Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27-09-2024 11:10
Static task
static1
Behavioral task
behavioral1
Sample
011c839ea6f5be8ca3e8c2088248f8301bbc614cdc8746c040033206b103c1e7N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
011c839ea6f5be8ca3e8c2088248f8301bbc614cdc8746c040033206b103c1e7N.exe
Resource
win10v2004-20240802-en
General
-
Target
011c839ea6f5be8ca3e8c2088248f8301bbc614cdc8746c040033206b103c1e7N.exe
-
Size
737KB
-
MD5
8ea5e38acebe9b835f9b330faa8d6560
-
SHA1
d3473c0c7fd2b8d85104f0d6b5560cd8487177af
-
SHA256
011c839ea6f5be8ca3e8c2088248f8301bbc614cdc8746c040033206b103c1e7
-
SHA512
cd0fab7d46856e7504a9f5dc1528177a2bc79e26ad0f12ecb9e860f524c4cc2ef40f5ac8d28d2f50169242f7fa8ad2a12fe090950c835906ce4976ff6b363e58
-
SSDEEP
6144:SgxilHZyojpSVOfkNvR/XwSFXHw5sKxGhjuZxerwfJcWVPwt+Verd1cIJYvvmW:6lYkCRv5FX8sKxGhyyk6TcIJYvvmW
Malware Config
Signatures
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1944-45-0x0000000000400000-0x0000000000442000-memory.dmp family_isrstealer behavioral1/memory/1944-46-0x0000000000400000-0x0000000000442000-memory.dmp family_isrstealer -
Detected Nirsoft tools 1 IoCs
Free utilities often used by attackers which can steal passwords, product keys, etc.
Processes:
resource yara_rule behavioral1/memory/3048-62-0x0000000000400000-0x000000000041F000-memory.dmp Nirsoft -
NirSoft MailPassView 1 IoCs
Password recovery tool for various email clients
Processes:
resource yara_rule behavioral1/memory/3048-62-0x0000000000400000-0x000000000041F000-memory.dmp MailPassView -
Executes dropped EXE 4 IoCs
Processes:
app.exeapp.exeapp.exeapp.exepid Process 2996 app.exe 1944 app.exe 1664 app.exe 3048 app.exe -
Loads dropped DLL 1 IoCs
Processes:
011c839ea6f5be8ca3e8c2088248f8301bbc614cdc8746c040033206b103c1e7N.exepid Process 2120 011c839ea6f5be8ca3e8c2088248f8301bbc614cdc8746c040033206b103c1e7N.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
Processes:
app.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts app.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
011c839ea6f5be8ca3e8c2088248f8301bbc614cdc8746c040033206b103c1e7N.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\Application = "C:\\Users\\Admin\\AppData\\Roaming\\app.exe" 011c839ea6f5be8ca3e8c2088248f8301bbc614cdc8746c040033206b103c1e7N.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
app.exeapp.exedescription pid Process procid_target PID 2996 set thread context of 1944 2996 app.exe 32 PID 1944 set thread context of 1664 1944 app.exe 33 PID 1944 set thread context of 3048 1944 app.exe 36 -
Processes:
resource yara_rule behavioral1/memory/1664-55-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/1664-56-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/1664-53-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/3048-59-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/3048-61-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/3048-62-0x0000000000400000-0x000000000041F000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
app.exeapp.exe011c839ea6f5be8ca3e8c2088248f8301bbc614cdc8746c040033206b103c1e7N.exeapp.exeapp.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language app.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language app.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 011c839ea6f5be8ca3e8c2088248f8301bbc614cdc8746c040033206b103c1e7N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language app.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language app.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
011c839ea6f5be8ca3e8c2088248f8301bbc614cdc8746c040033206b103c1e7N.exeapp.exepid Process 2120 011c839ea6f5be8ca3e8c2088248f8301bbc614cdc8746c040033206b103c1e7N.exe 2120 011c839ea6f5be8ca3e8c2088248f8301bbc614cdc8746c040033206b103c1e7N.exe 2120 011c839ea6f5be8ca3e8c2088248f8301bbc614cdc8746c040033206b103c1e7N.exe 2120 011c839ea6f5be8ca3e8c2088248f8301bbc614cdc8746c040033206b103c1e7N.exe 2120 011c839ea6f5be8ca3e8c2088248f8301bbc614cdc8746c040033206b103c1e7N.exe 2120 011c839ea6f5be8ca3e8c2088248f8301bbc614cdc8746c040033206b103c1e7N.exe 2996 app.exe 2996 app.exe 2996 app.exe 2996 app.exe 2996 app.exe 2996 app.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
