Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-02-2025 10:39
Static task
static1
Behavioral task
behavioral1
Sample
WowbeezFan 5.2.3.exe
Resource
win7-20240903-en
General
-
Target
WowbeezFan 5.2.3.exe
-
Size
707KB
-
MD5
be1f1639c3fc7332a7300920c0c26bd5
-
SHA1
39e46d7f8293b4f37624b24ff18eda4b04badede
-
SHA256
233592aca1140c5e5a405dcc63fd94ecc671ce418132ee971dc0153becc5a4bb
-
SHA512
4115a651908a6f8b8e482aade1eb2cf40288962316075ee8af6f50c0b14b6c604bdde9c11198213e02d6d368b0adf9d5a5999a4b7ee4ac459ce73e015657a89d
-
SSDEEP
12288:JuL6yZH3QqgvGmE9oExlzyceKLzpf4AGv+NmBfiITG9q:JuLrJRlfb7Aim
Malware Config
Signatures
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload 3 IoCs
resource yara_rule behavioral1/memory/2436-17-0x0000000000400000-0x0000000000435000-memory.dmp family_isrstealer behavioral1/memory/2436-13-0x0000000000400000-0x0000000000435000-memory.dmp family_isrstealer behavioral1/memory/2436-32-0x0000000000400000-0x0000000000435000-memory.dmp family_isrstealer -
Isrstealer family
-
Executes dropped EXE 2 IoCs
pid Process 2436 taskmgr.exe 2660 taskmgr.exe -
Loads dropped DLL 3 IoCs
pid Process 2468 WowbeezFan 5.2.3.exe 2468 WowbeezFan 5.2.3.exe 2436 taskmgr.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2468 set thread context of 2436 2468 WowbeezFan 5.2.3.exe 31 PID 2436 set thread context of 2660 2436 taskmgr.exe 32 -
resource yara_rule behavioral1/memory/2660-26-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/2660-29-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/2660-30-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/2660-31-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/2660-37-0x0000000000400000-0x0000000000453000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WowbeezFan 5.2.3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskmgr.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2436 taskmgr.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2468 wrote to memory of 2436 2468 WowbeezFan 5.2.3.exe 31 PID 2468 wrote to memory of 2436 2468 WowbeezFan 5.2.3.exe 31 PID 2468 wrote to memory of 2436 2468 WowbeezFan 5.2.3.exe 31 PID 2468 wrote to memory of 2436 2468 WowbeezFan 5.2.3.exe 31 PID 2468 wrote to memory of 2436 2468 WowbeezFan 5.2.3.exe 31 PID 2468 wrote to memory of 2436 2468 WowbeezFan 5.2.3.exe 31 PID 2468 wrote to memory of 2436 2468 WowbeezFan 5.2.3.exe 31 PID 2468 wrote to memory of 2436 2468 WowbeezFan 5.2.3.exe 31 PID 2436 wrote to memory of 2660 2436 taskmgr.exe 32 PID 2436 wrote to memory of 2660 2436 taskmgr.exe 32 PID 2436 wrote to memory of 2660 2436 taskmgr.exe 32 PID 2436 wrote to memory of 2660 2436 taskmgr.exe 32 PID 2436 wrote to memory of 2660 2436 taskmgr.exe 32 PID 2436 wrote to memory of 2660 2436 taskmgr.exe 32 PID 2436 wrote to memory of 2660 2436 taskmgr.exe 32 PID 2436 wrote to memory of 2660 2436 taskmgr.exe 32 PID 2436 wrote to memory of 2660 2436 taskmgr.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\WowbeezFan 5.2.3.exe"C:\Users\Admin\AppData\Local\Temp\WowbeezFan 5.2.3.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Users\Admin\AppData\Roaming\taskmgr.exeC:\Users\Admin\AppData\Roaming\taskmgr.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Users\Admin\AppData\Roaming\taskmgr.exe/scomma "C:\Users\Admin\AppData\Local\Temp\a30ZJf3vv2.ini"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2660
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD586b6f78ab4571ae949f8a0d9757eadfe
SHA1fee56dc91bb2f495b1d1a3e89d5b2b21eb5194f7
SHA2564b8f2769a6847b7a09952010e03161be2033f699dfa26e41324a6ba7c936ca69
SHA5123c11270e4507cd4ef274d837c02b66370c37af82a3afbf28d1bedf040c87c70972a981edf15ae8312c3d237234a8018c3c4ffd68ff4c852bdd484b5ea4297869