Analysis
-
max time kernel
143s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
15/10/2023, 19:39
Static task
static1
Behavioral task
behavioral1
Sample
7a76aa8b66225720bac9d217e27aa3d0_exe32.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
7a76aa8b66225720bac9d217e27aa3d0_exe32.exe
Resource
win10v2004-20230915-en
General
-
Target
7a76aa8b66225720bac9d217e27aa3d0_exe32.exe
-
Size
318KB
-
MD5
7a76aa8b66225720bac9d217e27aa3d0
-
SHA1
e4138d452a5384dcbf1d37eaa1d97f4251aa2be2
-
SHA256
c86cec582d5f33a3b779d80cf48b59b4be08f0da97302c65f83eb4517d8efc35
-
SHA512
ee5c78e19eb563d79afe1911625566a6d7a0740bc4ce7d5e43565def0258ed6620fab29c5d91f13de27ec24905c5b261d9cff62e610add0e731a648d4cedd8bc
-
SSDEEP
6144:/rTfUHeeSKOS9ccFKk3Y9t9YZOnSpThQ/V8v+6DE:/n8yN0Mr8ZOYGtlR
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 2472 Isass.exe 1580 Isass.exe 2964 Isass.exe 2660 7a76aa8b66225720bac9d217e27aa3d0_exe32.exe -
Loads dropped DLL 9 IoCs
pid Process 3016 7a76aa8b66225720bac9d217e27aa3d0_exe32.exe 3016 7a76aa8b66225720bac9d217e27aa3d0_exe32.exe 3016 7a76aa8b66225720bac9d217e27aa3d0_exe32.exe 3016 7a76aa8b66225720bac9d217e27aa3d0_exe32.exe 2740 7a76aa8b66225720bac9d217e27aa3d0_exe32.exe 2964 Isass.exe 2472 Isass.exe 2472 Isass.exe 2472 Isass.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Windows\CurrentVersion\Run\Isass.exe = "C:\\Users\\Public\\Microsoft Build\\Isass.exe" 7a76aa8b66225720bac9d217e27aa3d0_exe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Isass.exe = "C:\\Users\\Public\\Microsoft Build\\Isass.exe" 7a76aa8b66225720bac9d217e27aa3d0_exe32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3016 7a76aa8b66225720bac9d217e27aa3d0_exe32.exe 2472 Isass.exe 1580 Isass.exe 1580 Isass.exe 1580 Isass.exe 2740 7a76aa8b66225720bac9d217e27aa3d0_exe32.exe 2964 Isass.exe 2964 Isass.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 3016 wrote to memory of 2472 3016 7a76aa8b66225720bac9d217e27aa3d0_exe32.exe 28 PID 3016 wrote to memory of 2472 3016 7a76aa8b66225720bac9d217e27aa3d0_exe32.exe 28 PID 3016 wrote to memory of 2472 3016 7a76aa8b66225720bac9d217e27aa3d0_exe32.exe 28 PID 3016 wrote to memory of 2472 3016 7a76aa8b66225720bac9d217e27aa3d0_exe32.exe 28 PID 3016 wrote to memory of 1580 3016 7a76aa8b66225720bac9d217e27aa3d0_exe32.exe 29 PID 3016 wrote to memory of 1580 3016 7a76aa8b66225720bac9d217e27aa3d0_exe32.exe 29 PID 3016 wrote to memory of 1580 3016 7a76aa8b66225720bac9d217e27aa3d0_exe32.exe 29 PID 3016 wrote to memory of 1580 3016 7a76aa8b66225720bac9d217e27aa3d0_exe32.exe 29 PID 1580 wrote to memory of 2740 1580 Isass.exe 30 PID 1580 wrote to memory of 2740 1580 Isass.exe 30 PID 1580 wrote to memory of 2740 1580 Isass.exe 30 PID 1580 wrote to memory of 2740 1580 Isass.exe 30 PID 2740 wrote to memory of 2964 2740 7a76aa8b66225720bac9d217e27aa3d0_exe32.exe 31 PID 2740 wrote to memory of 2964 2740 7a76aa8b66225720bac9d217e27aa3d0_exe32.exe 31 PID 2740 wrote to memory of 2964 2740 7a76aa8b66225720bac9d217e27aa3d0_exe32.exe 31 PID 2740 wrote to memory of 2964 2740 7a76aa8b66225720bac9d217e27aa3d0_exe32.exe 31 PID 2964 wrote to memory of 2660 2964 Isass.exe 32 PID 2964 wrote to memory of 2660 2964 Isass.exe 32 PID 2964 wrote to memory of 2660 2964 Isass.exe 32 PID 2964 wrote to memory of 2660 2964 Isass.