Analysis
-
max time kernel
110s -
max time network
106s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27-09-2024 08:43
Static task
static1
Behavioral task
behavioral1
Sample
011c839ea6f5be8ca3e8c2088248f8301bbc614cdc8746c040033206b103c1e7N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
011c839ea6f5be8ca3e8c2088248f8301bbc614cdc8746c040033206b103c1e7N.exe
Resource
win10v2004-20240802-en
General
-
Target
011c839ea6f5be8ca3e8c2088248f8301bbc614cdc8746c040033206b103c1e7N.exe
-
Size
737KB
-
MD5
8ea5e38acebe9b835f9b330faa8d6560
-
SHA1
d3473c0c7fd2b8d85104f0d6b5560cd8487177af
-
SHA256
011c839ea6f5be8ca3e8c2088248f8301bbc614cdc8746c040033206b103c1e7
-
SHA512
cd0fab7d46856e7504a9f5dc1528177a2bc79e26ad0f12ecb9e860f524c4cc2ef40f5ac8d28d2f50169242f7fa8ad2a12fe090950c835906ce4976ff6b363e58
-
SSDEEP
6144:SgxilHZyojpSVOfkNvR/XwSFXHw5sKxGhjuZxerwfJcWVPwt+Verd1cIJYvvmW:6lYkCRv5FX8sKxGhyyk6TcIJYvvmW
Malware Config
Signatures
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload 2 IoCs
resource yara_rule behavioral1/memory/836-47-0x0000000000400000-0x0000000000442000-memory.dmp family_isrstealer behavioral1/memory/836-46-0x0000000000400000-0x0000000000442000-memory.dmp family_isrstealer -
Detected Nirsoft tools 1 IoCs
Free utilities often used by attackers which can steal passwords, product keys, etc.
resource yara_rule behavioral1/memory/448-63-0x0000000000400000-0x000000000041F000-memory.dmp Nirsoft -
NirSoft MailPassView 1 IoCs
Password recovery tool for various email clients
resource yara_rule behavioral1/memory/448-63-0x0000000000400000-0x000000000041F000-memory.dmp MailPassView -
Executes dropped EXE 4 IoCs
pid Process 1864 app.exe 836 app.exe 2356 app.exe 448 app.exe -
Loads dropped DLL 1 IoCs
pid Process 2968 011c839ea6f5be8ca3e8c2088248f8301bbc614cdc8746c040033206b103c1e7N.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts app.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\Application = "C:\\Users\\Admin\\AppData\\Roaming\\app.exe" 011c839ea6f5be8ca3e8c2088248f8301bbc614cdc8746c040033206b103c1e7N.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1864 set thread context of 836 1864 app.exe 32 PID 836 set thread context of 2356 836 app.exe 33 PID 836 set thread context of 448 836 app.exe 35 -
resource yara_rule behavioral1/memory/2356-56-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/2356-55-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/2356-53-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/448-60-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/448-62-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/448-63-0x0000000000400000-0x000000000041F000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language app.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language app.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language app.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 011c839ea6f5be8ca3e8c2088248f8301bbc614cdc8746c040033206b103c1e7N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language app.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2968 011c839ea6f5be8ca3e8c2088248f8301bbc614cdc8746c040033206b103c1e7N.exe 2968 011c839ea6f5be8ca3e8c2088248f8301bbc614cdc8746c040033206b103c1e7N.exe 2968 011c839ea6f5be8ca3e8c2088248f8301bbc614cdc8746c040033206b103c1e7N.exe 2968 011c839ea6f5be8ca3e8c2088248f8301bbc614cdc8746c040033206b103c1e7N.exe 2968 011c839ea6f5be8ca3e8c2088248f8301bbc614cdc8746c040033206b103c1e7N.exe 2968 011c839ea6f5be8ca3e8c2088248f8301bbc614cdc8746c040033206b103c1e7N.exe 1864 app.exe 1864 app.exe 1864 app.exe 1864 app.exe 1864 app.exe 1864 app.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2968 011c839ea6f5be8ca3e8c2088248f8301bbc614cdc8746c040033206b103c1e7N.exe Token: SeDebugPrivilege 1864 app.