Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
13/07/2024, 05:32
Static task
static1
Behavioral task
behavioral1
Sample
527f7517ed8c00cdf1dcb4abb5820d40N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
527f7517ed8c00cdf1dcb4abb5820d40N.exe
Resource
win10v2004-20240704-en
General
-
Target
527f7517ed8c00cdf1dcb4abb5820d40N.exe
-
Size
694KB
-
MD5
527f7517ed8c00cdf1dcb4abb5820d40
-
SHA1
4b1451f55664cd29947608bf6d6add0ebd25dbfe
-
SHA256
4927f0f8ec0bc609048fac1ee6e449df6c15cb0e872ed9b34423399105ae7d68
-
SHA512
ade05d5f36012580e8f4d81dc233e5cafac22be15accf4caf82bbd36ce949512e05f30caf77a5460f671796b3866de28406badf7e212b6625fcf2730cab5e39a
-
SSDEEP
12288:9n8yN0Mr82KzvFWOC3aEX968PFZSboNML+bgez/65CeO:FPufzv8O0QsFZS0cOgez/6YX
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 8 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation 527f7517ed8c00cdf1dcb4abb5820d40N.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation Isass.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation 527f7517ed8c00cdf1dcb4abb5820d40N.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation Isass.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation 527f7517ed8c00cdf1dcb4abb5820d40N.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation Isass.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation 527f7517ed8c00cdf1dcb4abb5820d40N.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation Isass.exe -
Executes dropped EXE 7 IoCs
pid Process 3364 Isass.exe 2928 Isass.exe 4532 Isass.exe 1960 Isass.exe 2032 Isass.exe 2024 527f7517ed8c00cdf1dcb4abb5820d40N.exe 1408 527f7517ed8c00cdf1dcb4abb5820d40N.exe -
Loads dropped DLL 1 IoCs
pid Process 1408 527f7517ed8c00cdf1dcb4abb5820d40N.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Isass.exe = "C:\\Users\\Public\\Microsoft Build\\Isass.exe" 527f7517ed8c00cdf1dcb4abb5820d40N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Isass.exe = "C:\\Users\\Public\\Microsoft Build\\Isass.exe" 527f7517ed8c00cdf1dcb4abb5820d40N.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 4312 527f7517ed8c00cdf1dcb4abb5820d40N.exe 4312 527f7517ed8c00cdf1dcb4abb5820d40N.exe 3364 Isass.exe 3364 Isass.exe 2928 Isass.exe 2928 Isass.exe 2928 Isass.exe 2928 Isass.exe 2928 Isass.exe 2928 Isass.exe 2444 527f7517ed8c00cdf1dcb4abb5820d40N.exe 2444 527f7517ed8c00cdf1dcb4abb5820d40N.exe 4532 Isass.exe 4532 Isass.exe 4532 Isass.exe 4532 Isass.exe 4532 Isass.exe 4532 Isass.exe 4920 527f7517ed8c00cdf1dcb4abb5820d40N.exe 4920 527f7517ed8c00cdf1dcb4abb5820d40N.exe 1960 Isass.exe 1960 Isass.exe 1960 Isass.exe 1960 Isass.exe 1960 Isass.exe 1960 Isass.exe 4788 527f7517ed8c00cdf1dcb4abb5820d40N.exe 4788 527f7517ed8c00cdf1dcb4abb5820d40N.exe 2032 Isass.exe 2032 Isass.exe 2032 Isass.exe 2032 Isass.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 4312 wrote to memory of 3364 4312 527f7517ed8c00cdf1dcb4abb5820d40N.exe 85 PID 4312 wrote to memory of 3364 4312 527f7517ed8c00cdf1dcb4abb5820d40N.exe 85 PID 4312 wrote to memory of 3364 4312 527f7517ed8c00cdf1dcb4abb5820d40N.exe 85 PID 4312 wrote to memory of 2928 4312 527f7517ed8c00cdf1dcb4abb5820d40N.exe 86 PID 4312 wrote to memory of 2928 4312 527f7517ed8c00cdf1dcb4abb5820d40N.exe 86 PID 4312 wrote to memory of 2928 4312 527f7517ed8c00cdf1dcb4abb5820d40N.exe 86 PID 2928 wrote to memory of 2444 2928 Isass.exe 87 PID 2928 wrote to memory of 2444 2928 Isass.exe 87 PID 2928 wrote to memory of 2444 2928 Isass.exe 87 PID 2444 wrote to memory of 4532 2444 527f7517ed8c00cdf1dcb4abb5820d40N.exe 88 PID 2444 wrote to memory of 4532 2444 527f7517ed8c00cdf1dcb4abb5820d40N.exe 88 PID 2444 wrote to memory of 4532 2444 527f7517ed8c00cdf1dcb4abb5820d40N.exe 88 PID 4532 wrote to memory of 4920 4532 Isass.exe 89 PID 4532 wrote to memory of 4920 4532 Isass.exe 89 PID 4532 wrote to memory of 4920 4532 Isass.exe 89 PID 4920 wrote to memory of 1960 4920 527f7517ed8c00cdf1dcb4abb5820d40N.exe 90 PID 4920 wrote to memory of 1960 4920 527f7517ed8c00cdf1dcb4abb5820d40N.exe 90 PID 4920 wrote to memory of 1960 4920 527f7517ed8c00cdf1dcb4abb5820d40N.exe 90 PID 1960 wrote