Analysis
-
max time kernel
55s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30/11/2022, 03:05
Static task
static1
Behavioral task
behavioral1
Sample
e334453a140e582a902b55a29758b1fc0db6e948ba0090b5431ffbf7a3d9fb86.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e334453a140e582a902b55a29758b1fc0db6e948ba0090b5431ffbf7a3d9fb86.exe
Resource
win10v2004-20221111-en
General
-
Target
e334453a140e582a902b55a29758b1fc0db6e948ba0090b5431ffbf7a3d9fb86.exe
-
Size
2.5MB
-
MD5
64779a324c694f4cac05c8e3372d3053
-
SHA1
2e5f8c11099ce0224dacb101b2bc5ee92e8377de
-
SHA256
e334453a140e582a902b55a29758b1fc0db6e948ba0090b5431ffbf7a3d9fb86
-
SHA512
2cb876fc4ca93aa05ceb6eb9f468fb94f1779fa4e0930f529abf527ab4898c712383df09ca7ccf93f54fa6ff48545cf79390529aa29dc5bbfd945cdd690d4638
-
SSDEEP
49152:Phh7f+Uq9lW2fihJUj95VbSZOO+LxVziRLT/9t0lwkYsMzROwVAquhtW:PnkLWuiDUfVbEOJfWRLT/PPsipV/ujW
Malware Config
Signatures
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload 4 IoCs
resource yara_rule behavioral1/memory/1404-135-0x0000000000400000-0x0000000000435000-memory.dmp family_isrstealer behavioral1/memory/1404-138-0x0000000000401180-mapping.dmp family_isrstealer behavioral1/memory/1404-149-0x0000000000400000-0x0000000000435000-memory.dmp family_isrstealer behavioral1/memory/1404-152-0x0000000000400000-0x0000000000435000-memory.dmp family_isrstealer -
Executes dropped EXE 4 IoCs
pid Process 2000 erUET.exe 2024 kzdqYi.exe 1404 cvtres.exe 1600 cvtres.exe -
resource yara_rule behavioral1/files/0x0008000000013300-63.dat upx behavioral1/files/0x0008000000013300-65.dat upx behavioral1/memory/2024-69-0x0000000000400000-0x0000000000623000-memory.dmp upx behavioral1/files/0x0008000000013300-70.dat upx behavioral1/memory/2024-130-0x0000000000400000-0x0000000000623000-memory.dmp upx behavioral1/memory/1600-150-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/1600-151-0x0000000000400000-0x0000000000453000-memory.dmp upx -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion kzdqYi.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate kzdqYi.exe -
Loads dropped DLL 5 IoCs
pid Process 1488 e334453a140e582a902b55a29758b1fc0db6e948ba0090b5431ffbf7a3d9fb86.exe 1488 e334453a140e582a902b55a29758b1fc0db6e948ba0090b5431ffbf7a3d9fb86.exe 1488 e334453a140e582a902b55a29758b1fc0db6e948ba0090b5431ffbf7a3d9fb86.exe 2000 erUET.exe 1404 cvtres.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2000 set thread context of 1404 2000 erUET.exe 31 PID 1404 set thread context of 1600 1404 cvtres.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BaseBoardProduct kzdqYi.exe Key created \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS kzdqYi.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2024 kzdqYi.exe 2000 erUET.exe 2000 erUET.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: 33 2024 kzdqYi.exe Token: SeIncBasePriorityPrivilege 2024 kzdqYi.exe Token: 33 2024 kzdqYi.exe Token: SeIncBasePriorityPrivilege 2024 kzdqYi.exe Token: SeDebugPrivilege 2000 erUET.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1404 cvtres.