Analysis
-
max time kernel
150s -
max time network
164s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28-06-2024 01:47
Static task
static1
Behavioral task
behavioral1
Sample
b6d4f162f5ae5e393b38a7b4530a148f667fefe09ba6eca65ffef29c0af1b47c.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
b6d4f162f5ae5e393b38a7b4530a148f667fefe09ba6eca65ffef29c0af1b47c.exe
Resource
win10v2004-20240226-en
General
-
Target
b6d4f162f5ae5e393b38a7b4530a148f667fefe09ba6eca65ffef29c0af1b47c.exe
-
Size
869KB
-
MD5
52301e2e4f83bc459f2a1fc537000853
-
SHA1
d32fd82310fdb782a2ae0c6a7b5cb87ee779bb08
-
SHA256
b6d4f162f5ae5e393b38a7b4530a148f667fefe09ba6eca65ffef29c0af1b47c
-
SHA512
8f157f9814b9d48d9455545d9a27e2009f28080d12ecb140b00a47f508c3bd94ed8a93f2a2fe2e22a1b46a558c345fc5e85b1c2ed80d5d5672c4f00f6d70073e
-
SSDEEP
12288:/n8yN0Mr8ZL6aVs7IypwXK4Qzh+jMlWCEh/yr5QE00vZ5McAA9YlO3d:vPuZLzIfpwiz0wy/ylQd0ccdYlO3d
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Isass.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation b6d4f162f5ae5e393b38a7b4530a148f667fefe09ba6eca65ffef29c0af1b47c.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Isass.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation b6d4f162f5ae5e393b38a7b4530a148f667fefe09ba6eca65ffef29c0af1b47c.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Isass.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation b6d4f162f5ae5e393b38a7b4530a148f667fefe09ba6eca65ffef29c0af1b47c.exe -
Executes dropped EXE 6 IoCs
pid Process 2528 Isass.exe 1232 Isass.exe 232 Isass.exe 524 Isass.exe 2532 b6d4f162f5ae5e393b38a7b4530a148f667fefe09ba6eca65ffef29c0af1b47c.exe 3356 b6d4f162f5ae5e393b38a7b4530a148f667fefe09ba6eca65ffef29c0af1b47c.exe -
Loads dropped DLL 1 IoCs
pid Process 3356 b6d4f162f5ae5e393b38a7b4530a148f667fefe09ba6eca65ffef29c0af1b47c.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Isass.exe = "C:\\Users\\Public\\Microsoft Build\\Isass.exe" b6d4f162f5ae5e393b38a7b4530a148f667fefe09ba6eca65ffef29c0af1b47c.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Isass.exe = "C:\\Users\\Public\\Microsoft Build\\Isass.exe" b6d4f162f5ae5e393b38a7b4530a148f667fefe09ba6eca65ffef29c0af1b47c.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 784 b6d4f162f5ae5e393b38a7b4530a148f667fefe09ba6eca65ffef29c0af1b47c.exe 784 b6d4f162f5ae5e393b38a7b4530a148f667fefe09ba6eca65ffef29c0af1b47c.exe 2528 Isass.exe 2528 Isass.exe 1232 Isass.exe 1232 Isass.exe 1232 Isass.exe 1232 Isass.exe 1232 Isass.exe 1232 Isass.exe 2240 b6d4f162f5ae5e393b38a7b4530a148f667fefe09ba6eca65ffef29c0af1b47c.exe 2240 b6d4f162f5ae5e393b38a7b4530a148f667fefe09ba6eca65ffef29c0af1b47c.exe 232 Isass.exe 232 Isass.exe 232 Isass.exe 232 Isass.exe 232 Isass.exe 232 Isass.exe 2628 b6d4f162f5ae5e393b38a7b4530a148f667fefe09ba6eca65ffef29c0af1b47c.exe 2628 b6d4f162f5ae5e393b38a7b4530a148f667fefe09ba6eca65ffef29c0af1b47c.exe 524 Isass.exe 524 Isass.exe 524 Isass.exe 524 Isass.