Analysis

  • max time kernel
    239s
  • max time network
    336s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    28-11-2022 11:15

General

  • Target

    0f4810f7fb8e05a70ab4c3ea5fb8b9f598ec8221541f0627acebf851cb1c1dc6.exe

  • Size

    552KB

  • MD5

    71ee4719874a577f4aacabe52668f341

  • SHA1

    4e61f9699f3ff32871b493fcda3ee134d681a64a

  • SHA256

    0f4810f7fb8e05a70ab4c3ea5fb8b9f598ec8221541f0627acebf851cb1c1dc6

  • SHA512

    147fd4618892c26ae9d00bee91416e3697b7e656cba21bd5fdd168e23026f7db70cfd1eadf8957b690152e31ac852c67d80d829142a47b5ab0fc7fa4fdd2096b

  • SSDEEP

    6144:DooqCevklyNpFiq+6sqjBkEs2P+avFpPK39pe58EJGGdYBZvd9OVqq65scTiK/Rd:D6ZkENWgtvrwpeaHgS/OVqqys5DYH

Malware Config

Signatures

  • ISR Stealer

    ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

  • ISR Stealer payload 8 IoCs
  • Suspicious use of SetThreadContext 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 57 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0f4810f7fb8e05a70ab4c3ea5fb8b9f598ec8221541f0627acebf851cb1c1dc6.exe
    "C:\Users\Admin\AppData\Local\Temp\0f4810f7fb8e05a70ab4c3ea5fb8b9f598ec8221541f0627acebf851cb1c1dc6.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:564
    • C:\Users\Admin\AppData\Local\Temp\0f4810f7fb8e05a70ab4c3ea5fb8b9f598ec8221541f0627acebf851cb1c1dc6.exe
      "C:\Users\Admin\AppData\Local\Temp\0f4810f7fb8e05a70ab4c3ea5fb8b9f598ec8221541f0627acebf851cb1c1dc6.exe"
      2⤵
        PID:896
      • C:\Users\Admin\AppData\Local\Temp\0f4810f7fb8e05a70ab4c3ea5fb8b9f598ec8221541f0627acebf851cb1c1dc6.exe
        "C:\Users\Admin\AppData\Local\Temp\0f4810f7fb8e05a70ab4c3ea5fb8b9f598ec8221541f0627acebf851cb1c1dc6.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1456
        • C:\Users\Admin\AppData\Local\Temp\0f4810f7fb8e05a70ab4c3ea5fb8b9f598ec8221541f0627acebf851cb1c1dc6.exe
          /scomma "C:\Users\Admin\AppData\Local\Temp\HWxeJxJpEC.ini"
          3⤵
            PID:1904
        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\takshost.exe
          "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\takshost.exe"
          2⤵
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:828
          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\takshost.exe
            "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\takshost.exe"
            3⤵
              PID:864

        Network

        MITRE ATT&CK Matrix ATT&CK v6

        Discovery

        System Information Discovery

        1
        T1082

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/0-93-0x0000000000400000-0x000000000041F000-memory.dmp
          Filesize

          124KB

        • memory/564-55-0x0000000074D50000-0x00000000752FB000-memory.dmp
          Filesize

          5.7MB

        • memory/564-54-0x0000000076D71000-0x0000000076D73000-memory.dmp
          Filesize

          8KB

        • memory/564-81-0x0000000074D50000-0x00000000752FB000-memory.dmp
          Filesize

          5.7MB

        • memory/828-79-0x0000000000000000-mapping.dmp
        • memory/828-92-0x0000000074D50000-0x00000000752FB000-memory.dmp
          Filesize

          5.7MB

        • memory/828-82-0x0000000074D50000-0x00000000752FB000-memory.dmp
          Filesize

          5.7MB

        • memory/864-89-0x0000000000401180-mapping.dmp
        • memory/896-62-0x0000000000401180-mapping.dmp
        • memory/896-63-0x0000000000130000-0x0000000000172000-memory.dmp
          Filesize

          264KB

        • memory/896-59-0x0000000000130000-0x0000000000172000-memory.dmp
          Filesize

          264KB

        • memory/896-57-0x0000000000130000-0x0000000000172000-memory.dmp
          Filesize

          264KB

        • memory/896-56-0x0000000000130000-0x0000000000172000-memory.dmp
          Filesize

          264KB

        • memory/1456-78-0x0000000000400000-0x0000000000442000-memory.dmp
          Filesize

          264KB

        • memory/1456-71-0x0000000000401180-mapping.dmp
        • memory/1456-94-0x0000000000400000-0x0000000000442000-memory.dmp
          Filesize

          264KB

        • memory/1456-95-0x0000000000400000-0x0000000000442000-memory.dmp
          Filesize

          264KB

        • memory/1904-77-0x00000000004512E0-mapping.dmp