Analysis

  • max time kernel
    158s
  • max time network
    89s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    01-12-2022 07:21

General

  • Target

    fda31f149676a5c9010d283b6302cbd148691b3129ce4481e8d8c4fe2912639b.exe

  • Size

    659KB

  • MD5

    40c4dcef207f79fd87ed126feaf47b20

  • SHA1

    170f9a30aced77be9f85393c26d937136c0aaf7d

  • SHA256

    fda31f149676a5c9010d283b6302cbd148691b3129ce4481e8d8c4fe2912639b

  • SHA512

    4835faee2c71a59746d473a3cc55142bb6530aa1d2ab65052feac0e8d100e3aa98f263814efc6dea212c226d87bc473713cc932810d796f6959952a7b4b802cc

  • SSDEEP

    12288:8GtnpSXzRVLgoGugOoMkWMjj4bntiJqvDBV4bTnYtC4qVknvjjun6UHGG9:8GtnpqPLgnlOoN5fYM4quvWfd9

Malware Config

Signatures

  • ISR Stealer

    ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

  • ISR Stealer payload 5 IoCs
  • Executes dropped EXE 3 IoCs
  • UPX packed file 22 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 11 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fda31f149676a5c9010d283b6302cbd148691b3129ce4481e8d8c4fe2912639b.exe
    "C:\Users\Admin\AppData\Local\Temp\fda31f149676a5c9010d283b6302cbd148691b3129ce4481e8d8c4fe2912639b.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1268
    • C:\Users\Admin\AppData\Local\Temp\Patch.exe
      "C:\Users\Admin\AppData\Local\Temp\Patch.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      PID:848
    • C:\Users\Admin\AppData\Local\Temp\xx.exe
      "C:\Users\Admin\AppData\Local\Temp\xx.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1532
      • C:\Users\Admin\AppData\Local\Temp\xx.exe
        "C:\Users\Admin\AppData\Local\Temp\xx.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:588
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x210
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:788

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Patch.exe

    Filesize

    518KB

    MD5

    6301f314bc5be80a8e26ef3a64d3822b

    SHA1

    c5fe8dd7166ae2fe6d2e867738b2d7521dd26b3d

    SHA256

    037dbb8f9f7e7cc78d89c68494620739123546bb3267369e897d6f1f1fa52c69

    SHA512

    fd2ebeb0f7046cc7a7be7e44302306745131aa46f9a7fe97d9e65fbaac143f542c2c47f7e1a53e5a002ba33cf0991aefda2e2c3851995fda236a9427b7a37e69

  • C:\Users\Admin\AppData\Local\Temp\Patch.exe

    Filesize

    518KB

    MD5

    6301f314bc5be80a8e26ef3a64d3822b

    SHA1

    c5fe8dd7166ae2fe6d2e867738b2d7521dd26b3d

    SHA256

    037dbb8f9f7e7cc78d89c68494620739123546bb3267369e897d6f1f1fa52c69

    SHA512

    fd2ebeb0f7046cc7a7be7e44302306745131aa46f9a7fe97d9e65fbaac143f542c2c47f7e1a53e5a002ba33cf0991aefda2e2c3851995fda236a9427b7a37e69

  • C:\Users\Admin\AppData\Local\Temp\xx.exe

    Filesize

    135KB

    MD5

    3e1e1fb050ac689fa976dd7e609da144

    SHA1

    492236ddd4f02a9a6e19dda741ea9214d312ad8e

    SHA256

    870fde24efd33834476251fda9f8e3b5b91bfedc113871b5556928e497105c6a

    SHA512

    b1724000e88c6b36f46f2ac09a83462227c330fb1d62a967d422539350da4a52f5c6a67bd98bdf2368ce05066f9096e1c1b640b9b22248729fd470fb906960e6

  • C:\Users\Admin\AppData\Local\Temp\xx.exe

    Filesize

    135KB

    MD5

    3e1e1fb050ac689fa976dd7e609da144

    SHA1

    492236ddd4f02a9a6e19dda741ea9214d312ad8e

    SHA256

    870fde24efd33834476251fda9f8e3b5b91bfedc113871b5556928e497105c6a

    SHA512

    b1724000e88c6b36f46f2ac09a83462227c330fb1d62a967d422539350da4a52f5c6a67bd98bdf2368ce05066f9096e1c1b640b9b22248729fd470fb906960e6

  • C:\Users\Admin\AppData\Local\Temp\xx.exe

    Filesize

    135KB

    MD5

    3e1e1fb050ac689fa976dd7e609da144

    SHA1

    492236ddd4f02a9a6e19dda741ea9214d312ad8e

    SHA256

    870fde24efd33834476251fda9f8e3b5b91bfedc113871b5556928e497105c6a

    SHA512

    b1724000e88c6b36f46f2ac09a83462227c330fb1d62a967d422539350da4a52f5c6a67bd98bdf2368ce05066f9096e1c1b640b9b22248729fd470fb906960e6

