Analysis
-
max time kernel
42s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03-12-2022 06:28
Static task
static1
Behavioral task
behavioral1
Sample
7b5f23eeaa859056b764e21e1749980f40ab2a2237d4b7feb6c9f2574ad81364.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7b5f23eeaa859056b764e21e1749980f40ab2a2237d4b7feb6c9f2574ad81364.exe
Resource
win10v2004-20220812-en
General
-
Target
7b5f23eeaa859056b764e21e1749980f40ab2a2237d4b7feb6c9f2574ad81364.exe
-
Size
2.6MB
-
MD5
b2894f2cbe96e7354f45c92dbc81a6b2
-
SHA1
c11da9d91173628a9557e9a7950f6b1504afd8db
-
SHA256
7b5f23eeaa859056b764e21e1749980f40ab2a2237d4b7feb6c9f2574ad81364
-
SHA512
d44011b7f32b06f1d702c9270b106642a7b5c25fd15764cafb14f2dcf2ba6e1909b2b873bede3d9dee627843fa2733e18042f7e267dc5fa7a27835b87ed3fdf4
-
SSDEEP
24576:YHYxbvHwDr6Y/Hicgp/lUBXHYxbvHwDr6Y/Hicgp/lUBhshRdrEAbm4z:Y4xcD/6h0BX4xcD/6h0BhydYAm4z
Malware Config
Signatures
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload 7 IoCs
resource yara_rule behavioral1/files/0x00090000000122fa-69.dat family_isrstealer behavioral1/files/0x00090000000122fa-72.dat family_isrstealer behavioral1/files/0x00090000000122fa-75.dat family_isrstealer behavioral1/files/0x00090000000122fa-82.dat family_isrstealer behavioral1/files/0x00090000000122fa-87.dat family_isrstealer behavioral1/files/0x00090000000122fa-95.dat family_isrstealer behavioral1/files/0x00090000000122fa-94.dat family_isrstealer -
NirSoft MailPassView 5 IoCs
Password recovery tool for various email clients
resource yara_rule behavioral1/memory/1372-102-0x0000000000400000-0x000000000041F000-memory.dmp MailPassView behavioral1/memory/1228-104-0x0000000000400000-0x000000000041F000-memory.dmp MailPassView behavioral1/memory/1372-105-0x0000000000400000-0x000000000041F000-memory.dmp MailPassView behavioral1/memory/1228-108-0x0000000000400000-0x000000000041F000-memory.dmp MailPassView behavioral1/memory/1372-107-0x0000000000400000-0x000000000041F000-memory.dmp MailPassView -
Nirsoft 5 IoCs
resource yara_rule behavioral1/memory/1372-102-0x0000000000400000-0x000000000041F000-memory.dmp Nirsoft behavioral1/memory/1228-104-0x0000000000400000-0x000000000041F000-memory.dmp Nirsoft behavioral1/memory/1372-105-0x0000000000400000-0x000000000041F000-memory.dmp Nirsoft behavioral1/memory/1228-108-0x0000000000400000-0x000000000041F000-memory.dmp Nirsoft behavioral1/memory/1372-107-0x0000000000400000-0x000000000041F000-memory.dmp Nirsoft -
Executes dropped EXE 8 IoCs
pid Process 900 sermini.exe 964 sermini.exe 2000 Server.exe 1992 Server.exe 1696 Server.exe 1436 Server.exe 1228 Server.exe 1372 Server.exe -
resource yara_rule behavioral1/memory/1992-73-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/1992-79-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/1992-81-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/1992-89-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/1228-90-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1228-100-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1372-102-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1228-104-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1372-105-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1992-106-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/1228-108-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1372-107-0x0000000000400000-0x000000000041F000-memory.dmp upx -