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 784 wrote to memory of 2528 784 b6d4f162f5ae5e393b38a7b4530a148f667fefe09ba6eca65ffef29c0af1b47c.exe 90 PID 784 wrote to memory of 2528 784 b6d4f162f5ae5e393b38a7b4530a148f667fefe09ba6eca65ffef29c0af1b47c.exe 90 PID 784 wrote to memory of 2528 784 b6d4f162f5ae5e393b38a7b4530a148f667fefe09ba6eca65ffef29c0af1b47c.exe 90 PID 784 wrote to memory of 1232 784 b6d4f162f5ae5e393b38a7b4530a148f667fefe09ba6eca65ffef29c0af1b47c.exe 93 PID 784 wrote to memory of 1232 784 b6d4f162f5ae5e393b38a7b4530a148f667fefe09ba6eca65ffef29c0af1b47c.exe 93 PID 784 wrote to memory of 1232 784 b6d4f162f5ae5e393b38a7b4530a148f667fefe09ba6eca65ffef29c0af1b47c.exe 93 PID 1232 wrote to memory of 2240 1232 Isass.exe 95 PID 1232 wrote to memory of 2240 1232 Isass.exe 95 PID 1232 wrote to memory of 2240 1232 Isass.exe 95 PID 2240 wrote to memory of 232 2240 b6d4f162f5ae5e393b38a7b4530a148f667fefe09ba6eca65ffef29c0af1b47c.exe 96 PID 2240 wrote to memory of 232 2240 b6d4f162f5ae5e393b38a7b4530a148f667fefe09ba6eca65ffef29c0af1b47c.exe 96 PID 2240 wrote to memory of 232 2240 b6d4f162f5ae5e393b38a7b4530a148f667fefe09ba6eca65ffef29c0af1b47c.exe 96 PID 232 wrote to memory of 2628 232 Isass.exe 97 PID 232 wrote to memory of 2628 232 Isass.exe 97 PID 232 wrote to memory of 2628 232 Isass.exe 97 PID 2628 wrote to memory of 524 2628 b6d4f162f5ae5e393b38a7b4530a148f667fefe09ba6eca65ffef29c0af1b47c.exe 99 PID 2628 wrote to memory of 524 2628 b6d4f162f5ae5e393b38a7b4530a148f667fefe09ba6eca65ffef29c0af1b47c.exe 99 PID 2628 wrote to memory of 524 2628 b6d4f162f5ae5e393b38a7b4530a148f667fefe09ba6eca65ffef29c0af1b47c.exe 99 PID 524 wrote to memory of 2532 524 Isass.exe 100 PID 524 wrote to memory of 2532 524 Isass.exe 100 PID 524 wrote to memory of 2532 524 Isass.exe 100 PID 2532 wrote to memory of 3356 2532 b6d4f162f5ae5e393b38a7b4530a148f667fefe09ba6eca65ffef29c0af1b47c.exe 101 PID 2532 wrote to memory of 3356 2532 b6d4f162f5ae5e393b38a7b4530a148f667fefe09ba6eca65ffef29c0af1b47c.exe 101 PID 2532 wrote to memory of 3356 2532 b6d4f162f5ae5e393b38a7b4530a148f667fefe09ba6eca65ffef29c0af1b47c.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\b6d4f162f5ae5e393b38a7b4530a148f667fefe09ba6eca65ffef29c0af1b47c.exe"C:\Users\Admin\AppData\Local\Temp\b6d4f162f5ae5e393b38a7b4530a148f667fefe09ba6eca65ffef29c0af1b47c.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:784 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2528
-
-
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\b6d4f162f5ae5e393b38a7b4530a148f667fefe09ba6eca65ffef29c0af1b47c.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Users\Admin\AppData\Local\Temp\b6d4f162f5ae5e393b38a7b4530a148f667fefe09ba6eca65ffef29c0af1b47c.exe"C:\Users\Admin\AppData\Local\Temp\b6d4f162f5ae5e393b38a7b4530a148f667fefe09ba6eca65ffef29c0af1b47c.exe"3⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\b6d4f162f5ae5e393b38a7b4530a148f667fefe09ba6eca65ffef29c0af1b47c.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:232 -
