Analysis
-
max time kernel
140s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
01-09-2024 08:59
Static task
static1
Behavioral task
behavioral1
Sample
3673c4e11b206790d884eedcaced0e58d19bf08b6554c8df64725aba2573240e.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3673c4e11b206790d884eedcaced0e58d19bf08b6554c8df64725aba2573240e.exe
Resource
win10v2004-20240802-en
General
-
Target
3673c4e11b206790d884eedcaced0e58d19bf08b6554c8df64725aba2573240e.exe
-
Size
919KB
-
MD5
3f88e4466cf3ce4d19113304b28f78f4
-
SHA1
d6ed629b26e37f138ae62511338be903f4ebdb86
-
SHA256
3673c4e11b206790d884eedcaced0e58d19bf08b6554c8df64725aba2573240e
-
SHA512
3827993b1e9a0fb15e02369947b026812069453733f913b01be33202422d17535c98f6635c93ae5b275924ca1b4f87d1e711d7be9e4e5d43eb39cf2342fe1069
-
SSDEEP
12288:8uPUTLYcAaUMhUhLupXshh1PEd5hOoXpJePfqw6gmQNhxAoRYn:8uPmLDUMihIXCE5Fi76gxh8
Malware Config
Signatures
-
Executes dropped EXE 5 IoCs
pid Process 2008 Isass.exe 328 Isass.exe 2768 Isass.exe 2932 Isass.exe 2744 Isass.exe -
Loads dropped DLL 8 IoCs
pid Process 1820 3673c4e11b206790d884eedcaced0e58d19bf08b6554c8df64725aba2573240e.exe 1820 3673c4e11b206790d884eedcaced0e58d19bf08b6554c8df64725aba2573240e.exe 1820 3673c4e11b206790d884eedcaced0e58d19bf08b6554c8df64725aba2573240e.exe 1820 3673c4e11b206790d884eedcaced0e58d19bf08b6554c8df64725aba2573240e.exe 2292 3673c4e11b206790d884eedcaced0e58d19bf08b6554c8df64725aba2573240e.exe 2292 3673c4e11b206790d884eedcaced0e58d19bf08b6554c8df64725aba2573240e.exe 2780 3673c4e11b206790d884eedcaced0e58d19bf08b6554c8df64725aba2573240e.exe 2956 3673c4e11b206790d884eedcaced0e58d19bf08b6554c8df64725aba2573240e.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\Isass.exe = "C:\\Users\\Public\\Microsoft Build\\Isass.exe" 3673c4e11b206790d884eedcaced0e58d19bf08b6554c8df64725aba2573240e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Isass.exe = "C:\\Users\\Public\\Microsoft Build\\Isass.exe" 3673c4e11b206790d884eedcaced0e58d19bf08b6554c8df64725aba2573240e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3673c4e11b206790d884eedcaced0e58d19bf08b6554c8df64725aba2573240e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Isass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3673c4e11b206790d884eedcaced0e58d19bf08b6554c8df64725aba2573240e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Isass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Isass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Isass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3673c4e11b206790d884eedcaced0e58d19bf08b6554c8df64725aba2573240e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3673c4e11b206790d884eedcaced0e58d19bf08b6554c8df64725aba2573240e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Isass.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 1820 3673c4e11b206790d884eedcaced0e58d19bf08b6554c8df64725aba2573240e.exe 2008 Isass.exe 328 Isass.exe 328 Isass.exe 328 Isass.exe 2292 3673c4e11b206790d884eedcaced0e58d19bf08b6554c8df64725aba2573240e.exe 2768 Isass.exe 2768 Isass.exe 2768 Isass.exe 2780 3673c4e11b206790d884eedcaced0e58d19bf08b6554c8df64725aba2573240e.exe 2932 Isass.exe 2932 Isass.exe 2932 Isass.exe 2956 3673c4e11b206790d884eedcaced0e58d19bf08b6554c8df64725aba2573240e.exe 2744 Isass.exe 2744 Isass.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 1820 wrote to memory of 2008 1820 3673c4e11b206790d884eedcaced0e58d19bf08b6554c8df64725aba2573240e.exe 30 PID 1820 wrote to memory of 2008 1820 3673c4e11b206790d884eedcaced0e58d19bf08b6554c8df64725aba2573240e.exe 30 PID 1820 wrote to memory of 2008 1820 3673c4e11b206790d884eedcaced0e58d19bf08b6554c8df64725aba2573240e.exe 30 PID 1820 wrote to memory of 2008 1820 3673c4e11b206790d884eedcaced0e58d19bf08b6554c8df64725aba2573240e.exe 30 PID 1820 wrote to memory of 328 1820 3673c4e11b206790d884eedcaced0e58d19bf08b6554c8df64725aba2573240e.exe 31 PID 1820 wrote to memory of 328 1820 3673c4e11b206790d884eedcaced0e58d19bf08b6554c8df64725aba2573240e.exe 31 PID 1820 wrote to memory of 328 1820 3673c4e11b206790d884eedcaced0e58d19bf08b6554c8df64725aba2573240e.exe 31 PID 1820 wrote to memory of 328 1820 3673c4e11b206790d884eedcaced0e58d19bf08b6554c8df64725aba2573240e.exe 31 PID 328 wrote to memory