Analysis
-
max time kernel
143s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
14-10-2023 17:53
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.491d858a95b0dc7ff89f628df79b6cd0.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.491d858a95b0dc7ff89f628df79b6cd0.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.491d858a95b0dc7ff89f628df79b6cd0.exe
-
Size
320KB
-
MD5
491d858a95b0dc7ff89f628df79b6cd0
-
SHA1
506dcbfcdf033b612c00f16cdd8169d834209245
-
SHA256
2c26f1d6d69ba05205ddd03ab98162995885cdec77ddb68762f8e1898f405ee8
-
SHA512
dc9641334d4f80f956070f5a4ee05d0235dcf22d6ab8325b60b0b01c6b21cf44ca408f85ea6b7737f63051a9f40ba7f0e39fdcf30360eff040ff2c09405ff53a
-
SSDEEP
6144:M9pIkYUUY44xTpp9AHKVKUkAGijl7xriJOwAydhnxt:qaNUUn4xTv9dVJNriJXbt
Malware Config
Signatures
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload 4 IoCs
resource yara_rule behavioral2/memory/4984-1-0x0000000000400000-0x0000000000442000-memory.dmp family_isrstealer behavioral2/memory/3932-6-0x0000000000400000-0x0000000000442000-memory.dmp family_isrstealer behavioral2/memory/3932-23-0x0000000000400000-0x0000000000442000-memory.dmp family_isrstealer behavioral2/memory/3932-37-0x0000000000400000-0x0000000000442000-memory.dmp family_isrstealer -
NirSoft MailPassView 2 IoCs
Password recovery tool for various email clients
resource yara_rule behavioral2/memory/1168-33-0x0000000000400000-0x000000000041F000-memory.dmp MailPassView behavioral2/memory/1168-35-0x0000000000400000-0x000000000041F000-memory.dmp MailPassView -
Nirsoft 2 IoCs
resource yara_rule behavioral2/memory/1168-33-0x0000000000400000-0x000000000041F000-memory.dmp Nirsoft behavioral2/memory/1168-35-0x0000000000400000-0x000000000041F000-memory.dmp Nirsoft -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/2492-2-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral2/memory/2140-12-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral2/memory/2140-14-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral2/memory/2140-13-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral2/memory/2140-16-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral2/memory/4904-22-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1168-32-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1168-34-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1168-33-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1168-35-0x0000000000400000-0x000000000041F000-memory.dmp upx -
Accesses Microsoft Outlook accounts 1 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts iexplore.exe Key opened \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts NEAS.491d858a95b0dc7ff89f628df79b6cd0.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 4996 set thread context of 4984 4996 NEAS.491d858a95b0dc7ff89f628df79b6cd0.exe 82 PID 4984 set thread context of 2492 4984 iexplore.exe 83 PID 4996 set thread context of 3932 4996 NEAS.491d858a95b0dc7ff89f628df79b6cd0.exe 86 PID 3932 set thread context of 2140 3932 NEAS.491d858a95b0dc7ff89f628df79b6cd0.exe 87 PID 4984 set thread context of 4904 4984 iexplore.exe 88 PID 3932 set thread context of 1168 3932 NEAS.491d858a95b0dc7ff89f628df79b6cd0.exe 94 -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4996 NEAS.491d858a95b0dc7ff89f628df79b6cd0.exe 4996 NEAS.491d858a95b0dc7ff89f628df79b6cd0.exe 4996 NEAS.491d858a95b0dc7ff89f628df79b6cd0.exe 4996 NEAS.491d858a95b0dc7ff89f628df79b6cd0.exe 4996 NEAS.491d858a95b0dc7ff89f628df79b6cd0.exe 4996 NEAS.491d858a95b0dc7ff89f628df79b6cd0.exe 4996 NEAS.491d858a95b0dc7ff89f628df79b6cd0.exe 4996 NEAS.491d858a95b0dc7ff89f628df79b6cd0.