  • \Users\Admin\AppData\Local\Temp\Patch.exe

    Filesize

    518KB

    MD5

    6301f314bc5be80a8e26ef3a64d3822b

    SHA1

    c5fe8dd7166ae2fe6d2e867738b2d7521dd26b3d

    SHA256

    037dbb8f9f7e7cc78d89c68494620739123546bb3267369e897d6f1f1fa52c69

    SHA512

    fd2ebeb0f7046cc7a7be7e44302306745131aa46f9a7fe97d9e65fbaac143f542c2c47f7e1a53e5a002ba33cf0991aefda2e2c3851995fda236a9427b7a37e69

  • \Users\Admin\AppData\Local\Temp\Patch.exe

    Filesize

    518KB

    MD5

    6301f314bc5be80a8e26ef3a64d3822b

    SHA1

    c5fe8dd7166ae2fe6d2e867738b2d7521dd26b3d

    SHA256

    037dbb8f9f7e7cc78d89c68494620739123546bb3267369e897d6f1f1fa52c69

    SHA512

    fd2ebeb0f7046cc7a7be7e44302306745131aa46f9a7fe97d9e65fbaac143f542c2c47f7e1a53e5a002ba33cf0991aefda2e2c3851995fda236a9427b7a37e69

  • \Users\Admin\AppData\Local\Temp\xx.exe

    Filesize

    135KB

    MD5

    3e1e1fb050ac689fa976dd7e609da144

    SHA1

    492236ddd4f02a9a6e19dda741ea9214d312ad8e

    SHA256

    870fde24efd33834476251fda9f8e3b5b91bfedc113871b5556928e497105c6a

    SHA512

    b1724000e88c6b36f46f2ac09a83462227c330fb1d62a967d422539350da4a52f5c6a67bd98bdf2368ce05066f9096e1c1b640b9b22248729fd470fb906960e6

  • \Users\Admin\AppData\Local\Temp\xx.exe

    Filesize

    135KB

    MD5

    3e1e1fb050ac689fa976dd7e609da144

    SHA1

    492236ddd4f02a9a6e19dda741ea9214d312ad8e

    SHA256

    870fde24efd33834476251fda9f8e3b5b91bfedc113871b5556928e497105c6a

    SHA512

    b1724000e88c6b36f46f2ac09a83462227c330fb1d62a967d422539350da4a52f5c6a67bd98bdf2368ce05066f9096e1c1b640b9b22248729fd470fb906960e6

  • \Users\Admin\AppData\Local\Temp\xx.exe

    Filesize

    135KB

    MD5

    3e1e1fb050ac689fa976dd7e609da144

    SHA1

    492236ddd4f02a9a6e19dda741ea9214d312ad8e

    SHA256

    870fde24efd33834476251fda9f8e3b5b91bfedc113871b5556928e497105c6a

    SHA512

    b1724000e88c6b36f46f2ac09a83462227c330fb1d62a967d422539350da4a52f5c6a67bd98bdf2368ce05066f9096e1c1b640b9b22248729fd470fb906960e6

  • \Users\Admin\AppData\Local\Temp\xx.exe

    Filesize

    135KB

    MD5

    3e1e1fb050ac689fa976dd7e609da144

    SHA1

    492236ddd4f02a9a6e19dda741ea9214d312ad8e

    SHA256

    870fde24efd33834476251fda9f8e3b5b91bfedc113871b5556928e497105c6a

    SHA512

    b1724000e88c6b36f46f2ac09a83462227c330fb1d62a967d422539350da4a52f5c6a67bd98bdf2368ce05066f9096e1c1b640b9b22248729fd470fb906960e6

  • \Users\Admin\AppData\Local\Temp\xx.exe

    Filesize

    135KB

    MD5

    3e1e1fb050ac689fa976dd7e609da144

    SHA1

    492236ddd4f02a9a6e19dda741ea9214d312ad8e

    SHA256

    870fde24efd33834476251fda9f8e3b5b91bfedc113871b5556928e497105c6a

    SHA512

    b1724000e88c6b36f46f2ac09a83462227c330fb1d62a967d422539350da4a52f5c6a67bd98bdf2368ce05066f9096e1c1b640b9b22248729fd470fb906960e6

  • \Users\Admin\AppData\Local\Temp\xx.exe

    Filesize

    135KB

    MD5

    3e1e1fb050ac689fa976dd7e609da144

    SHA1

    492236ddd4f02a9a6e19dda741ea9214d312ad8e

    SHA256

    870fde24efd33834476251fda9f8e3b5b91bfedc113871b5556928e497105c6a

    SHA512

    b1724000e88c6b36f46f2ac09a83462227c330fb1d62a967d422539350da4a52f5c6a67bd98bdf2368ce05066f9096e1c1b640b9b22248729fd470fb906960e6

