Analysis
-
max time kernel
136s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
24-06-2024 22:01
Static task
static1
Behavioral task
behavioral1
Sample
5f23a90128fbb7b93efe0458b47a0b8f30f724bf43c462306c45e58f0d09e147.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
5f23a90128fbb7b93efe0458b47a0b8f30f724bf43c462306c45e58f0d09e147.exe
Resource
win10v2004-20240611-en
General
-
Target
5f23a90128fbb7b93efe0458b47a0b8f30f724bf43c462306c45e58f0d09e147.exe
-
Size
1.1MB
-
MD5
312322ba92d80c13f90c392910b61aa6
-
SHA1
0e8393aca634c54c559fda2224387724eaab7823
-
SHA256
5f23a90128fbb7b93efe0458b47a0b8f30f724bf43c462306c45e58f0d09e147
-
SHA512
94c72d5786158c13f6a7f73f0b683402e9ae0d3ffafb21bed5756d381e7c0d1831398a227719f66d4438c9568993994257ca5b47001c54ffa797b59438c4bf94
-
SSDEEP
24576:ALmJkcoQricOIQxiZY1ia0ZnLhE7uU3lzKR0o30o9:PJZoQrbTFZY1ia0ZndE7lSLl
Malware Config
Signatures
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload 4 IoCs
resource yara_rule behavioral2/memory/1972-0-0x0000000000400000-0x0000000000464000-memory.dmp family_isrstealer behavioral2/memory/1972-2-0x0000000000400000-0x0000000000464000-memory.dmp family_isrstealer behavioral2/memory/1972-14-0x0000000000400000-0x0000000000464000-memory.dmp family_isrstealer behavioral2/memory/1972-16-0x0000000000400000-0x0000000000464000-memory.dmp family_isrstealer -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/1324-5-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral2/memory/1324-7-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral2/memory/1324-9-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral2/memory/1324-8-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral2/memory/1324-11-0x0000000000400000-0x0000000000453000-memory.dmp upx -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4376 set thread context of 1972 4376 5f23a90128fbb7b93efe0458b47a0b8f30f724bf43c462306c45e58f0d09e147.exe 83 PID 1972 set thread context of 1324 1972 5f23a90128fbb7b93efe0458b47a0b8f30f724bf43c462306c45e58f0d09e147.exe 84 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1972 5f23a90128fbb7b93efe0458b47a0b8f30f724bf43c462306c45e58f0d09e147.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 4376 wrote to memory of 1972 4376 5f23a90128fbb7b93efe0458b47a0b8f30f724bf43c462306c45e58f0d09e147.exe 83 PID 4376 wrote to memory of 1972 4376 5f23a90128fbb7b93efe0458b47a0b8f30f724bf43c462306c45e58f0d09e147.exe 83 PID 4376 wrote to memory of 1972 4376 5f23a90128fbb7b93efe0458b47a0b8f30f724bf43c462306c45e58f0d09e147.exe 83 PID 4376 wrote to memory of 1972 4376 5f23a90128fbb7b93efe0458b47a0b8f30f724bf43c462306c45e58f0d09e147.exe 83 PID 4376 wrote to memory of 1972 4376 5f23a90128fbb7b93efe0458b47a0b8f30f724bf43c462306c45e58f0d09e147.exe 83 PID 4376 wrote to memory of 1972 4376 5f23a90128fbb7b93efe0458b47a0b8f30f724bf43c462306c45e58f0d09e147.exe 83 PID 1972 wrote to memory of 1324 1972 5f23a90128fbb7b93efe0458b47a0b8f30f724bf43c462306c45e58f0d09e147.exe 84 PID 1972 wrote to memory of 1324 1972 5f23a90128fbb7b93efe0458b47a0b8f30f724bf43c462306c45e58f0d09e147.exe 84 PID 1972 wrote to memory of 1324 1972 5f23a90128fbb7b93efe0458b47a0b8f30f724bf43c462306c45e58f0d09e147.exe 84 PID 1972 wrote to memory of 1324 1972 5f23a90128fbb7b93efe0458b47a0b8f30f724bf43c462306c45e58f0d09e147.exe 84 PID 1972 wrote to memory of 1324 1972 5f23a90128fbb7b93efe0458b47a0b8f30f724bf43c462306c45e58f0d09e147.exe 84 PID 1972 wrote to memory of 1324 1972 5f23a90128fbb7b93efe0458b47a0b8f30f724bf43c462306c45e58f0d09e147.exe 84 PID 1972 wrote to memory of 1324 1972 5f23a90128fbb7b93efe0458b47a0b8f30f724bf43c462306c45e58f0d09e147.exe 84 PID 1972 wrote to memory of 1324 1972 5f23a90128fbb7b93efe0458b47a0b8f30f724bf43c462306c45e58f0d09e147.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\5f23a90128fbb7b93efe0458b47a0b8f30f724bf43c462306c45e58f0d09e147.exe"C:\Users\Admin\AppData\Local\Temp\5f23a90128fbb7b93efe0458b47a0b8f30f724bf43c462306c45e58f0d09e147.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\Users\Admin\AppData\Local\Temp\5f23a90128fbb7b93efe0458b47a0b8f30f724bf43c462306c45e58f0d09e147.exe"C:\Users\Admin\AppData\Local\Temp\5f23a90128fbb7b93efe0458b47a0b8f30f724bf43c462306c45e58f0d09e147.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\5f23a90128fbb7b93efe0458b47a0b8f30f724bf43c462306c45e58f0d09e147.exe/scomma "C:\Users\Admin\AppData\Local\Temp\jzB9KT8H6s.ini"3⤵PID:1324
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5B
MD5d1ea279fb5559c020a1b4137dc4de237
SHA1db6f8988af46b56216a6f0daf95ab8c9bdb57400
SHA256fcdcc2c46896915a1c695d6231f0fee336a668531b7a3da46178c80362546dba
SHA512720e9c284f0559015312df7fe977563e5e16f48d3506e51eb4016adf7971924d352f740b030aa3adc81b6f65fd1dba12df06d10fa6c115074e5097e7ee0f08b3