Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
24-06-2024 22:01
Static task
static1
Behavioral task
behavioral1
Sample
5f23a90128fbb7b93efe0458b47a0b8f30f724bf43c462306c45e58f0d09e147.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
5f23a90128fbb7b93efe0458b47a0b8f30f724bf43c462306c45e58f0d09e147.exe
Resource
win10v2004-20240611-en
General
-
Target
5f23a90128fbb7b93efe0458b47a0b8f30f724bf43c462306c45e58f0d09e147.exe
-
Size
1.1MB
-
MD5
312322ba92d80c13f90c392910b61aa6
-
SHA1
0e8393aca634c54c559fda2224387724eaab7823
-
SHA256
5f23a90128fbb7b93efe0458b47a0b8f30f724bf43c462306c45e58f0d09e147
-
SHA512
94c72d5786158c13f6a7f73f0b683402e9ae0d3ffafb21bed5756d381e7c0d1831398a227719f66d4438c9568993994257ca5b47001c54ffa797b59438c4bf94
-
SSDEEP
24576:ALmJkcoQricOIQxiZY1ia0ZnLhE7uU3lzKR0o30o9:PJZoQrbTFZY1ia0ZndE7lSLl
Malware Config
Signatures
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload 4 IoCs
resource yara_rule behavioral1/memory/1484-4-0x0000000000400000-0x0000000000464000-memory.dmp family_isrstealer behavioral1/memory/1484-6-0x0000000000400000-0x0000000000464000-memory.dmp family_isrstealer behavioral1/memory/1484-19-0x0000000000400000-0x0000000000464000-memory.dmp family_isrstealer behavioral1/memory/1484-21-0x0000000000400000-0x0000000000464000-memory.dmp family_isrstealer -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/1704-10-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/1704-12-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/1704-13-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/1704-14-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/1704-16-0x0000000000400000-0x0000000000453000-memory.dmp upx -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1484 set thread context of 1704 1484 5f23a90128fbb7b93efe0458b47a0b8f30f724bf43c462306c45e58f0d09e147.exe 29 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1484 5f23a90128fbb7b93efe0458b47a0b8f30f724bf43c462306c45e58f0d09e147.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2756 wrote to memory of 1484 2756 5f23a90128fbb7b93efe0458b47a0b8f30f724bf43c462306c45e58f0d09e147.exe 28 PID 2756 wrote to memory of 1484 2756 5f23a90128fbb7b93efe0458b47a0b8f30f724bf43c462306c45e58f0d09e147.exe 28 PID 2756 wrote to memory of 1484 2756 5f23a90128fbb7b93efe0458b47a0b8f30f724bf43c462306c45e58f0d09e147.exe 28 PID 2756 wrote to memory of 1484 2756 5f23a90128fbb7b93efe0458b47a0b8f30f724bf43c462306c45e58f0d09e147.exe 28 PID 2756 wrote to memory of 1484 2756 5f23a90128fbb7b93efe0458b47a0b8f30f724bf43c462306c45e58f0d09e147.exe 28 PID 2756 wrote to memory of 1484 2756 5f23a90128fbb7b93efe0458b47a0b8f30f724bf43c462306c45e58f0d09e147.exe 28 PID 2756 wrote to memory of 1484 2756 5f23a90128fbb7b93efe0458b47a0b8f30f724bf43c462306c45e58f0d09e147.exe 28 PID 1484 wrote to memory of 1704 1484 5f23a90128fbb7b93efe0458b47a0b8f30f724bf43c462306c45e58f0d09e147.exe 29 PID 1484 wrote to memory of 1704 1484 5f23a90128fbb7b93efe0458b47a0b8f30f724bf43c462306c45e58f0d09e147.exe 29 PID 1484 wrote to memory of 1704 1484 5f23a90128fbb7b93efe0458b47a0b8f30f724bf43c462306c45e58f0d09e147.exe 29 PID 1484 wrote to memory of 1704 1484 5f23a90128fbb7b93efe0458b47a0b8f30f724bf43c462306c45e58f0d09e147.exe 29 PID 1484 wrote to memory of 1704 1484 5f23a90128fbb7b93efe0458b47a0b8f30f724bf43c462306c45e58f0d09e147.exe 29 PID 1484 wrote to memory of 1704 1484 5f23a90128fbb7b93efe0458b47a0b8f30f724bf43c462306c45e58f0d09e147.exe 29 PID 1484 wrote to memory of 1704 1484 5f23a90128fbb7b93efe0458b47a0b8f30f724bf43c462306c45e58f0d09e147.exe 29 PID 1484 wrote to memory of 1704 1484 5f23a90128fbb7b93efe0458b47a0b8f30f724bf43c462306c45e58f0d09e147.exe 29 PID 1484 wrote to memory of 1704 1484 5f23a90128fbb7b93efe0458b47a0b8f30f724bf43c462306c45e58f0d09e147.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\5f23a90128fbb7b93efe0458b47a0b8f30f724bf43c462306c45e58f0d09e147.exe"C:\Users\Admin\AppData\Local\Temp\5f23a90128fbb7b93efe0458b47a0b8f30f724bf43c462306c45e58f0d09e147.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Users\Admin\AppData\Local\Temp\5f23a90128fbb7b93efe0458b47a0b8f30f724bf43c462306c45e58f0d09e147.exe"C:\Users\Admin\AppData\Local\Temp\5f23a90128fbb7b93efe0458b47a0b8f30f724bf43c462306c45e58f0d09e147.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Users\Admin\AppData\Local\Temp\5f23a90128fbb7b93efe0458b47a0b8f30f724bf43c462306c45e58f0d09e147.exe/scomma "C:\Users\Admin\AppData\Local\Temp\PxKZSpte9D.ini"3⤵PID:1704
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5B
MD5d1ea279fb5559c020a1b4137dc4de237
SHA1db6f8988af46b56216a6f0daf95ab8c9bdb57400
SHA256fcdcc2c46896915a1c695d6231f0fee336a668531b7a3da46178c80362546dba
SHA512720e9c284f0559015312df7fe977563e5e16f48d3506e51eb4016adf7971924d352f740b030aa3adc81b6f65fd1dba12df06d10fa6c115074e5097e7ee0f08b3