Loads dropped DLL 4 IoCs
pid Process 1520 7b5f23eeaa859056b764e21e1749980f40ab2a2237d4b7feb6c9f2574ad81364.exe 1520 7b5f23eeaa859056b764e21e1749980f40ab2a2237d4b7feb6c9f2574ad81364.exe 1520 7b5f23eeaa859056b764e21e1749980f40ab2a2237d4b7feb6c9f2574ad81364.exe 1520 7b5f23eeaa859056b764e21e1749980f40ab2a2237d4b7feb6c9f2574ad81364.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook accounts 1 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts Server.exe Key opened \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts Server.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2000 set thread context of 1992 2000 Server.exe 31 PID 1696 set thread context of 1436 1696 Server.exe 33 PID 1696 set thread context of 1228 1696 Server.exe 35 PID 2000 set thread context of 1372 2000 Server.exe 34 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1520 7b5f23eeaa859056b764e21e1749980f40ab2a2237d4b7feb6c9f2574ad81364.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2000 Server.exe 1696 Server.exe -
Suspicious use of WriteProcessMemory 52 IoCs
description pid Process procid_target PID 1520 wrote to memory of 900 1520 7b5f23eeaa859056b764e21e1749980f40ab2a2237d4b7feb6c9f2574ad81364.exe 28 PID 1520 wrote to memory of 900 1520 7b5f23eeaa859056b764e21e1749980f40ab2a2237d4b7feb6c9f2574ad81364.exe 28 PID 1520 wrote to memory of 900 1520 7b5f23eeaa859056b764e21e1749980f40ab2a2237d4b7feb6c9f2574ad81364.exe 28 PID 1520 wrote to memory of 900 1520 7b5f23eeaa859056b764e21e1749980f40ab2a2237d4b7feb6c9f2574ad81364.exe 28 PID 1520 wrote to memory of 964 1520 7b5f23eeaa859056b764e21e1749980f40ab2a2237d4b7feb6c9f2574ad81364.exe 29 PID 1520 wrote to memory of 964 1520 7b5f23eeaa859056b764e21e1749980f40ab2a2237d4b7feb6c9f2574ad81364.exe 29 PID 1520 wrote to memory of 964 1520 7b5f23eeaa859056b764e21e1749980f40ab2a2237d4b7feb6c9f2574ad81364.exe 29 PID 1520 wrote to memory of 964 1520 7b5f23eeaa859056b764e21e1749980f40ab2a2237d4b7feb6c9f2574ad81364.exe 29 PID 900 wrote to memory of 2000 900 sermini.exe 30 PID 900 wrote to memory of 2000 900 sermini.exe 30 PID 900 wrote to memory of 2000 900 sermini.exe 30 PID 900 wrote to memory of 2000 900 sermini.exe 30 PID 2000 wrote to memory of 1992 2000 Server.exe 31 PID 2000 wrote to memory of 1992 2000 Server.exe 31 PID 2000 wrote to memory of 1992 2000 Server.exe 31 PID 2000 wrote to memory of 1992 2000 Server.exe 31 PID 2000 wrote to memory of 1992 2000 Server.exe 31 PID 2000 wrote to memory of 1992 2000 Server.exe 31 PID 2000 wrote to memory of 1992 2000 Server.exe 31 PID 2000 wrote to memory of 1992 2000 Server.exe 31 PID 2000 wrote to memory of 1992 2000 Server.exe 31 PID 964 wrote to memory of 1696 964 sermini.exe 32 PID 964 wrote to memory of 1696 964 sermini.exe 32 PID 964 wrote to memory of 1696 964 sermini.exe 32 PID 964 wrote to memory of 1696 964 sermini.exe 32 PID 1696 wrote to memory of 1436 1696 Server.exe 33 PID 1696 wrote to memory of 1436 1696 Server.exe 33 PID 1696 wrote to memory of 1436 1696 Server.exe 33 PID 1696 wrote to memory of 1436 1696 Server.exe 33 PID 1696 wrote to memory of 1436 1696 Server.exe 33 PID 1696 wrote to memory of 1436 1696 Server.exe 33 PID 1696 wrote to memory of 1436 1696 Server.exe 33 PID 1696 wrote to memory of 1436 1696 Server.exe 33 PID 1696 wrote to memory of 1436 1696 