Analysis

  • max time kernel
    151s
  • max time network
    166s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-11-2022 11:15

General

  • Target

    0f4810f7fb8e05a70ab4c3ea5fb8b9f598ec8221541f0627acebf851cb1c1dc6.exe

  • Size

    552KB

  • MD5

    71ee4719874a577f4aacabe52668f341

  • SHA1

    4e61f9699f3ff32871b493fcda3ee134d681a64a

  • SHA256

    0f4810f7fb8e05a70ab4c3ea5fb8b9f598ec8221541f0627acebf851cb1c1dc6

  • SHA512

    147fd4618892c26ae9d00bee91416e3697b7e656cba21bd5fdd168e23026f7db70cfd1eadf8957b690152e31ac852c67d80d829142a47b5ab0fc7fa4fdd2096b

  • SSDEEP

    6144:DooqCevklyNpFiq+6sqjBkEs2P+avFpPK39pe58EJGGdYBZvd9OVqq65scTiK/Rd:D6ZkENWgtvrwpeaHgS/OVqqys5DYH

Malware Config

Signatures

  • ISR Stealer

    ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

  • ISR Stealer payload 4 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0f4810f7fb8e05a70ab4c3ea5fb8b9f598ec8221541f0627acebf851cb1c1dc6.exe
    "C:\Users\Admin\AppData\Local\Temp\0f4810f7fb8e05a70ab4c3ea5fb8b9f598ec8221541f0627acebf851cb1c1dc6.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1632
    • C:\Users\Admin\AppData\Local\Temp\0f4810f7fb8e05a70ab4c3ea5fb8b9f598ec8221541f0627acebf851cb1c1dc6.exe
      "C:\Users\Admin\AppData\Local\Temp\0f4810f7fb8e05a70ab4c3ea5fb8b9f598ec8221541f0627acebf851cb1c1dc6.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3212
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\takshost.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\takshost.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2544
      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\takshost.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\takshost.exe"
        3⤵
          PID:4124

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Discovery

    Query Registry

    1
    T1012

    System Information Discovery

    2
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/0-151-0x0000000000400000-0x0000000000453000-memory.dmp
      Filesize

      332KB

    • memory/0-140-0x0000000000400000-0x0000000000453000-memory.dmp
      Filesize

      332KB

    • memory/1632-133-0x0000000075230000-0x00000000757E1000-memory.dmp
      Filesize

      5.7MB

    • memory/1632-132-0x0000000075230000-0x00000000757E1000-memory.dmp
      Filesize

      5.7MB

    • memory/1632-142-0x0000000075230000-0x00000000757E1000-memory.dmp
      Filesize

      5.7MB

    • memory/2544-149-0x0000000075230000-0x00000000757E1000-memory.dmp
      Filesize

      5.7MB

    • memory/2544-150-0x0000000075230000-0x00000000757E1000-memory.dmp
      Filesize

      5.7MB

    • memory/2544-141-0x0000000000000000-mapping.dmp
    • memory/2544-143-0x0000000075230000-0x00000000757E1000-memory.dmp
      Filesize

      5.7MB

    • memory/3212-135-0x0000000000400000-0x0000000000442000-memory.dmp
      Filesize

      264KB

    • memory/3212-148-0x0000000000400000-0x0000000000442000-memory.dmp
      Filesize

      264KB

    • memory/3212-137-0x0000000000400000-0x0000000000442000-memory.dmp
      Filesize

      264KB

    • memory/3212-134-0x0000000000000000-mapping.dmp
    • memory/3212-152-0x0000000000400000-0x0000000000442000-memory.dmp
      Filesize

      264KB

    • memory/4124-144-0x0000000000000000-mapping.dmp