Analysis
-
max time kernel
140s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28-04-2024 18:33
Static task
static1
Behavioral task
behavioral1
Sample
0cb3026b28ab359211f50176bc8f920884474445331155c4b9a3d5bc11f93266.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0cb3026b28ab359211f50176bc8f920884474445331155c4b9a3d5bc11f93266.exe
Resource
win10v2004-20240419-en
General
-
Target
0cb3026b28ab359211f50176bc8f920884474445331155c4b9a3d5bc11f93266.exe
-
Size
271KB
-
MD5
e94d9a5d0a03d3f2bf241a50eea621bc
-
SHA1
1e915cbf1017cf35ad92c3c06f96b7719062e156
-
SHA256
0cb3026b28ab359211f50176bc8f920884474445331155c4b9a3d5bc11f93266
-
SHA512
2154f9e4f349842217bb97c4e497a91eee6ab3789a6c1f1c7e926e8877a021e496efc61ee69a2e8d5128f47171a204f98a8e262bd30ea557880a0d4eaf85944c
-
SSDEEP
6144:/rTfUHeeSKOS9ccFKk3Y9t9YZfnVUBTUeg:/n8yN0Mr8ZfnVUBTTg
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 26 IoCs
Processes:
resource yara_rule C:\Users\Public\Microsoft Build\Isass.exe UPX behavioral1/memory/2856-9-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/2700-15-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/2856-12-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/2548-17-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/2676-20-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/2652-22-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/2736-25-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/2452-27-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/2556-30-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/2464-36-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/2700-40-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/2700-41-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/2700-44-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/2700-45-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/2700-52-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/2700-53-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/2700-61-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/2700-62-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/2700-68-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/2700-69-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/2700-77-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/2700-78-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/2700-86-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/2700-87-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/2700-99-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX -
Executes dropped EXE 6 IoCs
Processes:
Isass.exeIsass.exeIsass.exeIsass.exeIsass.exe0cb3026b28ab359211f50176bc8f920884474445331155c4b9a3d5bc11f93266.exepid process 2700 Isass.exe 2548 Isass.exe 2652 Isass.exe 2452 Isass.exe 2464 Isass.exe 2484 0cb3026b28ab359211f50176bc8f920884474445331155c4b9a3d5bc11f93266.exe -
Loads dropped DLL 12 IoCs
Processes:
