Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20250207-en -
resource tags
arch:x64arch:x86image:win10v2004-20250207-enlocale:en-usos:windows10-2004-x64system -
submitted
12-02-2025 10:39
Static task
static1
Behavioral task
behavioral1
Sample
WowbeezFan 5.2.3.exe
Resource
win7-20240903-en
General
-
Target
WowbeezFan 5.2.3.exe
-
Size
707KB
-
MD5
be1f1639c3fc7332a7300920c0c26bd5
-
SHA1
39e46d7f8293b4f37624b24ff18eda4b04badede
-
SHA256
233592aca1140c5e5a405dcc63fd94ecc671ce418132ee971dc0153becc5a4bb
-
SHA512
4115a651908a6f8b8e482aade1eb2cf40288962316075ee8af6f50c0b14b6c604bdde9c11198213e02d6d368b0adf9d5a5999a4b7ee4ac459ce73e015657a89d
-
SSDEEP
12288:JuL6yZH3QqgvGmE9oExlzyceKLzpf4AGv+NmBfiITG9q:JuLrJRlfb7Aim
Malware Config
Signatures
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload 3 IoCs
resource yara_rule behavioral2/memory/4452-10-0x0000000000400000-0x0000000000435000-memory.dmp family_isrstealer behavioral2/memory/4452-6-0x0000000000400000-0x0000000000435000-memory.dmp family_isrstealer behavioral2/memory/4452-25-0x0000000000400000-0x0000000000435000-memory.dmp family_isrstealer -
Isrstealer family
-
Downloads MZ/PE file 1 IoCs
flow pid Process 39 2416 Process not Found -
Executes dropped EXE 2 IoCs
pid Process 4452 taskmgr.exe 1424 taskmgr.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4264 set thread context of 4452 4264 WowbeezFan 5.2.3.exe 89 PID 4452 set thread context of 1424 4452 taskmgr.exe 90 -
resource yara_rule behavioral2/memory/1424-19-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral2/memory/1424-22-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral2/memory/1424-18-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral2/memory/1424-14-0x0000000000400000-0x0000000000453000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WowbeezFan 5.2.3.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4900 MicrosoftEdgeUpdate.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4452 taskmgr.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 4264 wrote to memory of 4452 4264 WowbeezFan 5.2.3.exe 89 PID 4264 wrote to memory of 4452 4264 WowbeezFan 5.2.3.exe 89 PID 4264 wrote to memory of 4452 4264 WowbeezFan 5.2.3.exe 89 PID 4264 wrote to memory of 4452 4264 WowbeezFan 5.2.3.exe 89 PID 4264 wrote to memory of 4452 4264 WowbeezFan 5.2.3.exe 89 PID 4264 wrote to memory of 4452 4264 WowbeezFan 5.2.3.exe 89 PID 4264 wrote to memory of 4452 4264 WowbeezFan 5.2.3.exe 89 PID 4264 wrote to memory of 4452 4264 WowbeezFan 5.2.3.exe 89 PID 4452 wrote to memory of 1424 4452 taskmgr.exe 90 PID 4452 wrote to memory of 1424 4452 taskmgr.exe 90 PID 4452 wrote to memory of 1424 4452 taskmgr.exe 90 PID 4452 wrote to memory of 1424 4452 taskmgr.exe 90 PID 4452 wrote to memory of 1424 4452 taskmgr.exe 90 PID 4452 wrote to memory of 1424 4452 taskmgr.exe 90 PID 4452 wrote to memory of 1424 4452 taskmgr.exe 90 PID 4452 wrote to memory of 1424 4452 taskmgr.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\WowbeezFan 5.2.3.exe"C:\Users\Admin\AppData\Local\Temp\WowbeezFan 5.2.3.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4264 -
C:\Users\Admin\AppData\Roaming\taskmgr.exeC:\Users\Admin\AppData\Roaming\taskmgr.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4452 -
C:\Users\Admin\AppData\Roaming\taskmgr.exe/scomma "C:\Users\Admin\AppData\Local\Temp\p9EMcqKoAg.ini"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1424
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSI0IiBpbnN0YWxsZGF0ZXRpbWU9IjE3Mzg5NDY4ODkiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4MzQxOTM2NTgwOTAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1MDI0MDA4NjM2Ii8-PC9hcHA-PC9yZXF1ZXN0Pg1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:4900
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5B
MD5d1ea279fb5559c020a1b4137dc4de237
SHA1db6f8988af46b56216a6f0daf95ab8c9bdb57400
SHA256fcdcc2c46896915a1c695d6231f0fee336a668531b7a3da46178c80362546dba
SHA512720e9c284f0559015312df7fe977563e5e16f48d3506e51eb4016adf7971924d352f740b030aa3adc81b6f65fd1dba12df06d10fa6c115074e5097e7ee0f08b3
-
Filesize
2KB
MD586b6f78ab4571ae949f8a0d9757eadfe
SHA1fee56dc91bb2f495b1d1a3e89d5b2b21eb5194f7
SHA2564b8f2769a6847b7a09952010e03161be2033f699dfa26e41324a6ba7c936ca69
SHA5123c11270e4507cd4ef274d837c02b66370c37af82a3afbf28d1bedf040c87c70972a981edf15ae8312c3d237234a8018c3c4ffd68ff4c852bdd484b5ea4297869