Server.exe 33 PID 1696 wrote to memory of 1228 1696 Server.exe 35 PID 1696 wrote to memory of 1228 1696 Server.exe 35 PID 1696 wrote to memory of 1228 1696 Server.exe 35 PID 1696 wrote to memory of 1228 1696 Server.exe 35 PID 1696 wrote to memory of 1228 1696 Server.exe 35 PID 1696 wrote to memory of 1228 1696 Server.exe 35 PID 1696 wrote to memory of 1228 1696 Server.exe 35 PID 1696 wrote to memory of 1228 1696 Server.exe 35 PID 2000 wrote to memory of 1372 2000 Server.exe 34 PID 2000 wrote to memory of 1372 2000 Server.exe 34 PID 2000 wrote to memory of 1372 2000 Server.exe 34 PID 2000 wrote to memory of 1372 2000 Server.exe 34 PID 2000 wrote to memory of 1372 2000 Server.exe 34 PID 2000 wrote to memory of 1372 2000 Server.exe 34 PID 2000 wrote to memory of 1372 2000 Server.exe 34 PID 2000 wrote to memory of 1372 2000 Server.exe 34 PID 1696 wrote to memory of 1228 1696 Server.exe 35 PID 2000 wrote to memory of 1372 2000 Server.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\7b5f23eeaa859056b764e21e1749980f40ab2a2237d4b7feb6c9f2574ad81364.exe"C:\Users\Admin\AppData\Local\Temp\7b5f23eeaa859056b764e21e1749980f40ab2a2237d4b7feb6c9f2574ad81364.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Users\Admin\AppData\Local\Temp\sermini.exe"C:\Users\Admin\AppData\Local\Temp\sermini.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:900 -
C:\Users\Admin\AppData\Roaming\Server.exe"C:\Users\Admin\AppData\Roaming\Server.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Users\Admin\AppData\Roaming\Server.exe/scomma "C:\Users\Admin\AppData\Local\Temp\PT91KVwAbt.ini"4⤵
- Executes dropped EXE
PID:1992
-
-
C:\Users\Admin\AppData\Roaming\Server.exe/scomma "C:\Users\Admin\AppData\Local\Temp\4iOREXLdmk.ini"4⤵
- Executes dropped EXE
- Accesses Microsoft Outlook accounts
PID:1372
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\sermini.exe"C:\Users\Admin\AppData\Local\Temp\sermini.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Users\Admin\AppData\Roaming\Server.exe"C:\Users\Admin\AppData\Roaming\Server.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Users\Admin\AppData\Roaming\Server.exe/scomma "C:\Users\Admin\AppData\Local\Temp\aWExuZHbu3.ini"4⤵
- Executes dropped EXE
PID:1436
-
-
C:\Users\Admin\AppData\Roaming\Server.exe/scomma "C:\Users\Admin\AppData\Local\Temp\4iOREXLdmk.ini"4⤵
- Executes dropped EXE
- Accesses Microsoft Outlook accounts
PID:1228
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD545d775dc475cd0fe65d96e57beb58acd
SHA193491ac5bb503a1022e2004e0b5ff0434f9bcea1
SHA2567797c2591a0051b65422b5919ecf9764b0e8f601cea40fe1afa21985d8216a0e
SHA5123394c1e0612c3514afd711c0ddb8098b61c54494177d8df757e0cb6b2ff12ed058151d16bfc3d6913d9624b268e64114f914d4003db99f69357f5696e26cb621
-
Filesize
1.2MB
MD545d775dc475cd0fe65d96e57beb58acd
SHA193491ac5bb503a1022e2004e0b5ff0434f9bcea1
SHA2567797c2591a0051b65422b5919ecf9764b0e8f601cea40fe1afa21985d8216a0e
SHA5123394c1e0612c3514afd711c0ddb8098b61c54494177d8df757e0cb6b2ff12ed058151d16bfc3d6913d9624b268e64114f914d4003db99f69357f5696e26cb621
-
Filesize
1.2MB
MD545d775dc475cd0fe65d96e57beb58acd
SHA193491ac5bb503a1022e2004e0b5ff0434f9bcea1
SHA2567797c2591a0051b65422b5919ecf9764b0e8f601cea40fe1afa21985d8216a0e
SHA5123394c1e0612c3514afd711c0ddb8098b61c54494177d8df757e0cb6b2ff12ed058151d16bfc3d6913d9624b268e64114f914d4003db99f69357f5696e26cb621
