Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12-01-2024 18:21
Static task
static1
Behavioral task
behavioral1
Sample
572b0a1dc3f6452bd60bc4c2271fa972.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
572b0a1dc3f6452bd60bc4c2271fa972.exe
Resource
win10v2004-20231215-en
General
-
Target
572b0a1dc3f6452bd60bc4c2271fa972.exe
-
Size
264KB
-
MD5
572b0a1dc3f6452bd60bc4c2271fa972
-
SHA1
f4560af2b524b8a1fd4d6196187ad38d4aa28b39
-
SHA256
61ba14e415c7c25cb55814c83b8921907c3d0cb24fe8ebe4e2d79d1d7f9f0ded
-
SHA512
e3c4d319d34a586578155948722c0403c5a42e9a7e32fddd82e3733653ba587bc8df9012eb322bf3946ad83b561a275b5b0686abce543efaa6a94e4a6ef022eb
-
SSDEEP
6144:PlC7pFKGULN4W420m8nCBozjrSPq0jGJxKZuW:spUNO20m8nCBTd
Malware Config
Signatures
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload 1 IoCs
resource yara_rule behavioral2/files/0x00070000000231e5-8.dat family_isrstealer -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Control Panel\International\Geo\Nation 572b0a1dc3f6452bd60bc4c2271fa972.exe -
Executes dropped EXE 2 IoCs
pid Process 3816 Server1.exe 5028 keygen.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created C:\Windows\assembly\Desktop.ini keygen.exe File opened for modification C:\Windows\assembly\Desktop.ini keygen.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\assembly keygen.exe File created C:\Windows\assembly\Desktop.ini keygen.exe File opened for modification C:\Windows\assembly\Desktop.ini keygen.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Charset Server1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Codepage Server1.exe Key created \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000_Classes\MIME\Database Server1.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3816 Server1.exe 3816 Server1.exe 3816 Server1.exe 3816 Server1.exe 3816 Server1.exe 3816 Server1.exe 3816 Server1.exe 3816 Server1.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3816 Server1.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 3660 wrote to memory of 3816 3660 572b0a1dc3f6452bd60bc4c2271fa972.exe 89 PID 3660 wrote to memory of 3816 3660 572b0a1dc3f6452bd60bc4c2271fa972.exe 89 PID 3660 wrote to memory of 3816 3660 572b0a1dc3f6452bd60bc4c2271fa972.exe 89 PID 3660 wrote to memory of 5028 3660 572b0a1dc3f6452bd60bc4c2271fa972.exe 90 PID 3660 wrote to memory of 5028 3660 572b0a1dc3f6452bd60bc4c2271fa972.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\572b0a1dc3f6452bd60bc4c2271fa972.exe"C:\Users\Admin\AppData\Local\Temp\572b0a1dc3f6452bd60bc4c2271fa972.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3660 -
C:\Users\Admin\AppData\Local\Temp\Server1.exe"C:\Users\Admin\AppData\Local\Temp\Server1.exe"2⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3816
-
-
C:\Users\Admin\AppData\Local\Temp\keygen.exe"C:\Users\Admin\AppData\Local\Temp\keygen.exe"2⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- Drops file in Windows directory
PID:5028
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76KB
MD596e90f5200f5cf9be677b61f52f6da05
SHA1d7bc0c3e1126cb055114c90d322536b129960273
SHA25627f59685b9c46919d50803b107fd86375249417f9e7c75e42bf8242b68c97ed4
SHA512e010498fc79bee891707e8dbcc69bdbf7e6926b4228549b063ac36650f75f5ff95ba74b628cd1d6cda01665ca09f805da870b2d885e57a3426b99e5a4a90b0de
-
Filesize
108KB
MD5dba6fbc5a2c420c7d5ae4bdaf2d0b60c
SHA1f818492cb0d80b229eecb793ff88f626e5b7641d
SHA2566f3c761b8d91fdebb51a07019b00f7bd4072483e47fa7e819e6513480f6a168e
SHA5122675185222a45e892853e25ad5d8cfb79195808013d9d66371ca295ef06b9c63dcbbe6f94eb143f67b68b0fc7ad3622ad3551a9d9023fab6179b24dcda6709fb