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 1488 wrote to memory of 2000 1488 e334453a140e582a902b55a29758b1fc0db6e948ba0090b5431ffbf7a3d9fb86.exe 28 PID 1488 wrote to memory of 2000 1488 e334453a140e582a902b55a29758b1fc0db6e948ba0090b5431ffbf7a3d9fb86.exe 28 PID 1488 wrote to memory of 2000 1488 e334453a140e582a902b55a29758b1fc0db6e948ba0090b5431ffbf7a3d9fb86.exe 28 PID 1488 wrote to memory of 2000 1488 e334453a140e582a902b55a29758b1fc0db6e948ba0090b5431ffbf7a3d9fb86.exe 28 PID 1488 wrote to memory of 2024 1488 e334453a140e582a902b55a29758b1fc0db6e948ba0090b5431ffbf7a3d9fb86.exe 29 PID 1488 wrote to memory of 2024 1488 e334453a140e582a902b55a29758b1fc0db6e948ba0090b5431ffbf7a3d9fb86.exe 29 PID 1488 wrote to memory of 2024 1488 e334453a140e582a902b55a29758b1fc0db6e948ba0090b5431ffbf7a3d9fb86.exe 29 PID 1488 wrote to memory of 2024 1488 e334453a140e582a902b55a29758b1fc0db6e948ba0090b5431ffbf7a3d9fb86.exe 29 PID 2000 wrote to memory of 1404 2000 erUET.exe 31 PID 2000 wrote to memory of 1404 2000 erUET.exe 31 PID 2000 wrote to memory of 1404 2000 erUET.exe 31 PID 2000 wrote to memory of 1404 2000 erUET.exe 31 PID 2000 wrote to memory of 1404 2000 erUET.exe 31 PID 2000 wrote to memory of 1404 2000 erUET.exe 31 PID 2000 wrote to memory of 1404 2000 erUET.exe 31 PID 2000 wrote to memory of 1404 2000 erUET.exe 31 PID 1404 wrote to memory of 1600 1404 cvtres.exe 32 PID 1404 wrote to memory of 1600 1404 cvtres.exe 32 PID 1404 wrote to memory of 1600 1404 cvtres.exe 32 PID 1404 wrote to memory of 1600 1404 cvtres.exe 32 PID 1404 wrote to memory of 1600 1404 cvtres.exe 32 PID 1404 wrote to memory of 1600 1404 cvtres.exe 32 PID 1404 wrote to memory of 1600 1404 cvtres.exe 32 PID 1404 wrote to memory of 1600 1404 cvtres.exe 32 PID 1404 wrote to memory of 1600 1404 cvtres.exe 32 PID 2000 wrote to memory of 1404 2000 erUET.exe 31 PID 2000 wrote to memory of 1404 2000 erUET.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\e334453a140e582a902b55a29758b1fc0db6e948ba0090b5431ffbf7a3d9fb86.exe"C:\Users\Admin\AppData\Local\Temp\e334453a140e582a902b55a29758b1fc0db6e948ba0090b5431ffbf7a3d9fb86.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Users\Admin\AppData\Local\Temp\erUET.exe"C:\Users\Admin\AppData\Local\Temp\erUET.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Users\Admin\AppData\Local\Temp\cvtres.exeC:\Users\Admin\AppData\Local\Temp\\cvtres.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Users\Admin\AppData\Local\Temp\cvtres.exe/scomma "C:\Users\Admin\AppData\Local\Temp\9XyLxvjbpY.ini"4⤵
- Executes dropped EXE
PID:1600
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\kzdqYi.exe"C:\Users\Admin\AppData\Local\Temp\kzdqYi.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2024
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
31KB
MD5ed797d8dc2c92401985d162e42ffa450
SHA10f02fc517c7facc4baefde4fe9467fb6488ebabe
SHA256b746362010a101cb5931bc066f0f4d3fc740c02a68c1f37fc3c8e6c87fd7cb1e
SHA512e831a6ff987f3ef29982da16afad06938b68eddd43c234ba88d1c96a1b5547f2284baf35cbb3a5bfd75e7f0445d14daa014e0ba00b4db72c67f83f0a314c80c2
-
Filesize
31KB
MD5ed797d8dc2c92401985d162e42ffa450
SHA10f02fc517c7facc4baefde4fe9467fb6488ebabe
SHA256b746362010a101cb5931bc066f0f4d3fc740c02a68c1f37fc3c8e6c87fd7cb1e