C:\Users\Admin\AppData\Local\Temp\b6d4f162f5ae5e393b38a7b4530a148f667fefe09ba6eca65ffef29c0af1b47c.exe"C:\Users\Admin\AppData\Local\Temp\b6d4f162f5ae5e393b38a7b4530a148f667fefe09ba6eca65ffef29c0af1b47c.exe"5⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\b6d4f162f5ae5e393b38a7b4530a148f667fefe09ba6eca65ffef29c0af1b47c.exe6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:524 -
C:\Users\Admin\AppData\Local\Temp\b6d4f162f5ae5e393b38a7b4530a148f667fefe09ba6eca65ffef29c0af1b47c.exe"C:\Users\Admin\AppData\Local\Temp\b6d4f162f5ae5e393b38a7b4530a148f667fefe09ba6eca65ffef29c0af1b47c.exe"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\Temp\{9CFDEF5A-0BF1-4602-9537-639AD575FDF9}\.cr\b6d4f162f5ae5e393b38a7b4530a148f667fefe09ba6eca65ffef29c0af1b47c.exe"C:\Windows\Temp\{9CFDEF5A-0BF1-4602-9537-639AD575FDF9}\.cr\b6d4f162f5ae5e393b38a7b4530a148f667fefe09ba6eca65ffef29c0af1b47c.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\b6d4f162f5ae5e393b38a7b4530a148f667fefe09ba6eca65ffef29c0af1b47c.exe" -burn.filehandle.attached=540 -burn.filehandle.self=6488⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3356
-
-
-
-
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1352 --field-trial-handle=2280,i,716736634476467098,11449718822158202904,262144 --variations-seed-version /prefetch:81⤵PID:2440
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\b6d4f162f5ae5e393b38a7b4530a148f667fefe09ba6eca65ffef29c0af1b47c.exe
Filesize632KB
MD5c27046bd35c5717084bb40c7305b941a
SHA151510a7753dd2a1236b34b495db21ef18a74c25c
SHA256e0bc82c13bcd1ade084a0421dab88e23e9cc5499323449e585e7dd2116951bd3
SHA512df9dc98043ea5b86c671e769a75e569366223c5a291f5eed22f68af9783a0aa295d8bb0ee0b510767cce7961f2e501124d9fe656044766644e18682f21446214
-
Filesize
216KB
MD54e3da62191c139e87d1f71984d949fce
SHA15c8b28ea57a97cbb166e4fbcc141844aad5f253f
SHA256d01f00c25d0328aa0d4bfa21af570f1697a725f23cf7d3cbfb4fef6183bc42bc
SHA5127ca61e187b25fb9afce445e4952091f1248d6e68ff08c1d00d32a9c681f653d4100628ab31c23285e85d2f0daaa523f47f8ca4d3ac4f18d2224ceec999a63b9e
-
Filesize
1KB
MD5d6bd210f227442b3362493d046cea233
SHA1ff286ac8370fc655aea0ef35e9cf0bfcb6d698de
SHA256335a256d4779ec5dcf283d007fb56fd8211bbcaf47dcd70fe60ded6a112744ef
SHA512464aaab9e08de610ad34b97d4076e92dc04c2cdc6669f60bfc50f0f9ce5d71c31b8943bd84cee1a04fb9ab5bbed3442bd41d9cb21a0dd170ea97c463e1ce2b5b
-
Filesize
191KB
MD5eab9caf4277829abdf6223ec1efa0edd
SHA174862ecf349a9bedd32699f2a7a4e00b4727543d
SHA256a4efbdb2ce55788ffe92a244cb775efd475526ef5b61ad78de2bcdfaddac7041
SHA51245b15ade68e0a90ea7300aeb6dca9bc9e347a63dba5ce72a635957564d1bdf0b1584a5e34191916498850fc7b3b7ecfbcbfcb246b39dbf59d47f66bc825c6fd2
-
Filesize
5.3MB
MD5030a8ae82177ea133b93d2a44c2faf84
SHA1a42fcdbcdc459ba814389ebee1d004c864d68d2f
SHA2567e431124facd06863cca6c2d6c8f5fcb44d541fc269ecbcd49cee8a5d364cb49
SHA51261788f349b1115387b63d3fb7cfe9e52bee9a2585c065df4aaa7d439ece6739114604f1d2b7b90d08d3ee84b20afca88fec559f0fcce612fb20d9da0f433da71