Analysis
-
max time kernel
121s -
max time network
35s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
02-12-2022 21:57
Static task
static1
Behavioral task
behavioral1
Sample
537f1dcbcce67bfd21fb5fe053dfd49dc6cbbc1efc09874b29f2cc4263f87ba5.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
537f1dcbcce67bfd21fb5fe053dfd49dc6cbbc1efc09874b29f2cc4263f87ba5.exe
Resource
win10v2004-20220812-en
General
-
Target
537f1dcbcce67bfd21fb5fe053dfd49dc6cbbc1efc09874b29f2cc4263f87ba5.exe
-
Size
980KB
-
MD5
61ec9f33042ed7a5dbcf2aa174f3641e
-
SHA1
741ee7fd03da983bb934b8ee6c8c8c9f0d8cb0ff
-
SHA256
537f1dcbcce67bfd21fb5fe053dfd49dc6cbbc1efc09874b29f2cc4263f87ba5
-
SHA512
f68a7c356465f6bad55b6854870a8af46c67cde4251780abe2025721d2478ebbfede3bd84280eccc27553f8231e6028dc0f53aa0e3165df50950c4be412868f6
-
SSDEEP
12288:h2Ux5zpQmdTO3rlj/NSQPNE7bKVUW0IKvCnR77QV/VVvuFZFQW0xY38:EUxlTglJSQp90IcCnRMwZFQ8
Malware Config
Signatures
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload 4 IoCs
resource yara_rule behavioral1/memory/468-59-0x0000000000400000-0x000000000048D000-memory.dmp family_isrstealer behavioral1/memory/468-61-0x0000000000400000-0x000000000048D000-memory.dmp family_isrstealer behavioral1/memory/468-62-0x0000000000401130-mapping.dmp family_isrstealer behavioral1/memory/468-74-0x0000000000400000-0x000000000048D000-memory.dmp family_isrstealer -
resource yara_rule behavioral1/memory/1776-66-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/1776-71-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/1776-72-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/1776-73-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/1776-75-0x0000000000400000-0x0000000000453000-memory.dmp upx -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1164 set thread context of 468 1164 537f1dcbcce67bfd21fb5fe053dfd49dc6cbbc1efc09874b29f2cc4263f87ba5.exe 28 PID 468 set thread context of 1776 468 cvtres.exe 29 -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 1164 537f1dcbcce67bfd21fb5fe053dfd49dc6cbbc1efc09874b29f2cc4263f87ba5.exe 1164 537f1dcbcce67bfd21fb5fe053dfd49dc6cbbc1efc09874b29f2cc4263f87ba5.exe 1164 537f1dcbcce67bfd21fb5fe053dfd49dc6cbbc1efc09874b29f2cc4263f87ba5.exe 1164 537f1dcbcce67bfd21fb5fe053dfd49dc6cbbc1efc09874b29f2cc4263f87ba5.exe 1164 537f1dcbcce67bfd21fb5fe053dfd49dc6cbbc1efc09874b29f2cc4263f87ba5.exe 1164 537f1dcbcce67bfd21fb5fe053dfd49dc6cbbc1efc09874b29f2cc4263f87ba5.exe 1164 537f1dcbcce67bfd21fb5fe053dfd49dc6cbbc1efc09874b29f2cc4263f87ba5.exe 1164 537f1dcbcce67bfd21fb5fe053dfd49dc6cbbc1efc09874b29f2cc4263f87ba5.exe 1164 537f1dcbcce67bfd21fb5fe053dfd49dc6cbbc1efc09874b29f2cc4263f87ba5.exe 1164 537f1dcbcce67bfd21fb5fe053dfd49dc6cbbc1efc09874b29f2cc4263f87ba5.exe 1164 537f1dcbcce67bfd21fb5fe053dfd49dc6cbbc1efc09874b29f2cc4263f87ba5.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1164 537f1dcbcce67bfd21fb5fe053dfd49dc6cbbc1efc09874b29f2cc4263f87ba5.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 468 cvtres.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1164 wrote to memory of 468 1164 537f1dcbcce67bfd21fb5fe053dfd49dc6cbbc1efc09874b29f2cc4263f87ba5.exe 28 PID 1164 wrote to memory of 468 1164 537f1dcbcce67bfd21fb5fe053dfd49dc6cbbc1efc09874b29f2cc4263f87ba5.exe 28 PID 1164 wrote to memory of 468 1164 537f1dcbcce67bfd21fb5fe053dfd49dc6cbbc1efc09874b29f2cc4263f87ba5.exe 28 PID 1164 wrote to memory of 468 1164 537f1dcbcce67bfd21fb5fe053dfd49dc6cbbc1efc09874b29f2cc4263f87ba5.exe 28 PID 1164 wrote to memory of 468 1164 537f1dcbcce67bfd21fb5fe053dfd49dc6cbbc1efc09874b29f2cc4263f87ba5.exe 28 PID 1164 wrote to memory of 468 1164 537f1dcbcce67bfd21fb5fe053dfd49dc6cbbc1efc09874b29f2cc4263f87ba5.exe 28 PID 1164 wrote to memory of 468 1164 537f1dcbcce67bfd21fb5fe053dfd49dc6cbbc1efc09874b29f2cc4263f87ba5.exe 28 PID 1164 wrote to memory of 468 1164 537f1dcbcce67bfd21fb5fe053dfd49dc6cbbc1efc09874b29f2cc4263f87ba5.exe 28 PID 468 wrote to memory of 1776 468 cvtres.exe 29 PID 468 wrote to memory of 1776 468 cvtres.exe 29 PID 468 wrote to memory of 1776 468 cvtres.exe 29 PID 468 wrote to memory of 1776 468 cvtres.exe 29 PID 468 wrote to memory of 1776 468 cvtres.exe 29 PID 468 wrote to memory of 1776 468 cvtres.exe 29 PID 468 wrote to memory of 1776 468 cvtres.exe 29 PID 468 wrote to memory of 1776 468 cvtres.exe 29 PID 468 wrote to memory of 1776 468 cvtres.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\537f1dcbcce67bfd21fb5fe053dfd49dc6cbbc1efc09874b29f2cc4263f87ba5.exe"C:\Users\Admin\AppData\Local\Temp\537f1dcbcce67bfd21fb5fe053dfd49dc6cbbc1efc09874b29f2cc4263f87ba5.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe2⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe/scomma "C:\Users\Admin\AppData\Local\Temp\tmp.ini"3⤵PID:1776
-
-