Analysis
-
max time kernel
150s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240319-en -
resource tags
arch:x64arch:x86image:win10v2004-20240319-enlocale:en-usos:windows10-2004-x64system -
submitted
21-03-2024 17:31
Static task
static1
Behavioral task
behavioral1
Sample
dc35c41440704458ed7a60c0ac026f62.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
dc35c41440704458ed7a60c0ac026f62.exe
Resource
win10v2004-20240319-en
General
-
Target
dc35c41440704458ed7a60c0ac026f62.exe
-
Size
408KB
-
MD5
dc35c41440704458ed7a60c0ac026f62
-
SHA1
28459a2a602943fb5f44cb7424061c390fefb502
-
SHA256
4d4e7a37101a9fa0810a3ff324a87c302a1328dcaeae6a9c637752e871a1a678
-
SHA512
f522adf75f7915caf3a87551f4704303ddde487da920c6a2a762d4fc821f5c6749b2496cdd5b5193252eb97f01cdcc3dc77584be90e6833e32f2410b955f8081
-
SSDEEP
6144:v7l/Mts0sXrneChRWcSUEC8ctAom2C+do4ON1ZA0bYQpBuLGlY+6iPHS/ei:hMSeChscpEBctA2Q11aPQ3/6/ei
Malware Config
Signatures
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload 5 IoCs
resource yara_rule behavioral2/memory/4908-12-0x0000000000400000-0x0000000000459000-memory.dmp family_isrstealer behavioral2/files/0x0007000000023333-28.dat family_isrstealer behavioral2/memory/4908-70-0x0000000000400000-0x0000000000459000-memory.dmp family_isrstealer behavioral2/memory/1124-87-0x0000000000400000-0x0000000000459000-memory.dmp family_isrstealer behavioral2/memory/4908-95-0x0000000000400000-0x0000000000459000-memory.dmp family_isrstealer -
NirSoft WebBrowserPassView 4 IoCs
Password recovery tool for various web browsers
resource yara_rule behavioral2/memory/2492-44-0x0000000000400000-0x0000000000454000-memory.dmp WebBrowserPassView behavioral2/memory/2492-49-0x0000000000400000-0x0000000000454000-memory.dmp WebBrowserPassView behavioral2/memory/2492-50-0x0000000000400000-0x0000000000454000-memory.dmp WebBrowserPassView behavioral2/memory/2492-53-0x0000000000400000-0x0000000000454000-memory.dmp WebBrowserPassView -
Nirsoft 4 IoCs
resource yara_rule behavioral2/memory/2492-44-0x0000000000400000-0x0000000000454000-memory.dmp Nirsoft behavioral2/memory/2492-49-0x0000000000400000-0x0000000000454000-memory.dmp Nirsoft behavioral2/memory/2492-50-0x0000000000400000-0x0000000000454000-memory.dmp Nirsoft behavioral2/memory/2492-53-0x0000000000400000-0x0000000000454000-memory.dmp Nirsoft -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation dc35c41440704458ed7a60c0ac026f62.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation dc35c41440704458ed7a60c0ac026f62.exe -
Executes dropped EXE 6 IoCs
pid Process 2376 YSDXT.exe 5000 YSDXT.exe 2492 YSDXT.exe 3028 intelgfx.exe 1124 intelgfx.exe 4928 intelgfx.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/4908-5-0x0000000000400000-0x0000000000459000-memory.dmp upx behavioral2/memory/3628-7-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/3628-10-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/4908-9-0x0000000000400000-0x0000000000459000-memory.dmp upx behavioral2/memory/4908-12-0x0000000000400000-0x0000000000459000-memory.dmp upx behavioral2/memory/3628-13-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/4908-70-0x0000000000400000-0x0000000000459000-memory.dmp upx behavioral2/memory/3628-77-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/3628-82-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/1124-87-0x0000000000400000-0x0000000000459000-memory.dmp upx behavioral2/memory/4908-95-0x0000000000400000-0x0000000000459000-memory.dmp upx behavioral2/memory/4928-97-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\invidiadriver = "C:\\Users\\Admin\\AppData\\Roaming\\system32\\intelgfx.exe" reg.