Analysis
-
max time kernel
111s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 15:54
Static task
static1
Behavioral task
behavioral1
Sample
c53b524f93bfc772458bb3d17872e519e9d281ec38df764c1f241a982d1046deN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c53b524f93bfc772458bb3d17872e519e9d281ec38df764c1f241a982d1046deN.exe
Resource
win10v2004-20240802-en
General
-
Target
c53b524f93bfc772458bb3d17872e519e9d281ec38df764c1f241a982d1046deN.exe
-
Size
369KB
-
MD5
b64fbc7362b68978ae5d4206e857e7f0
-
SHA1
ca11f7b8ab7aaf479c5580af7ce2d2c8658c12c8
-
SHA256
c53b524f93bfc772458bb3d17872e519e9d281ec38df764c1f241a982d1046de
-
SHA512
260d5d9b47f3521ee55ec316e110193265f28400e15bbf15b4387c17ed89de3a319fbc9c64cbc73be8dabf37b117d1d804dc2d5ee6a3f81088f290f66962904c
-
SSDEEP
6144:ztvBPnU1b7e9SQii1EkoNlhlrQ2ZrM2xDM5z51PhPHdwLFM484Lm7Sq:Zv1nWdQP1EDhZPxDM5z5vOBLS7Sq
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation c53b524f93bfc772458bb3d17872e519e9d281ec38df764c1f241a982d1046deN.exe -
Executes dropped EXE 2 IoCs
pid Process 4928 Isass.exe 1696 XP_c53b524f93bfc772458bb3d17872e519e9d281ec38df764c1f241a982d1046deN.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Isass.exe = "C:\\Program Files (x86)\\Microsoft Build\\Isass.exe" c53b524f93bfc772458bb3d17872e519e9d281ec38df764c1f241a982d1046deN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Isass.exe = "C:\\Program Files (x86)\\Microsoft Build\\Isass.exe" c53b524f93bfc772458bb3d17872e519e9d281ec38df764c1f241a982d1046deN.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft Build\Isass.exe c53b524f93bfc772458bb3d17872e519e9d281ec38df764c1f241a982d1046deN.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c53b524f93bfc772458bb3d17872e519e9d281ec38df764c1f241a982d1046deN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Isass.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3828 c53b524f93bfc772458bb3d17872e519e9d281ec38df764c1f241a982d1046deN.exe 3828 c53b524f93bfc772458bb3d17872e519e9d281ec38df764c1f241a982d1046deN.exe 4928 Isass.exe 4928 Isass.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 3828 wrote to memory of 4928 3828 c53b524f93bfc772458bb3d17872e519e9d281ec38df764c1f241a982d1046deN.exe 83 PID 3828 wrote to memory of 4928 3828 c53b524f93bfc772458bb3d17872e519e9d281ec38df764c1f241a982d1046deN.exe 83 PID 3828 wrote to memory of 4928 3828 c53b524f93bfc772458bb3d17872e519e9d281ec38df764c1f241a982d1046deN.exe 83 PID 3828 wrote to memory of 1696 3828 c53b524f93bfc772458bb3d17872e519e9d281ec38df764c1f241a982d1046deN.exe 84 PID 3828 wrote to memory of 1696 3828 c53b524f93bfc772458bb3d17872e519e9d281ec38df764c1f241a982d1046deN.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\c53b524f93bfc772458bb3d17872e519e9d281ec38df764c1f241a982d1046deN.exe"C:\Users\Admin\AppData\Local\Temp\c53b524f93bfc772458bb3d17872e519e9d281ec38df764c1f241a982d1046deN.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3828 -
C:\Program Files (x86)\Microsoft Build\Isass.exe"C:\Program Files (x86)\Microsoft Build\Isass.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4928
-
-
C:\Users\Admin\AppData\Local\Temp\XP_c53b524f93bfc772458bb3d17872e519e9d281ec38df764c1f241a982d1046deN.exe"C:\Users\Admin\AppData\Local\Temp\XP_c53b524f93bfc772458bb3d17872e519e9d281ec38df764c1f241a982d1046deN.exe"2⤵
- Executes dropped EXE
PID:1696
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
213KB
MD561e49c2f3d433842e7a23bb69d55d866
SHA15e805e4e9550fd3d93f6a052f2db58a1b521b208
SHA2563f35ac321848d4c2ae583d715d61ba6f34e40e46b62096b332b62f2ce8178fb3
SHA512e0229e17d70486c446cdb50318cb27ae4f99eb464ee92c2fc0c3e33e54844c6dd13917d67336f7b52e31378764c0f317df1cfe0fbd1a1eec76fa3fb50b94f1c3
-
Filesize
6.8MB
MD590f16d965fabe2c0f0896f1822142936
SHA12db3233f729d323065c7a332fc314c7801ac6e00
SHA2562ddf573635ba114400d953a5042b6b821eb97e5175894161aca3e931a7620f33
SHA512401a2b8910323f0085abd12adef3779fa430d280cc53fd6feb5ae1b151e8e3ffd595d7924e847fcdf050471d681d8b882ab1338c955712af716a95220a189b57
-
C:\Users\Admin\AppData\Local\Temp\XP_c53b524f93bfc772458bb3d17872e519e9d281ec38df764c1f241a982d1046deN.exe
Filesize99KB
MD5b7515e4664543b43461c2ecd7a5676dc
SHA1f6fbcfe5b093fe9691b740684607bc31a9159935
SHA256bf1b03022cadfc18049a7f0ecf1f3134c7676fcb6ff6c6941ae7f77e21285c73
SHA512ac4c7098878ccfd2cc76451c071bfd992eecc49e9e8502545eada32aed4c28515dee5096e6dc6e61147e619a5f16ce4f364ebb98c2a78c0ee4b44b9517a872d1
-
C:\Users\Admin\AppData\Local\Temp\XP_c53b524f93bfc772458bb3d17872e519e9d281ec38df764c1f241a982d1046deN.exe
Filesize213KB
MD58fa2bd5b1fe76dae8c502cab34802fe4
SHA1e9c15d83d8ac536cdd23d2a31e6008aaaca4e37b
SHA25663c50d8066e9b27a88bed96641c02632791d07abef150394e0308c29c0e9e751
SHA512a6257797059f1af8df2895a46697df75c11e8334a80a45b9de15abc206d4da4508bbc71cbc3eaa9f3801ae1e7700f1e3f844c511b0c4b9196c9ac1d115284bfe