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 836 app.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2968 wrote to memory of 1864 2968 011c839ea6f5be8ca3e8c2088248f8301bbc614cdc8746c040033206b103c1e7N.exe 31 PID 2968 wrote to memory of 1864 2968 011c839ea6f5be8ca3e8c2088248f8301bbc614cdc8746c040033206b103c1e7N.exe 31 PID 2968 wrote to memory of 1864 2968 011c839ea6f5be8ca3e8c2088248f8301bbc614cdc8746c040033206b103c1e7N.exe 31 PID 2968 wrote to memory of 1864 2968 011c839ea6f5be8ca3e8c2088248f8301bbc614cdc8746c040033206b103c1e7N.exe 31 PID 1864 wrote to memory of 836 1864 app.exe 32 PID 1864 wrote to memory of 836 1864 app.exe 32 PID 1864 wrote to memory of 836 1864 app.exe 32 PID 1864 wrote to memory of 836 1864 app.exe 32 PID 1864 wrote to memory of 836 1864 app.exe 32 PID 1864 wrote to memory of 836 1864 app.exe 32 PID 1864 wrote to memory of 836 1864 app.exe 32 PID 1864 wrote to memory of 836 1864 app.exe 32 PID 836 wrote to memory of 2356 836 app.exe 33 PID 836 wrote to memory of 2356 836 app.exe 33 PID 836 wrote to memory of 2356 836 app.exe 33 PID 836 wrote to memory of 2356 836 app.exe 33 PID 836 wrote to memory of 2356 836 app.exe 33 PID 836 wrote to memory of 2356 836 app.exe 33 PID 836 wrote to memory of 2356 836 app.exe 33 PID 836 wrote to memory of 2356 836 app.exe 33 PID 836 wrote to memory of 2356 836 app.exe 33 PID 836 wrote to memory of 448 836 app.exe 35 PID 836 wrote to memory of 448 836 app.exe 35 PID 836 wrote to memory of 448 836 app.exe 35 PID 836 wrote to memory of 448 836 app.exe 35 PID 836 wrote to memory of 448 836 app.exe 35 PID 836 wrote to memory of 448 836 app.exe 35 PID 836 wrote to memory of 448 836 app.exe 35 PID 836 wrote to memory of 448 836 app.exe 35 PID 836 wrote to memory of 448 836 app.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\011c839ea6f5be8ca3e8c2088248f8301bbc614cdc8746c040033206b103c1e7N.exe"C:\Users\Admin\AppData\Local\Temp\011c839ea6f5be8ca3e8c2088248f8301bbc614cdc8746c040033206b103c1e7N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Users\Admin\AppData\Roaming\app.exe"C:\Users\Admin\AppData\Roaming\app.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Users\Admin\AppData\Roaming\app.exe"C:\Users\Admin\AppData\Roaming\app.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Users\Admin\AppData\Roaming\app.exe/scomma "C:\Users\Admin\AppData\Local\Temp\ECSdqr6zDi.ini"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2356
-
-
C:\Users\Admin\AppData\Roaming\app.exe/scomma "C:\Users\Admin\AppData\Local\Temp\g3lAasvwbz.ini"4⤵
- Executes dropped EXE
- Accesses Microsoft Outlook accounts
- System Location Discovery: System Language Discovery
PID:448
-
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc2f8feecbb7a8414ab80cba498f367e
SHA177d015f7f1dc714b7ac93c18f2d9950773f49ada
SHA25662b689110b07baa413949a9ea5fc419d9e42edad99770b096e81918b031b5d50
SHA5124e5760d1768d0478dd08cc013dc5eb6d53a8e2e94728c161c3d387741d82251dac311b792efd4e5a7d20822e9aff2b4cbad3f5233e8a741cf121de75d7d1c5f2
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
5B
MD5d1ea279fb5559c020a1b4137dc4de237
SHA1db6f8988af46b56216a6f0daf95ab8c9bdb57400
SHA256fcdcc2c46896915a1c695d6231f0fee336a668531b7a3da46178c80362546dba
SHA512720e9c284f0559015312df7fe977563e5e16f48d3506e51eb4016adf7971924d352f740b030aa3adc81b6f65fd1dba12df06d10fa6c115074e5097e7ee0f08b3
-
Filesize
742KB
MD52b9e9796b9caca75df98a607ea8c45ae
SHA17debc5ea30ecea6962996c4bdc3f4ec56222f8f4
SHA256666bac0b2419592c1cfdda65baf3baf111cfe4e080a103ee6833140bf4e290d7
SHA51207e47354acdc79f290bcc267281b3656cc2e5d9e80705cf95837c1fbeea3d5eb3f48cf560515a142b7248d731f702d1518c692bb2ef19f7dba7902b120ea5cfb