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 1304 set thread context of 4908 1304 dc35c41440704458ed7a60c0ac026f62.exe 96 PID 1304 set thread context of 3628 1304 dc35c41440704458ed7a60c0ac026f62.exe 97 PID 2376 set thread context of 5000 2376 YSDXT.exe 102 PID 5000 set thread context of 2492 5000 YSDXT.exe 103 PID 3028 set thread context of 1124 3028 intelgfx.exe 106 PID 3028 set thread context of 4928 3028 intelgfx.exe 107 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2376 YSDXT.exe 2376 YSDXT.exe 2376 YSDXT.exe 2376 YSDXT.exe 2376 YSDXT.exe 2376 YSDXT.exe 2376 YSDXT.exe 2376 YSDXT.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4928 intelgfx.exe Token: SeDebugPrivilege 4928 intelgfx.exe Token: SeDebugPrivilege 4928 intelgfx.exe Token: SeDebugPrivilege 4928 intelgfx.exe Token: SeDebugPrivilege 4928 intelgfx.exe Token: SeDebugPrivilege 4928 intelgfx.exe Token: SeDebugPrivilege 4928 intelgfx.exe Token: SeDebugPrivilege 4928 intelgfx.exe Token: SeDebugPrivilege 4928 intelgfx.exe Token: SeDebugPrivilege 4928 intelgfx.exe Token: SeDebugPrivilege 4928 intelgfx.exe Token: SeDebugPrivilege 4928 intelgfx.exe Token: SeDebugPrivilege 4928 intelgfx.exe Token: SeDebugPrivilege 4928 intelgfx.exe Token: SeDebugPrivilege 4928 intelgfx.exe Token: SeDebugPrivilege 4928 intelgfx.exe Token: SeDebugPrivilege 4928 intelgfx.exe Token: SeDebugPrivilege 4928 intelgfx.exe Token: SeDebugPrivilege 4928 intelgfx.exe Token: SeDebugPrivilege 4928 intelgfx.exe Token: SeDebugPrivilege 4928 intelgfx.exe Token: SeDebugPrivilege 4928 intelgfx.exe Token: SeDebugPrivilege 4928 intelgfx.exe Token: SeDebugPrivilege 4928 intelgfx.exe Token: SeDebugPrivilege 4928 intelgfx.exe Token: SeDebugPrivilege 4928 intelgfx.exe Token: SeDebugPrivilege 4928 intelgfx.exe Token: SeDebugPrivilege 4928 intelgfx.exe Token: SeDebugPrivilege 4928 intelgfx.exe Token: SeDebugPrivilege 4928 intelgfx.exe Token: SeDebugPrivilege 4928 intelgfx.exe Token: SeDebugPrivilege 4928 intelgfx.exe Token: SeDebugPrivilege 4928 intelgfx.exe Token: SeDebugPrivilege 4928 intelgfx.exe Token: SeDebugPrivilege 4928 intelgfx.exe Token: SeDebugPrivilege 4928 intelgfx.exe Token: SeDebugPrivilege 4928 intelgfx.exe Token: SeDebugPrivilege 4928 intelgfx.exe Token: SeDebugPrivilege 4928 intelgfx.exe Token: SeDebugPrivilege 4928 intelgfx.exe Token: SeDebugPrivilege 4928 intelgfx.exe Token: SeDebugPrivilege 4928 intelgfx.exe Token: SeDebugPrivilege 4928 intelgfx.exe Token: SeDebugPrivilege 4928 intelgfx.exe Token: SeDebugPrivilege 4928 intelgfx.exe Token: SeDebugPrivilege 4928 intelgfx.exe Token: SeDebugPrivilege 4928 intelgfx.exe Token: SeDebugPrivilege 4928 intelgfx.exe Token: SeDebugPrivilege 4928 intelgfx.exe Token: SeDebugPrivilege 4928 intelgfx.exe Token: SeDebugPrivilege 4928 intelgfx.exe Token: SeDebugPrivilege 4928 intelgfx.exe Token: SeDebugPrivilege 4928 intelgfx.exe Token: SeDebugPrivilege 4928 intelgfx.exe Token: SeDebugPrivilege 4928 intelgfx.exe Token: SeDebugPrivilege 4928 intelgfx.exe Token: SeDebugPrivilege 4928 intelgfx.exe Token: SeDebugPrivilege 4928 intelgfx.exe Token: SeDebugPrivilege 4928 intelgfx.exe Token: SeDebugPrivilege 4928 intelgfx.exe Token: SeDebugPrivilege 4928 intelgfx.exe Token: SeDebugPrivilege 4928 intelgfx.exe Token: SeDebugPrivilege 4928 intelgfx.exe Token: SeDebugPrivilege 4928 intelgfx.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 1304 dc35c41440704458ed7a60c0ac026f62.exe 3628 dc35c41440704458ed7a60c0ac026f62.exe 4908 dc35c41440704458ed7a60c0ac026f62.exe 2376 YSDXT.exe 3028 intelgfx.exe 1124 intelgfx.exe 4928 intelgfx.exe -
Suspicious use of WriteProcessMemory 62 IoCs