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4996 NEAS.491d858a95b0dc7ff89f628df79b6cd0.exe 4996 NEAS.491d858a95b0dc7ff89f628df79b6cd0.exe 4984 iexplore.exe 3932 NEAS.491d858a95b0dc7ff89f628df79b6cd0.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 4996 wrote to memory of 4984 4996 NEAS.491d858a95b0dc7ff89f628df79b6cd0.exe 82 PID 4996 wrote to memory of 4984 4996 NEAS.491d858a95b0dc7ff89f628df79b6cd0.exe 82 PID 4996 wrote to memory of 4984 4996 NEAS.491d858a95b0dc7ff89f628df79b6cd0.exe 82 PID 4996 wrote to memory of 4984 4996 NEAS.491d858a95b0dc7ff89f628df79b6cd0.exe 82 PID 4996 wrote to memory of 4984 4996 NEAS.491d858a95b0dc7ff89f628df79b6cd0.exe 82 PID 4996 wrote to memory of 4984 4996 NEAS.491d858a95b0dc7ff89f628df79b6cd0.exe 82 PID 4996 wrote to memory of 4984 4996 NEAS.491d858a95b0dc7ff89f628df79b6cd0.exe 82 PID 4996 wrote to memory of 4984 4996 NEAS.491d858a95b0dc7ff89f628df79b6cd0.exe 82 PID 4984 wrote to memory of 2492 4984 iexplore.exe 83 PID 4984 wrote to memory of 2492 4984 iexplore.exe 83 PID 4984 wrote to memory of 2492 4984 iexplore.exe 83 PID 4984 wrote to memory of 2492 4984 iexplore.exe 83 PID 4984 wrote to memory of 2492 4984 iexplore.exe 83 PID 4984 wrote to memory of 2492 4984 iexplore.exe 83 PID 4984 wrote to memory of 2492 4984 iexplore.exe 83 PID 4984 wrote to memory of 2492 4984 iexplore.exe 83 PID 4996 wrote to memory of 3932 4996 NEAS.491d858a95b0dc7ff89f628df79b6cd0.exe 86 PID 4996 wrote to memory of 3932 4996 NEAS.491d858a95b0dc7ff89f628df79b6cd0.exe 86 PID 4996 wrote to memory of 3932 4996 NEAS.491d858a95b0dc7ff89f628df79b6cd0.exe 86 PID 4996 wrote to memory of 3932 4996 NEAS.491d858a95b0dc7ff89f628df79b6cd0.exe 86 PID 4996 wrote to memory of 3932 4996 NEAS.491d858a95b0dc7ff89f628df79b6cd0.exe 86 PID 4996 wrote to memory of 3932 4996 NEAS.491d858a95b0dc7ff89f628df79b6cd0.exe 86 PID 4996 wrote to memory of 3932 4996 NEAS.491d858a95b0dc7ff89f628df79b6cd0.exe 86 PID 4996 wrote to memory of 3932 4996 NEAS.491d858a95b0dc7ff89f628df79b6cd0.exe 86 PID 3932 wrote to memory of 2140 3932 NEAS.491d858a95b0dc7ff89f628df79b6cd0.exe 87 PID 3932 wrote to memory of 2140 3932 NEAS.491d858a95b0dc7ff89f628df79b6cd0.exe 87 PID 3932 wrote to memory of 2140 3932 NEAS.491d858a95b0dc7ff89f628df79b6cd0.exe 87 PID 3932 wrote to memory of 2140 3932 NEAS.491d858a95b0dc7ff89f628df79b6cd0.exe 87 PID 3932 wrote to memory of 2140 3932 NEAS.491d858a95b0dc7ff89f628df79b6cd0.exe 87 PID 3932 wrote to memory of 2140 3932 NEAS.491d858a95b0dc7ff89f628df79b6cd0.exe 87 PID 3932 wrote to memory of 2140 3932 NEAS.491d858a95b0dc7ff89f628df79b6cd0.exe 87 PID 3932 wrote to memory of 2140 3932 NEAS.491d858a95b0dc7ff89f628df79b6cd0.exe 87 PID 4984 wrote to memory of 4904 4984 iexplore.exe 88 PID 4984 wrote to memory of 4904 4984 iexplore.exe 88 PID 4984 wrote to memory of 4904 4984 iexplore.exe 88 PID 4984 wrote to memory of 4904 4984 iexplore.exe 88 PID 4984 wrote to memory of 4904 4984 iexplore.exe 88 PID 4984 wrote to memory of 4904 4984 iexplore.exe 88 PID 4984 wrote to memory of 4904 4984 iexplore.exe 88 PID 4984 wrote to memory of 4904 4984 