011c839ea6f5be8ca3e8c2088248f8301bbc614cdc8746c040033206b103c1e7N.exeapp.exedescription pid Process Token: SeDebugPrivilege 2120 011c839ea6f5be8ca3e8c2088248f8301bbc614cdc8746c040033206b103c1e7N.exe Token: SeDebugPrivilege 2996 app.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
app.exepid Process 1944 app.exe -
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
011c839ea6f5be8ca3e8c2088248f8301bbc614cdc8746c040033206b103c1e7N.exeapp.exeapp.exedescription pid Process procid_target PID 2120 wrote to memory of 2996 2120 011c839ea6f5be8ca3e8c2088248f8301bbc614cdc8746c040033206b103c1e7N.exe 31 PID 2120 wrote to memory of 2996 2120 011c839ea6f5be8ca3e8c2088248f8301bbc614cdc8746c040033206b103c1e7N.exe 31 PID 2120 wrote to memory of 2996 2120 011c839ea6f5be8ca3e8c2088248f8301bbc614cdc8746c040033206b103c1e7N.exe 31 PID 2120 wrote to memory of 2996 2120 011c839ea6f5be8ca3e8c2088248f8301bbc614cdc8746c040033206b103c1e7N.exe 31 PID 2996 wrote to memory of 1944 2996 app.exe 32 PID 2996 wrote to memory of 1944 2996 app.exe 32 PID 2996 wrote to memory of 1944 2996 app.exe 32 PID 2996 wrote to memory of 1944 2996 app.exe 32 PID 2996 wrote to memory of 1944 2996 app.exe 32 PID 2996 wrote to memory of 1944 2996 app.exe 32 PID 2996 wrote to memory of 1944 2996 app.exe 32 PID 2996 wrote to memory of 1944 2996 app.exe 32 PID 1944 wrote to memory of 1664 1944 app.exe 33 PID 1944 wrote to memory of 1664 1944 app.exe 33 PID 1944 wrote to memory of 1664 1944 app.exe 33 PID 1944 wrote to memory of 1664 1944 app.exe 33 PID 1944 wrote to memory of 1664 1944 app.exe 33 PID 1944 wrote to memory of 1664 1944 app.exe 33 PID 1944 wrote to memory of 1664 1944 app.exe 33 PID 1944 wrote to memory of 1664 1944 app.exe 33 PID 1944 wrote to memory of 1664 1944 app.exe 33 PID 1944 wrote to memory of 3048 1944 app.exe 36 PID 1944 wrote to memory of 3048 1944 app.exe 36 PID 1944 wrote to memory of 3048 1944 app.exe 36 PID 1944 wrote to memory of 3048 1944 app.exe 36 PID 1944 wrote to memory of 3048 1944 app.exe 36 PID 1944 wrote to memory of 3048 1944 app.exe 36 PID 1944 wrote to memory of 3048 1944 app.exe 36 PID 1944 wrote to memory of 3048 1944 app.exe 36 PID 1944 wrote to memory of 3048 1944 app.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\011c839ea6f5be8ca3e8c2088248f8301bbc614cdc8746c040033206b103c1e7N.exe"C:\Users\Admin\AppData\Local\Temp\011c839ea6f5be8ca3e8c2088248f8301bbc614cdc8746c040033206b103c1e7N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Users\Admin\AppData\Roaming\app.exe"C:\Users\Admin\AppData\Roaming\app.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Users\Admin\AppData\Roaming\app.exe"C:\Users\Admin\AppData\Roaming\app.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Users\Admin\AppData\Roaming\app.exe/scomma "C:\Users\Admin\AppData\Local\Temp\o33KKmFlDq.ini"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1664
-
-
C:\Users\Admin\AppData\Roaming\app.exe/scomma "C:\Users\Admin\AppData\Local\Temp\KM96RJiTRC.ini"4⤵
- Executes dropped EXE
- Accesses Microsoft Outlook accounts
- System Location Discovery: System Language Discovery
PID:3048
-
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
5B
MD5d1ea279fb5559c020a1b4137dc4de237
SHA1db6f8988af46b56216a6f0daf95ab8c9bdb57400
SHA256fcdcc2c46896915a1c695d6231f0fee336a668531b7a3da46178c80362546dba
SHA512720e9c284f0559015312df7fe977563e5e16f48d3506e51eb4016adf7971924d352f740b030aa3adc81b6f65fd1dba12df06d10fa6c115074e5097e7ee0f08b3
-
Filesize
742KB
MD52b9e9796b9caca75df98a607ea8c45ae
SHA17debc5ea30ecea6962996c4bdc3f4ec56222f8f4
SHA256666bac0b2419592c1cfdda65baf3baf111cfe4e080a103ee6833140bf4e290d7
SHA51207e47354acdc79f290bcc267281b3656cc2e5d9e80705cf95837c1fbeea3d5eb3f48cf560515a142b7248d731f702d1518c692bb2ef19f7dba7902b120ea5cfb