Analysis

  • max time kernel
    117s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    26-12-2023 05:27

General

  • Target

    Battlefield 3 Aimbot/WinJect.exe

  • Size

    540KB

  • MD5

    6abce2783394bf829a97599d04a8def3

  • SHA1

    2a7864232650cf6528c903ec505e4fc1cc59517c

  • SHA256

    29ab5fe35a0f48c4683adf37e978abbfff23c0b2f8b416d58b18690ebf41a66a

  • SHA512

    8c07c4b105296747f6224f161b00250e5fa54c4f7b2ad33313b91f4116917064f4acc315f664688346d0272bc77953c338fe40d4ed6e0fd5e5ad507f12cdf7b4

  • SSDEEP

    6144:dHEUWvcNBG1R741QrIJvnjqHByUkz/urMkHug25ijoBFQi7f0u1WeJiXpH4raGpt:pFG1d4gIJLqcU9OgiioSOLKR4rFMgn

Malware Config

Signatures

  • ISR Stealer

    ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

  • ISR Stealer payload 4 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 6 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 34 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Battlefield 3 Aimbot\WinJect.exe
    "C:\Users\Admin\AppData\Local\Temp\Battlefield 3 Aimbot\WinJect.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2532
    • C:\Users\Admin\AppData\Local\Temp\Battlefield 3 Aimbot\WinJect.exe
      "C:\Users\Admin\AppData\Local\Temp\Battlefield 3 Aimbot\WinJect.exe"
      2⤵
      • Loads dropped DLL
      • Writes to the Master Boot Record (MBR)
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2204
      • C:\Users\Admin\AppData\Local\Temp\Winject.exe
        "C:\Users\Admin\AppData\Local\Temp\Winject.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: GetForegroundWindowSpam
        PID:2708
      • C:\Users\Admin\AppData\Local\Temp\0718i2vupW.exe
        "C:\Users\Admin\AppData\Local\Temp\0718i2vupW.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2752
        • C:\Users\Admin\AppData\Local\Temp\0718i2vupW.exe
          "C:\Users\Admin\AppData\Local\Temp\0718i2vupW.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Writes to the Master Boot Record (MBR)
          • Suspicious use of SetThreadContext
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2596
          • C:\Users\Admin\AppData\Local\Temp\0718i2vupW.exe
            "C:\Users\Admin\AppData\Local\Temp\0718i2vupW.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of SetWindowsHookEx
            PID:2564

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\0718i2vupW.exe

    Filesize

    228KB

    MD5

    4bde2fa501b271311668b79e08c3977e

    SHA1

    60517822d48cf2b560c2d4681c4e5685e29f9632

    SHA256

    73903815bf438131d3dee70fb8f7f757f1ae57deb7fddd802685fd14d95c33dd

    SHA512

    4a39144ed55e44228882b1d30e1d4b6ddc76cbc8037089fdd0e058ad79364a66d13d311827bf181907d3e29b84b6443349624e2d505d1c4d64cea2e48cd684c3

  • \Users\Admin\AppData\Local\Temp\Winject.exe

    Filesize

    156KB

    MD5

    5c71bf80b291452cff22524688d38297

    SHA1

    a10e2ee7d94b41c54149d3561166c37c1465e079

    SHA256

    9aa9e7fbf8b8d286c5c6f0571e08da319b5418b6a4f5565bb3aa7b879b26368b

    SHA512

    e12b07e9d08946222950e32acad1a81ec410132ed3baf9eecd2e940a0dc63acaa65a83875208eda0318b50a535b4579ae0650ea17ec05d11444460ac2d67b007

  • memory/2204-4-0x0000000000400000-0x000000000046B000-memory.dmp

    Filesize

    428KB

  • memory/2204-2-0x0000000000400000-0x000000000046B000-memory.dmp

    Filesize

    428KB

  • memory/2204-6-0x0000000000400000-0x000000000046B000-memory.dmp

    Filesize

    428KB

  • memory/2204-10-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2204-12-0x0000000000400000-0x000000000046B000-memory.dmp

    Filesize

    428KB

  • memory/2204-14-0x0000000000400000-0x000000000046B000-memory.dmp

    Filesize

    428KB

  • memory/2204-37-0x0000000000400000-0x000000000046B000-memory.dmp

    Filesize

    428KB

  • memory/2564-60-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/2564-58-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/2564-62-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/2564-66-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/2564-74-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/2564-76-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/2596-43-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/2596-45-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/2596-51-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/2596-54-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/2596-41-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/2596-70-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB