Analysis
-
max time kernel
151s -
max time network
172s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2023 09:44
Static task
static1
Behavioral task
behavioral1
Sample
0fedae8ed94dda11aab91041e0f3ff8ce94a5ea3ca252eaf266db5feea28e3d0.exe
Resource
win10v2004-20231020-en
General
-
Target
0fedae8ed94dda11aab91041e0f3ff8ce94a5ea3ca252eaf266db5feea28e3d0.exe
-
Size
5.6MB
-
MD5
e475a80569f548105ff8e46ad33e5961
-
SHA1
9dd52eb79051271c62f8a52d51f7f2b4a858f67c
-
SHA256
0fedae8ed94dda11aab91041e0f3ff8ce94a5ea3ca252eaf266db5feea28e3d0
-
SHA512
eb29ccc77d8dd4134a1fec90cb88813b40e5ee9aff57f0a207d2987b07578e8f7a32f12d4b280fe3fa56012e9d0f708f6ee64430c1de3c05f263fbc4f61811f8
-
SSDEEP
98304:HiRmxZFsM4kxzDcT+GcY437KvDwEHuujlsaSzsC0p43MpQdZ9nc+fsCb+oSBAON6:CRm1syxacY48eda2TMpQdZ9nc+fyhNjG
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 4540 is-82BE2.tmp 4876 IsoBuster_1121.exe 4220 IsoBuster_1121.exe -
Loads dropped DLL 1 IoCs
pid Process 4540 is-82BE2.tmp -
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 51.159.66.125 -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 34 IoCs
description ioc Process File created C:\Program Files (x86)\Smart Projects\IsoBuster\Lang\is-03IT8.tmp is-82BE2.tmp File created C:\Program Files (x86)\Smart Projects\IsoBuster\Lang\is-5QSET.tmp is-82BE2.tmp File created C:\Program Files (x86)\Smart Projects\IsoBuster\is-REGA5.tmp is-82BE2.tmp File created C:\Program Files (x86)\Smart Projects\IsoBuster\Plugins\is-MIO7Q.tmp is-82BE2.tmp File opened for modification C:\Program Files (x86)\Smart Projects\IsoBuster\IsoBuster_1121.exe is-82BE2.tmp File created C:\Program Files (x86)\Smart Projects\IsoBuster\Lang\is-4VUM1.tmp is-82BE2.tmp File created C:\Program Files (x86)\Smart Projects\IsoBuster\Lang\is-KQVFQ.tmp is-82BE2.tmp File created C:\Program Files (x86)\Smart Projects\IsoBuster\Lang\is-660T7.tmp is-82BE2.tmp File created C:\Program Files (x86)\Smart Projects\IsoBuster\is-1MBLR.tmp is-82BE2.tmp File created C:\Program Files (x86)\Smart Projects\IsoBuster\Online\is-KCGQK.tmp is-82BE2.tmp File created C:\Program Files (x86)\Smart Projects\IsoBuster\unins000.dat is-82BE2.tmp File created C:\Program Files (x86)\Smart Projects\IsoBuster\Lang\is-CNRMA.tmp is-82BE2.tmp File created C:\Program Files (x86)\Smart Projects\IsoBuster\Lang\is-AKST0.tmp is-82BE2.tmp File created C:\Program Files (x86)\Smart Projects\IsoBuster\Lang\is-P352M.tmp is-82BE2.tmp File created C:\Program Files (x86)\Smart Projects\IsoBuster\Lang\is-8IV00.tmp is-82BE2.tmp File created C:\Program Files (x86)\Smart Projects\IsoBuster\Lang\is-AI6G5.tmp is-82BE2.tmp File created C:\Program Files (x86)\Smart Projects\IsoBuster\Lang\is-C4HUC.tmp is-82BE2.tmp File created C:\Program Files (x86)\Smart Projects\IsoBuster\Lang\is-PB8G7.tmp is-82BE2.tmp File created C:\Program Files (x86)\Smart Projects\IsoBuster\Lang\is-G3GL8.tmp is-82BE2.tmp File created C:\Program Files (x86)\Smart Projects\IsoBuster\Lang\is-1MPPG.tmp is-82BE2.tmp File created C:\Program Files (x86)\Smart Projects\IsoBuster\Lang\is-Q6TCG.tmp is-82BE2.tmp File created C:\Program Files (x86)\Smart Projects\IsoBuster\Help\is-S01NF.tmp is-82BE2.tmp File created C:\Program Files (x86)\Smart Projects\IsoBuster\Lang\is-0507M.tmp is-82BE2.tmp File created C:\Program Files (x86)\Smart Projects\IsoBuster\Lang\is-I7M22.tmp is-82BE2.tmp File created C:\Program Files (x86)\Smart Projects\IsoBuster\Lang\is-O8O00.tmp is-82BE2.tmp File created C:\Program Files (x86)\Smart Projects\IsoBuster\Online\is-N46K2.tmp is-82BE2.tmp File opened for modification C:\Program Files (x86)\Smart Projects\IsoBuster\unins000.dat is-82BE2.tmp File created C:\Program Files (x86)\Smart Projects\IsoBuster\Plugins\is-92Q6U.tmp is-82BE2.tmp File created C:\Program Files (x86)\Smart Projects\IsoBuster\Lang\is-5PLC0.tmp is-82BE2.tmp File created C:\Program Files (x86)\Smart Projects\IsoBuster\Lang\is-NSONB.tmp is-82BE2.tmp File created C:\Program Files (x86)\Smart Projects\IsoBuster\Lang\is-7P3B7.tmp is-82BE2.tmp File created C:\Program Files (x86)\Smart Projects\IsoBuster\Lang\is-JK6A6.tmp is-82BE2.tmp File created C:\Program Files (x86)\Smart Projects\IsoBuster\Plugins\is-UINTQ.tmp is-82BE2.tmp File created C:\Program Files (x86)\Smart Projects\IsoBuster\Plugins\is-5HOCU.tmp is-82BE2.