Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
29-01-2023 06:55
Static task
static1
Behavioral task
behavioral1
Sample
c9c15c614ea8a43be81ad6da31b320a1577f142ee1ec84e498bede89d360bdb3.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
c9c15c614ea8a43be81ad6da31b320a1577f142ee1ec84e498bede89d360bdb3.exe
Resource
win10v2004-20221111-en
General
-
Target
c9c15c614ea8a43be81ad6da31b320a1577f142ee1ec84e498bede89d360bdb3.exe
-
Size
480KB
-
MD5
84730977d3c5921ce72f06569e0303d7
-
SHA1
0136a583df02745bdc1bbef21e6bf395a07a87ab
-
SHA256
c9c15c614ea8a43be81ad6da31b320a1577f142ee1ec84e498bede89d360bdb3
-
SHA512
9f4b3eecb443f0b7b8cfc30dec73a2e04d639406e6c7c945382173d8bd11d12d28bb9e4888469ea0873e8f0c5b43ec0e9f3b6688afb8242dec451a353aa9e368
-
SSDEEP
12288:diJu+2t874tMkvsVSKgMG5PJVSiFCtDM:druNMMG5nSiFCtD
Malware Config
Signatures
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload 2 IoCs
resource yara_rule behavioral1/memory/984-75-0x0000000000400000-0x0000000000418000-memory.dmp family_isrstealer behavioral1/memory/984-79-0x0000000000400000-0x0000000000418000-memory.dmp family_isrstealer -
Executes dropped EXE 4 IoCs
pid Process 1764 7132194.exe 2024 7132194.exe 1872 gioc.exe 2004 gioc.exe -
resource yara_rule behavioral1/memory/984-67-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral1/memory/984-69-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral1/memory/984-73-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral1/memory/984-70-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral1/memory/984-75-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral1/memory/984-79-0x0000000000400000-0x0000000000418000-memory.dmp upx -
Loads dropped DLL 8 IoCs
pid Process 1220 c9c15c614ea8a43be81ad6da31b320a1577f142ee1ec84e498bede89d360bdb3.exe 1220 c9c15c614ea8a43be81ad6da31b320a1577f142ee1ec84e498bede89d360bdb3.exe 1220 c9c15c614ea8a43be81ad6da31b320a1577f142ee1ec84e498bede89d360bdb3.exe 1220 c9c15c614ea8a43be81ad6da31b320a1577f142ee1ec84e498bede89d360bdb3.exe 1220 c9c15c614ea8a43be81ad6da31b320a1577f142ee1ec84e498bede89d360bdb3.exe 1764 7132194.exe 2024 7132194.exe 2024 7132194.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\Currentversion\Run gioc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\{95F3E054-D72F-9A6F-9DD5-17F4C1F7062C} = "C:\\Users\\Admin\\AppData\\Roaming\\Uduby\\gioc.exe" gioc.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1220 set thread context of 984 1220 c9c15c614ea8a43be81ad6da31b320a1577f142ee1ec84e498bede89d360bdb3.exe 30 PID 1764 set thread context of 2024 1764 7132194.exe 31 PID 1872 set thread context of 2004 1872 gioc.exe 33 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 984 c9c15c614ea8a43be81ad6da31b320a1577f142ee1ec84e498bede89d360bdb3.exe 984 c9c15c614ea8a43be81ad6da31b320a1577f142ee1ec84e498bede89d360bdb3.exe 984 c9c15c614ea8a43be81ad6da31b320a1577f142ee1ec84e498bede89d360bdb3.exe 984 c9c15c614ea8a43be81ad6da31b320a1577f142ee1ec84e498bede89d360bdb3.exe 2004 gioc.exe 2004 gioc.exe 2004 gioc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeSecurityPrivilege 2024 7132194.