Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-01-2025 13:25
Static task
static1
Behavioral task
behavioral1
Sample
Battlefield 3 Aimbot/FaceBotFixed.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Battlefield 3 Aimbot/FaceBotFixed.dll
Resource
win10v2004-20250129-en
Behavioral task
behavioral3
Sample
Battlefield 3 Aimbot/WinJect.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Battlefield 3 Aimbot/WinJect.exe
Resource
win10v2004-20250129-en
General
-
Target
Battlefield 3 Aimbot/WinJect.exe
-
Size
540KB
-
MD5
6abce2783394bf829a97599d04a8def3
-
SHA1
2a7864232650cf6528c903ec505e4fc1cc59517c
-
SHA256
29ab5fe35a0f48c4683adf37e978abbfff23c0b2f8b416d58b18690ebf41a66a
-
SHA512
8c07c4b105296747f6224f161b00250e5fa54c4f7b2ad33313b91f4116917064f4acc315f664688346d0272bc77953c338fe40d4ed6e0fd5e5ad507f12cdf7b4
-
SSDEEP
6144:dHEUWvcNBG1R741QrIJvnjqHByUkz/urMkHug25ijoBFQi7f0u1WeJiXpH4raGpt:pFG1d4gIJLqcU9OgiioSOLKR4rFMgn
Malware Config
Signatures
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload 3 IoCs
resource yara_rule behavioral3/memory/2644-66-0x0000000000400000-0x0000000000414000-memory.dmp family_isrstealer behavioral3/memory/2644-63-0x0000000000400000-0x0000000000414000-memory.dmp family_isrstealer behavioral3/memory/2644-74-0x0000000000400000-0x0000000000414000-memory.dmp family_isrstealer -
Isrstealer family
-
Executes dropped EXE 4 IoCs
pid Process 2948 Winject.exe 2328 0718i2vupW.exe 2772 0718i2vupW.exe 2644 0718i2vupW.exe -
Loads dropped DLL 6 IoCs
pid Process 332 WinJect.exe 332 WinJect.exe 332 WinJect.exe 332 WinJect.exe 2328 0718i2vupW.exe 2772 0718i2vupW.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 WinJect.exe File opened for modification \??\PhysicalDrive0 0718i2vupW.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2096 set thread context of 332 2096 WinJect.exe 31 PID 2328 set thread context of 2772 2328 0718i2vupW.exe 34 PID 2772 set thread context of 2644 2772 0718i2vupW.exe 35 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0718i2vupW.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0718i2vupW.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WinJect.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WinJect.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Winject.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0718i2vupW.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2644 0718i2vupW.exe 2644 0718i2vupW.exe 2644 0718i2vupW.exe 2644 0718i2vupW.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2948 Winject.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2096 WinJect.exe 332 WinJect.exe 2328 0718i2vupW.exe 2772 0718i2vupW.exe 2644 0718i2vupW.exe -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 2096 wrote to memory of 332 2096 WinJect.exe 31 PID 2096 wrote to memory of 332 2096 WinJect.exe 31 PID 2096 wrote to memory of 332 2096 WinJect.exe 31 PID 2096 wrote to memory of 332 2096 WinJect.exe 31 PID 2096 wrote to memory of 332 2096 WinJect.exe 31 PID 2096 wrote to memory of 332 2096 WinJect.exe 31 PID 2096 wrote to memory of 332 2096 WinJect.exe 31 PID 2096 wrote to memory of 332 2096 WinJect.exe 31 PID 2096 wrote to memory of 332 2096 WinJect.exe 31 PID 332 wrote to memory of 2948 332 WinJect.exe 32 PID 332 wrote to memory of 2948 332 WinJect.exe 32 PID 332 wrote to memory of 2948 332 WinJect.exe 32 PID 332 wrote to memory of 2948 332 WinJect.exe 32 PID 332 wrote to memory of 2328 332 WinJect.exe 33 PID 332 wrote to memory of 2328 332 WinJect.exe 33 PID 332 wrote to memory of 2328 332 WinJect.exe 33 PID 332 wrote to memory of 2328 332 WinJect.exe 33 PID 2328 wrote to memory of 2772 2328 0718i2vupW.exe 34 PID 2328 wrote to memory of 2772 2328 0718i2vupW.exe 34 PID 2328 wrote to memory of 2772 2328 0718i2vupW.exe 34 PID 2328 wrote to memory of 2772 2328 0718i2vupW.exe 34 PID 2328 wrote to memory of 2772 2328 0718i2vupW.exe 34 PID 2328 wrote to memory of 2772 2328 0718i2vupW.exe 34 PID 2328 wrote to memory of 2772 2328 0718i2vupW.exe 34 PID 2328 wrote to memory of 2772 2328 0718i2vupW.exe 34 PID 2328 wrote to memory of 2772 2328 0718i2vupW.exe 34 PID 2772 wrote to memory of 2644 2772 0718i2vupW.exe 35 PID 2772 wrote to memory of 2644 2772 0718i2vupW.exe 35 PID 2772 wrote to memory of 2644 2772 0718i2vupW.exe 35 PID 2772 wrote to memory of 2644 2772 0718i2vupW.exe 35 PID 2772 wrote to memory of 2644 2772 0718i2vupW.exe 35 PID 2772 wrote to memory of 2644 2772 0718i2vupW.exe 35 PID 2772 wrote to memory of 2644 2772 0718i2vupW.exe 35 PID 2772 wrote to memory of 2644 2772 0718i2vupW.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\Battlefield 3 Aimbot\WinJect.exe"C:\Users\Admin\AppData\Local\Temp\Battlefield 3 Aimbot\WinJect.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Users\Admin\AppData\Local\Temp\Battlefield 3 Aimbot\WinJect.exe"C:\Users\Admin\AppData\Local\Temp\Battlefield 3 Aimbot\WinJect.exe"2⤵
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:332 -
C:\Users\Admin\AppData\Local\Temp\Winject.exe"C:\Users\Admin\AppData\Local\Temp\Winject.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:2948
-
-
C:\Users\Admin\AppData\Local\Temp\0718i2vupW.exe"C:\Users\Admin\AppData\Local\Temp\0718i2vupW.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Users\Admin\AppData\Local\Temp\0718i2vupW.exe"C:\Users\Admin\AppData\Local\Temp\0718i2vupW.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Users\Admin\AppData\Local\Temp\0718i2vupW.exe"C:\Users\Admin\AppData\Local\Temp\0718i2vupW.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2644
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
228KB
MD54bde2fa501b271311668b79e08c3977e
SHA160517822d48cf2b560c2d4681c4e5685e29f9632
SHA25673903815bf438131d3dee70fb8f7f757f1ae57deb7fddd802685fd14d95c33dd
SHA5124a39144ed55e44228882b1d30e1d4b6ddc76cbc8037089fdd0e058ad79364a66d13d311827bf181907d3e29b84b6443349624e2d505d1c4d64cea2e48cd684c3
-
Filesize
156KB
MD55c71bf80b291452cff22524688d38297
SHA1a10e2ee7d94b41c54149d3561166c37c1465e079
SHA2569aa9e7fbf8b8d286c5c6f0571e08da319b5418b6a4f5565bb3aa7b879b26368b
SHA512e12b07e9d08946222950e32acad1a81ec410132ed3baf9eecd2e940a0dc63acaa65a83875208eda0318b50a535b4579ae0650ea17ec05d11444460ac2d67b007