Analysis

  • max time kernel
    48s
  • max time network
    35s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    29-11-2022 14:36

General

  • Target

    018111e36651a7a4590818f65190a2f74278c9ac5a964506009c115bebc76ef8.exe

  • Size

    1.3MB

  • MD5

    4753fe490e06759ed4af57c52959cde9

  • SHA1

    7fae7af36fc9fb30385cf462f397ebe738610eb0

  • SHA256

    018111e36651a7a4590818f65190a2f74278c9ac5a964506009c115bebc76ef8

  • SHA512

    70131ad6d76aa6d9a614731d8e9bf983d7819d97b40aafe6d8c5e93e608e2ba882cbd3b98574d7c73f7344b941682b225a36e29e61bb49f72304c431ca590f73

  • SSDEEP

    24576:KaHMv6Corjqny/Q5U0JW0fRqrSPy/2wP1aoUJ4:K1vqjd/Q5U0EiRI/2wdaA

Malware Config

Signatures

  • ISR Stealer

    ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

  • ISR Stealer payload 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 4 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\018111e36651a7a4590818f65190a2f74278c9ac5a964506009c115bebc76ef8.exe
    "C:\Users\Admin\AppData\Local\Temp\018111e36651a7a4590818f65190a2f74278c9ac5a964506009c115bebc76ef8.exe"
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1888
    • C:\Users\Admin\AppData\Local\Temp\018111e36651a7a4590818f65190a2f74278c9ac5a964506009c115bebc76ef8.exe
      "C:\Users\Admin\AppData\Local\Temp\018111e36651a7a4590818f65190a2f74278c9ac5a964506009c115bebc76ef8.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:112
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 112 -s 144
        3⤵
        • Program crash
        PID:660

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/112-55-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/112-56-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/112-58-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/112-61-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/112-62-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/1888-54-0x00000000757E1000-0x00000000757E3000-memory.dmp

    Filesize

    8KB