0cb3026b28ab359211f50176bc8f920884474445331155c4b9a3d5bc11f93266.exe0cb3026b28ab359211f50176bc8f920884474445331155c4b9a3d5bc11f93266.exe0cb3026b28ab359211f50176bc8f920884474445331155c4b9a3d5bc11f93266.exe0cb3026b28ab359211f50176bc8f920884474445331155c4b9a3d5bc11f93266.exeIsass.exeIsass.exepid process 2856 0cb3026b28ab359211f50176bc8f920884474445331155c4b9a3d5bc11f93266.exe 2856 0cb3026b28ab359211f50176bc8f920884474445331155c4b9a3d5bc11f93266.exe 2856 0cb3026b28ab359211f50176bc8f920884474445331155c4b9a3d5bc11f93266.exe 2856 0cb3026b28ab359211f50176bc8f920884474445331155c4b9a3d5bc11f93266.exe 2676 0cb3026b28ab359211f50176bc8f920884474445331155c4b9a3d5bc11f93266.exe 2676 0cb3026b28ab359211f50176bc8f920884474445331155c4b9a3d5bc11f93266.exe 2736 0cb3026b28ab359211f50176bc8f920884474445331155c4b9a3d5bc11f93266.exe 2736 0cb3026b28ab359211f50176bc8f920884474445331155c4b9a3d5bc11f93266.exe 2556 0cb3026b28ab359211f50176bc8f920884474445331155c4b9a3d5bc11f93266.exe 2556 0cb3026b28ab359211f50176bc8f920884474445331155c4b9a3d5bc11f93266.exe 2464 Isass.exe 2700 Isass.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
0cb3026b28ab359211f50176bc8f920884474445331155c4b9a3d5bc11f93266.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\Isass.exe = "C:\\Users\\Public\\Microsoft Build\\Isass.exe" 0cb3026b28ab359211f50176bc8f920884474445331155c4b9a3d5bc11f93266.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Isass.exe = "C:\\Users\\Public\\Microsoft Build\\Isass.exe" 0cb3026b28ab359211f50176bc8f920884474445331155c4b9a3d5bc11f93266.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 16 IoCs
Processes:
0cb3026b28ab359211f50176bc8f920884474445331155c4b9a3d5bc11f93266.exeIsass.exeIsass.exe0cb3026b28ab359211f50176bc8f920884474445331155c4b9a3d5bc11f93266.exeIsass.exe0cb3026b28ab359211f50176bc8f920884474445331155c4b9a3d5bc11f93266.exeIsass.exe0cb3026b28ab359211f50176bc8f920884474445331155c4b9a3d5bc11f93266.exeIsass.exepid process 2856 0cb3026b28ab359211f50176bc8f920884474445331155c4b9a3d5bc11f93266.exe 2700 Isass.exe 2548 Isass.exe 2548 Isass.exe 2548 Isass.exe 2676 0cb3026b28ab359211f50176bc8f920884474445331155c4b9a3d5bc11f93266.exe 2652 Isass.exe 2652 Isass.exe 2652 Isass.exe 2736 0cb3026b28ab359211f50176bc8f920884474445331155c4b9a3d5bc11f93266.exe 2452 Isass.exe 2452 Isass.exe 2452 Isass.exe 2556 0cb3026b28ab359211f50176bc8f920884474445331155c4b9a3d5bc11f93266.exe 2464 Isass.exe 2464 Isass.exe -
Suspicious use of WriteProcessMemory 36 IoCs
Processes:
0cb3026b28ab359211f50176bc8f920884474445331155c4b9a3d5bc11f93266.exeIsass.exe0cb3026b28ab359211f50176bc8f920884474445331155c4b9a3d5bc11f93266.exeIsass.exe0cb3026b28ab359211f50176bc8f920884474445331155c4b9a3d5bc11f93266.exeIsass.exe0cb3026b28ab359211f50176bc8f920884474445331155c4b9a3d5bc11f93266.exeIsass.exedescription pid process target process PID 2856 wrote to memory of 2700 2856 0cb3026b28ab359211f50176bc8f920884474445331155c4b9a3d5bc11f93266.exe Isass.exe PID 2856 wrote to memory of 2700 2856 0cb3026b28ab359211f50176bc8f920884474445331155c4b9a3d5bc11f93266.exe Isass.exe PID 2856 wrote to memory of 2700 2856 0cb3026b28ab359211f50176bc8f920884474445331155c4b9a3d5bc11f93266.exe Isass.exe PID 2856 wrote to memory of 2700 2856 0cb3026b28ab359211f50176bc8f920884474445331155c4b9a3d5bc11f93266.exe Isass.exe PID 2856 wrote to memory of 2548 2856 