Analysis

  • max time kernel
    163s
  • max time network
    181s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-12-2023 05:27

General

  • Target

    Battlefield 3 Aimbot/WinJect.exe

  • Size

    540KB

  • MD5

    6abce2783394bf829a97599d04a8def3

  • SHA1

    2a7864232650cf6528c903ec505e4fc1cc59517c

  • SHA256

    29ab5fe35a0f48c4683adf37e978abbfff23c0b2f8b416d58b18690ebf41a66a

  • SHA512

    8c07c4b105296747f6224f161b00250e5fa54c4f7b2ad33313b91f4116917064f4acc315f664688346d0272bc77953c338fe40d4ed6e0fd5e5ad507f12cdf7b4

  • SSDEEP

    6144:dHEUWvcNBG1R741QrIJvnjqHByUkz/urMkHug25ijoBFQi7f0u1WeJiXpH4raGpt:pFG1d4gIJLqcU9OgiioSOLKR4rFMgn

Malware Config

Signatures

  • ISR Stealer

    ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

  • ISR Stealer payload 4 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Battlefield 3 Aimbot\WinJect.exe
    "C:\Users\Admin\AppData\Local\Temp\Battlefield 3 Aimbot\WinJect.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1712
    • C:\Users\Admin\AppData\Local\Temp\Battlefield 3 Aimbot\WinJect.exe
      "C:\Users\Admin\AppData\Local\Temp\Battlefield 3 Aimbot\WinJect.exe"
      2⤵
      • Checks computer location settings
      • Writes to the Master Boot Record (MBR)
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2228
      • C:\Users\Admin\AppData\Local\Temp\Winject.exe
        "C:\Users\Admin\AppData\Local\Temp\Winject.exe"
        3⤵
        • Executes dropped EXE
        PID:1060
      • C:\Users\Admin\AppData\Local\Temp\0718i2vupW.exe
        "C:\Users\Admin\AppData\Local\Temp\0718i2vupW.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4344
        • C:\Users\Admin\AppData\Local\Temp\0718i2vupW.exe
          "C:\Users\Admin\AppData\Local\Temp\0718i2vupW.exe"
          4⤵
          • Executes dropped EXE
          • Writes to the Master Boot Record (MBR)
          • Suspicious use of SetThreadContext
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:4948
          • C:\Users\Admin\AppData\Local\Temp\0718i2vupW.exe
            "C:\Users\Admin\AppData\Local\Temp\0718i2vupW.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of SetWindowsHookEx
            PID:3508

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Pre-OS Boot

1
T1542

Bootkit

1
T1542.003

Defense Evasion

Pre-OS Boot

1
T1542

Bootkit

1
T1542.003

Credential Access

Unsecured Credentials

2
T1552

Credentials In Files

2
T1552.001

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

2
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\0718i2vupW.exe
    Filesize

    228KB

    MD5

    4bde2fa501b271311668b79e08c3977e

    SHA1

    60517822d48cf2b560c2d4681c4e5685e29f9632

    SHA256

    73903815bf438131d3dee70fb8f7f757f1ae57deb7fddd802685fd14d95c33dd

    SHA512

    4a39144ed55e44228882b1d30e1d4b6ddc76cbc8037089fdd0e058ad79364a66d13d311827bf181907d3e29b84b6443349624e2d505d1c4d64cea2e48cd684c3

  • C:\Users\Admin\AppData\Local\Temp\Winject.exe
    Filesize

    156KB

    MD5

    5c71bf80b291452cff22524688d38297

    SHA1

    a10e2ee7d94b41c54149d3561166c37c1465e079

    SHA256

    9aa9e7fbf8b8d286c5c6f0571e08da319b5418b6a4f5565bb3aa7b879b26368b

    SHA512

    e12b07e9d08946222950e32acad1a81ec410132ed3baf9eecd2e940a0dc63acaa65a83875208eda0318b50a535b4579ae0650ea17ec05d11444460ac2d67b007

  • C:\Users\Admin\AppData\Local\Temp\Winject.exe
    Filesize

    128KB

    MD5

    c26d4096238dc3acb2f95da99f63f0dd

    SHA1

    5492852ee3673481ba369a771e0677ca88458235

    SHA256

    a5cc37592128ef8a3ed218eb2334b8fa3c0f315a6a08cec1801128709da09af4

    SHA512

    983367759200825b88062a75143dd94e4007bb65e3fd5409525e40483f745412af99a989e5ae7317d4c56b3c39bf4f9ab1cab0e59b23ff5e18ef2ad9b29ed8d8

  • memory/2228-2-0x0000000000400000-0x000000000046B000-memory.dmp
    Filesize

    428KB

  • memory/2228-4-0x0000000000400000-0x000000000046B000-memory.dmp
    Filesize

    428KB

  • memory/2228-22-0x0000000000400000-0x000000000046B000-memory.dmp
    Filesize

    428KB

  • memory/3508-36-0x0000000000400000-0x0000000000414000-memory.dmp
    Filesize

    80KB

  • memory/3508-33-0x0000000000400000-0x0000000000414000-memory.dmp
    Filesize

    80KB

  • memory/3508-41-0x0000000000400000-0x0000000000414000-memory.dmp
    Filesize

    80KB

  • memory/3508-43-0x0000000000400000-0x0000000000414000-memory.dmp
    Filesize

    80KB

  • memory/4948-30-0x0000000000400000-0x000000000041E000-memory.dmp
    Filesize

    120KB

  • memory/4948-27-0x0000000000400000-0x000000000041E000-memory.dmp
    Filesize

    120KB

  • memory/4948-39-0x0000000000400000-0x000000000041E000-memory.dmp
    Filesize

    120KB