Analysis
-
max time kernel
321s -
max time network
342s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
02/12/2022, 06:13
Static task
static1
Behavioral task
behavioral1
Sample
a1773b654b8724ebe57bc5d10cf65d2dc031846ab6bd3c96167c25aa23788b00.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a1773b654b8724ebe57bc5d10cf65d2dc031846ab6bd3c96167c25aa23788b00.exe
Resource
win10v2004-20221111-en
General
-
Target
a1773b654b8724ebe57bc5d10cf65d2dc031846ab6bd3c96167c25aa23788b00.exe
-
Size
408KB
-
MD5
a5dad59342b10f77be163943a0627875
-
SHA1
4a7d1f2ce7293794b74dc9d00d6fa1393d07a213
-
SHA256
a1773b654b8724ebe57bc5d10cf65d2dc031846ab6bd3c96167c25aa23788b00
-
SHA512
f6722bfbb610f44199c2595129b38145a0125afa50df9fe015f4e29e2fe90200c18ad84928835eaf85a4e3f91bcd5fb262ad4c257421da35475a55173a0ff18b
-
SSDEEP
6144:v7l/Mts0sXrneChRWcSUEC8ctAom2C+do4ON1ZA0bYQpBuLGlY+6iPHS/ei:hMSeChscpEBctA2Q11aPQ3/6/ei
Malware Config
Signatures
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload 7 IoCs
resource yara_rule behavioral2/memory/4652-141-0x0000000000400000-0x0000000000459000-memory.dmp family_isrstealer behavioral2/memory/4652-144-0x0000000000400000-0x0000000000459000-memory.dmp family_isrstealer behavioral2/memory/4652-150-0x0000000000400000-0x0000000000459000-memory.dmp family_isrstealer behavioral2/files/0x000c000000022dd6-153.dat family_isrstealer behavioral2/files/0x000c000000022dd6-154.dat family_isrstealer behavioral2/files/0x000c000000022dd6-159.dat family_isrstealer behavioral2/files/0x000c000000022dd6-167.dat family_isrstealer -
NirSoft WebBrowserPassView 1 IoCs
Password recovery tool for various web browsers
resource yara_rule behavioral2/memory/2844-166-0x0000000000400000-0x0000000000454000-memory.dmp WebBrowserPassView -
Nirsoft 1 IoCs
resource yara_rule behavioral2/memory/2844-166-0x0000000000400000-0x0000000000454000-memory.dmp Nirsoft -
Executes dropped EXE 3 IoCs
pid Process 4784 TOYTP.exe 4768 TOYTP.exe 2844 TOYTP.exe -
resource yara_rule behavioral2/memory/4652-135-0x0000000000400000-0x0000000000459000-memory.dmp upx behavioral2/memory/4652-139-0x0000000000400000-0x0000000000459000-memory.dmp upx behavioral2/memory/4652-141-0x0000000000400000-0x0000000000459000-memory.dmp upx behavioral2/memory/3824-138-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/4652-144-0x0000000000400000-0x0000000000459000-memory.dmp upx behavioral2/memory/3824-145-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/3824-146-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/3824-149-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/4652-150-0x0000000000400000-0x0000000000459000-memory.dmp upx -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation a1773b654b8724ebe57bc5d10cf65d2dc031846ab6bd3c96167c25aa23788b00.exe Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation a1773b654b8724ebe57bc5d10cf65d2dc031846ab6bd3c96167c25aa23788b00.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1612 set thread context of 4652 1612 a1773b654b8724ebe57bc5d10cf65d2dc031846ab6bd3c96167c25aa23788b00.exe 83 PID 1612 set thread context of 3824 1612 a1773b654b8724ebe57bc5d10cf65d2dc031846ab6bd3c96167c25aa23788b00.exe 85 PID 4784 set thread context of 4768 4784 TOYTP.exe 91 PID 4768 set thread context of 2844 4768 TOYTP.exe 93 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4784 TOYTP.exe 4784 TOYTP.exe 4784 TOYTP.exe 4784 TOYTP.exe 4784 TOYTP.exe 4784 TOYTP.exe 4784 TOYTP.exe 4784 TOYTP.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1612 a1773b654b8724ebe57bc5d10cf65d2dc031846ab6bd3c96167c25aa23788b00.exe 4652 a1773b654b8724ebe57bc5d10cf65d2dc031846ab6bd3c96167c25aa23788b00.exe 3824 a1773b654b8724ebe57bc5d10cf65d2dc031846ab6bd3c96167c25aa23788b00.exe 4784 TOYTP.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 1612 wrote to memory of 4652 1612 a1773b654b8724ebe57bc5d10cf65d2dc031846ab6bd3c96167c25aa23788b00.exe 83 PID 1612 wrote to memory of 4652 1612 a1773b654b8724ebe57bc5d10cf65d2dc031846ab6bd3c96167c25aa23788b00.exe 83 PID 1612 wrote to memory of 4652 1612 a1773b654b8724ebe57bc5d10cf65d2dc031846ab6bd3c96167c25aa23788b00.exe 83 PID 1612 wrote to memory of 4652 1612 a1773b654b8724ebe57bc5d10cf65d2dc031846ab6bd3c96167c25aa23788b00.exe 83 PID 1612 wrote to memory of 4652 1612 a1773b654b8724ebe57bc5d10cf65d2dc031846ab6bd3c96167c25aa23788b00.exe 83 PID 1612 wrote to memory of 4652 1612 a1773b654b8724ebe57bc5d10cf65d2dc031846ab6bd3c96167c25aa23788b00.exe 83 PID 1612 wrote to memory of 4652 1612 a1773b654b8724ebe57bc5d10cf65d2dc031846ab6bd3c96167c25aa23788b00.exe 83 PID 1612 wrote to memory of 4652 1612 a1773b654b8724ebe57bc5d10cf65d2dc031846ab6bd3c96167c25aa23788b00.exe 83 PID 1612 wrote to memory of 3824 1612 a1773b654b8724ebe57bc5d10cf65d2dc031846ab6bd3c96167c25aa23788b00.exe 85 PID 1612 wrote to memory of 3824 1612 a1773b654b8724ebe57bc5d10cf65d2dc031846ab6bd3c96167c25aa23788b00.exe 85 PID 1612 wrote to memory of 3824 1612 a1773b654b8724ebe57bc5d10cf65d2dc031846ab6bd3c96167c25aa23788b00.exe 85 PID 1612 wrote to memory of 3824 1612 a1773b654b8724ebe57bc5d10cf65d2dc031846ab6bd3c96167c25aa23788b00.exe 85 PID 1612 wrote to memory of 3824 1612 a1773b654b8724ebe57bc5d10cf65d2dc031846ab6bd3c96167c25aa23788b00.exe 85 PID 1612 wrote to memory of 3824 1612 a1773b654b8724ebe57bc5d10cf65d2dc031846ab6bd3c96167c25aa23788b00.exe 85 PID 1612 wrote to memory of 3824 1612 a1773b654b8724ebe57bc5d10cf65d2dc031846ab6bd3c96167c25aa23788b00.exe 85 PID 1612 wrote to memory of 3824 1612 a1773b654b8724ebe57bc5d10cf65d2dc031846ab6bd3c96167c25aa23788b00.exe 85 PID 3824 wrote to memory of 2040 3824 a1773b654b8724ebe57bc5d10cf65d2dc031846ab6bd3c96167c25aa23788b00.exe 88 PID 3824 wrote to memory of 2040 3824 a1773b654b8724ebe57bc5d10cf65d2dc031846ab6bd3c96167c25aa23788b00.exe 88 PID 3824 wrote to memory of 2040 3824 a1773b654b8724ebe57bc5d10cf65d2dc031846ab6bd3c96167c25aa23788b00.exe 88 PID 4652 wrote to memory of 4784 4652 a1773b654b8724ebe57bc5d10cf65d2dc031846ab6bd3c96167c25aa23788b00.exe 87 PID 4652 wrote to memory of 4784 4652 a1773b654b8724ebe57bc5d10cf65d2dc031846ab6bd3c96167c25aa23788b00.exe 87 PID 4652 wrote to memory of 4784 4652 a1773b654b8724ebe57bc5d10cf65d2dc031846ab6bd3c96167c25aa23788b00.exe 87 PID 4784 wrote to memory of 4768 4784 TOYTP.exe 91 PID 4784 wrote to memory of 4768 4784 TOYTP.exe 91 PID 4784 wrote to memory of 4768 4784 TOYTP.exe 91 PID 4784 wrote to memory of 4768 4784 TOYTP.exe 91 PID 4784 wrote to memory of 4768 4784 TOYTP.exe 91 PID 4784 wrote to memory of 4768 4784 TOYTP.exe 91 PID 4784 wrote to memory of 4768 4784 TOYTP.exe 91 PID 4784 wrote to memory of 4768 4784 TOYTP.exe 91 PID 4784 wrote to memory of 4768 4784 TOYTP.exe 91 PID 4784 wrote to memory of 4768 4784 TOYTP.exe 91 PID 4784 wrote to memory of 4768 4784 TOYTP.exe 91 PID 4784 wrote to memory of 4768 4784 TOYTP.exe 91 PID 4784 wrote to memory of 4768 4784 TOYTP.exe 91 PID 4768 wrote to memory of 2844 4768 TOYTP.exe 93 PID 4768 wrote to memory of 2844 4768 TOYTP.exe 93 PID 4768 wrote to memory of 2844 4768 TOYTP.exe 93 PID 4768 wrote to memory of 2844 4768 TOYTP.exe 93 PID 4768 wrote to memory of 2844 4768 TOYTP.