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1220 c9c15c614ea8a43be81ad6da31b320a1577f142ee1ec84e498bede89d360bdb3.exe 1764 7132194.exe 984 c9c15c614ea8a43be81ad6da31b320a1577f142ee1ec84e498bede89d360bdb3.exe 1872 gioc.exe -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 1220 wrote to memory of 1764 1220 c9c15c614ea8a43be81ad6da31b320a1577f142ee1ec84e498bede89d360bdb3.exe 27 PID 1220 wrote to memory of 1764 1220 c9c15c614ea8a43be81ad6da31b320a1577f142ee1ec84e498bede89d360bdb3.exe 27 PID 1220 wrote to memory of 1764 1220 c9c15c614ea8a43be81ad6da31b320a1577f142ee1ec84e498bede89d360bdb3.exe 27 PID 1220 wrote to memory of 1764 1220 c9c15c614ea8a43be81ad6da31b320a1577f142ee1ec84e498bede89d360bdb3.exe 27 PID 1220 wrote to memory of 984 1220 c9c15c614ea8a43be81ad6da31b320a1577f142ee1ec84e498bede89d360bdb3.exe 30 PID 1220 wrote to memory of 984 1220 c9c15c614ea8a43be81ad6da31b320a1577f142ee1ec84e498bede89d360bdb3.exe 30 PID 1220 wrote to memory of 984 1220 c9c15c614ea8a43be81ad6da31b320a1577f142ee1ec84e498bede89d360bdb3.exe 30 PID 1220 wrote to memory of 984 1220 c9c15c614ea8a43be81ad6da31b320a1577f142ee1ec84e498bede89d360bdb3.exe 30 PID 1220 wrote to memory of 984 1220 c9c15c614ea8a43be81ad6da31b320a1577f142ee1ec84e498bede89d360bdb3.exe 30 PID 1220 wrote to memory of 984 1220 c9c15c614ea8a43be81ad6da31b320a1577f142ee1ec84e498bede89d360bdb3.exe 30 PID 1220 wrote to memory of 984 1220 c9c15c614ea8a43be81ad6da31b320a1577f142ee1ec84e498bede89d360bdb3.exe 30 PID 1220 wrote to memory of 984 1220 c9c15c614ea8a43be81ad6da31b320a1577f142ee1ec84e498bede89d360bdb3.exe 30 PID 1764 wrote to memory of 2024 1764 7132194.exe 31 PID 1764 wrote to memory of 2024 1764 7132194.exe 31 PID 1764 wrote to memory of 2024 1764 7132194.exe 31 PID 1764 wrote to memory of 2024 1764 7132194.exe 31 PID 1764 wrote to memory of 2024 1764 7132194.exe 31 PID 1764 wrote to memory of 2024 1764 7132194.exe 31 PID 1764 wrote to memory of 2024 1764 7132194.exe 31 PID 1764 wrote to memory of 2024 1764 7132194.exe 31 PID 1764 wrote to memory of 2024 1764 7132194.exe 31 PID 2024 wrote to memory of 1872 2024 7132194.exe 32 PID 2024 wrote to memory of 1872 2024 7132194.exe 32 PID 2024 wrote to memory of 1872 2024 7132194.exe 32 PID 2024 wrote to memory of 1872 2024 7132194.exe 32 PID 1872 wrote to memory of 2004 1872 gioc.exe 33 PID 1872 wrote to memory of 2004 1872 gioc.exe 33 PID 1872 wrote to memory of 2004 1872 gioc.exe 33 PID 1872 wrote to memory of 2004 1872 gioc.exe 33 PID 1872 wrote to memory of 2004 1872 gioc.exe 33 PID 1872 wrote to memory of 2004 1872 gioc.exe 33 PID 1872 wrote to memory of 2004 1872 gioc.exe 33 PID 1872 wrote to memory of 2004 1872 gioc.exe 33 PID 1872 wrote to memory of 2004 1872 gioc.exe 33 PID 2024 wrote to memory of 928 2024 7132194.exe 34 PID 2024 wrote to memory of 928 2024 7132194.exe 34 PID 2024 wrote to memory of 928 2024 7132194.exe 34 PID 2024 wrote to memory of 928 2024 7132194.exe 34 PID 2004 wrote to memory of 1128 2004 gioc.exe 13 PID 2004 wrote to memory of 1128 2004 gioc.exe 13 PID 2004 wrote to memory of 1128 2004 gioc.exe 13 PID 2004 wrote to memory of 1128 2004 gioc.exe 13 PID 2004 wrote to memory of 1128 2004 gioc.exe 13 PID 2004 wrote to memory of 1188 2004 gioc.exe 6 PID 2004 wrote to memory of 1188 2004 gioc.exe 6 PID 2004 wrote to memory of 1188 2004 gioc.exe 6 PID 2004 wrote to memory of 1188 2004 gioc.exe 6 PID 2004 wrote to memory of 1188 2004 gioc.exe 6 PID 2004 wrote to memory of 1224 2004 gioc.exe 12 PID 2004 wrote to memory of 1224 2004 gioc.exe 12 PID 2004 wrote to memory of 1224 2004 gioc.exe 12 PID 2004 wrote to memory of 1224 2004 gioc.exe 12 PID 2004 wrote to memory of 1224 2004 gioc.exe 12 PID 2004 wrote to memory of 368 2004 gioc.exe 28 PID 2004 wrote to memory of 368 2004 gioc.exe 28 PID 2004 wrote to memory of 368 2004 gioc.exe 28 PID 2004 wrote to memory of 368 2004 gioc.exe 28 PID 2004 wrote to memory of 368 2004 gioc.exe 28 PID 2004 wrote to memory of 928 2004 gioc.exe 34 PID 2004 wrote to memory of 928 2004 gioc.exe 34 PID 2004 wrote to memory of 928 2004 gioc.exe 34 PID 2004 wrote to memory of 928 2004 gioc.exe 34 PID 2004 wrote to memory of 928 2004 gioc.exe 34