-
Filesize
260KB
MD5339e91d3f17423499c0f387b45c8b460
SHA17bc91865d6a1477d2a7461d2e9347e77e17107ed
SHA25603ec9e4d5f402f7d7397652e68530ca6a390c0c396a8677e2b3416af66bcf526
SHA5122cd0fea98d45f85e8358c51bc49b78bf9fe448231c0ac9c56bf4accb2a0ea8f21e8434065b082125972e95b48c931acc2938ddaac7f0b5f151623536bd44066b
-
Filesize
260KB
MD5339e91d3f17423499c0f387b45c8b460
SHA17bc91865d6a1477d2a7461d2e9347e77e17107ed
SHA25603ec9e4d5f402f7d7397652e68530ca6a390c0c396a8677e2b3416af66bcf526
SHA5122cd0fea98d45f85e8358c51bc49b78bf9fe448231c0ac9c56bf4accb2a0ea8f21e8434065b082125972e95b48c931acc2938ddaac7f0b5f151623536bd44066b
-
Filesize
260KB
MD5339e91d3f17423499c0f387b45c8b460
SHA17bc91865d6a1477d2a7461d2e9347e77e17107ed
SHA25603ec9e4d5f402f7d7397652e68530ca6a390c0c396a8677e2b3416af66bcf526
SHA5122cd0fea98d45f85e8358c51bc49b78bf9fe448231c0ac9c56bf4accb2a0ea8f21e8434065b082125972e95b48c931acc2938ddaac7f0b5f151623536bd44066b
-
Filesize
260KB
MD5339e91d3f17423499c0f387b45c8b460
SHA17bc91865d6a1477d2a7461d2e9347e77e17107ed
SHA25603ec9e4d5f402f7d7397652e68530ca6a390c0c396a8677e2b3416af66bcf526
SHA5122cd0fea98d45f85e8358c51bc49b78bf9fe448231c0ac9c56bf4accb2a0ea8f21e8434065b082125972e95b48c931acc2938ddaac7f0b5f151623536bd44066b
-
Filesize
260KB
MD5339e91d3f17423499c0f387b45c8b460
SHA17bc91865d6a1477d2a7461d2e9347e77e17107ed
SHA25603ec9e4d5f402f7d7397652e68530ca6a390c0c396a8677e2b3416af66bcf526
SHA5122cd0fea98d45f85e8358c51bc49b78bf9fe448231c0ac9c56bf4accb2a0ea8f21e8434065b082125972e95b48c931acc2938ddaac7f0b5f151623536bd44066b
-
Filesize
260KB
MD5339e91d3f17423499c0f387b45c8b460
SHA17bc91865d6a1477d2a7461d2e9347e77e17107ed
SHA25603ec9e4d5f402f7d7397652e68530ca6a390c0c396a8677e2b3416af66bcf526
SHA5122cd0fea98d45f85e8358c51bc49b78bf9fe448231c0ac9c56bf4accb2a0ea8f21e8434065b082125972e95b48c931acc2938ddaac7f0b5f151623536bd44066b
-
Filesize
260KB
MD5339e91d3f17423499c0f387b45c8b460
SHA17bc91865d6a1477d2a7461d2e9347e77e17107ed
SHA25603ec9e4d5f402f7d7397652e68530ca6a390c0c396a8677e2b3416af66bcf526
SHA5122cd0fea98d45f85e8358c51bc49b78bf9fe448231c0ac9c56bf4accb2a0ea8f21e8434065b082125972e95b48c931acc2938ddaac7f0b5f151623536bd44066b
-
Filesize
1.2MB
MD545d775dc475cd0fe65d96e57beb58acd
SHA193491ac5bb503a1022e2004e0b5ff0434f9bcea1
SHA2567797c2591a0051b65422b5919ecf9764b0e8f601cea40fe1afa21985d8216a0e
SHA5123394c1e0612c3514afd711c0ddb8098b61c54494177d8df757e0cb6b2ff12ed058151d16bfc3d6913d9624b268e64114f914d4003db99f69357f5696e26cb621
-
Filesize
1.2MB
MD545d775dc475cd0fe65d96e57beb58acd
SHA193491ac5bb503a1022e2004e0b5ff0434f9bcea1
SHA2567797c2591a0051b65422b5919ecf9764b0e8f601cea40fe1afa21985d8216a0e
SHA5123394c1e0612c3514afd711c0ddb8098b61c54494177d8df757e0cb6b2ff12ed058151d16bfc3d6913d9624b268e64114f914d4003db99f69357f5696e26cb621
-
Filesize
1.2MB
MD545d775dc475cd0fe65d96e57beb58acd
SHA193491ac5bb503a1022e2004e0b5ff0434f9bcea1
SHA2567797c2591a0051b65422b5919ecf9764b0e8f601cea40fe1afa21985d8216a0e
SHA5123394c1e0612c3514afd711c0ddb8098b61c54494177d8df757e0cb6b2ff12ed058151d16bfc3d6913d9624b268e64114f914d4003db99f69357f5696e26cb621
-
Filesize
1.2MB
MD545d775dc475cd0fe65d96e57beb58acd
SHA193491ac5bb503a1022e2004e0b5ff0434f9bcea1
SHA2567797c2591a0051b65422b5919ecf9764b0e8f601cea40fe1afa21985d8216a0e
SHA5123394c1e0612c3514afd711c0ddb8098b61c54494177d8df757e0cb6b2ff12ed058151d16bfc3d6913d9624b268e64114f914d4003db99f69357f5696e26cb621