SHA512e831a6ff987f3ef29982da16afad06938b68eddd43c234ba88d1c96a1b5547f2284baf35cbb3a5bfd75e7f0445d14daa014e0ba00b4db72c67f83f0a314c80c2
-
Filesize
31KB
MD5ed797d8dc2c92401985d162e42ffa450
SHA10f02fc517c7facc4baefde4fe9467fb6488ebabe
SHA256b746362010a101cb5931bc066f0f4d3fc740c02a68c1f37fc3c8e6c87fd7cb1e
SHA512e831a6ff987f3ef29982da16afad06938b68eddd43c234ba88d1c96a1b5547f2284baf35cbb3a5bfd75e7f0445d14daa014e0ba00b4db72c67f83f0a314c80c2
-
Filesize
292KB
MD5518ce1b2afc2d70896ccf5eea0c931a5
SHA13deb8749cd62e882453bc18827ab6f58c2489b07
SHA256ff2edad3e1d94f659db3522502afab58b8e93339a2a3502c6da46cf88389807c
SHA512825225674f0908f088897128a11b8c1ff84ceb04b6531c88fc2040a8e3e2ed0e5d60c7ba65cb330fc2b00f9c234853a98c79681cc5e7d238673c8c58dd3495b1
-
Filesize
292KB
MD5518ce1b2afc2d70896ccf5eea0c931a5
SHA13deb8749cd62e882453bc18827ab6f58c2489b07
SHA256ff2edad3e1d94f659db3522502afab58b8e93339a2a3502c6da46cf88389807c
SHA512825225674f0908f088897128a11b8c1ff84ceb04b6531c88fc2040a8e3e2ed0e5d60c7ba65cb330fc2b00f9c234853a98c79681cc5e7d238673c8c58dd3495b1
-
Filesize
3.0MB
MD5101805e8a353950b96986e86a32dda78
SHA1c507ad2cbcdc7525067301d751564b9c94157e27
SHA256f74cc391a224498f70d2df82121852fee7d53f0f40926d561e953a8d2dd08e5f
SHA51242f33d0f506c2034be1e8c5e956602c3d9e090f6744870f08a4a5bdfd93f3bdba2b70995ecc7a9b75ab042a617eda60d2c8ddc2366936d29f44f0bd09d792925
-
Filesize
3.0MB
MD5101805e8a353950b96986e86a32dda78
SHA1c507ad2cbcdc7525067301d751564b9c94157e27
SHA256f74cc391a224498f70d2df82121852fee7d53f0f40926d561e953a8d2dd08e5f
SHA51242f33d0f506c2034be1e8c5e956602c3d9e090f6744870f08a4a5bdfd93f3bdba2b70995ecc7a9b75ab042a617eda60d2c8ddc2366936d29f44f0bd09d792925
-
Filesize
31KB
MD5ed797d8dc2c92401985d162e42ffa450
SHA10f02fc517c7facc4baefde4fe9467fb6488ebabe
SHA256b746362010a101cb5931bc066f0f4d3fc740c02a68c1f37fc3c8e6c87fd7cb1e
SHA512e831a6ff987f3ef29982da16afad06938b68eddd43c234ba88d1c96a1b5547f2284baf35cbb3a5bfd75e7f0445d14daa014e0ba00b4db72c67f83f0a314c80c2
-
Filesize
31KB
MD5ed797d8dc2c92401985d162e42ffa450
SHA10f02fc517c7facc4baefde4fe9467fb6488ebabe
SHA256b746362010a101cb5931bc066f0f4d3fc740c02a68c1f37fc3c8e6c87fd7cb1e
SHA512e831a6ff987f3ef29982da16afad06938b68eddd43c234ba88d1c96a1b5547f2284baf35cbb3a5bfd75e7f0445d14daa014e0ba00b4db72c67f83f0a314c80c2
-
Filesize
292KB
MD5518ce1b2afc2d70896ccf5eea0c931a5
SHA13deb8749cd62e882453bc18827ab6f58c2489b07
SHA256ff2edad3e1d94f659db3522502afab58b8e93339a2a3502c6da46cf88389807c
SHA512825225674f0908f088897128a11b8c1ff84ceb04b6531c88fc2040a8e3e2ed0e5d60c7ba65cb330fc2b00f9c234853a98c79681cc5e7d238673c8c58dd3495b1
-
Filesize
292KB
MD5518ce1b2afc2d70896ccf5eea0c931a5
SHA13deb8749cd62e882453bc18827ab6f58c2489b07
SHA256ff2edad3e1d94f659db3522502afab58b8e93339a2a3502c6da46cf88389807c
SHA512825225674f0908f088897128a11b8c1ff84ceb04b6531c88fc2040a8e3e2ed0e5d60c7ba65cb330fc2b00f9c234853a98c79681cc5e7d238673c8c58dd3495b1
-
Filesize
3.0MB
MD5101805e8a353950b96986e86a32dda78
SHA1c507ad2cbcdc7525067301d751564b9c94157e27
SHA256f74cc391a224498f70d2df82121852fee7d53f0f40926d561e953a8d2dd08e5f
SHA51242f33d0f506c2034be1e8c5e956602c3d9e090f6744870f08a4a5bdfd93f3bdba2b70995ecc7a9b75ab042a617eda60d2c8ddc2366936d29f44f0bd09d792925