Analysis

  • max time kernel
    174s
  • max time network
    32s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    02-12-2022 21:56

General

  • Target

    9369c8e914653070131fe9699d18617f367c403eae6d739bdef7974d50c3e032.exe

  • Size

    648KB

  • MD5

    612d3a263b05cdf932144c4b86a81588

  • SHA1

    c4fabf889d321b89c0ccd15ae4089afe3f21a18d

  • SHA256

    9369c8e914653070131fe9699d18617f367c403eae6d739bdef7974d50c3e032

  • SHA512

    81aa5b3b919299bfc3410ce7ee9016c43583b0d7a8be50913757b7f48d6f671c4dd7d259a9c3173a3e41245f63c10b54f45e127407664d53475e9d2ac97be2d1

  • SSDEEP

    6144:F76EZgP8mXJyt7q0hwf3bbf6NsV1ie7vdfY2zJlsJ9nuL5CAxTCCyzwZThI/2V:EE41J+qrzoup7BYyJlsJ9uEiA2V

Malware Config

Signatures

  • ISR Stealer

    ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

  • ISR Stealer payload 4 IoCs
  • Executes dropped EXE 6 IoCs
  • UPX packed file 21 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 10 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9369c8e914653070131fe9699d18617f367c403eae6d739bdef7974d50c3e032.exe
    "C:\Users\Admin\AppData\Local\Temp\9369c8e914653070131fe9699d18617f367c403eae6d739bdef7974d50c3e032.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1408
    • C:\Users\Admin\AppData\Local\Temp\9369c8e914653070131fe9699d18617f367c403eae6d739bdef7974d50c3e032.exe
      "C:\Users\Admin\AppData\Local\Temp\9369c8e914653070131fe9699d18617f367c403eae6d739bdef7974d50c3e032.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1116
      • C:\Users\Admin\AppData\Local\Temp\JEOJ59.exe
        "C:\Users\Admin\AppData\Local\Temp\JEOJ59.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:1720
    • C:\Users\Admin\AppData\Local\Temp\9369c8e914653070131fe9699d18617f367c403eae6d739bdef7974d50c3e032.exe
      "C:\Users\Admin\AppData\Local\Temp\9369c8e914653070131fe9699d18617f367c403eae6d739bdef7974d50c3e032.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:592
      • C:\Users\Admin\AppData\Roaming\FolderName\FileName.exe
        "C:\Users\Admin\AppData\Roaming\FolderName\FileName.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1712
        • C:\Users\Admin\AppData\Roaming\FolderName\FileName.exe
          "C:\Users\Admin\AppData\Roaming\FolderName\FileName.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:1156
        • C:\Users\Admin\AppData\Roaming\FolderName\FileName.exe
          "C:\Users\Admin\AppData\Roaming\FolderName\FileName.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:844
          • C:\Windows\SysWOW64\ipconfig.exe
            "C:\Windows\system32\ipconfig.exe"
            5⤵
            • Gathers network information
            • Suspicious use of WriteProcessMemory
            PID:1404
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c ""C:\Users\Admin\AppData\Local\Temp\GTPSW.bat" "
              6⤵
                PID:1184
                • C:\Windows\SysWOW64\reg.exe
                  REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Key Name" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\FolderName\FileName.exe" /f
                  7⤵
                  • Adds Run key to start application
                  PID:1612
          • C:\Users\Admin\AppData\Roaming\FolderName\FileName.exe
            "C:\Users\Admin\AppData\Roaming\FolderName\FileName.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:1796
            • C:\Users\Admin\AppData\Roaming\FolderName\FileName.exe
              /scomma "C:\Users\Admin\AppData\Local\Temp\tmp.ini"
              5⤵
              • Executes dropped EXE
              PID:1876

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\GTPSW.bat

      Filesize

      149B

      MD5

      a7721cdbbbba65653ea208cb8193d12b

      SHA1

      ddf61419fa642e1176c559790138e3a0ee898c65

      SHA256

      d2336e875fe13cec23a748d16db82a25ba2dff3ec8f7477e84c4121f4d2a6847

      SHA512

      12fbec3ddb7eb7da28a12889a32f4f2aeb20bab9564d876760f82f7615c017b592381ab6ba3d945ffdeba86a150f54ccbdfa961580b74fa6692fbcbb24b11bb6