0cb3026b28ab359211f50176bc8f920884474445331155c4b9a3d5bc11f93266.exe Isass.exe PID 2856 wrote to memory of 2548 2856 0cb3026b28ab359211f50176bc8f920884474445331155c4b9a3d5bc11f93266.exe Isass.exe PID 2856 wrote to memory of 2548 2856 0cb3026b28ab359211f50176bc8f920884474445331155c4b9a3d5bc11f93266.exe Isass.exe PID 2856 wrote to memory of 2548 2856 0cb3026b28ab359211f50176bc8f920884474445331155c4b9a3d5bc11f93266.exe Isass.exe PID 2548 wrote to memory of 2676 2548 Isass.exe 0cb3026b28ab359211f50176bc8f920884474445331155c4b9a3d5bc11f93266.exe PID 2548 wrote to memory of 2676 2548 Isass.exe 0cb3026b28ab359211f50176bc8f920884474445331155c4b9a3d5bc11f93266.exe PID 2548 wrote to memory of 2676 2548 Isass.exe 0cb3026b28ab359211f50176bc8f920884474445331155c4b9a3d5bc11f93266.exe PID 2548 wrote to memory of 2676 2548 Isass.exe 0cb3026b28ab359211f50176bc8f920884474445331155c4b9a3d5bc11f93266.exe PID 2676 wrote to memory of 2652 2676 0cb3026b28ab359211f50176bc8f920884474445331155c4b9a3d5bc11f93266.exe Isass.exe PID 2676 wrote to memory of 2652 2676 0cb3026b28ab359211f50176bc8f920884474445331155c4b9a3d5bc11f93266.exe Isass.exe PID 2676 wrote to memory of 2652 2676 0cb3026b28ab359211f50176bc8f920884474445331155c4b9a3d5bc11f93266.exe Isass.exe PID 2676 wrote to memory of 2652 2676 0cb3026b28ab359211f50176bc8f920884474445331155c4b9a3d5bc11f93266.exe Isass.exe PID 2652 wrote to memory of 2736 2652 Isass.exe 0cb3026b28ab359211f50176bc8f920884474445331155c4b9a3d5bc11f93266.exe PID 2652 wrote to memory of 2736 2652 Isass.exe 0cb3026b28ab359211f50176bc8f920884474445331155c4b9a3d5bc11f93266.exe PID 2652 wrote to memory of 2736 2652 Isass.exe 0cb3026b28ab359211f50176bc8f920884474445331155c4b9a3d5bc11f93266.exe PID 2652 wrote to memory of 2736 2652 Isass.exe 0cb3026b28ab359211f50176bc8f920884474445331155c4b9a3d5bc11f93266.exe PID 2736 wrote to memory of 2452 2736 0cb3026b28ab359211f50176bc8f920884474445331155c4b9a3d5bc11f93266.exe Isass.exe PID 2736 wrote to memory of 2452 2736 0cb3026b28ab359211f50176bc8f920884474445331155c4b9a3d5bc11f93266.exe Isass.exe PID 2736 wrote to memory of 2452 2736 0cb3026b28ab359211f50176bc8f920884474445331155c4b9a3d5bc11f93266.exe Isass.exe PID 2736 wrote to memory of 2452 2736 0cb3026b28ab359211f50176bc8f920884474445331155c4b9a3d5bc11f93266.exe Isass.exe PID 2452 wrote to memory of 2556 2452 Isass.exe 0cb3026b28ab359211f50176bc8f920884474445331155c4b9a3d5bc11f93266.exe PID 2452 wrote to memory of 2556 2452 Isass.exe 0cb3026b28ab359211f50176bc8f920884474445331155c4b9a3d5bc11f93266.exe PID 2452 wrote to memory of 2556 2452 Isass.exe 0cb3026b28ab359211f50176bc8f920884474445331155c4b9a3d5bc11f93266.exe PID 2452 wrote to memory of 2556 2452 Isass.exe 0cb3026b28ab359211f50176bc8f920884474445331155c4b9a3d5bc11f93266.exe PID 2556 wrote to memory of 2464 2556 0cb3026b28ab359211f50176bc8f920884474445331155c4b9a3d5bc11f93266.exe Isass.exe PID 2556 wrote to memory of 2464 2556 0cb3026b28ab359211f50176bc8f920884474445331155c4b9a3d5bc11f93266.exe Isass.exe PID 2556 wrote to memory of 2464 2556 0cb3026b28ab359211f50176bc8f920884474445331155c4b9a3d5bc11f93266.exe Isass.exe PID 2556 wrote