Analysis
-
max time kernel
140s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
01/09/2024, 14:57
Static task
static1
Behavioral task
behavioral1
Sample
184e59e76f6fa14247e00c92234aa8475ad86486b03177ceac287691e75cd726.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
184e59e76f6fa14247e00c92234aa8475ad86486b03177ceac287691e75cd726.exe
Resource
win10v2004-20240802-en
General
-
Target
184e59e76f6fa14247e00c92234aa8475ad86486b03177ceac287691e75cd726.exe
-
Size
1.5MB
-
MD5
9310d851134a48c6d594498a5cb45162
-
SHA1
d88c57ef82b0eeed05cdf44d9a7d6e95cb2b6a08
-
SHA256
184e59e76f6fa14247e00c92234aa8475ad86486b03177ceac287691e75cd726
-
SHA512
d1fb9bec4bc960186f55f518b0db50dc9276282fefda9313bc4e51b5340b484fe1311d6e8e86ca2ec1496d49d80931523f3de9271794deb4dc447d87b153ca34
-
SSDEEP
24576:8uPmLDUMihIXCE5uEGOivIEQ5ELbHjR0L2oXzD:8u+LIIX7gEGOivRQ5EfHjA2ojD
Malware Config
Signatures
-
Executes dropped EXE 5 IoCs
pid Process 2060 Isass.exe 2116 Isass.exe 2812 Isass.exe 2288 184e59e76f6fa14247e00c92234aa8475ad86486b03177ceac287691e75cd726.exe 1196 Process not Found -
Loads dropped DLL 12 IoCs
pid Process 3028 184e59e76f6fa14247e00c92234aa8475ad86486b03177ceac287691e75cd726.exe 3028 184e59e76f6fa14247e00c92234aa8475ad86486b03177ceac287691e75cd726.exe 3028 184e59e76f6fa14247e00c92234aa8475ad86486b03177ceac287691e75cd726.exe 3028 184e59e76f6fa14247e00c92234aa8475ad86486b03177ceac287691e75cd726.exe 2092 184e59e76f6fa14247e00c92234aa8475ad86486b03177ceac287691e75cd726.exe 2092 184e59e76f6fa14247e00c92234aa8475ad86486b03177ceac287691e75cd726.exe 2812 Isass.exe 2812 Isass.exe 1196 Process not Found 2060 Isass.exe 2060 Isass.exe 2060 Isass.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\Isass.exe = "C:\\Users\\Public\\Microsoft Build\\Isass.exe" 184e59e76f6fa14247e00c92234aa8475ad86486b03177ceac287691e75cd726.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Isass.exe = "C:\\Users\\Public\\Microsoft Build\\Isass.exe" 184e59e76f6fa14247e00c92234aa8475ad86486b03177ceac287691e75cd726.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Isass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 184e59e76f6fa14247e00c92234aa8475ad86486b03177ceac287691e75cd726.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Isass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 184e59e76f6fa14247e00c92234aa8475ad86486b03177ceac287691e75cd726.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Isass.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3028 184e59e76f6fa14247e00c92234aa8475ad86486b03177ceac287691e75cd726.exe 2060 Isass.exe 2116 Isass.exe 2116 Isass.exe 2116 Isass.exe 2092 184e59e76f6fa14247e00c92234aa8475ad86486b03177ceac287691e75cd726.exe 2812 Isass.exe 2812 Isass.