Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
13-03-2024 03:07
Static task
static1
Behavioral task
behavioral1
Sample
c4d20a36d9f0e1ca758818b3be981779.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
c4d20a36d9f0e1ca758818b3be981779.exe
Resource
win10v2004-20240226-en
General
-
Target
c4d20a36d9f0e1ca758818b3be981779.exe
-
Size
606KB
-
MD5
c4d20a36d9f0e1ca758818b3be981779
-
SHA1
2d55fcb91c41aa7d63f240fc1c5a49c919cc4487
-
SHA256
1fbf779d7f1d4dfe9cd3f7c84c6e5763bb77530acc11732563e7abaeaba65a93
-
SHA512
e926955240c20b52d885a3471bd422cf0903e49260595419cdef1851676539b84379c1a6959a8ef9452352035f443052886d0a10c913da91824a0a0ae5e77ffe
-
SSDEEP
12288:DrVRbtxoNY4psjC6bswqW4jV//1iVs9odGn:DrFuJVMFMie9odO
Malware Config
Signatures
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload 3 IoCs
resource yara_rule behavioral2/memory/2568-30-0x0000000000400000-0x0000000000414000-memory.dmp family_isrstealer behavioral2/memory/2568-36-0x0000000000400000-0x0000000000414000-memory.dmp family_isrstealer behavioral2/memory/2568-44-0x0000000000400000-0x0000000000414000-memory.dmp family_isrstealer -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation c4d20a36d9f0e1ca758818b3be981779.exe -
Executes dropped EXE 4 IoCs
pid Process 5000 tmp1.exe 2356 tmp2.exe 2568 tmp1.EXE 2168 tmp2.EXE -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RegEdit = "C:\\Users\\Admin\\AppData\\Roaming\\RegEdit.exe" tmp2.EXE -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 5000 set thread context of 2568 5000 tmp1.exe 92 PID 2356 set thread context of 2168 2356 tmp2.exe 93 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2568 tmp1.EXE 2568 tmp1.EXE 2568 tmp1.EXE 2568 tmp1.EXE 2568 tmp1.EXE 2568 tmp1.EXE 2568 tmp1.EXE 2568 tmp1.EXE -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 5032 c4d20a36d9f0e1ca758818b3be981779.exe 5000 tmp1.exe 2356 tmp2.exe 2568 tmp1.EXE -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 5032 wrote to memory of 5000 5032 c4d20a36d9f0e1ca758818b3be981779.exe 90 PID 5032 wrote to memory of 5000 5032 c4d20a36d9f0e1ca758818b3be981779.exe 90 PID 5032 wrote to memory of 5000 5032 c4d20a36d9f0e1ca758818b3be981779.exe 90 PID 5032 wrote to memory of 2356 5032 c4d20a36d9f0e1ca758818b3be981779.exe 91 PID 5032 wrote to memory of 2356 5032 c4d20a36d9f0e1ca758818b3be981779.exe 91 PID 5032 wrote to memory of 2356 5032 c4d20a36d9f0e1ca758818b3be981779.exe 91 PID 5000 wrote to memory of 2568 5000 tmp1.exe 92 PID 5000 wrote to memory of 2568 5000 tmp1.exe 92 PID 5000 wrote to memory of 2568 5000 tmp1.exe 92 PID 2356 wrote to memory of 2168 2356 tmp2.exe 93 PID 2356 wrote to memory of 2168 2356 tmp2.exe 93 PID 2356 wrote to memory of 2168 2356 tmp2.exe 93 PID 5000 wrote to memory of 2568 5000 tmp1.exe 92 PID 2356 wrote to memory of 2168 2356 tmp2.exe 93 PID 5000 wrote to memory of 2568 5000 tmp1.exe 92 PID 5000 wrote to memory of 2568 5000 tmp1.exe 92 PID 2356 wrote to memory of 2168 2356 tmp2.exe 93 PID 5000 wrote to memory of 2568 5000 tmp1.exe 92 PID 2356 wrote to memory of 2168 2356 tmp2.exe 93 PID 2356 wrote to memory of 2168 2356 tmp2.exe 93 PID 2356 wrote to memory of 2168 2356 tmp2.exe 93 PID 2356 wrote to memory of 2168 2356 tmp2.exe 93 PID 5000 wrote to memory of 2568 5000 tmp1.exe 92 PID 2356 wrote to memory of 2168 2356 tmp2.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\c4d20a36d9f0e1ca758818b3be981779.exe"C:\Users\Admin\AppData\Local\Temp\c4d20a36d9f0e1ca758818b3be981779.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Users\Admin\AppData\Local\Temp\tmp1.exe"C:\Users\Admin\AppData\Local\Temp\tmp1.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Users\Admin\AppData\Local\Temp\tmp1.EXE"C:\Users\Admin\AppData\Local\Temp\tmp1.EXE"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2568
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp2.exe"C:\Users\Admin\AppData\Local\Temp\tmp2.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Users\Admin\AppData\Local\Temp\tmp2.EXE"C:\Users\Admin\AppData\Local\Temp\tmp2.EXE"3⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2168
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
156KB
MD5c1cfb778cbfe135b6fb0d2b6b9116b38
SHA1f90af1a915f603a6acc40c18a5d9e8e6eef8d015
SHA256b5d32c93e9a815f775489aa2b0ab1f86d45821df344916237746557062d7e8fb
SHA5128ca72c995233c5c14eb9d1b6d6b1b70f72f03acbfb578743b0da8bce03b36d0d2d7e005feefb2fffd55f803e41f9e17b5be8ccc5a333a34d426545fbb6443b0a
-
Filesize
216KB
MD5f0c93f442042bbbe985674d671191ed3
SHA1a9ebbe67032eec48673b42325682859ce06a5e2c
SHA2569708ceb9b7f76534315948101b2c8493d0c96e8205eee25e7b8a5473f65b997e
SHA5127e8978c682d0e735f8f7bc16d1fb99136e927c7dc1d6e0fe5be41f0ec0808af9203bf146653f9fe4ac806c91f532144f5b27ac2b9adcb7b3876d4ab02a75e776
-
Filesize
88KB
MD54eb6b67e77fa490b97926583d79d7e0d
SHA1149e480b4fadfff351faac91f03a96a0382c2dc9
SHA2566391f472e0b8866b4db818f2d13daf8beca8d77918d712dfc3307582d40e10d0
SHA5122c49766d2ce7e693abfd25ddff14c3ae43af20d236d44ac4ffa4a332786c41d955c52ab1aac9593f03cd66f5c3c67850b13e62a4a27ad0b86647397dfab200f4
-
Filesize
64KB
MD519be60d8ce45d71cba9166cc9000a265
SHA12d6ede4da37200698d51624605f7e8bbc05da363
SHA25614b3e98b1bfbf89b2631741eb3c7116351dd08c52081b88519043c14a6f9b1c5
SHA512cd615f665b7d3279bd5ede2bf0155593039ff3d69d948a2289a2baa2b17bb6ef451246385f5968b9a0329c34d25586768987de399d9073f168a5e40fcb2a2016