  • \Users\Admin\AppData\Local\Temp\xx.exe

    Filesize

    135KB

    MD5

    3e1e1fb050ac689fa976dd7e609da144

    SHA1

    492236ddd4f02a9a6e19dda741ea9214d312ad8e

    SHA256

    870fde24efd33834476251fda9f8e3b5b91bfedc113871b5556928e497105c6a

    SHA512

    b1724000e88c6b36f46f2ac09a83462227c330fb1d62a967d422539350da4a52f5c6a67bd98bdf2368ce05066f9096e1c1b640b9b22248729fd470fb906960e6

  • \Users\Admin\AppData\Local\Temp\xx.exe

    Filesize

    135KB

    MD5

    3e1e1fb050ac689fa976dd7e609da144

    SHA1

    492236ddd4f02a9a6e19dda741ea9214d312ad8e

    SHA256

    870fde24efd33834476251fda9f8e3b5b91bfedc113871b5556928e497105c6a

    SHA512

    b1724000e88c6b36f46f2ac09a83462227c330fb1d62a967d422539350da4a52f5c6a67bd98bdf2368ce05066f9096e1c1b640b9b22248729fd470fb906960e6

  • \Users\Admin\AppData\Local\Temp\xx.exe

    Filesize

    135KB

    MD5

    3e1e1fb050ac689fa976dd7e609da144

    SHA1

    492236ddd4f02a9a6e19dda741ea9214d312ad8e

    SHA256

    870fde24efd33834476251fda9f8e3b5b91bfedc113871b5556928e497105c6a

    SHA512

    b1724000e88c6b36f46f2ac09a83462227c330fb1d62a967d422539350da4a52f5c6a67bd98bdf2368ce05066f9096e1c1b640b9b22248729fd470fb906960e6

  • memory/588-96-0x0000000000330000-0x00000000003AE000-memory.dmp

    Filesize

    504KB

  • memory/588-81-0x0000000000400000-0x0000000000418000-memory.dmp

    Filesize

    96KB

  • memory/588-97-0x0000000000330000-0x00000000003AE000-memory.dmp

    Filesize

    504KB

  • memory/588-104-0x0000000000400000-0x0000000000418000-memory.dmp

    Filesize

    96KB

  • memory/588-102-0x0000000000330000-0x00000000003AE000-memory.dmp

    Filesize

    504KB

  • memory/588-85-0x0000000000400000-0x0000000000418000-memory.dmp

    Filesize

    96KB

  • memory/588-93-0x0000000000400000-0x0000000000418000-memory.dmp

    Filesize

    96KB

  • memory/588-98-0x0000000000330000-0x00000000003AE000-memory.dmp

    Filesize

    504KB

  • memory/588-103-0x0000000000400000-0x0000000000418000-memory.dmp

    Filesize

    96KB

  • memory/588-101-0x0000000000330000-0x00000000003AE000-memory.dmp

    Filesize

    504KB

  • memory/588-99-0x0000000000400000-0x0000000000418000-memory.dmp

    Filesize

    96KB

  • memory/588-92-0x0000000000400000-0x0000000000418000-memory.dmp

    Filesize

    96KB

  • memory/848-74-0x000007FEF2CF0000-0x000007FEF3D86000-memory.dmp

    Filesize

    16.6MB

  • memory/848-65-0x000007FEF41E0000-0x000007FEF4C03000-memory.dmp

    Filesize

    10.1MB

  • memory/848-100-0x0000000002066000-0x0000000002085000-memory.dmp

    Filesize

    124KB

  • memory/848-76-0x000007FEF2A90000-0x000007FEF2BD3000-memory.dmp

    Filesize

    1.3MB

  • memory/848-75-0x0000000002066000-0x0000000002085000-memory.dmp

    Filesize

    124KB

  • memory/1268-54-0x0000000075211000-0x0000000075213000-memory.dmp

    Filesize

    8KB

  • memory/1532-77-0x0000000000230000-0x00000000002AE000-memory.dmp

    Filesize

    504KB

  • memory/1532-86-0x0000000000400000-0x000000000047E000-memory.dmp

    Filesize

    504KB

  • memory/1532-79-0x0000000000400000-0x000000000047E000-memory.dmp

    Filesize

    504KB

  • memory/1532-78-0x0000000000230000-0x00000000002AE000-memory.dmp

    Filesize

    504KB

  • memory/1532-73-0x0000000000400000-0x000000000047E000-memory.dmp

    Filesize

    504KB

  • memory/1532-72-0x0000000000230000-0x00000000002AE000-memory.dmp

    Filesize

    504KB