Processes
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1188
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1224
-
C:\Users\Admin\AppData\Local\Temp\c9c15c614ea8a43be81ad6da31b320a1577f142ee1ec84e498bede89d360bdb3.exe"C:\Users\Admin\AppData\Local\Temp\c9c15c614ea8a43be81ad6da31b320a1577f142ee1ec84e498bede89d360bdb3.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Users\Admin\AppData\Local\Temp\7132194.exe"C:\Users\Admin\AppData\Local\Temp\7132194.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Users\Admin\AppData\Local\Temp\7132194.exe"C:\Users\Admin\AppData\Local\Temp\7132194.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Users\Admin\AppData\Roaming\Uduby\gioc.exe"C:\Users\Admin\AppData\Roaming\Uduby\gioc.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Users\Admin\AppData\Roaming\Uduby\gioc.exe"C:\Users\Admin\AppData\Roaming\Uduby\gioc.exe"6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2004
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp890f69e6.bat"5⤵PID:928
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\c9c15c614ea8a43be81ad6da31b320a1577f142ee1ec84e498bede89d360bdb3.exe"C:\Users\Admin\AppData\Local\Temp\c9c15c614ea8a43be81ad6da31b320a1577f142ee1ec84e498bede89d360bdb3.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:984
-
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1128
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:368
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
312KB
MD5c907917088779ac7dd2c35f1255846a0
SHA1eecdc166d70455d180276f3cc592d92fe4659c90
SHA256bcd73949ff5780c5dc60019c1d211bc926009b5fe81b47ee29fd88b05c87e200
SHA5126cde845481acc502ac1a1baa64fc264bf3400b1fdb165971550081a7f8ccba8ee749e4994c3a61348b6048b06540842884078ad0891185897d1155d15090d0e1
-
Filesize
312KB
MD5c907917088779ac7dd2c35f1255846a0
SHA1eecdc166d70455d180276f3cc592d92fe4659c90
SHA256bcd73949ff5780c5dc60019c1d211bc926009b5fe81b47ee29fd88b05c87e200
SHA5126cde845481acc502ac1a1baa64fc264bf3400b1fdb165971550081a7f8ccba8ee749e4994c3a61348b6048b06540842884078ad0891185897d1155d15090d0e1
-
Filesize
312KB
MD5c907917088779ac7dd2c35f1255846a0
SHA1eecdc166d70455d180276f3cc592d92fe4659c90
SHA256bcd73949ff5780c5dc60019c1d211bc926009b5fe81b47ee29fd88b05c87e200
SHA5126cde845481acc502ac1a1baa64fc264bf3400b1fdb165971550081a7f8ccba8ee749e4994c3a61348b6048b06540842884078ad0891185897d1155d15090d0e1
-
Filesize
193B
MD566983dc69a5e6a712d03c7f6e6af39ce
SHA178e901bdf0d3d7669589a6f86309cee3fefef920
SHA2563560fbb94525cb1269caf1c803e79e47317ad658695673cfaf0a582af9788382
SHA5120c3744ca221d0a946884092321e923a0a8476e269256d9f75117caf68b065612e6a8338f6f9b3393eb4a94d9144a852e5188a36340e6686218e404a4e697b68e
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-4063495947-34355257-727531523-1000\699c4b9cdebca7aaea5193cae8a50098_8e28fefd-2db0-4dd4-85d7-665f2cf2c74b
Filesize50B
MD55b63d4dd8c04c88c0e30e494ec6a609a
SHA1884d5a8bdc25fe794dc22ef9518009dcf0069d09
SHA2564d93c22555b3169e5c13716ca59b8b22892c69b3025aea841afe5259698102fd
