Analysis
-
max time kernel
133s -
max time network
169s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
06-12-2022 14:58
Static task
static1
Behavioral task
behavioral1
Sample
7cc8c112ed99935b0a69b1ddd4fe672eaab54310b75e467ca1485b0a2e589a1c.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
7cc8c112ed99935b0a69b1ddd4fe672eaab54310b75e467ca1485b0a2e589a1c.exe
Resource
win10v2004-20221111-en
General
-
Target
7cc8c112ed99935b0a69b1ddd4fe672eaab54310b75e467ca1485b0a2e589a1c.exe
-
Size
269KB
-
MD5
8269b1107aeefdb83374ecc9149878f5
-
SHA1
274e6dabe1574074fc4303167030fd21d184789e
-
SHA256
7cc8c112ed99935b0a69b1ddd4fe672eaab54310b75e467ca1485b0a2e589a1c
-
SHA512
f16f8c9812fd1b56093882f9d8d3bdcabb43d1fbdcedbfe6bd83cf820316a7b772a913d5a6ce61957c676f6057f9aac614a072bcbdd320c8b52379d937949b3b
-
SSDEEP
6144:BP8ilqgFAjN98/Un8Ple1evMigXAuQoYE1R:BP8ilPKROs8JvNgXBQPE1
Malware Config
Signatures
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload 1 IoCs
resource yara_rule behavioral2/memory/2348-135-0x0000000000370000-0x00000000003B2000-memory.dmp family_isrstealer -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation 7cc8c112ed99935b0a69b1ddd4fe672eaab54310b75e467ca1485b0a2e589a1c.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Win Update = "C:\\Users\\Admin\\AppData\\Local\\Temp\\7cc8c112ed99935b0a69b1ddd4fe672eaab54310b75e467ca1485b0a2e589a1c.exe" reg.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2280 set thread context of 2348 2280 7cc8c112ed99935b0a69b1ddd4fe672eaab54310b75e467ca1485b0a2e589a1c.exe 82 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry key 1 TTPs 1 IoCs
pid Process 1832 reg.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2280 wrote to memory of 2348 2280 7cc8c112ed99935b0a69b1ddd4fe672eaab54310b75e467ca1485b0a2e589a1c.exe 82 PID 2280 wrote to memory of 2348 2280 7cc8c112ed99935b0a69b1ddd4fe672eaab54310b75e467ca1485b0a2e589a1c.exe 82 PID 2280 wrote to memory of 2348 2280 7cc8c112ed99935b0a69b1ddd4fe672eaab54310b75e467ca1485b0a2e589a1c.exe 82 PID 2280 wrote to memory of 2348 2280 7cc8c112ed99935b0a69b1ddd4fe672eaab54310b75e467ca1485b0a2e589a1c.exe 82 PID 2280 wrote to memory of 2348 2280 7cc8c112ed99935b0a69b1ddd4fe672eaab54310b75e467ca1485b0a2e589a1c.exe 82 PID 2280 wrote to memory of 2348 2280 7cc8c112ed99935b0a69b1ddd4fe672eaab54310b75e467ca1485b0a2e589a1c.exe 82 PID 2280 wrote to memory of 2348 2280 7cc8c112ed99935b0a69b1ddd4fe672eaab54310b75e467ca1485b0a2e589a1c.exe 82 PID 2280 wrote to memory of 4220 2280 7cc8c112ed99935b0a69b1ddd4fe672eaab54310b75e467ca1485b0a2e589a1c.exe 85 PID 2280 wrote to memory of 4220 2280 7cc8c112ed99935b0a69b1ddd4fe672eaab54310b75e467ca1485b0a2e589a1c.exe 85 PID 2280 wrote to memory of 4220 2280 7cc8c112ed99935b0a69b1ddd4fe672eaab54310b75e467ca1485b0a2e589a1c.exe 85 PID 4220 wrote to memory of 1832 4220 cmd.exe 87 PID 4220 wrote to memory of 1832 4220 cmd.exe 87 PID 4220 wrote to memory of 1832 4220 cmd.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\7cc8c112ed99935b0a69b1ddd4fe672eaab54310b75e467ca1485b0a2e589a1c.exe"C:\Users\Admin\AppData\Local\Temp\7cc8c112ed99935b0a69b1ddd4fe672eaab54310b75e467ca1485b0a2e589a1c.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Users\Admin\AppData\Local\Temp\7cc8c112ed99935b0a69b1ddd4fe672eaab54310b75e467ca1485b0a2e589a1c.exe"C:\Users\Admin\AppData\Local\Temp\7cc8c112ed99935b0a69b1ddd4fe672eaab54310b75e467ca1485b0a2e589a1c.exe"2⤵PID:2348
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Win Update" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\7cc8c112ed99935b0a69b1ddd4fe672eaab54310b75e467ca1485b0a2e589a1c.exe" & exit2⤵
- Suspicious use of WriteProcessMemory
PID:4220 -
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Win Update" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\7cc8c112ed99935b0a69b1ddd4fe672eaab54310b75e467ca1485b0a2e589a1c.exe"3⤵
- Adds Run key to start application
- Modifies registry key
PID:1832
-
-