Analysis
-
max time kernel
119s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
10-07-2024 06:29
Static task
static1
Behavioral task
behavioral1
Sample
33a786104d5e3b82458985ccaadea765_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
33a786104d5e3b82458985ccaadea765_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
33a786104d5e3b82458985ccaadea765_JaffaCakes118.exe
-
Size
255KB
-
MD5
33a786104d5e3b82458985ccaadea765
-
SHA1
aa5799c26f8815df3bda581c4415bd92fcfaed5c
-
SHA256
3c34b05fb21dc3b7d281c5f528776b695edf7b58f3f84240073c8939f92c2032
-
SHA512
6adf8c52e2eed7427cf5c3a076f1ecd921e6fe055b37629e5d4deac406223dfde75ba8679eccc74146239564ebca9a52cd08488db70cc260431719ca17a450d9
-
SSDEEP
6144:A+8r3DavvgYgH4howWXXp3u4q/L0PmwlYcGdwsNWd41o:fOOvvgQowqXp30wmw5Gta4
Malware Config
Signatures
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload 4 IoCs
resource yara_rule behavioral1/memory/2648-33-0x0000000000400000-0x0000000000414000-memory.dmp family_isrstealer behavioral1/memory/2648-29-0x0000000000400000-0x0000000000414000-memory.dmp family_isrstealer behavioral1/memory/2648-45-0x0000000000400000-0x0000000000414000-memory.dmp family_isrstealer behavioral1/memory/2648-50-0x0000000000400000-0x0000000000414000-memory.dmp family_isrstealer -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1188 set thread context of 2760 1188 33a786104d5e3b82458985ccaadea765_JaffaCakes118.exe 30 PID 1188 set thread context of 2648 1188 33a786104d5e3b82458985ccaadea765_JaffaCakes118.exe 31 -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Codepage vbc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database vbc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Charset vbc.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 1188 33a786104d5e3b82458985ccaadea765_JaffaCakes118.exe 1188 33a786104d5e3b82458985ccaadea765_JaffaCakes118.exe 1188 33a786104d5e3b82458985ccaadea765_JaffaCakes118.exe 1188 33a786104d5e3b82458985ccaadea765_JaffaCakes118.exe 1188 33a786104d5e3b82458985ccaadea765_JaffaCakes118.exe 2648 vbc.exe 2648 vbc.exe 2648 vbc.exe 2648 vbc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1188 33a786104d5e3b82458985ccaadea765_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2648 vbc.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1188 wrote to memory of 2760 1188 33a786104d5e3b82458985ccaadea765_JaffaCakes118.exe 30 PID 1188 wrote to memory of 2760 1188 33a786104d5e3b82458985ccaadea765_JaffaCakes118.exe 30 PID 1188 wrote to memory of 2760 1188 33a786104d5e3b82458985ccaadea765_JaffaCakes118.exe 30 PID 1188 wrote to memory of 2760 1188 33a786104d5e3b82458985ccaadea765_JaffaCakes118.exe 30 PID 1188 wrote to memory of 2760 1188 33a786104d5e3b82458985ccaadea765_JaffaCakes118.exe 30 PID 1188 wrote to memory of 2760 1188 33a786104d5e3b82458985ccaadea765_JaffaCakes118.exe 30 PID 1188 wrote to memory of 2760 1188 33a786104d5e3b82458985ccaadea765_JaffaCakes118.exe 30 PID 1188 wrote to memory of 2760 1188 33a786104d5e3b82458985ccaadea765_JaffaCakes118.exe 30 PID 1188 wrote to memory of 2760 1188 33a786104d5e3b82458985ccaadea765_JaffaCakes118.exe 30 PID 1188 wrote to memory of 2760 1188 33a786104d5e3b82458985ccaadea765_JaffaCakes118.exe 30 PID 1188 wrote to memory of 2760 1188 33a786104d5e3b82458985ccaadea765_JaffaCakes118.exe 30 PID 1188 wrote to memory of 2760 1188 33a786104d5e3b82458985ccaadea765_JaffaCakes118.exe 30 PID 1188 wrote to memory of 2648 1188 33a786104d5e3b82458985ccaadea765_JaffaCakes118.exe 31 PID 1188 wrote to memory of 2648 1188 33a786104d5e3b82458985ccaadea765_JaffaCakes118.exe 31 PID 1188 wrote to memory of 2648 1188 33a786104d5e3b82458985ccaadea765_JaffaCakes118.exe 31 PID 1188 wrote to memory of 2648 1188 33a786104d5e3b82458985ccaadea765_JaffaCakes118.exe 31 PID 1188 wrote to memory of 2648 1188 33a786104d5e3b82458985ccaadea765_JaffaCakes118.exe 31 PID 1188 wrote to memory of 2648 1188 33a786104d5e3b82458985ccaadea765_JaffaCakes118.exe 31 PID 1188 wrote to memory of 2648 1188 33a786104d5e3b82458985ccaadea765_JaffaCakes118.exe 31 PID 1188 wrote to memory of 2648 1188 33a786104d5e3b82458985ccaadea765_JaffaCakes118.exe 31 PID 1188 wrote to memory of 2648 1188 33a786104d5e3b82458985ccaadea765_JaffaCakes118.exe 31 PID 1188 wrote to memory of 2648 1188 33a786104d5e3b82458985ccaadea765_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\33a786104d5e3b82458985ccaadea765_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\33a786104d5e3b82458985ccaadea765_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:2760
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2648
-