Analysis

  • max time kernel
    163s
  • max time network
    181s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/12/2023, 05:27

General

  • Target

    Battlefield 3 Aimbot/WinJect.exe

  • Size

    540KB

  • MD5

    6abce2783394bf829a97599d04a8def3

  • SHA1

    2a7864232650cf6528c903ec505e4fc1cc59517c

  • SHA256

    29ab5fe35a0f48c4683adf37e978abbfff23c0b2f8b416d58b18690ebf41a66a

  • SHA512

    8c07c4b105296747f6224f161b00250e5fa54c4f7b2ad33313b91f4116917064f4acc315f664688346d0272bc77953c338fe40d4ed6e0fd5e5ad507f12cdf7b4

  • SSDEEP

    6144:dHEUWvcNBG1R741QrIJvnjqHByUkz/urMkHug25ijoBFQi7f0u1WeJiXpH4raGpt:pFG1d4gIJLqcU9OgiioSOLKR4rFMgn

Malware Config

Signatures

  • ISR Stealer

    ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

  • ISR Stealer payload 4 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Battlefield 3 Aimbot\WinJect.exe
    "C:\Users\Admin\AppData\Local\Temp\Battlefield 3 Aimbot\WinJect.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1712
    • C:\Users\Admin\AppData\Local\Temp\Battlefield 3 Aimbot\WinJect.exe
      "C:\Users\Admin\AppData\Local\Temp\Battlefield 3 Aimbot\WinJect.exe"
      2⤵
      • Checks computer location settings
      • Writes to the Master Boot Record (MBR)
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2228
      • C:\Users\Admin\AppData\Local\Temp\Winject.exe
        "C:\Users\Admin\AppData\Local\Temp\Winject.exe"
        3⤵
        • Executes dropped EXE
        PID:1060
      • C:\Users\Admin\AppData\Local\Temp\0718i2vupW.exe
        "C:\Users\Admin\AppData\Local\Temp\0718i2vupW.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4344
        • C:\Users\Admin\AppData\Local\Temp\0718i2vupW.exe
          "C:\Users\Admin\AppData\Local\Temp\0718i2vupW.exe"
          4⤵
          • Executes dropped EXE
          • Writes to the Master Boot Record (MBR)
          • Suspicious use of SetThreadContext
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:4948
          • C:\Users\Admin\AppData\Local\Temp\0718i2vupW.exe
            "C:\Users\Admin\AppData\Local\Temp\0718i2vupW.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of SetWindowsHookEx
            PID:3508

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\0718i2vupW.exe

          Filesize

          228KB

          MD5

          4bde2fa501b271311668b79e08c3977e

          SHA1

          60517822d48cf2b560c2d4681c4e5685e29f9632

          SHA256

          73903815bf438131d3dee70fb8f7f757f1ae57deb7fddd802685fd14d95c33dd

          SHA512

          4a39144ed55e44228882b1d30e1d4b6ddc76cbc8037089fdd0e058ad79364a66d13d311827bf181907d3e29b84b6443349624e2d505d1c4d64cea2e48cd684c3

        • C:\Users\Admin\AppData\Local\Temp\Winject.exe

          Filesize

          156KB

          MD5

          5c71bf80b291452cff22524688d38297

          SHA1

          a10e2ee7d94b41c54149d3561166c37c1465e079

          SHA256

          9aa9e7fbf8b8d286c5c6f0571e08da319b5418b6a4f5565bb3aa7b879b26368b

          SHA512

          e12b07e9d08946222950e32acad1a81ec410132ed3baf9eecd2e940a0dc63acaa65a83875208eda0318b50a535b4579ae0650ea17ec05d11444460ac2d67b007

        • C:\Users\Admin\AppData\Local\Temp\Winject.exe

          Filesize

          128KB

          MD5

          c26d4096238dc3acb2f95da99f63f0dd

          SHA1

          5492852ee3673481ba369a771e0677ca88458235

          SHA256

          a5cc37592128ef8a3ed218eb2334b8fa3c0f315a6a08cec1801128709da09af4

          SHA512

          983367759200825b88062a75143dd94e4007bb65e3fd5409525e40483f745412af99a989e5ae7317d4c56b3c39bf4f9ab1cab0e59b23ff5e18ef2ad9b29ed8d8

        • memory/2228-2-0x0000000000400000-0x000000000046B000-memory.dmp

          Filesize

          428KB

        • memory/2228-4-0x0000000000400000-0x000000000046B000-memory.dmp

          Filesize

          428KB

        • memory/2228-22-0x0000000000400000-0x000000000046B000-memory.dmp

          Filesize

          428KB

        • memory/3508-36-0x0000000000400000-0x0000000000414000-memory.dmp

          Filesize

          80KB

        • memory/3508-33-0x0000000000400000-0x0000000000414000-memory.dmp

          Filesize

          80KB

        • memory/3508-41-0x0000000000400000-0x0000000000414000-memory.dmp

          Filesize

          80KB

        • memory/3508-43-0x0000000000400000-0x0000000000414000-memory.dmp

          Filesize

          80KB

        • memory/4948-30-0x0000000000400000-0x000000000041E000-memory.dmp

          Filesize

          120KB

        • memory/4948-27-0x0000000000400000-0x000000000041E000-memory.dmp

          Filesize

          120KB

        • memory/4948-39-0x0000000000400000-0x000000000041E000-memory.dmp

          Filesize

          120KB