Analysis
-
max time kernel
110s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
16-12-2024 06:30
Static task
static1
Behavioral task
behavioral1
Sample
8429d738392a7baf7d4fe289c560dfa3233169dd234d9885452c81691b39373cN.exe
Resource
win7-20241023-en
General
-
Target
8429d738392a7baf7d4fe289c560dfa3233169dd234d9885452c81691b39373cN.exe
-
Size
527KB
-
MD5
9078ea88145489ae166ec9c534000ff0
-
SHA1
3d84ed1e46534edc57b260f81e0dc5afacc78d6a
-
SHA256
8429d738392a7baf7d4fe289c560dfa3233169dd234d9885452c81691b39373c
-
SHA512
f22e2e8b4448d3aa827d2f264ad02d591980209d411a432e0da1b7253b6bc6ff93ba17a8e72ddc6acdf48e128902d1ce78d829684c957e30ce3a47f5a9fbb450
-
SSDEEP
12288:QYBzgc7Bs/4DeYYzYBzgc783y84CGtjnVB5ONbs9Qj:QUgc7e/4jYzUgc78RQXBQhj
Malware Config
Signatures
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload 2 IoCs
resource yara_rule behavioral1/memory/2872-54-0x0000000000400000-0x0000000000464000-memory.dmp family_isrstealer behavioral1/memory/2872-97-0x0000000000400000-0x0000000000464000-memory.dmp family_isrstealer -
Isrstealer family
-
Executes dropped EXE 5 IoCs
pid Process 2088 Patch IDM 6.xx.exe 2548 123456.exe 2872 123456.exe 2672 Patch IDM 6.xx.exe 2712 123456.exe -
Loads dropped DLL 13 IoCs
pid Process 1740 8429d738392a7baf7d4fe289c560dfa3233169dd234d9885452c81691b39373cN.exe 1740 8429d738392a7baf7d4fe289c560dfa3233169dd234d9885452c81691b39373cN.exe 1740 8429d738392a7baf7d4fe289c560dfa3233169dd234d9885452c81691b39373cN.exe 2088 Patch IDM 6.xx.exe 2088 Patch IDM 6.xx.exe 2088 Patch IDM 6.xx.exe 2548 123456.exe 2088 Patch IDM 6.xx.exe 2672 Patch IDM 6.xx.exe 2672 Patch IDM 6.xx.exe 2672 Patch IDM 6.xx.exe 2872 123456.exe 2672 Patch IDM 6.xx.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2548 set thread context of 2872 2548 123456.exe 32 PID 2088 set thread context of 2672 2088 Patch IDM 6.xx.exe 33 PID 2872 set thread context of 2712 2872 123456.exe 34 -
resource yara_rule behavioral1/memory/2672-81-0x0000000000400000-0x0000000000444000-memory.dmp upx behavioral1/memory/2672-77-0x0000000000400000-0x0000000000444000-memory.dmp upx behavioral1/memory/2672-72-0x0000000000400000-0x0000000000444000-memory.dmp upx behavioral1/memory/2672-66-0x0000000000400000-0x0000000000444000-memory.dmp upx behavioral1/memory/2672-63-0x0000000000400000-0x0000000000444000-memory.dmp upx behavioral1/memory/2712-88-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/2672-60-0x0000000000400000-0x0000000000444000-memory.dmp upx behavioral1/memory/2712-90-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/2712-91-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/2672-92-0x0000000000400000-0x0000000000444000-memory.dmp upx behavioral1/memory/2712-96-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/2672-98-0x0000000000230000-0x0000000000261000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 123456.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8429d738392a7baf7d4fe289c560dfa3233169dd234d9885452c81691b39373cN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Patch IDM 6.xx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 123456.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 123456.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Patch IDM 6.xx.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1740 8429d738392a7baf7d4fe289c560dfa3233169dd234d9885452c81691b39373cN.exe 2548 123456.exe 2088 Patch IDM 6.xx.exe 2872 123456.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 1740 wrote to memory of 2088 1740 8429d738392a7baf7d4fe289c560dfa3233169dd234d9885452c81691b39373cN.exe 30 PID 1740 wrote to memory of 2088 1740 8429d738392a7baf7d4fe289c560dfa3233169dd234d9885452c81691b39373cN.exe 30 PID 1740 wrote to memory of 2088 1740 8429d738392a7baf7d4fe289c560dfa3233169dd234d9885452c81691b39373cN.exe 30 PID 1740 wrote to memory of 2088 1740 8429d738392a7baf7d4fe289c560dfa3233169dd234d9885452c81691b39373cN.exe 30 PID 1740 wrote to memory of 2088 1740 8429d738392a7baf7d4fe289c560dfa3233169dd234d9885452c81691b39373cN.exe 30 PID 1740 wrote to memory of 2088 1740 8429d738392a7baf7d4fe289c560dfa3233169dd234d9885452c81691b39373cN.exe 30 PID 1740 wrote to memory of 2088 1740 8429d738392a7baf7d4fe289c560dfa3233169dd234d9885452c81691b39373cN.exe 30 PID 1740 wrote to memory of 2548 1740 