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\7a76aa8b66225720bac9d217e27aa3d0_exe32.exe"C:\Users\Admin\AppData\Local\Temp\7a76aa8b66225720bac9d217e27aa3d0_exe32.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2472
-
-
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\7a76aa8b66225720bac9d217e27aa3d0_exe32.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Users\Admin\AppData\Local\Temp\7a76aa8b66225720bac9d217e27aa3d0_exe32.exe"C:\Users\Admin\AppData\Local\Temp\7a76aa8b66225720bac9d217e27aa3d0_exe32.exe"3⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\7a76aa8b66225720bac9d217e27aa3d0_exe32.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Users\Admin\AppData\Local\Temp\7a76aa8b66225720bac9d217e27aa3d0_exe32.exe"C:\Users\Admin\AppData\Local\Temp\7a76aa8b66225720bac9d217e27aa3d0_exe32.exe"5⤵
- Executes dropped EXE
PID:2660
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
88KB
MD54a895ec6c5a9df94820219ef525cf65a
SHA1525dd15cdeec20966d61c5f0a81667cd931349cb
SHA256949b6765d794c53656c9afc45b90d9a2cfcae6bb30444086b29225f19242217b
SHA512a830996a8aae3d25bd21283f4f19ea295d6caa31ab98d14f5bacc15fee64264170348ca03c7bd390e6107274fb91923e24f4c6a6dca09a5354ae47d4109ed611
-
Filesize
88KB
MD54a895ec6c5a9df94820219ef525cf65a
SHA1525dd15cdeec20966d61c5f0a81667cd931349cb
SHA256949b6765d794c53656c9afc45b90d9a2cfcae6bb30444086b29225f19242217b
SHA512a830996a8aae3d25bd21283f4f19ea295d6caa31ab98d14f5bacc15fee64264170348ca03c7bd390e6107274fb91923e24f4c6a6dca09a5354ae47d4109ed611
-
Filesize
216KB
MD5dd5b5e4a1e6eeae101810f21c0790e86
SHA122013493fe1ab7e46a242f58b3cfb9d6f8f0026f
SHA25689a6bac57d0981cbc24a178064e9e7ddb6ad23ff434b3bbb7c9dc46451b3d3fe
SHA5121d78661c3e995119e594f51d93ea8c192f60557ad8804246b8100bf3997e6b320ddbe832caa59d259b122034e7d2fa114bf53afdaf33dae2538d738cc63f5da3
-
Filesize
216KB
MD5dd5b5e4a1e6eeae101810f21c0790e86
SHA122013493fe1ab7e46a242f58b3cfb9d6f8f0026f
SHA25689a6bac57d0981cbc24a178064e9e7ddb6ad23ff434b3bbb7c9dc46451b3d3fe
SHA5121d78661c3e995119e594f51d93ea8c192f60557ad8804246b8100bf3997e6b320ddbe832caa59d259b122034e7d2fa114bf53afdaf33dae2538d738cc63f5da3
-
Filesize
216KB
MD5dd5b5e4a1e6eeae101810f21c0790e86
SHA122013493fe1ab7e46a242f58b3cfb9d6f8f0026f
SHA25689a6bac57d0981cbc24a178064e9e7ddb6ad23ff434b3bbb7c9dc46451b3d3fe
SHA5121d78661c3e995119e594f51d93ea8c192f60557ad8804246b8100bf3997e6b320ddbe832caa59d259b122034e7d2fa114bf53afdaf33dae2538d738cc63f5da3
-
Filesize
216KB
MD5dd5b5e4a1e6eeae101810f21c0790e86
SHA122013493fe1ab7e46a242f58b3cfb9d6f8f0026f
SHA25689a6bac57d0981cbc24a178064e9e7ddb6ad23ff434b3bbb7c9dc46451b3d3fe
SHA5121d78661c3e995119e594f51d93ea8c192f60557ad8804246b8100bf3997e6b320ddbe832caa59d259b122034e7d2fa114bf53afdaf33dae2538d738cc63f5da3
-
Filesize
216KB