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 5020 wrote to memory of 4540 5020 0fedae8ed94dda11aab91041e0f3ff8ce94a5ea3ca252eaf266db5feea28e3d0.exe 89 PID 5020 wrote to memory of 4540 5020 0fedae8ed94dda11aab91041e0f3ff8ce94a5ea3ca252eaf266db5feea28e3d0.exe 89 PID 5020 wrote to memory of 4540 5020 0fedae8ed94dda11aab91041e0f3ff8ce94a5ea3ca252eaf266db5feea28e3d0.exe 89 PID 4540 wrote to memory of 8 4540 is-82BE2.tmp 92 PID 4540 wrote to memory of 8 4540 is-82BE2.tmp 92 PID 4540 wrote to memory of 8 4540 is-82BE2.tmp 92 PID 4540 wrote to memory of 4876 4540 is-82BE2.tmp 94 PID 4540 wrote to memory of 4876 4540 is-82BE2.tmp 94 PID 4540 wrote to memory of 4876 4540 is-82BE2.tmp 94 PID 8 wrote to memory of 2836 8 net.exe 95 PID 8 wrote to memory of 2836 8 net.exe 95 PID 8 wrote to memory of 2836 8 net.exe 95 PID 4540 wrote to memory of 4220 4540 is-82BE2.tmp 96 PID 4540 wrote to memory of 4220 4540 is-82BE2.tmp 96 PID 4540 wrote to memory of 4220 4540 is-82BE2.tmp 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\0fedae8ed94dda11aab91041e0f3ff8ce94a5ea3ca252eaf266db5feea28e3d0.exe"C:\Users\Admin\AppData\Local\Temp\0fedae8ed94dda11aab91041e0f3ff8ce94a5ea3ca252eaf266db5feea28e3d0.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Users\Admin\AppData\Local\Temp\is-TTMUU.tmp\is-82BE2.tmp"C:\Users\Admin\AppData\Local\Temp\is-TTMUU.tmp\is-82BE2.tmp" /SL4 $50118 "C:\Users\Admin\AppData\Local\Temp\0fedae8ed94dda11aab91041e0f3ff8ce94a5ea3ca252eaf266db5feea28e3d0.exe" 5597940 1418242⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4540 -
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" helpmsg 23⤵
- Suspicious use of WriteProcessMemory
PID:8 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 helpmsg 24⤵PID:2836
-
-
-
C:\Program Files (x86)\Smart Projects\IsoBuster\IsoBuster_1121.exe"C:\Program Files (x86)\Smart Projects\IsoBuster\IsoBuster_1121.exe" -i3⤵
- Executes dropped EXE
PID:4876
-
-
C:\Program Files (x86)\Smart Projects\IsoBuster\IsoBuster_1121.exe"C:\Program Files (x86)\Smart Projects\IsoBuster\IsoBuster_1121.exe" -s3⤵
- Executes dropped EXE
PID:4220
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.4MB
MD581bf17b6bc712eec07e481349afc3dbc
SHA1eedecca191d3a6b1f16483714343fe1019d7fc62
SHA25681baf334067384061f84fb8335cd811aa22984601ad103e3f575f0a5cb9a639b
SHA5123aa53bfc176d2313e7a02c8f3511e1892adcacf02ee28135e5ae46b1224fdfaef6ddcba8b5f9b340c40c39d22b87d23468401df2c84ac57c57fdeabf2f302171
-
Filesize
4.4MB
MD581bf17b6bc712eec07e481349afc3dbc
SHA1eedecca191d3a6b1f16483714343fe1019d7fc62
SHA25681baf334067384061f84fb8335cd811aa22984601ad103e3f575f0a5cb9a639b
SHA5123aa53bfc176d2313e7a02c8f3511e1892adcacf02ee28135e5ae46b1224fdfaef6ddcba8b5f9b340c40c39d22b87d23468401df2c84ac57c57fdeabf2f302171
-
Filesize
4.4MB
MD581bf17b6bc712eec07e481349afc3dbc
SHA1eedecca191d3a6b1f16483714343fe1019d7fc62
SHA25681baf334067384061f84fb8335cd811aa22984601ad103e3f575f0a5cb9a639b
SHA5123aa53bfc176d2313e7a02c8f3511e1892adcacf02ee28135e5ae46b1224fdfaef6ddcba8b5f9b340c40c39d22b87d23468401df2c84ac57c57fdeabf2f302171
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
642KB
MD5e57693101a63b1f934f462bc7a2ef093
SHA12748ea8c66b980f14c9ce36c1c3061e690cf3ce7
SHA25671267ff94c9fc72cbffaeed3bc2f33cef1eeb1887c29c574d7f26595d1a6235f
SHA5123dcda686a85b19a9c7b4c96d132e90ed43c7df13ce9456beb2b88c278d8068cc3abcbfe25b1607c7b8281d276efb24809730f352927b326254f3208cbdf54a3e
-
Filesize
642KB
MD5e57693101a63b1f934f462bc7a2ef093
SHA12748ea8c66b980f14c9ce36c1c3061e690cf3ce7
SHA25671267ff94c9fc72cbffaeed3bc2f33cef1eeb1887c29c574d7f26595d1a6235f
SHA5123dcda686a85b19a9c7b4c96d132e90ed43c7df13ce9456beb2b88c278d8068cc3abcbfe25b1607c7b8281d276efb24809730f352927b326254f3208cbdf54a3e