iexplore.exe 88 PID 3932 wrote to memory of 1168 3932 NEAS.491d858a95b0dc7ff89f628df79b6cd0.exe 94 PID 3932 wrote to memory of 1168 3932 NEAS.491d858a95b0dc7ff89f628df79b6cd0.exe 94 PID 3932 wrote to memory of 1168 3932 NEAS.491d858a95b0dc7ff89f628df79b6cd0.exe 94 PID 3932 wrote to memory of 1168 3932 NEAS.491d858a95b0dc7ff89f628df79b6cd0.exe 94 PID 3932 wrote to memory of 1168 3932 NEAS.491d858a95b0dc7ff89f628df79b6cd0.exe 94 PID 3932 wrote to memory of 1168 3932 NEAS.491d858a95b0dc7ff89f628df79b6cd0.exe 94 PID 3932 wrote to memory of 1168 3932 NEAS.491d858a95b0dc7ff89f628df79b6cd0.exe 94 PID 3932 wrote to memory of 1168 3932 NEAS.491d858a95b0dc7ff89f628df79b6cd0.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.491d858a95b0dc7ff89f628df79b6cd0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.491d858a95b0dc7ff89f628df79b6cd0.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4996 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe/scomma "C:\Users\Admin\AppData\Local\Temp\OTMgUhK3mo.ini"3⤵PID:2492
-
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe/scomma "C:\Users\Admin\AppData\Local\Temp\91q0n8eMYS.ini"3⤵
- Accesses Microsoft Outlook accounts
PID:4904
-
-
-
C:\Users\Admin\AppData\Local\Temp\NEAS.491d858a95b0dc7ff89f628df79b6cd0.exeC:\Users\Admin\AppData\Local\Temp\NEAS.491d858a95b0dc7ff89f628df79b6cd0.exe2⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3932 -
C:\Users\Admin\AppData\Local\Temp\NEAS.491d858a95b0dc7ff89f628df79b6cd0.exe/scomma "C:\Users\Admin\AppData\Local\Temp\7Jg6vAYYmK.ini"3⤵PID:2140
-
-
C:\Users\Admin\AppData\Local\Temp\NEAS.491d858a95b0dc7ff89f628df79b6cd0.exe/scomma "C:\Users\Admin\AppData\Local\Temp\ndLQlWbB5u.ini"3⤵
- Accesses Microsoft Outlook accounts
PID:1168
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
Filesize2KB
MD51ee94947dd50a0bc374767ba5f608b91
SHA1e3635de5f588a26caeb9fd21365948e5d8ab2283
SHA2568b462f58e5c54c5d4fe452bc9b745a91ecadbcc4835a3605b83b0f058205175e
SHA5123d5c5a7a536f4b76c8ef2dbc2eb3f4c69ad216ff971fae49a5a89639d3396989b9cf51911f454077a1d1e1dde7aa1ed486080584a37888fba17ab54d423ae165
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
Filesize488B
MD5dbb9e74f6ac5d858bad4f8b62df592cd
SHA1c5224f0cf262955006318381435c4fd4bfd9c9a3
SHA25652d029046c729f19b26699f2f16a7708daee923f0c350a5c01525251bc958edb
SHA512575dbf6f6cdcd1a92756212a9f59976804c2c7bcdae6b46558ff695d707a0c4e3128302461f79fa3c31541bafa8ded1cb25f48b2a9253619de42e8ee47c45ce6
-
Filesize
162B
MD54f8e702cc244ec5d4de32740c0ecbd97
SHA13adb1f02d5b6054de0046e367c1d687b6cdf7aff
SHA2569e17cb15dd75bbbd5dbb984eda674863c3b10ab72613cf8a39a00c3e11a8492a
SHA51221047fea5269fee75a2a187aa09316519e35068cb2f2f76cfaf371e5224445e9d5c98497bd76fb9608d2b73e9dac1a3f5bfadfdc4623c479d53ecf93d81d3c9f
-
Filesize
5B
MD5d1ea279fb5559c020a1b4137dc4de237
SHA1db6f8988af46b56216a6f0daf95ab8c9bdb57400
SHA256fcdcc2c46896915a1c695d6231f0fee336a668531b7a3da46178c80362546dba
SHA512720e9c284f0559015312df7fe977563e5e16f48d3506e51eb4016adf7971924d352f740b030aa3adc81b6f65fd1dba12df06d10fa6c115074e5097e7ee0f08b3
-
Filesize
5B
MD5d1ea279fb5559c020a1b4137dc4de237
SHA1db6f8988af46b56216a6f0daf95ab8c9bdb57400
SHA256fcdcc2c46896915a1c695d6231f0fee336a668531b7a3da46178c80362546dba
SHA512720e9c284f0559015312df7fe977563e5e16f48d3506e51eb4016adf7971924d352f740b030aa3adc81b6f65fd1dba12df06d10fa6c115074e5097e7ee0f08b3