of 2292 328 Isass.exe 32 PID 328 wrote to memory of 2292 328 Isass.exe 32 PID 328 wrote to memory of 2292 328 Isass.exe 32 PID 328 wrote to memory of 2292 328 Isass.exe 32 PID 2292 wrote to memory of 2768 2292 3673c4e11b206790d884eedcaced0e58d19bf08b6554c8df64725aba2573240e.exe 33 PID 2292 wrote to memory of 2768 2292 3673c4e11b206790d884eedcaced0e58d19bf08b6554c8df64725aba2573240e.exe 33 PID 2292 wrote to memory of 2768 2292 3673c4e11b206790d884eedcaced0e58d19bf08b6554c8df64725aba2573240e.exe 33 PID 2292 wrote to memory of 2768 2292 3673c4e11b206790d884eedcaced0e58d19bf08b6554c8df64725aba2573240e.exe 33 PID 2768 wrote to memory of 2780 2768 Isass.exe 34 PID 2768 wrote to memory of 2780 2768 Isass.exe 34 PID 2768 wrote to memory of 2780 2768 Isass.exe 34 PID 2768 wrote to memory of 2780 2768 Isass.exe 34 PID 2780 wrote to memory of 2932 2780 3673c4e11b206790d884eedcaced0e58d19bf08b6554c8df64725aba2573240e.exe 35 PID 2780 wrote to memory of 2932 2780 3673c4e11b206790d884eedcaced0e58d19bf08b6554c8df64725aba2573240e.exe 35 PID 2780 wrote to memory of 2932 2780 3673c4e11b206790d884eedcaced0e58d19bf08b6554c8df64725aba2573240e.exe 35 PID 2780 wrote to memory of 2932 2780 3673c4e11b206790d884eedcaced0e58d19bf08b6554c8df64725aba2573240e.exe 35 PID 2932 wrote to memory of 2956 2932 Isass.exe 36 PID 2932 wrote to memory of 2956 2932 Isass.exe 36 PID 2932 wrote to memory of 2956 2932 Isass.exe 36 PID 2932 wrote to memory of 2956 2932 Isass.exe 36 PID 2956 wrote to memory of 2744 2956 3673c4e11b206790d884eedcaced0e58d19bf08b6554c8df64725aba2573240e.exe 37 PID 2956 wrote to memory of 2744 2956 3673c4e11b206790d884eedcaced0e58d19bf08b6554c8df64725aba2573240e.exe 37 PID 2956 wrote to memory of 2744 2956 3673c4e11b206790d884eedcaced0e58d19bf08b6554c8df64725aba2573240e.exe 37 PID 2956 wrote to memory of 2744 2956 3673c4e11b206790d884eedcaced0e58d19bf08b6554c8df64725aba2573240e.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\3673c4e11b206790d884eedcaced0e58d19bf08b6554c8df64725aba2573240e.exe"C:\Users\Admin\AppData\Local\Temp\3673c4e11b206790d884eedcaced0e58d19bf08b6554c8df64725aba2573240e.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2008
-
-
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\3673c4e11b206790d884eedcaced0e58d19bf08b6554c8df64725aba2573240e.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:328 -
C:\Users\Admin\AppData\Local\Temp\3673c4e11b206790d884eedcaced0e58d19bf08b6554c8df64725aba2573240e.exe"C:\Users\Admin\AppData\Local\Temp\3673c4e11b206790d884eedcaced0e58d19bf08b6554c8df64725aba2573240e.exe"3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\3673c4e11b206790d884eedcaced0e58d19bf08b6554c8df64725aba2573240e.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Users\Admin\AppData\Local\Temp\3673c4e11b206790d884eedcaced0e58d19bf08b6554c8df64725aba2573240e.exe"C:\Users\Admin\AppData\Local\Temp\3673c4e11b206790d884eedcaced0e58d19bf08b6554c8df64725aba2573240e.exe"5⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\3673c4e11b206790d884eedcaced0e58d19bf08b6554c8df64725aba2573240e.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Users\Admin\AppData\Local\Temp\3673c4e11b206790d884eedcaced0e58d19bf08b6554c8df64725aba2573240e.exe"C:\Users\Admin\AppData\Local\Temp\3673c4e11b206790d884eedcaced0e58d19bf08b6554c8df64725aba2573240e.exe"7⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\3673c4e11b206790d884eedcaced0e58d19bf08b6554c8df64725aba2573240e.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2744
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\3673c4e11b206790d884eedcaced0e58d19bf08b6554c8df64725aba2573240e.exe
Filesize284KB
MD5290ab3601b988b124f4911778d89626a
SHA191082fca98f044b2d98ffd66930215f8e1852884
SHA256dcb9736a6019fa15abe55507d4ce1d22443683cf474b72de204947fb1823c736
SHA512aec8c1ebc47525f49882dc04fbb4b8e24f8bc506430c106ca66ef68f02ca8c7faca0ba2e7c649e9a631ad37eae2844484274ad42e78b90a446161197cb95ef41
-
Filesize
624KB
MD5b01405cb348a3cd105c66cc390ff7fb3
SHA1a706e33fc2258aa2618953963d468f27760a8ad5
SHA256345dc0e46f05f78cd67044d6af423a6d3e4e04a28112f0bb0379ef3e5f63c2b4
SHA5126aa7b7dc1d0adf5df7c2ffe68faa5bfbeb7016621ebefccdad7e0b573ec6290a08b4f90e44318c577c80cf009b808e72be5acb5f45e007b340b01f641c107740