Analysis
-
max time kernel
149s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01-09-2024 14:57
Static task
static1
Behavioral task
behavioral1
Sample
184e59e76f6fa14247e00c92234aa8475ad86486b03177ceac287691e75cd726.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
184e59e76f6fa14247e00c92234aa8475ad86486b03177ceac287691e75cd726.exe
Resource
win10v2004-20240802-en
General
-
Target
184e59e76f6fa14247e00c92234aa8475ad86486b03177ceac287691e75cd726.exe
-
Size
1.5MB
-
MD5
9310d851134a48c6d594498a5cb45162
-
SHA1
d88c57ef82b0eeed05cdf44d9a7d6e95cb2b6a08
-
SHA256
184e59e76f6fa14247e00c92234aa8475ad86486b03177ceac287691e75cd726
-
SHA512
d1fb9bec4bc960186f55f518b0db50dc9276282fefda9313bc4e51b5340b484fe1311d6e8e86ca2ec1496d49d80931523f3de9271794deb4dc447d87b153ca34
-
SSDEEP
24576:8uPmLDUMihIXCE5uEGOivIEQ5ELbHjR0L2oXzD:8u+LIIX7gEGOivRQ5EfHjA2ojD
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation 184e59e76f6fa14247e00c92234aa8475ad86486b03177ceac287691e75cd726.exe Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation Isass.exe Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation 184e59e76f6fa14247e00c92234aa8475ad86486b03177ceac287691e75cd726.exe Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation Isass.exe -
Executes dropped EXE 4 IoCs
pid Process 1216 Isass.exe 3100 Isass.exe 2368 Isass.exe 316 184e59e76f6fa14247e00c92234aa8475ad86486b03177ceac287691e75cd726.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Isass.exe = "C:\\Users\\Public\\Microsoft Build\\Isass.exe" 184e59e76f6fa14247e00c92234aa8475ad86486b03177ceac287691e75cd726.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Isass.exe = "C:\\Users\\Public\\Microsoft Build\\Isass.exe" 184e59e76f6fa14247e00c92234aa8475ad86486b03177ceac287691e75cd726.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Isass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 184e59e76f6fa14247e00c92234aa8475ad86486b03177ceac287691e75cd726.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Isass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 184e59e76f6fa14247e00c92234aa8475ad86486b03177ceac287691e75cd726.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Isass.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 3540 184e59e76f6fa14247e00c92234aa8475ad86486b03177ceac287691e75cd726.exe 3540 184e59e76f6fa14247e00c92234aa8475ad86486b03177ceac287691e75cd726.exe 1216 Isass.exe 1216 Isass.exe 3100 Isass.exe 3100 Isass.exe 3100 Isass.exe 3100 Isass.exe 3100 Isass.exe 3100 Isass.exe 1988 184e59e76f6fa14247e00c92234aa8475ad86486b03177ceac287691e75cd726.exe 1988 184e59e76f6fa14247e00c92234aa8475ad86486b03177ceac287691e75cd726.exe 2368 Isass.exe 2368 Isass.exe 2368 Isass.exe 2368 Isass.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3540 wrote to memory of 1216 3540 184e59e76f6fa14247e00c92234aa8475ad86486b03177ceac287691e75cd726.exe 85 PID 3540 wrote to memory of 1216 3540 184e59e76f6fa14247e00c92234aa8475ad86486b03177ceac287691e75cd726.exe 85 PID 3540 wrote to memory of 1216 3540 184e59e76f6fa14247e00c92234aa8475ad86486b03177ceac287691e75cd726.exe 85 PID 3540 wrote to memory of 3100 3540 184e59e76f6fa14247e00c92234aa8475ad86486b03177ceac287691e75cd726.exe 88 PID 3540 wrote to memory of 3100 3540 184e59e76f6fa14247e00c92234aa8475ad86486b03177ceac287691e75cd726.exe 88 PID 3540 wrote to memory of 3100 3540 184e59e76f6fa14247e00c92234aa8475ad86486b03177ceac287691e75cd726.exe 88 PID 3100 wrote to memory of 1988 3100 Isass.exe 89 PID 3100 wrote to memory of 1988 3100 Isass.exe 89 PID 3100 wrote to memory of 1988 3100 Isass.exe 89 PID 1988 wrote to memory of 2368 1988 184e59e76f6fa14247e00c92234aa8475ad86486b03177ceac287691e75cd726.exe 90 PID 1988 wrote to memory of 2368 1988 184e59e76f6fa14247e00c92234aa8475ad86486b03177ceac287691e75cd726.exe 90 PID 1988 wrote to memory of 2368 1988 184e59e76f6fa14247e00c92234aa8475ad86486b03177ceac287691e75cd726.exe 90 PID 2368 wrote to memory of 316 2368 Isass.exe 91 PID 2368 wrote to memory of 316 2368 Isass.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\184e59e76f6fa14247e00c92234aa8475ad86486b03177ceac287691e75cd726.exe"C:\Users\Admin\AppData\Local\Temp\184e59e76f6fa14247e00c92234aa8475ad86486b03177ceac287691e75cd726.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3540 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1216
-
-
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\184e59e76f6fa14247e00c92234aa8475ad86486b03177ceac287691e75cd726.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3100 -
C:\Users\Admin\AppData\Local\Temp\184e59e76f6fa14247e00c92234aa8475ad86486b03177ceac287691e75cd726.exe"C:\Users\Admin\AppData\Local\Temp\184e59e76f6fa14247e00c92234aa8475ad86486b03177ceac287691e75cd726.exe"3⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\184e59e76f6fa14247e00c92234aa8475ad86486b03177ceac287691e75cd726.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\184e59e76f6fa14247e00c92234aa8475ad86486b03177ceac287691e75cd726.exe"C:\Users\Admin\AppData\Local\Temp\184e59e76f6fa14247e00c92234aa8475ad86486b03177ceac287691e75cd726.exe"5⤵
- Executes dropped EXE
PID:316
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD58c780aa366db1d64a2540d57c52a398f
SHA1fe2f885ae09947cd9febf917a0df65e264143162
SHA256504a1b2ffc09709445f9081109054e0aa573fe82c00d00f737f531b0fd1a3f14
SHA51216ec3fe8cd57c0f5ca87cb17908831d9f5068ed593d096406cd97a12a0d30827498506db689cbd9e1be57ca597922bb84e46f4df02757023dc5a9da5c1133596
-
C:\Users\Admin\AppData\Local\Temp\184e59e76f6fa14247e00c92234aa8475ad86486b03177ceac287691e75cd726.exe
Filesize835KB
MD5e015a2d8890e2a96a93ca818f834c45b
SHA130bda2b4464b1c41210cba367e444aed56502360
SHA256dc1ba9cb15d0808dc2d80ce13acfa0b07acdfcfe2cdf94da47e0e570e7345f6d
SHA51220a80b50486e938b92f3aef85e59307f644b69dc5d1edee38038182b57caf636f5f1909959f6fafcfc2e915010d2b3d230cba8300fbc0f63ee2ee3ad8ad64123
-
Filesize
624KB
MD5fc826a64e9ef090727c29cd63deffb21
SHA113a523bd00ef5eb3fa0987496bb32547d0e89c8e
SHA256831762e51895407f6c462adf65077fb21a9191d0cece0f10411a085368e19532
SHA51258710e3a943a5b928e8d2c7a8c45b0fd395cdf16e3763d053a47ec2f5299f05bf09c1430e6390b2ab60a8e17777553c2c1b690eb5d0a30018ee87c98c63d92dc