8429d738392a7baf7d4fe289c560dfa3233169dd234d9885452c81691b39373cN.exe 31 PID 1740 wrote to memory of 2548 1740 8429d738392a7baf7d4fe289c560dfa3233169dd234d9885452c81691b39373cN.exe 31 PID 1740 wrote to memory of 2548 1740 8429d738392a7baf7d4fe289c560dfa3233169dd234d9885452c81691b39373cN.exe 31 PID 1740 wrote to memory of 2548 1740 8429d738392a7baf7d4fe289c560dfa3233169dd234d9885452c81691b39373cN.exe 31 PID 2548 wrote to memory of 2872 2548 123456.exe 32 PID 2548 wrote to memory of 2872 2548 123456.exe 32 PID 2548 wrote to memory of 2872 2548 123456.exe 32 PID 2548 wrote to memory of 2872 2548 123456.exe 32 PID 2548 wrote to memory of 2872 2548 123456.exe 32 PID 2548 wrote to memory of 2872 2548 123456.exe 32 PID 2548 wrote to memory of 2872 2548 123456.exe 32 PID 2088 wrote to memory of 2672 2088 Patch IDM 6.xx.exe 33 PID 2088 wrote to memory of 2672 2088 Patch IDM 6.xx.exe 33 PID 2088 wrote to memory of 2672 2088 Patch IDM 6.xx.exe 33 PID 2088 wrote to memory of 2672 2088 Patch IDM 6.xx.exe 33 PID 2088 wrote to memory of 2672 2088 Patch IDM 6.xx.exe 33 PID 2088 wrote to memory of 2672 2088 Patch IDM 6.xx.exe 33 PID 2088 wrote to memory of 2672 2088 Patch IDM 6.xx.exe 33 PID 2088 wrote to memory of 2672 2088 Patch IDM 6.xx.exe 33 PID 2088 wrote to memory of 2672 2088 Patch IDM 6.xx.exe 33 PID 2088 wrote to memory of 2672 2088 Patch IDM 6.xx.exe 33 PID 2088 wrote to memory of 2672 2088 Patch IDM 6.xx.exe 33 PID 2872 wrote to memory of 2712 2872 123456.exe 34 PID 2872 wrote to memory of 2712 2872 123456.exe 34 PID 2872 wrote to memory of 2712 2872 123456.exe 34 PID 2872 wrote to memory of 2712 2872 123456.exe 34 PID 2872 wrote to memory of 2712 2872 123456.exe 34 PID 2872 wrote to memory of 2712 2872 123456.exe 34 PID 2872 wrote to memory of 2712 2872 123456.exe 34 PID 2872 wrote to memory of 2712 2872 123456.exe 34 PID 2872 wrote to memory of 2712 2872 123456.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\8429d738392a7baf7d4fe289c560dfa3233169dd234d9885452c81691b39373cN.exe"C:\Users\Admin\AppData\Local\Temp\8429d738392a7baf7d4fe289c560dfa3233169dd234d9885452c81691b39373cN.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Users\Admin\AppData\Local\Temp\Patch IDM 6.xx.exe"C:\Users\Admin\AppData\Local\Temp\Patch IDM 6.xx.exe" 02⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Users\Admin\AppData\Local\Temp\Patch IDM 6.xx.exe"C:\Users\Admin\AppData\Local\Temp\Patch IDM 6.xx.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2672
-
-
-
C:\Users\Admin\AppData\Local\Temp\123456.exe"C:\Users\Admin\AppData\Local\Temp\123456.exe" 02⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Users\Admin\AppData\Local\Temp\123456.exeC:\Users\Admin\AppData\Local\Temp\123456.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Users\Admin\AppData\Local\Temp\123456.exe/scomma "C:\Users\Admin\AppData\Local\Temp\tmp.ini"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2712
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
299KB
MD58285e8a3752fe609776497efde3ddcd4
SHA149cf1f293cdf0271600176ce08931a022f42731d
SHA2563c59f214ae5d53379f36522e41b71f429de802aac74951e239d17f98bda340bd
SHA512a6bbf39a8380b076ff9f9d7c940d863d63662d6a06de53e90b857c4a15ab95ab3e65b8b5a17af25fc4da435df07ed59b562c691c38ba83e82df3dc70417b97a8
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-1163522206-1469769407-485553996-1000\88603cb2913a7df3fbd16b5f958e6447_9d81b961-0275-4281-8321-63119951606b
Filesize51B
MD55fc2ac2a310f49c14d195230b91a8885
SHA190855cc11136ba31758fe33b5cf9571f9a104879
SHA256374e0e2897a7a82e0e44794cad89df0f3cdd7703886239c1fe06d625efd48092
SHA512ab46554df9174b9fe9beba50a640f67534c3812f64d96a1fb8adfdc136dfe730ca2370825cd45b7f87a544d6a58dd868cb5a3a7f42e2789f6d679dbc0fdd52c3
-
Filesize
215KB
MD59fd4ec851eea8905f5cf0e5b18928a5d
SHA1580e42f43b3fcf72023f87a726f108f08b22d228
SHA256eadb6538f312408451f6033bad587b34f7f5b265c76a27de12fb5ec177eaec30
SHA51269e1ff1005afac8d050b3cf0ae9d7d2da69ca20a0b0bbee21be81bd54416dc59bd0e2d26b90e214a435bc66d35d3627798e25f1332059d3b4e164eb2f8367a35
-
Filesize
9KB
MD5780d14604d49e3c634200c523def8351
SHA1e208ef6f421d2260070a9222f1f918f1de0a8eeb
SHA256844eb66a10b848d3a71a8c63c35f0a01550a46d2ff8503e2ca8947978b03b4d2
SHA512a49c030f11da8f0cdc4205c86bec00653ec2f8899983cad9d7195fd23255439291aaec5a7e128e1a103efd93b8566e86f15af89eba4efebf9debce14a7a5564b