to memory of 4788 1960 Isass.exe 91 PID 1960 wrote to memory of 4788 1960 Isass.exe 91 PID 1960 wrote to memory of 4788 1960 Isass.exe 91 PID 4788 wrote to memory of 2032 4788 527f7517ed8c00cdf1dcb4abb5820d40N.exe 92 PID 4788 wrote to memory of 2032 4788 527f7517ed8c00cdf1dcb4abb5820d40N.exe 92 PID 4788 wrote to memory of 2032 4788 527f7517ed8c00cdf1dcb4abb5820d40N.exe 92 PID 2032 wrote to memory of 2024 2032 Isass.exe 93 PID 2032 wrote to memory of 2024 2032 Isass.exe 93 PID 2032 wrote to memory of 2024 2032 Isass.exe 93 PID 2024 wrote to memory of 1408 2024 527f7517ed8c00cdf1dcb4abb5820d40N.exe 95 PID 2024 wrote to memory of 1408 2024 527f7517ed8c00cdf1dcb4abb5820d40N.exe 95 PID 2024 wrote to memory of 1408 2024 527f7517ed8c00cdf1dcb4abb5820d40N.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\527f7517ed8c00cdf1dcb4abb5820d40N.exe"C:\Users\Admin\AppData\Local\Temp\527f7517ed8c00cdf1dcb4abb5820d40N.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4312 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3364
-
-
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\527f7517ed8c00cdf1dcb4abb5820d40N.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Users\Admin\AppData\Local\Temp\527f7517ed8c00cdf1dcb4abb5820d40N.exe"C:\Users\Admin\AppData\Local\Temp\527f7517ed8c00cdf1dcb4abb5820d40N.exe"3⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\527f7517ed8c00cdf1dcb4abb5820d40N.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\Users\Admin\AppData\Local\Temp\527f7517ed8c00cdf1dcb4abb5820d40N.exe"C:\Users\Admin\AppData\Local\Temp\527f7517ed8c00cdf1dcb4abb5820d40N.exe"5⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\527f7517ed8c00cdf1dcb4abb5820d40N.exe6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Users\Admin\AppData\Local\Temp\527f7517ed8c00cdf1dcb4abb5820d40N.exe"C:\Users\Admin\AppData\Local\Temp\527f7517ed8c00cdf1dcb4abb5820d40N.exe"7⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\527f7517ed8c00cdf1dcb4abb5820d40N.exe8⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\527f7517ed8c00cdf1dcb4abb5820d40N.exe"C:\Users\Admin\AppData\Local\Temp\527f7517ed8c00cdf1dcb4abb5820d40N.exe"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Users\Admin\AppData\Local\Temp\527f7517ed8c00cdf1dcb4abb5820d40N.exe"C:\Users\Admin\AppData\Local\Temp\527f7517ed8c00cdf1dcb4abb5820d40N.exe" -burn.unelevated BurnPipe.{3B7F002D-0E98-4129-A350-37145284AA2B} {DCB7C174-A222-42FE-BF79-F84D8A761C45} 202410⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1408
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
703KB
MD51b62834a404ee3f77347bc9ff1837612
SHA18f33982bdeff4ae9014350fcc1f1420113ab7d21
SHA256375fbd6101fd59b82df3c9b8f0382b65e380dc63ee9b17ca247e3c171d31be67
SHA51245cb5cba48de623aef1a0355170980aa8e284288d89381b7dcd6c07ce50262b9a5ebd4b902da737153f7d2fc7ececab4ae75fc0e5c6ed3435c301d7c18a095a1
-
Filesize
443KB
MD539e2f79a5becdc5ffdf17003402c2f82
SHA17d2c053093cedf3e4b556628b3d8192275b983a8
SHA25676583dd73769247f3ee4b1a74dfca1dd9792c74aaa246c324f97201c34ed1a5a
SHA5122f4fba7ec629275f0cc64587d885ca9c1d8b5fb6e968b98b7307be93d6cf02a56871b8cc04990a3939ccb5b5840cf55b6a2f5093b3ee0c4d4cc72a996e6d343b
-
Filesize
1KB
MD5d6bd210f227442b3362493d046cea233
SHA1ff286ac8370fc655aea0ef35e9cf0bfcb6d698de
SHA256335a256d4779ec5dcf283d007fb56fd8211bbcaf47dcd70fe60ded6a112744ef
SHA512464aaab9e08de610ad34b97d4076e92dc04c2cdc6669f60bfc50f0f9ce5d71c31b8943bd84cee1a04fb9ab5bbed3442bd41d9cb21a0dd170ea97c463e1ce2b5b
-
Filesize
126KB
MD5d7bf29763354eda154aad637017b5483
SHA1dfa7d296bfeecde738ef4708aaabfebec6bc1e48
SHA2567f5f8fcfd84132579f07e395e65b44e1b031fe01a299bce0e3dd590131c5cb93
SHA5121c76175732fe68b9b12cb46077daa21e086041adbd65401717a9a1b5f3c516e03c35a90897c22c7281647d6af4a1a5ffb3fbd5706ea376d8f6e574d27396019c
-
Filesize
211KB
MD5458483e934837c2d747c3a270fecb8c1
SHA17c90c31730017719eb2c3827255f684627195170
SHA25633493d57d56ed06245d2f07e280c1bd8b941f7934d043f54459a24ccdca427f7
SHA512d32c56f518d4d2c62647c68abd832d607c0660df955fcaa8d6f5e8939e857a74eb5923378e8ffa99bb2e9098fada088a8e06ec7226adfa37ef27b9c8a1f91b7e