000400000-0x0000000000453000-memory.dmp upx -
Uses the VBS compiler for execution 1 TTPs
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts vbc.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 956 set thread context of 1864 956 1a44a0bc93d4f829404adb03337d66684593f764c8cc959f2a0c80d6cd56bbba.exe 28 PID 1864 set thread context of 1668 1864 vbc.exe 29 PID 1864 set thread context of 1756 1864 vbc.exe 30 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 956 1a44a0bc93d4f829404adb03337d66684593f764c8cc959f2a0c80d6cd56bbba.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1864 vbc.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 956 wrote to memory of 1864 956 1a44a0bc93d4f829404adb03337d66684593f764c8cc959f2a0c80d6cd56bbba.exe 28 PID 956 wrote to memory of 1864 956 1a44a0bc93d4f829404adb03337d66684593f764c8cc959f2a0c80d6cd56bbba.exe 28 PID 956 wrote to memory of 1864 956 1a44a0bc93d4f829404adb03337d66684593f764c8cc959f2a0c80d6cd56bbba.exe 28 PID 956 wrote to memory of 1864 956 1a44a0bc93d4f829404adb03337d66684593f764c8cc959f2a0c80d6cd56bbba.exe 28 PID 956 wrote to memory of 1864 956 1a44a0bc93d4f829404adb03337d66684593f764c8cc959f2a0c80d6cd56bbba.exe 28 PID 956 wrote to memory of 1864 956 1a44a0bc93d4f829404adb03337d66684593f764c8cc959f2a0c80d6cd56bbba.exe 28 PID 956 wrote to memory of 1864 956 1a44a0bc93d4f829404adb03337d66684593f764c8cc959f2a0c80d6cd56bbba.exe 28 PID 956 wrote to memory of 1864 956 1a44a0bc93d4f829404adb03337d66684593f764c8cc959f2a0c80d6cd56bbba.exe 28 PID 1864 wrote to memory of 1668 1864 vbc.exe 29 PID 1864 wrote to memory of 1668 1864 vbc.exe 29 PID 1864 wrote to memory of 1668 1864 vbc.exe 29 PID 1864 wrote to memory of 1668 1864 vbc.exe 29 PID 1864 wrote to memory of 1668 1864 vbc.exe 29 PID 1864 wrote to memory of 1668 1864 vbc.exe 29 PID 1864 wrote to memory of 1668 1864 vbc.exe 29 PID 1864 wrote to memory of 1668 1864 vbc.exe 29 PID 1864 wrote to memory of 1668 1864 vbc.exe 29 PID 1864 wrote to memory of 1756 1864 vbc.exe 30 PID 1864 wrote to memory of 1756 1864 vbc.exe 30 PID 1864 wrote to memory of 1756 1864 vbc.exe 30 PID 1864 wrote to memory of 1756 1864 vbc.exe 30 PID 1864 wrote to memory of 1756 1864 vbc.exe 30 PID 1864 wrote to memory of 1756 1864 vbc.exe 30 PID 1864 wrote to memory of 1756 1864 vbc.exe 30 PID 1864 wrote to memory of 1756 1864 vbc.exe 30 PID 1864 wrote to memory of 1756 1864 vbc.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\1a44a0bc93d4f829404adb03337d66684593f764c8cc959f2a0c80d6cd56bbba.exe"C:\Users\Admin\AppData\Local\Temp\1a44a0bc93d4f829404adb03337d66684593f764c8cc959f2a0c80d6cd56bbba.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe/scomma "C:\Users\Admin\AppData\Local\Temp\9ScHUBLd8U.ini"3⤵PID:1668
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe/scomma "C:\Users\Admin\AppData\Local\Temp\iMhtrhZnkQ.ini"3⤵
- Accesses Microsoft Outlook accounts
PID:1756
-
-