Analysis
-
max time kernel
120s -
max time network
112s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14-08-2024 02:20
Static task
static1
Behavioral task
behavioral1
Sample
8e56525f13bc18c4c84e461f04f957f0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8e56525f13bc18c4c84e461f04f957f0N.exe
Resource
win10v2004-20240802-en
General
-
Target
8e56525f13bc18c4c84e461f04f957f0N.exe
-
Size
910KB
-
MD5
8e56525f13bc18c4c84e461f04f957f0
-
SHA1
0c2b3d3c65151314cf025b46b988486b9326eeb1
-
SHA256
b0368ec19dad6310577ab0b937dc9f78fcff79b2b6fa649f2cbb4e45c1e8bdc8
-
SHA512
cc894436ce7fbb036688936c56a4015a061690376fc0fc4360a25d9583a54c2871df071cae43b3fc92bd4ebf5f1aeebb1bf4ba32220230268e33991f13d0fb8f
-
SSDEEP
12288:/n8yN0Mr8Zmk7aVs7IypwXK4Qzh+jMlWCEh/E8kj2fPWadHduXhus/REQpVCW:vPuZmkQIfpwiz0wy/E8c0sp5YW
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 8 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation Isass.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation 8e56525f13bc18c4c84e461f04f957f0N.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation Isass.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation 8e56525f13bc18c4c84e461f04f957f0N.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation Isass.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation 8e56525f13bc18c4c84e461f04f957f0N.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation Isass.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation 8e56525f13bc18c4c84e461f04f957f0N.exe -
Executes dropped EXE 7 IoCs
pid Process 4948 Isass.exe 4396 Isass.exe 2540 Isass.exe 944 Isass.exe 1656 Isass.exe 1220 8e56525f13bc18c4c84e461f04f957f0N.exe 4664 8e56525f13bc18c4c84e461f04f957f0N.exe -
Loads dropped DLL 1 IoCs
pid Process 4664 8e56525f13bc18c4c84e461f04f957f0N.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Isass.exe = "C:\\Users\\Public\\Microsoft Build\\Isass.exe" 8e56525f13bc18c4c84e461f04f957f0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Isass.exe = "C:\\Users\\Public\\Microsoft Build\\Isass.exe" 8e56525f13bc18c4c84e461f04f957f0N.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Isass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8e56525f13bc18c4c84e461f04f957f0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Isass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8e56525f13bc18c4c84e461f04f957f0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Isass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8e56525f13bc18c4c84e461f04f957f0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Isass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8e56525f13bc18c4c84e461f04f957f0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Isass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8e56525f13bc18c4c84e461f04f957f0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8e56525f13bc18c4c84e461f04f957f0N.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 2432 8e56525f13bc18c4c84e461f04f957f0N.exe 2432 8e56525f13bc18c4c84e461f04f957f0N.exe 4948 Isass.exe 4948 Isass.exe 4396 Isass.exe 4396 Isass.exe 4396 Isass.exe 4396 Isass.exe 4396 Isass.exe 4396 Isass.exe 1168 8e56525f13bc18c4c84e461f04f957f0N.exe 1168 8e56525f13bc18c4c84e461f04f957f0N.exe 2540 Isass.exe 2540 Isass.exe 2540 Isass.exe 2540 Isass.exe 2540 Isass.exe 2540 Isass.exe 1612 8e56525f13bc18c4c84e461f04f957f0N.exe 1612 8e56525f13bc18c4c84e461f04f957f0N.exe 944 Isass.exe 944 Isass.exe 944 Isass.exe 944 Isass.exe 944 Isass.exe 944 Isass.exe 5040 8e56525f13bc18c4c84e461f04f957f0N.exe 5040 8e56525f13bc18c4c84e461f04f957f0N.exe 1656 Isass.exe 1656 Isass.exe 1656 Isass.exe 1656 Isass.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2432 wrote to memory of 4948 2432 8e56525f13bc18c4c84e461f04f957f0N.exe 84 PID 2432 wrote to memory of 4948 2432 8e56525f13bc18c4c84e461f04f957f0N.exe 84 PID 2432 wrote to memory of 4948 2432 8e56525f13bc18c4c84e461f04f957f0N.exe 84 PID 2432 wrote to memory of 4396 2432 8e56525f13bc18c4c84e461f04f957f0N.exe 85 PID 2432 wrote to memory of 4396 2432 8e56525f13bc18c4c84e461f04f957f0N.exe 85 PID 2432 wrote to memory of 4396 2432 8e56525f13bc18c4c84e461f04f957f0N.exe 85 PID 4396 wrote to memory of 1168 4396 Isass.exe 86 PID 4396 wrote to memory of 1168 4396 Isass.exe 86 PID 4396 wrote to memory of 1168 4396 Isass.exe 86 PID 1168 wrote to memory of 2540 1168 8e56525f13bc18c4c84e461f04f957f0N.exe 87 PID 1168 wrote to memory of 2540 1168 8e56525f13bc18c4c84e461f04f957f0N.exe 87 PID 1168 wrote to memory of 2540 1168 8e56525f13bc18c4c84e461f04f957f0N.exe 87 PID 