    • C:\Users\Admin\AppData\Local\Temp\JEOJ59.exe

      Filesize

      584KB

      MD5

      faeba776a31577433922a73082aaa37b

      SHA1

      a7b0030ddb9b3ae2c7175025d4818f9b2a751144

      SHA256

      9ea32a5cc6884ca0f02074fc2033f41c32bfeee0ab3609a40dbb3ec29cae4c4f

      SHA512

      2162e2e01842b999214f5a507361655e9e01fc793352be19c3d0d726697e2a028bd632774ecfb1ef39d362c9e78bc732477af64c174fbf24f16120de59483d29

    • C:\Users\Admin\AppData\Roaming\FolderName\FileName.exe

      Filesize

      648KB

      MD5

      33738c73b47f526d005a3bb8cd17ec80

      SHA1

      a945e13f68993876b31b71743fa8b8599bc054b6

      SHA256

      f692ab08877c472feff8c4482ffcd33bcfb5ebca1f3af86269c0808beb830bb2

      SHA512

      c2ac3fb503f45d10b9019afbcbe7cae204c76af6747a2babeb137cd7633e048ce6c00770406eca60d4c5799d15da9dbc3ff25aebc89327f09f083fa664f4b38f

    • C:\Users\Admin\AppData\Roaming\FolderName\FileName.exe

      Filesize

      648KB

      MD5

      33738c73b47f526d005a3bb8cd17ec80

      SHA1

      a945e13f68993876b31b71743fa8b8599bc054b6

      SHA256

      f692ab08877c472feff8c4482ffcd33bcfb5ebca1f3af86269c0808beb830bb2

      SHA512

      c2ac3fb503f45d10b9019afbcbe7cae204c76af6747a2babeb137cd7633e048ce6c00770406eca60d4c5799d15da9dbc3ff25aebc89327f09f083fa664f4b38f

    • C:\Users\Admin\AppData\Roaming\FolderName\FileName.exe

      Filesize

      648KB

      MD5

      33738c73b47f526d005a3bb8cd17ec80

      SHA1

      a945e13f68993876b31b71743fa8b8599bc054b6

      SHA256

      f692ab08877c472feff8c4482ffcd33bcfb5ebca1f3af86269c0808beb830bb2

      SHA512

      c2ac3fb503f45d10b9019afbcbe7cae204c76af6747a2babeb137cd7633e048ce6c00770406eca60d4c5799d15da9dbc3ff25aebc89327f09f083fa664f4b38f

    • C:\Users\Admin\AppData\Roaming\FolderName\FileName.exe

      Filesize

      648KB

      MD5

      33738c73b47f526d005a3bb8cd17ec80

      SHA1

      a945e13f68993876b31b71743fa8b8599bc054b6

      SHA256

      f692ab08877c472feff8c4482ffcd33bcfb5ebca1f3af86269c0808beb830bb2

      SHA512

      c2ac3fb503f45d10b9019afbcbe7cae204c76af6747a2babeb137cd7633e048ce6c00770406eca60d4c5799d15da9dbc3ff25aebc89327f09f083fa664f4b38f

    • C:\Users\Admin\AppData\Roaming\FolderName\FileName.exe

      Filesize

      648KB

      MD5

      33738c73b47f526d005a3bb8cd17ec80

      SHA1

      a945e13f68993876b31b71743fa8b8599bc054b6

      SHA256

      f692ab08877c472feff8c4482ffcd33bcfb5ebca1f3af86269c0808beb830bb2

      SHA512

      c2ac3fb503f45d10b9019afbcbe7cae204c76af6747a2babeb137cd7633e048ce6c00770406eca60d4c5799d15da9dbc3ff25aebc89327f09f083fa664f4b38f

    • C:\Users\Admin\AppData\Roaming\FolderName\FileName.exe

      Filesize

      648KB

      MD5

      33738c73b47f526d005a3bb8cd17ec80

      SHA1

      a945e13f68993876b31b71743fa8b8599bc054b6

      SHA256

      f692ab08877c472feff8c4482ffcd33bcfb5ebca1f3af86269c0808beb830bb2

      SHA512

      c2ac3fb503f45d10b9019afbcbe7cae204c76af6747a2babeb137cd7633e048ce6c00770406eca60d4c5799d15da9dbc3ff25aebc89327f09f083fa664f4b38f

    • \Users\Admin\AppData\Local\Temp\JEOJ59.exe

      Filesize

      584KB

      MD5

      faeba776a31577433922a73082aaa37b

      SHA1

      a7b0030ddb9b3ae2c7175025d4818f9b2a751144

      SHA256

      9ea32a5cc6884ca0f02074fc2033f41c32bfeee0ab3609a40dbb3ec29cae4c4f

      SHA512

      2162e2e01842b999214f5a507361655e9e01fc793352be19c3d0d726697e2a028bd632774ecfb1ef39d362c9e78bc732477af64c174fbf24f16120de59483d29