to memory of 2464 2556 0cb3026b28ab359211f50176bc8f920884474445331155c4b9a3d5bc11f93266.exe Isass.exe PID 2464 wrote to memory of 2484 2464 Isass.exe 0cb3026b28ab359211f50176bc8f920884474445331155c4b9a3d5bc11f93266.exe PID 2464 wrote to memory of 2484 2464 Isass.exe 0cb3026b28ab359211f50176bc8f920884474445331155c4b9a3d5bc11f93266.exe PID 2464 wrote to memory of 2484 2464 Isass.exe 0cb3026b28ab359211f50176bc8f920884474445331155c4b9a3d5bc11f93266.exe PID 2464 wrote to memory of 2484 2464 Isass.exe 0cb3026b28ab359211f50176bc8f920884474445331155c4b9a3d5bc11f93266.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0cb3026b28ab359211f50176bc8f920884474445331155c4b9a3d5bc11f93266.exe"C:\Users\Admin\AppData\Local\Temp\0cb3026b28ab359211f50176bc8f920884474445331155c4b9a3d5bc11f93266.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2700
-
-
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\0cb3026b28ab359211f50176bc8f920884474445331155c4b9a3d5bc11f93266.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Users\Admin\AppData\Local\Temp\0cb3026b28ab359211f50176bc8f920884474445331155c4b9a3d5bc11f93266.exe"C:\Users\Admin\AppData\Local\Temp\0cb3026b28ab359211f50176bc8f920884474445331155c4b9a3d5bc11f93266.exe"3⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\0cb3026b28ab359211f50176bc8f920884474445331155c4b9a3d5bc11f93266.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Users\Admin\AppData\Local\Temp\0cb3026b28ab359211f50176bc8f920884474445331155c4b9a3d5bc11f93266.exe"C:\Users\Admin\AppData\Local\Temp\0cb3026b28ab359211f50176bc8f920884474445331155c4b9a3d5bc11f93266.exe"5⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\0cb3026b28ab359211f50176bc8f920884474445331155c4b9a3d5bc11f93266.exe6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Users\Admin\AppData\Local\Temp\0cb3026b28ab359211f50176bc8f920884474445331155c4b9a3d5bc11f93266.exe"C:\Users\Admin\AppData\Local\Temp\0cb3026b28ab359211f50176bc8f920884474445331155c4b9a3d5bc11f93266.exe"7⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\0cb3026b28ab359211f50176bc8f920884474445331155c4b9a3d5bc11f93266.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Users\Admin\AppData\Local\Temp\0cb3026b28ab359211f50176bc8f920884474445331155c4b9a3d5bc11f93266.exe"C:\Users\Admin\AppData\Local\Temp\0cb3026b28ab359211f50176bc8f920884474445331155c4b9a3d5bc11f93266.exe"9⤵
- Executes dropped EXE
PID:2484
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\0cb3026b28ab359211f50176bc8f920884474445331155c4b9a3d5bc11f93266.exe
Filesize37KB
MD5371627fd939bb54ed26f473ca54e718f
SHA13a6910295ae9d1fe388b7572736b8bdfc6e0d111
SHA256b5481e424246a174456add0132427df3a7cd4105f5769835cdf597966c7c0b61
SHA512ff7ea5ae445089ffa808c97e23c620313dd267994b343176c0cb9f8098aace1d12d9212b96611fdf97c974ef94f866b817aed9c0e5f4f195234e7d8d4ec3f8cd
-
Filesize
216KB
MD55e0cf203964abafa22d81a923be95cb9
SHA1e066b6d4a7739fef41c63521435ee3f735fe17b8
SHA25608df8fa4184b52bd2d853adf15ce9e2926abf25a8a2f805845fd4d85a8ade74f
SHA51278245760d831fd173a504cde12d1b2200ed7e6891afbb129a7bdc67784a50a0fc86dc7caf46286c74ddf3fa43c74558f21925f9c0eef872ed25644496a6dd26b