MD5dd5b5e4a1e6eeae101810f21c0790e86
SHA122013493fe1ab7e46a242f58b3cfb9d6f8f0026f
SHA25689a6bac57d0981cbc24a178064e9e7ddb6ad23ff434b3bbb7c9dc46451b3d3fe
SHA5121d78661c3e995119e594f51d93ea8c192f60557ad8804246b8100bf3997e6b320ddbe832caa59d259b122034e7d2fa114bf53afdaf33dae2538d738cc63f5da3
-
Filesize
88KB
MD54a895ec6c5a9df94820219ef525cf65a
SHA1525dd15cdeec20966d61c5f0a81667cd931349cb
SHA256949b6765d794c53656c9afc45b90d9a2cfcae6bb30444086b29225f19242217b
SHA512a830996a8aae3d25bd21283f4f19ea295d6caa31ab98d14f5bacc15fee64264170348ca03c7bd390e6107274fb91923e24f4c6a6dca09a5354ae47d4109ed611
-
Filesize
88KB
MD54a895ec6c5a9df94820219ef525cf65a
SHA1525dd15cdeec20966d61c5f0a81667cd931349cb
SHA256949b6765d794c53656c9afc45b90d9a2cfcae6bb30444086b29225f19242217b
SHA512a830996a8aae3d25bd21283f4f19ea295d6caa31ab98d14f5bacc15fee64264170348ca03c7bd390e6107274fb91923e24f4c6a6dca09a5354ae47d4109ed611
-
Filesize
88KB
MD54a895ec6c5a9df94820219ef525cf65a
SHA1525dd15cdeec20966d61c5f0a81667cd931349cb
SHA256949b6765d794c53656c9afc45b90d9a2cfcae6bb30444086b29225f19242217b
SHA512a830996a8aae3d25bd21283f4f19ea295d6caa31ab98d14f5bacc15fee64264170348ca03c7bd390e6107274fb91923e24f4c6a6dca09a5354ae47d4109ed611
-
Filesize
88KB
MD54a895ec6c5a9df94820219ef525cf65a
SHA1525dd15cdeec20966d61c5f0a81667cd931349cb
SHA256949b6765d794c53656c9afc45b90d9a2cfcae6bb30444086b29225f19242217b
SHA512a830996a8aae3d25bd21283f4f19ea295d6caa31ab98d14f5bacc15fee64264170348ca03c7bd390e6107274fb91923e24f4c6a6dca09a5354ae47d4109ed611
-
Filesize
216KB
MD5dd5b5e4a1e6eeae101810f21c0790e86
SHA122013493fe1ab7e46a242f58b3cfb9d6f8f0026f
SHA25689a6bac57d0981cbc24a178064e9e7ddb6ad23ff434b3bbb7c9dc46451b3d3fe
SHA5121d78661c3e995119e594f51d93ea8c192f60557ad8804246b8100bf3997e6b320ddbe832caa59d259b122034e7d2fa114bf53afdaf33dae2538d738cc63f5da3
-
Filesize
216KB
MD5dd5b5e4a1e6eeae101810f21c0790e86
SHA122013493fe1ab7e46a242f58b3cfb9d6f8f0026f
SHA25689a6bac57d0981cbc24a178064e9e7ddb6ad23ff434b3bbb7c9dc46451b3d3fe
SHA5121d78661c3e995119e594f51d93ea8c192f60557ad8804246b8100bf3997e6b320ddbe832caa59d259b122034e7d2fa114bf53afdaf33dae2538d738cc63f5da3
-
Filesize
216KB
MD5dd5b5e4a1e6eeae101810f21c0790e86
SHA122013493fe1ab7e46a242f58b3cfb9d6f8f0026f
SHA25689a6bac57d0981cbc24a178064e9e7ddb6ad23ff434b3bbb7c9dc46451b3d3fe
SHA5121d78661c3e995119e594f51d93ea8c192f60557ad8804246b8100bf3997e6b320ddbe832caa59d259b122034e7d2fa114bf53afdaf33dae2538d738cc63f5da3
-
Filesize
216KB
MD5dd5b5e4a1e6eeae101810f21c0790e86
SHA122013493fe1ab7e46a242f58b3cfb9d6f8f0026f
SHA25689a6bac57d0981cbc24a178064e9e7ddb6ad23ff434b3bbb7c9dc46451b3d3fe
SHA5121d78661c3e995119e594f51d93ea8c192f60557ad8804246b8100bf3997e6b320ddbe832caa59d259b122034e7d2fa114bf53afdaf33dae2538d738cc63f5da3
-
Filesize
216KB
MD5dd5b5e4a1e6eeae101810f21c0790e86
SHA122013493fe1ab7e46a242f58b3cfb9d6f8f0026f
SHA25689a6bac57d0981cbc24a178064e9e7ddb6ad23ff434b3bbb7c9dc46451b3d3fe
SHA5121d78661c3e995119e594f51d93ea8c192f60557ad8804246b8100bf3997e6b320ddbe832caa59d259b122034e7d2fa114bf53afdaf33dae2538d738cc63f5da3