    • \Users\Admin\AppData\Local\Temp\JEOJ59.exe

      Filesize

      584KB

      MD5

      faeba776a31577433922a73082aaa37b

      SHA1

      a7b0030ddb9b3ae2c7175025d4818f9b2a751144

      SHA256

      9ea32a5cc6884ca0f02074fc2033f41c32bfeee0ab3609a40dbb3ec29cae4c4f

      SHA512

      2162e2e01842b999214f5a507361655e9e01fc793352be19c3d0d726697e2a028bd632774ecfb1ef39d362c9e78bc732477af64c174fbf24f16120de59483d29

    • \Users\Admin\AppData\Local\Temp\JEOJ59.exe

      Filesize

      584KB

      MD5

      faeba776a31577433922a73082aaa37b

      SHA1

      a7b0030ddb9b3ae2c7175025d4818f9b2a751144

      SHA256

      9ea32a5cc6884ca0f02074fc2033f41c32bfeee0ab3609a40dbb3ec29cae4c4f

      SHA512

      2162e2e01842b999214f5a507361655e9e01fc793352be19c3d0d726697e2a028bd632774ecfb1ef39d362c9e78bc732477af64c174fbf24f16120de59483d29

    • \Users\Admin\AppData\Local\Temp\JEOJ59.exe

      Filesize

      584KB

      MD5

      faeba776a31577433922a73082aaa37b

      SHA1

      a7b0030ddb9b3ae2c7175025d4818f9b2a751144

      SHA256

      9ea32a5cc6884ca0f02074fc2033f41c32bfeee0ab3609a40dbb3ec29cae4c4f

      SHA512

      2162e2e01842b999214f5a507361655e9e01fc793352be19c3d0d726697e2a028bd632774ecfb1ef39d362c9e78bc732477af64c174fbf24f16120de59483d29

    • \Users\Admin\AppData\Local\Temp\JEOJ59.exe

      Filesize

      584KB

      MD5

      faeba776a31577433922a73082aaa37b

      SHA1

      a7b0030ddb9b3ae2c7175025d4818f9b2a751144

      SHA256

      9ea32a5cc6884ca0f02074fc2033f41c32bfeee0ab3609a40dbb3ec29cae4c4f

      SHA512

      2162e2e01842b999214f5a507361655e9e01fc793352be19c3d0d726697e2a028bd632774ecfb1ef39d362c9e78bc732477af64c174fbf24f16120de59483d29

    • \Users\Admin\AppData\Roaming\FolderName\FileName.exe

      Filesize

      648KB

      MD5

      33738c73b47f526d005a3bb8cd17ec80

      SHA1

      a945e13f68993876b31b71743fa8b8599bc054b6

      SHA256

      f692ab08877c472feff8c4482ffcd33bcfb5ebca1f3af86269c0808beb830bb2

      SHA512

      c2ac3fb503f45d10b9019afbcbe7cae204c76af6747a2babeb137cd7633e048ce6c00770406eca60d4c5799d15da9dbc3ff25aebc89327f09f083fa664f4b38f

    • \Users\Admin\AppData\Roaming\FolderName\FileName.exe

      Filesize

      648KB

      MD5

      33738c73b47f526d005a3bb8cd17ec80

      SHA1

      a945e13f68993876b31b71743fa8b8599bc054b6

      SHA256

      f692ab08877c472feff8c4482ffcd33bcfb5ebca1f3af86269c0808beb830bb2

      SHA512

      c2ac3fb503f45d10b9019afbcbe7cae204c76af6747a2babeb137cd7633e048ce6c00770406eca60d4c5799d15da9dbc3ff25aebc89327f09f083fa664f4b38f

    • \Users\Admin\AppData\Roaming\FolderName\FileName.exe

      Filesize

      648KB

      MD5

      33738c73b47f526d005a3bb8cd17ec80

      SHA1

      a945e13f68993876b31b71743fa8b8599bc054b6

      SHA256

      f692ab08877c472feff8c4482ffcd33bcfb5ebca1f3af86269c0808beb830bb2

      SHA512

      c2ac3fb503f45d10b9019afbcbe7cae204c76af6747a2babeb137cd7633e048ce6c00770406eca60d4c5799d15da9dbc3ff25aebc89327f09f083fa664f4b38f

