Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 07:46
Static task
static1
Behavioral task
behavioral1
Sample
2de955495a987336b32f27d3e84d8c1a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2de955495a987336b32f27d3e84d8c1a.exe
Resource
win10v2004-20231222-en
General
-
Target
2de955495a987336b32f27d3e84d8c1a.exe
-
Size
205KB
-
MD5
2de955495a987336b32f27d3e84d8c1a
-
SHA1
7609b0324872ebdd2e74f485ca0bba8dfa30cff9
-
SHA256
a4c3779c665ff0b55ad100d952211b8a0d7d063764ad85811e239124535d6cc9
-
SHA512
8b717fd9da4d56f5a680b82822c8c063f7766d5f6d45fd90c0850852594e5ccb722c2528945a08497c672764919dacdcb666463f1bbd2f5075212c5393b3c59a
-
SSDEEP
3072:JM2kKQtv3vwsyclCPCRnglKDqvTQCfzRaPP8/eR:oJv/ws6PCBgkDSYF
Malware Config
Signatures
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/436-7-0x0000000000400000-0x0000000000414000-memory.dmp family_isrstealer behavioral2/memory/436-4-0x0000000000400000-0x0000000000414000-memory.dmp family_isrstealer behavioral2/memory/436-11-0x0000000000400000-0x0000000000414000-memory.dmp family_isrstealer behavioral2/memory/436-14-0x0000000000400000-0x0000000000414000-memory.dmp family_isrstealer -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
2de955495a987336b32f27d3e84d8c1a.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows = "C:\\Users\\Admin\\AppData\\Roaming\\polo.exe" 2de955495a987336b32f27d3e84d8c1a.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
2de955495a987336b32f27d3e84d8c1a.exedescription pid process target process PID 4208 set thread context of 436 4208 2de955495a987336b32f27d3e84d8c1a.exe vbc.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
vbc.exepid process 436 vbc.exe 436 vbc.exe 436 vbc.exe 436 vbc.exe 436 vbc.exe 436 vbc.exe 436 vbc.exe 436 vbc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
vbc.exepid process 436 vbc.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
2de955495a987336b32f27d3e84d8c1a.exedescription pid process target process PID 4208 wrote to memory of 436 4208 2de955495a987336b32f27d3e84d8c1a.exe vbc.exe PID 4208 wrote to memory of 436 4208 2de955495a987336b32f27d3e84d8c1a.exe vbc.exe PID 4208 wrote to memory of 436 4208 2de955495a987336b32f27d3e84d8c1a.exe vbc.exe PID 4208 wrote to memory of 436 4208 2de955495a987336b32f27d3e84d8c1a.exe vbc.exe PID 4208 wrote to memory of 436 4208 2de955495a987336b32f27d3e84d8c1a.exe vbc.exe PID 4208 wrote to memory of 436 4208 2de955495a987336b32f27d3e84d8c1a.exe vbc.exe PID 4208 wrote to memory of 436 4208 2de955495a987336b32f27d3e84d8c1a.exe vbc.exe PID 4208 wrote to memory of 436 4208 2de955495a987336b32f27d3e84d8c1a.exe vbc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2de955495a987336b32f27d3e84d8c1a.exe"C:\Users\Admin\AppData\Local\Temp\2de955495a987336b32f27d3e84d8c1a.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4208 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:436
-