SHA51215ff8551ac6b9de978050569bcdc26f44dfc06a0eaf445ac70fd45453a21bdafa3e4c8b4857d6a1c3226f4102a639682bdfb71d7b255062fb81a51c9126896cb
-
Filesize
312KB
MD51ec6a2a492e670274a3ce88030d6652f
SHA18d0d6e894432600bd28c26edc0230ad87cae1f5c
SHA256e06e01844aa4d90202aadcfb4baac93b8df7f926d296a57ec7f916177b1d609d
SHA51249391bf84e304818cc6aeda57bc51b6f1d0175f60b6a6deb8be3a5f23715a96e15736d42127878b7d787e657dc76ae8fd2f410e735f625e04db00d095be58b68
-
Filesize
312KB
MD51ec6a2a492e670274a3ce88030d6652f
SHA18d0d6e894432600bd28c26edc0230ad87cae1f5c
SHA256e06e01844aa4d90202aadcfb4baac93b8df7f926d296a57ec7f916177b1d609d
SHA51249391bf84e304818cc6aeda57bc51b6f1d0175f60b6a6deb8be3a5f23715a96e15736d42127878b7d787e657dc76ae8fd2f410e735f625e04db00d095be58b68
-
Filesize
312KB
MD51ec6a2a492e670274a3ce88030d6652f
SHA18d0d6e894432600bd28c26edc0230ad87cae1f5c
SHA256e06e01844aa4d90202aadcfb4baac93b8df7f926d296a57ec7f916177b1d609d
SHA51249391bf84e304818cc6aeda57bc51b6f1d0175f60b6a6deb8be3a5f23715a96e15736d42127878b7d787e657dc76ae8fd2f410e735f625e04db00d095be58b68
-
Filesize
312KB
MD5c907917088779ac7dd2c35f1255846a0
SHA1eecdc166d70455d180276f3cc592d92fe4659c90
SHA256bcd73949ff5780c5dc60019c1d211bc926009b5fe81b47ee29fd88b05c87e200
SHA5126cde845481acc502ac1a1baa64fc264bf3400b1fdb165971550081a7f8ccba8ee749e4994c3a61348b6048b06540842884078ad0891185897d1155d15090d0e1
-
Filesize
312KB
MD5c907917088779ac7dd2c35f1255846a0
SHA1eecdc166d70455d180276f3cc592d92fe4659c90
SHA256bcd73949ff5780c5dc60019c1d211bc926009b5fe81b47ee29fd88b05c87e200
SHA5126cde845481acc502ac1a1baa64fc264bf3400b1fdb165971550081a7f8ccba8ee749e4994c3a61348b6048b06540842884078ad0891185897d1155d15090d0e1
-
Filesize
312KB
MD5c907917088779ac7dd2c35f1255846a0
SHA1eecdc166d70455d180276f3cc592d92fe4659c90
SHA256bcd73949ff5780c5dc60019c1d211bc926009b5fe81b47ee29fd88b05c87e200
SHA5126cde845481acc502ac1a1baa64fc264bf3400b1fdb165971550081a7f8ccba8ee749e4994c3a61348b6048b06540842884078ad0891185897d1155d15090d0e1
-
Filesize
312KB
MD5c907917088779ac7dd2c35f1255846a0
SHA1eecdc166d70455d180276f3cc592d92fe4659c90
SHA256bcd73949ff5780c5dc60019c1d211bc926009b5fe81b47ee29fd88b05c87e200
SHA5126cde845481acc502ac1a1baa64fc264bf3400b1fdb165971550081a7f8ccba8ee749e4994c3a61348b6048b06540842884078ad0891185897d1155d15090d0e1
-
Filesize
312KB
MD5c907917088779ac7dd2c35f1255846a0
SHA1eecdc166d70455d180276f3cc592d92fe4659c90
SHA256bcd73949ff5780c5dc60019c1d211bc926009b5fe81b47ee29fd88b05c87e200
SHA5126cde845481acc502ac1a1baa64fc264bf3400b1fdb165971550081a7f8ccba8ee749e4994c3a61348b6048b06540842884078ad0891185897d1155d15090d0e1
-
Filesize
312KB
MD5c907917088779ac7dd2c35f1255846a0
SHA1eecdc166d70455d180276f3cc592d92fe4659c90
SHA256bcd73949ff5780c5dc60019c1d211bc926009b5fe81b47ee29fd88b05c87e200
SHA5126cde845481acc502ac1a1baa64fc264bf3400b1fdb165971550081a7f8ccba8ee749e4994c3a61348b6048b06540842884078ad0891185897d1155d15090d0e1
-
Filesize
312KB
MD51ec6a2a492e670274a3ce88030d6652f
SHA18d0d6e894432600bd28c26edc0230ad87cae1f5c
SHA256e06e01844aa4d90202aadcfb4baac93b8df7f926d296a57ec7f916177b1d609d
SHA51249391bf84e304818cc6aeda57bc51b6f1d0175f60b6a6deb8be3a5f23715a96e15736d42127878b7d787e657dc76ae8fd2f410e735f625e04db00d095be58b68
-
Filesize
312KB
MD51ec6a2a492e670274a3ce88030d6652f
SHA18d0d6e894432600bd28c26edc0230ad87cae1f5c
SHA256e06e01844aa4d90202aadcfb4baac93b8df7f926d296a57ec7f916177b1d609d
SHA51249391bf84e304818cc6aeda57bc51b6f1d0175f60b6a6deb8be3a5f23715a96e15736d42127878b7d787e657dc76ae8fd2f410e735f625e04db00d095be58b68