    • \Users\Admin\AppData\Roaming\FolderName\FileName.exe

      Filesize

      648KB

      MD5

      33738c73b47f526d005a3bb8cd17ec80

      SHA1

      a945e13f68993876b31b71743fa8b8599bc054b6

      SHA256

      f692ab08877c472feff8c4482ffcd33bcfb5ebca1f3af86269c0808beb830bb2

      SHA512

      c2ac3fb503f45d10b9019afbcbe7cae204c76af6747a2babeb137cd7633e048ce6c00770406eca60d4c5799d15da9dbc3ff25aebc89327f09f083fa664f4b38f

    • \Users\Admin\AppData\Roaming\FolderName\FileName.exe

      Filesize

      648KB

      MD5

      33738c73b47f526d005a3bb8cd17ec80

      SHA1

      a945e13f68993876b31b71743fa8b8599bc054b6

      SHA256

      f692ab08877c472feff8c4482ffcd33bcfb5ebca1f3af86269c0808beb830bb2

      SHA512

      c2ac3fb503f45d10b9019afbcbe7cae204c76af6747a2babeb137cd7633e048ce6c00770406eca60d4c5799d15da9dbc3ff25aebc89327f09f083fa664f4b38f

    • memory/592-98-0x0000000000400000-0x0000000000412000-memory.dmp

      Filesize

      72KB

    • memory/592-64-0x0000000000400000-0x0000000000412000-memory.dmp

      Filesize

      72KB

    • memory/592-76-0x0000000000400000-0x0000000000412000-memory.dmp

      Filesize

      72KB

    • memory/592-75-0x0000000000400000-0x0000000000412000-memory.dmp

      Filesize

      72KB

    • memory/592-89-0x0000000000400000-0x0000000000412000-memory.dmp

      Filesize

      72KB

    • memory/592-69-0x0000000000400000-0x0000000000412000-memory.dmp

      Filesize

      72KB

    • memory/592-70-0x0000000000400000-0x0000000000412000-memory.dmp

      Filesize

      72KB

    • memory/592-65-0x0000000000400000-0x0000000000412000-memory.dmp

      Filesize

      72KB

    • memory/844-157-0x0000000000400000-0x0000000000412000-memory.dmp

      Filesize

      72KB

    • memory/844-137-0x0000000000400000-0x0000000000412000-memory.dmp

      Filesize

      72KB

    • memory/1116-61-0x0000000000400000-0x000000000049B000-memory.dmp

      Filesize

      620KB

    • memory/1116-151-0x0000000000400000-0x000000000049B000-memory.dmp

      Filesize

      620KB

    • memory/1116-60-0x0000000000400000-0x000000000049B000-memory.dmp

      Filesize

      620KB

    • memory/1116-66-0x0000000000400000-0x000000000049B000-memory.dmp

      Filesize

      620KB

    • memory/1116-68-0x0000000000400000-0x000000000049B000-memory.dmp

      Filesize

      620KB

    • memory/1116-58-0x0000000000400000-0x000000000049B000-memory.dmp

      Filesize

      620KB

    • memory/1116-57-0x0000000000400000-0x000000000049B000-memory.dmp

      Filesize

      620KB

    • memory/1156-130-0x0000000000400000-0x000000000049B000-memory.dmp

      Filesize

      620KB

    • memory/1408-56-0x0000000075F21000-0x0000000075F23000-memory.dmp

      Filesize

      8KB

    • memory/1796-128-0x0000000000400000-0x0000000000432000-memory.dmp

      Filesize

      200KB

    • memory/1796-147-0x0000000000400000-0x0000000000432000-memory.dmp

      Filesize

      200KB

    • memory/1796-132-0x0000000000400000-0x0000000000432000-memory.dmp

      Filesize

      200KB

    • memory/1796-122-0x0000000000400000-0x0000000000432000-memory.dmp

      Filesize

      200KB

    • memory/1796-121-0x0000000000400000-0x0000000000432000-memory.dmp

      Filesize

      200KB

    • memory/1876-145-0x0000000000400000-0x0000000000453000-memory.dmp

      Filesize

      332KB

    • memory/1876-146-0x0000000000400000-0x0000000000453000-memory.dmp

      Filesize

      332KB

    • memory/1876-148-0x0000000000400000-0x0000000000453000-memory.dmp

      Filesize

      332KB

    • memory/1876-152-0x0000000000400000-0x0000000000453000-memory.dmp

      Filesize

      332KB

    • memory/1876-140-0x0000000000400000-0x0000000000453000-memory.dmp

      Filesize

      332KB