description pid Process procid_target PID 1304 wrote to memory of 4908 1304 dc35c41440704458ed7a60c0ac026f62.exe 96 PID 1304 wrote to memory of 4908 1304 dc35c41440704458ed7a60c0ac026f62.exe 96 PID 1304 wrote to memory of 4908 1304 dc35c41440704458ed7a60c0ac026f62.exe 96 PID 1304 wrote to memory of 4908 1304 dc35c41440704458ed7a60c0ac026f62.exe 96 PID 1304 wrote to memory of 4908 1304 dc35c41440704458ed7a60c0ac026f62.exe 96 PID 1304 wrote to memory of 4908 1304 dc35c41440704458ed7a60c0ac026f62.exe 96 PID 1304 wrote to memory of 4908 1304 dc35c41440704458ed7a60c0ac026f62.exe 96 PID 1304 wrote to memory of 4908 1304 dc35c41440704458ed7a60c0ac026f62.exe 96 PID 1304 wrote to memory of 3628 1304 dc35c41440704458ed7a60c0ac026f62.exe 97 PID 1304 wrote to memory of 3628 1304 dc35c41440704458ed7a60c0ac026f62.exe 97 PID 1304 wrote to memory of 3628 1304 dc35c41440704458ed7a60c0ac026f62.exe 97 PID 1304 wrote to memory of 3628 1304 dc35c41440704458ed7a60c0ac026f62.exe 97 PID 1304 wrote to memory of 3628 1304 dc35c41440704458ed7a60c0ac026f62.exe 97 PID 1304 wrote to memory of 3628 1304 dc35c41440704458ed7a60c0ac026f62.exe 97 PID 1304 wrote to memory of 3628 1304 dc35c41440704458ed7a60c0ac026f62.exe 97 PID 1304 wrote to memory of 3628 1304 dc35c41440704458ed7a60c0ac026f62.exe 97 PID 3628 wrote to memory of 3600 3628 dc35c41440704458ed7a60c0ac026f62.exe 99 PID 3628 wrote to memory of 3600 3628 dc35c41440704458ed7a60c0ac026f62.exe 99 PID 3628 wrote to memory of 3600 3628 dc35c41440704458ed7a60c0ac026f62.exe 99 PID 4908 wrote to memory of 2376 4908 dc35c41440704458ed7a60c0ac026f62.exe 98 PID 4908 wrote to memory of 2376 4908 dc35c41440704458ed7a60c0ac026f62.exe 98 PID 4908 wrote to memory of 2376 4908 dc35c41440704458ed7a60c0ac026f62.exe 98 PID 2376 wrote to memory of 5000 2376 YSDXT.exe 102 PID 2376 wrote to memory of 5000 2376 YSDXT.exe 102 PID 2376 wrote to memory of 5000 2376 YSDXT.exe 102 PID 2376 wrote to memory of 5000 2376 YSDXT.exe 102 PID 2376 wrote to memory of 5000 2376 YSDXT.exe 102 PID 2376 wrote to memory of 5000 2376 YSDXT.exe 102 PID 2376 wrote to memory of 5000 2376 YSDXT.exe 102 PID 2376 wrote to memory of 5000 2376 YSDXT.exe 102 PID 2376 wrote to memory of 5000 2376 YSDXT.exe 102 PID 2376 wrote to memory of 5000 2376 YSDXT.exe 102 PID 2376 wrote to memory of 5000 2376 YSDXT.exe 102 PID 2376 wrote to memory of 5000 2376 YSDXT.exe 102 PID 2376 wrote to memory of 5000 2376 YSDXT.exe 102 PID 5000 wrote to memory of 2492 5000 YSDXT.exe 103 PID 5000 wrote to memory of 2492 5000 YSDXT.exe 103 PID 5000 wrote to memory of 2492 5000 YSDXT.exe 103 PID 5000 wrote to memory of 2492 5000 YSDXT.exe 103 PID 5000 wrote to memory of 2492 5000 YSDXT.exe 103 PID 3600 wrote to memory of 692 3600 cmd.exe 104 PID 3600 wrote to memory of 692 3600 cmd.exe 104 PID 3600 wrote to memory of 692 3600 cmd.exe 104 PID 3628 wrote to memory of 3028 3628 dc35c41440704458ed7a60c0ac026f62.exe 105 PID 3628 wrote to memory of 3028 3628 dc35c41440704458ed7a60c0ac026f62.exe 105 PID 3628 wrote to memory of 3028 3628 dc35c41440704458ed7a60c0ac026f62.exe 105 PID 3028 wrote to memory of 1124 3028 intelgfx.exe 106 PID 3028 wrote to memory of 1124 3028 intelgfx.exe 106 PID 3028 wrote to memory of 1124 3028 intelgfx.exe 106 PID 3028 wrote to memory of 1124 3028 intelgfx.exe 106 PID 3028 wrote to memory of 1124 3028 intelgfx.exe 106 PID 3028 wrote to memory of 1124 3028 intelgfx.exe 106 PID 3028 wrote to memory of 1124 3028 intelgfx.exe 106 PID 3028 wrote to memory of 1124 3028 intelgfx.exe 106 PID 3028 wrote to memory of 4928 3028 intelgfx.exe 107 PID 3028 wrote to memory of 4928 3028 intelgfx.exe 107 PID 3028 wrote to memory of 4928 3028 intelgfx.exe 107 PID 3028 wrote to memory of 4928 3028 intelgfx.exe 107 PID 3028 wrote to memory of 4928 3028 intelgfx.exe 107 PID 3028 wrote to memory of 4928 3028 intelgfx.exe 107 PID 3028 wrote to memory of 4928 3028 intelgfx.exe 107 PID 3028 wrote to memory of 4928 3028 intelgfx.