Analysis
-
max time kernel
2s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
28-12-2023 11:37
Static task
static1
Behavioral task
behavioral1
Sample
dc35c41440704458ed7a60c0ac026f62.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
dc35c41440704458ed7a60c0ac026f62.exe
Resource
win10v2004-20231222-en
General
-
Target
dc35c41440704458ed7a60c0ac026f62.exe
-
Size
408KB
-
MD5
dc35c41440704458ed7a60c0ac026f62
-
SHA1
28459a2a602943fb5f44cb7424061c390fefb502
-
SHA256
4d4e7a37101a9fa0810a3ff324a87c302a1328dcaeae6a9c637752e871a1a678
-
SHA512
f522adf75f7915caf3a87551f4704303ddde487da920c6a2a762d4fc821f5c6749b2496cdd5b5193252eb97f01cdcc3dc77584be90e6833e32f2410b955f8081
-
SSDEEP
6144:v7l/Mts0sXrneChRWcSUEC8ctAom2C+do4ON1ZA0bYQpBuLGlY+6iPHS/ei:hMSeChscpEBctA2Q11aPQ3/6/ei
Malware Config
Signatures
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload 4 IoCs
resource yara_rule behavioral2/memory/4236-12-0x0000000000400000-0x0000000000459000-memory.dmp family_isrstealer behavioral2/memory/4572-88-0x0000000000400000-0x0000000000459000-memory.dmp family_isrstealer behavioral2/memory/4236-82-0x0000000000400000-0x0000000000459000-memory.dmp family_isrstealer behavioral2/memory/4236-93-0x0000000000400000-0x0000000000459000-memory.dmp family_isrstealer -
NirSoft WebBrowserPassView 3 IoCs
Password recovery tool for various web browsers
resource yara_rule behavioral2/memory/4396-35-0x0000000000400000-0x0000000000454000-memory.dmp WebBrowserPassView behavioral2/memory/4396-40-0x0000000000400000-0x0000000000454000-memory.dmp WebBrowserPassView behavioral2/memory/4396-43-0x0000000000400000-0x0000000000454000-memory.dmp WebBrowserPassView -
Nirsoft 3 IoCs
resource yara_rule behavioral2/memory/4396-35-0x0000000000400000-0x0000000000454000-memory.dmp Nirsoft behavioral2/memory/4396-40-0x0000000000400000-0x0000000000454000-memory.dmp Nirsoft behavioral2/memory/4396-43-0x0000000000400000-0x0000000000454000-memory.dmp Nirsoft -
resource yara_rule behavioral2/memory/4236-4-0x0000000000400000-0x0000000000459000-memory.dmp upx behavioral2/memory/4236-8-0x0000000000400000-0x0000000000459000-memory.dmp upx behavioral2/memory/5072-10-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/5072-13-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/4236-12-0x0000000000400000-0x0000000000459000-memory.dmp upx behavioral2/memory/5072-6-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/4572-88-0x0000000000400000-0x0000000000459000-memory.dmp upx behavioral2/memory/4236-82-0x0000000000400000-0x0000000000459000-memory.dmp upx behavioral2/memory/5072-83-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/4236-93-0x0000000000400000-0x0000000000459000-memory.dmp upx behavioral2/memory/3152-95-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4044 set thread context of 4236 4044 dc35c41440704458ed7a60c0ac026f62.exe 52 PID 4044 set thread context of 5072 4044 dc35c41440704458ed7a60c0ac026f62.exe 51 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4044 dc35c41440704458ed7a60c0ac026f62.exe 4236 dc35c41440704458ed7a60c0ac026f62.exe 5072 dc35c41440704458ed7a60c0ac026f62.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 4044 wrote to memory of 4236 4044 dc35c41440704458ed7a60c0ac026f62.exe 52 PID 4044 wrote to memory of 4236 4044 dc35c41440704458ed7a60c0ac026f62.exe 52 PID 4044 wrote to memory of 4236 4044 dc35c41440704458ed7a60c0ac026f62.exe 52 PID 4044 wrote to memory of 4236 4044 dc35c41440704458ed7a60c0ac026f62.exe 52 PID 4044 wrote to memory of 4236 4044 dc35c41440704458ed7a60c0ac026f62.exe 52 PID 4044 wrote to memory of 4236 4044 dc35c41440704458ed7a60c0ac026f62.exe 52 PID 4044 wrote to memory of 4236 4044 dc35c41440704458ed7a60c0ac026f62.exe 52 PID 4044 wrote to memory of 4236 4044 dc35c41440704458ed7a60c0ac026f62.exe 52 PID 4044 wrote to memory of 5072 4044 dc35c41440704458ed7a60c0ac026f62.exe 51 PID 4044 wrote to memory of 5072 4044 dc35c41440704458ed7a60c0ac026f62.exe 51 PID 4044 wrote to memory of 5072 4044 dc35c41440704458ed7a60c0ac026f62.exe 51 PID 4044 wrote to memory of 5072 4044 dc35c41440704458ed7a60c0ac026f62.exe 51 PID 4044 wrote to memory of 5072 4044 dc35c41440704458ed7a60c0ac026f62.exe 51 PID 4044 wrote to memory of 5072 4044 dc35c41440704458ed7a60c0ac026f62.exe 51 PID 4044 wrote to memory of 5072 4044 dc35c41440704458ed7a60c0ac026f62.exe 51 PID 4044 wrote to memory of 5072 4044 dc35c41440704458ed7a60c0ac026f62.exe 51
Processes
-
C:\Users\Admin\AppData\Local\Temp\dc35c41440704458ed7a60c0ac026f62.exe"C:\Users\Admin\AppData\Local\Temp\dc35c41440704458ed7a60c0ac026f62.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Users\Admin\AppData\Local\Temp\dc35c41440704458ed7a60c0ac026f62.exe"C:\Users\Admin\AppData\Local\Temp\dc35c41440704458ed7a60c0ac026f62.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:5072 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\TQEQB.bat" "3⤵PID:1356
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "invidiadriver" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\system32\intelgfx.exe" /f4⤵PID:1564
-
-
-
C:\Users\Admin\AppData\Roaming\system32\intelgfx.exe"C:\Users\Admin\AppData\Roaming\system32\intelgfx.exe"3⤵PID:412
-
C:\Users\Admin\AppData\Roaming\system32\intelgfx.exe"C:\Users\Admin\AppData\Roaming\system32\intelgfx.exe"4⤵PID:3152
-
-
C:\Users\Admin\AppData\Roaming\system32\intelgfx.exe"C:\Users\Admin\AppData\Roaming\system32\intelgfx.exe"4⤵PID:4572
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\dc35c41440704458ed7a60c0ac026f62.exe"C:\Users\Admin\AppData\Local\Temp\dc35c41440704458ed7a60c0ac026f62.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:4236
-
-
C:\Users\Admin\AppData\Local\Temp\FAKFB.exe"C:\Users\Admin\AppData\Local\Temp\FAKFB.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp1⤵PID:4396
-
C:\Users\Admin\AppData\Local\Temp\FAKFB.exe"C:\Users\Admin\AppData\Local\Temp\FAKFB.exe"1⤵PID:3712
-
C:\Users\Admin\AppData\Local\Temp\FAKFB.exe"C:\Users\Admin\AppData\Local\Temp\FAKFB.exe"1⤵PID:4304