2540 wrote to memory of 1612 2540 Isass.exe 88 PID 2540 wrote to memory of 1612 2540 Isass.exe 88 PID 2540 wrote to memory of 1612 2540 Isass.exe 88 PID 1612 wrote to memory of 944 1612 8e56525f13bc18c4c84e461f04f957f0N.exe 89 PID 1612 wrote to memory of 944 1612 8e56525f13bc18c4c84e461f04f957f0N.exe 89 PID 1612 wrote to memory of 944 1612 8e56525f13bc18c4c84e461f04f957f0N.exe 89 PID 944 wrote to memory of 5040 944 Isass.exe 90 PID 944 wrote to memory of 5040 944 Isass.exe 90 PID 944 wrote to memory of 5040 944 Isass.exe 90 PID 5040 wrote to memory of 1656 5040 8e56525f13bc18c4c84e461f04f957f0N.exe 91 PID 5040 wrote to memory of 1656 5040 8e56525f13bc18c4c84e461f04f957f0N.exe 91 PID 5040 wrote to memory of 1656 5040 8e56525f13bc18c4c84e461f04f957f0N.exe 91 PID 1656 wrote to memory of 1220 1656 Isass.exe 92 PID 1656 wrote to memory of 1220 1656 Isass.exe 92 PID 1656 wrote to memory of 1220 1656 Isass.exe 92 PID 1220 wrote to memory of 4664 1220 8e56525f13bc18c4c84e461f04f957f0N.exe 93 PID 1220 wrote to memory of 4664 1220 8e56525f13bc18c4c84e461f04f957f0N.exe 93 PID 1220 wrote to memory of 4664 1220 8e56525f13bc18c4c84e461f04f957f0N.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\8e56525f13bc18c4c84e461f04f957f0N.exe"C:\Users\Admin\AppData\Local\Temp\8e56525f13bc18c4c84e461f04f957f0N.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4948
-
-
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\8e56525f13bc18c4c84e461f04f957f0N.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4396 -
C:\Users\Admin\AppData\Local\Temp\8e56525f13bc18c4c84e461f04f957f0N.exe"C:\Users\Admin\AppData\Local\Temp\8e56525f13bc18c4c84e461f04f957f0N.exe"3⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\8e56525f13bc18c4c84e461f04f957f0N.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Users\Admin\AppData\Local\Temp\8e56525f13bc18c4c84e461f04f957f0N.exe"C:\Users\Admin\AppData\Local\Temp\8e56525f13bc18c4c84e461f04f957f0N.exe"5⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\8e56525f13bc18c4c84e461f04f957f0N.exe6⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Users\Admin\AppData\Local\Temp\8e56525f13bc18c4c84e461f04f957f0N.exe"C:\Users\Admin\AppData\Local\Temp\8e56525f13bc18c4c84e461f04f957f0N.exe"7⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\8e56525f13bc18c4c84e461f04f957f0N.exe8⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Users\Admin\AppData\Local\Temp\8e56525f13bc18c4c84e461f04f957f0N.exe"C:\Users\Admin\AppData\Local\Temp\8e56525f13bc18c4c84e461f04f957f0N.exe"9⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Windows\Temp\{B6F5F386-36BD-4181-BD8D-4924838EDC2F}\.cr\8e56525f13bc18c4c84e461f04f957f0N.exe"C:\Windows\Temp\{B6F5F386-36BD-4181-BD8D-4924838EDC2F}\.cr\8e56525f13bc18c4c84e461f04f957f0N.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\8e56525f13bc18c4c84e461f04f957f0N.exe" -burn.filehandle.attached=540 -burn.filehandle.self=54810⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4664
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
745KB
MD566162a428e9133b06f4153b49fc83caa
SHA19704cf9b65a6961792cd09f7514188dd07a8e0c8
SHA256e55f55cb910ad9ae17d9a66977a4f507f36f8d893e9a9451a3d4fa94b8e028b2
SHA512da6329fcd55ebcc3e5df60869e068a2e141ae9413a90ea3c36792c67c5aa22b95e12ed718016c3a92d05547a573c5ab496db2dee244a0434d97ca5c93753e3a2
-
Filesize
632KB
MD5c27046bd35c5717084bb40c7305b941a
SHA151510a7753dd2a1236b34b495db21ef18a74c25c
SHA256e0bc82c13bcd1ade084a0421dab88e23e9cc5499323449e585e7dd2116951bd3
SHA512df9dc98043ea5b86c671e769a75e569366223c5a291f5eed22f68af9783a0aa295d8bb0ee0b510767cce7961f2e501124d9fe656044766644e18682f21446214
-
Filesize
256KB
MD5ff50b5d0f14788a29b1339dcd91a0900
SHA1f78f7c8dd81d27cd9a1fd6ef295b2d42ff3bed85
SHA25652c5071ede287e89c3d8518c075ad507264b030bd50b5c01488b9aeccac4b6d0
SHA51217b32f0376e1f3fb919131b823881d7d512cddfa3eba9db2a2b0d8e2deb76f587b4f97a43c58b55f5ac937adfcee86916054c2f74539fcae642ab6987c6b627c
-
Filesize
1KB
MD5d6bd210f227442b3362493d046cea233
SHA1ff286ac8370fc655aea0ef35e9cf0bfcb6d698de
SHA256335a256d4779ec5dcf283d007fb56fd8211bbcaf47dcd70fe60ded6a112744ef
SHA512464aaab9e08de610ad34b97d4076e92dc04c2cdc6669f60bfc50f0f9ce5d71c31b8943bd84cee1a04fb9ab5bbed3442bd41d9cb21a0dd170ea97c463e1ce2b5b
-
Filesize
191KB
MD5eab9caf4277829abdf6223ec1efa0edd
SHA174862ecf349a9bedd32699f2a7a4e00b4727543d
SHA256a4efbdb2ce55788ffe92a244cb775efd475526ef5b61ad78de2bcdfaddac7041
SHA51245b15ade68e0a90ea7300aeb6dca9bc9e347a63dba5ce72a635957564d1bdf0b1584a5e34191916498850fc7b3b7ecfbcbfcb246b39dbf59d47f66bc825c6fd2