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\dc35c41440704458ed7a60c0ac026f62.exe"C:\Users\Admin\AppData\Local\Temp\dc35c41440704458ed7a60c0ac026f62.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Users\Admin\AppData\Local\Temp\dc35c41440704458ed7a60c0ac026f62.exe"C:\Users\Admin\AppData\Local\Temp\dc35c41440704458ed7a60c0ac026f62.exe"2⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Users\Admin\AppData\Local\Temp\YSDXT.exe"C:\Users\Admin\AppData\Local\Temp\YSDXT.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Users\Admin\AppData\Local\Temp\YSDXT.exe"C:\Users\Admin\AppData\Local\Temp\YSDXT.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Users\Admin\AppData\Local\Temp\YSDXT.exe"C:\Users\Admin\AppData\Local\Temp\YSDXT.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp5⤵
- Executes dropped EXE
PID:2492
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\dc35c41440704458ed7a60c0ac026f62.exe"C:\Users\Admin\AppData\Local\Temp\dc35c41440704458ed7a60c0ac026f62.exe"2⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3628 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\PJOKL.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:3600 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "invidiadriver" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\system32\intelgfx.exe" /f4⤵
- Adds Run key to start application
PID:692
-
-
-
C:\Users\Admin\AppData\Roaming\system32\intelgfx.exe"C:\Users\Admin\AppData\Roaming\system32\intelgfx.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Users\Admin\AppData\Roaming\system32\intelgfx.exe"C:\Users\Admin\AppData\Roaming\system32\intelgfx.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1124
-
-
C:\Users\Admin\AppData\Roaming\system32\intelgfx.exe"C:\Users\Admin\AppData\Roaming\system32\intelgfx.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4928
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4140 --field-trial-handle=2320,i,3025503729105798828,9325691672526736153,262144 --variations-seed-version /prefetch:81⤵PID:2068
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD55f88391307396bd801e5d983e4f96ac4
SHA1d426f3dad0cd9f13287b263028ad4587f2b1d9c8
SHA2562d6e24c71a3081416896765d09901744dbd541553af2d831f2a17f6f38ac4dec
SHA5120cc65532264fe5541dc75016c080004c111fecfb97f2f0063984a89089d49ea07a1bf6c1fa9b835ad32cfa986bac82d171351c6cf2163598199588aefdb402f8
-
Filesize
320KB
MD5ccc2260269cb43ddadda9444e3d112f7
SHA1ddab46acc12d7c60a15fa363f88030f1dd539fcb
SHA2568ca1bd039407381c33fb7ab570b6e95b0ce64b0d5ef64a1968f9b55647cc1911
SHA512787d0b4f5d89b840a4917c78e46f963c8c96a96ec005b45d085222ef307c2a76f074c4a65ca033b038e1b7d1419c7cd3c5c5f3075c3ea24e546c68bdd7643fde
-
Filesize
384KB
MD5e04328476002044819c479a0ee2ef749
SHA164dfbf9567263dcdfd9dc574c68342c62f45496d
SHA2565f05a564056106c00550bee58c1c1cb3d2d20fbacb0bcad8bc9b998f469bde51
SHA51271fcf7f17e4f7c23d1a795029d47ce6f9753377220919c4d9858f2738de81c15e3437a22a2b9a853914ce0a188876ee16df71816dd16fb7f36cc9cdfa8fdd652
-
Filesize
408KB
MD5a08780334a46a528eb1c69bdda2485db
SHA1cb23220f3940528cf494f46d37d6f1ef9536f5f4
SHA25646bb64b5812ac8723cb15e2d9a63f326c99f04fca18eabda7a4fa465e41523b2
SHA512cdd0fb89c515d22ac6ff04a2607703d408e718ebe88a4c58611b5665feac86e2368d5a3d2fd9faa179db6a37aeeeb7f0a861431eaf07f0f6f1a54a51aa51d7b3