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 3028 wrote to memory of 2060 3028 184e59e76f6fa14247e00c92234aa8475ad86486b03177ceac287691e75cd726.exe 30 PID 3028 wrote to memory of 2060 3028 184e59e76f6fa14247e00c92234aa8475ad86486b03177ceac287691e75cd726.exe 30 PID 3028 wrote to memory of 2060 3028 184e59e76f6fa14247e00c92234aa8475ad86486b03177ceac287691e75cd726.exe 30 PID 3028 wrote to memory of 2060 3028 184e59e76f6fa14247e00c92234aa8475ad86486b03177ceac287691e75cd726.exe 30 PID 3028 wrote to memory of 2116 3028 184e59e76f6fa14247e00c92234aa8475ad86486b03177ceac287691e75cd726.exe 31 PID 3028 wrote to memory of 2116 3028 184e59e76f6fa14247e00c92234aa8475ad86486b03177ceac287691e75cd726.exe 31 PID 3028 wrote to memory of 2116 3028 184e59e76f6fa14247e00c92234aa8475ad86486b03177ceac287691e75cd726.exe 31 PID 3028 wrote to memory of 2116 3028 184e59e76f6fa14247e00c92234aa8475ad86486b03177ceac287691e75cd726.exe 31 PID 2116 wrote to memory of 2092 2116 Isass.exe 32 PID 2116 wrote to memory of 2092 2116 Isass.exe 32 PID 2116 wrote to memory of 2092 2116 Isass.exe 32 PID 2116 wrote to memory of 2092 2116 Isass.exe 32 PID 2092 wrote to memory of 2812 2092 184e59e76f6fa14247e00c92234aa8475ad86486b03177ceac287691e75cd726.exe 33 PID 2092 wrote to memory of 2812 2092 184e59e76f6fa14247e00c92234aa8475ad86486b03177ceac287691e75cd726.exe 33 PID 2092 wrote to memory of 2812 2092 184e59e76f6fa14247e00c92234aa8475ad86486b03177ceac287691e75cd726.exe 33 PID 2092 wrote to memory of 2812 2092 184e59e76f6fa14247e00c92234aa8475ad86486b03177ceac287691e75cd726.exe 33 PID 2812 wrote to memory of 2288 2812 Isass.exe 34 PID 2812 wrote to memory of 2288 2812 Isass.exe 34 PID 2812 wrote to memory of 2288 2812 Isass.exe 34 PID 2812 wrote to memory of 2288 2812 Isass.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\184e59e76f6fa14247e00c92234aa8475ad86486b03177ceac287691e75cd726.exe"C:\Users\Admin\AppData\Local\Temp\184e59e76f6fa14247e00c92234aa8475ad86486b03177ceac287691e75cd726.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2060
-
-
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\184e59e76f6fa14247e00c92234aa8475ad86486b03177ceac287691e75cd726.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Users\Admin\AppData\Local\Temp\184e59e76f6fa14247e00c92234aa8475ad86486b03177ceac287691e75cd726.exe"C:\Users\Admin\AppData\Local\Temp\184e59e76f6fa14247e00c92234aa8475ad86486b03177ceac287691e75cd726.exe"3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\184e59e76f6fa14247e00c92234aa8475ad86486b03177ceac287691e75cd726.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Users\Admin\AppData\Local\Temp\184e59e76f6fa14247e00c92234aa8475ad86486b03177ceac287691e75cd726.exe"C:\Users\Admin\AppData\Local\Temp\184e59e76f6fa14247e00c92234aa8475ad86486b03177ceac287691e75cd726.exe"5⤵
- Executes dropped EXE
PID:2288
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
624KB
MD5fc826a64e9ef090727c29cd63deffb21
SHA113a523bd00ef5eb3fa0987496bb32547d0e89c8e
SHA256831762e51895407f6c462adf65077fb21a9191d0cece0f10411a085368e19532
SHA51258710e3a943a5b928e8d2c7a8c45b0fd395cdf16e3763d053a47ec2f5299f05bf09c1430e6390b2ab60a8e17777553c2c1b690eb5d0a30018ee87c98c63d92dc
-
\Users\Admin\AppData\Local\Temp\184e59e76f6fa14247e00c92234aa8475ad86486b03177ceac287691e75cd726.exe
Filesize835KB
MD5e015a2d8890e2a96a93ca818f834c45b
SHA130bda2b4464b1c41210cba367e444aed56502360
SHA256dc1ba9cb15d0808dc2d80ce13acfa0b07acdfcfe2cdf94da47e0e570e7345f6d
SHA51220a80b50486e938b92f3aef85e59307f644b69dc5d1edee38038182b57caf636f5f1909959f6fafcfc2e915010d2b3d230cba8300fbc0f63ee2ee3ad8ad64123