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\a1773b654b8724ebe57bc5d10cf65d2dc031846ab6bd3c96167c25aa23788b00.exe"C:\Users\Admin\AppData\Local\Temp\a1773b654b8724ebe57bc5d10cf65d2dc031846ab6bd3c96167c25aa23788b00.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Users\Admin\AppData\Local\Temp\a1773b654b8724ebe57bc5d10cf65d2dc031846ab6bd3c96167c25aa23788b00.exe"C:\Users\Admin\AppData\Local\Temp\a1773b654b8724ebe57bc5d10cf65d2dc031846ab6bd3c96167c25aa23788b00.exe"2⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4652 -
C:\Users\Admin\AppData\Local\Temp\TOYTP.exe"C:\Users\Admin\AppData\Local\Temp\TOYTP.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4784 -
C:\Users\Admin\AppData\Local\Temp\TOYTP.exe"C:\Users\Admin\AppData\Local\Temp\TOYTP.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4768 -
C:\Users\Admin\AppData\Local\Temp\TOYTP.exe"C:\Users\Admin\AppData\Local\Temp\TOYTP.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp5⤵
- Executes dropped EXE
PID:2844
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\a1773b654b8724ebe57bc5d10cf65d2dc031846ab6bd3c96167c25aa23788b00.exe"C:\Users\Admin\AppData\Local\Temp\a1773b654b8724ebe57bc5d10cf65d2dc031846ab6bd3c96167c25aa23788b00.exe"2⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3824 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ELLUQ.bat" "3⤵PID:2040
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD55f88391307396bd801e5d983e4f96ac4
SHA1d426f3dad0cd9f13287b263028ad4587f2b1d9c8
SHA2562d6e24c71a3081416896765d09901744dbd541553af2d831f2a17f6f38ac4dec
SHA5120cc65532264fe5541dc75016c080004c111fecfb97f2f0063984a89089d49ea07a1bf6c1fa9b835ad32cfa986bac82d171351c6cf2163598199588aefdb402f8
-
Filesize
320KB
MD5ccc2260269cb43ddadda9444e3d112f7
SHA1ddab46acc12d7c60a15fa363f88030f1dd539fcb
SHA2568ca1bd039407381c33fb7ab570b6e95b0ce64b0d5ef64a1968f9b55647cc1911
SHA512787d0b4f5d89b840a4917c78e46f963c8c96a96ec005b45d085222ef307c2a76f074c4a65ca033b038e1b7d1419c7cd3c5c5f3075c3ea24e546c68bdd7643fde
-
Filesize
320KB
MD5ccc2260269cb43ddadda9444e3d112f7
SHA1ddab46acc12d7c60a15fa363f88030f1dd539fcb
SHA2568ca1bd039407381c33fb7ab570b6e95b0ce64b0d5ef64a1968f9b55647cc1911
SHA512787d0b4f5d89b840a4917c78e46f963c8c96a96ec005b45d085222ef307c2a76f074c4a65ca033b038e1b7d1419c7cd3c5c5f3075c3ea24e546c68bdd7643fde
-
Filesize
320KB
MD5ccc2260269cb43ddadda9444e3d112f7
SHA1ddab46acc12d7c60a15fa363f88030f1dd539fcb
SHA2568ca1bd039407381c33fb7ab570b6e95b0ce64b0d5ef64a1968f9b55647cc1911
SHA512787d0b4f5d89b840a4917c78e46f963c8c96a96ec005b45d085222ef307c2a76f074c4a65ca033b038e1b7d1419c7cd3c5c5f3075c3ea24e546c68bdd7643fde
-
Filesize
320KB
MD5ccc2260269cb43ddadda9444e3d112f7
SHA1ddab46acc12d7c60a15fa363f88030f1dd539fcb
SHA2568ca1bd039407381c33fb7ab570b6e95b0ce64b0d5ef64a1968f9b55647cc1911
SHA512787d0b4f5d89b840a4917c78e46f963c8c96a96ec005b45d085222ef307c2a76f074c4a65ca033b038e1b7d1419c7cd3c5c5f3075c3ea24e546c68bdd7643fde