Analysis
-
max time kernel
150s -
max time network
28s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
31-03-2021 06:59
Static task
static1
Behavioral task
behavioral1
Sample
Ref150420190619A-B0270PEL. pdf.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
Ref150420190619A-B0270PEL. pdf.exe
Resource
win10v20201028
General
-
Target
Ref150420190619A-B0270PEL. pdf.exe
-
Size
1.0MB
-
MD5
5ed97211220671294ee925c64b1e3ebc
-
SHA1
22651d893883c0e0df19df33a31cb75ded09d102
-
SHA256
01bac3adf5b25f8dad0afe3fd753eefa5b31f2b3550e44069f594280e084f9b4
-
SHA512
73d7b53b0fe041d06f025842a57149e96aa9b6d52e2983c520ae52ea39c0bd617fd9341a32377bafe9e5d7da86807fbe062add794749f85e98f569dedb18c1a5
Malware Config
Signatures
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty Payload 1 IoCs
resource yara_rule behavioral1/memory/1900-29-0x0000000000850000-0x00000000008FC000-memory.dmp family_stormkitty -
Loads dropped DLL 1 IoCs
pid Process 1684 Ref150420190619A-B0270PEL. pdf.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 1684 set thread context of 1984 1684 Ref150420190619A-B0270PEL. pdf.exe 26 PID 1984 set thread context of 1932 1984 Ref150420190619A-B0270PEL. pdf.exe 27 PID 1984 set thread context of 1900 1984 Ref150420190619A-B0270PEL. pdf.exe 28 PID 1984 set thread context of 1732 1984 Ref150420190619A-B0270PEL. pdf.exe 29 PID 1984 set thread context of 1792 1984 Ref150420190619A-B0270PEL. pdf.exe 36 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 3 IoCs
pid pid_target Process procid_target 1268 1900 WerFault.exe 28 1356 1932 WerFault.exe 27 1568 1732 WerFault.exe 29 -
Suspicious behavior: EnumeratesProcesses 19 IoCs
pid Process 1684 Ref150420190619A-B0270PEL. pdf.exe 1684 Ref150420190619A-B0270PEL. pdf.exe 1684 Ref150420190619A-B0270PEL. pdf.exe 1684 Ref150420190619A-B0270PEL. pdf.exe 1268 WerFault.exe 1356 WerFault.exe 1268 WerFault.exe 1356 WerFault.exe 1268 WerFault.exe 1356 WerFault.exe 1268 WerFault.exe 1356 WerFault.exe 1268 WerFault.exe 1356 WerFault.exe 1568 WerFault.exe 1568 WerFault.exe 1568 WerFault.exe 1568 WerFault.exe 1568 WerFault.exe -
Suspicious behavior: GetForegroundWindowSpam 3 IoCs
pid Process 1984 Ref150420190619A-B0270PEL. pdf.exe 1268 WerFault.exe 1356 WerFault.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1684 Ref150420190619A-B0270PEL. pdf.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1732 InstallUtil.exe Token: SeDebugPrivilege 1268 WerFault.exe Token: SeDebugPrivilege 1356 WerFault.exe Token: SeDebugPrivilege 1568 WerFault.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1984 Ref150420190619A-B0270PEL. pdf.exe 1984 Ref150420190619A-B0270PEL. pdf.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1984 Ref150420190619A-B0270PEL. pdf.exe 1984 Ref150420190619A-B0270PEL. pdf.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1684 wrote to memory of 1984 1684 Ref150420190619A-B0270PEL. pdf.exe 26 PID 1684 wrote to memory of 1984 1684 Ref150420190619A-B0270PEL. pdf.exe 26 PID 1684 wrote to memory of 1984 1684 Ref150420190619A-B0270PEL. pdf.exe 26 PID 1684 wrote to memory of 1984 1684 Ref150420190619A-B0270PEL. pdf.exe 26 PID 1684 wrote to memory of 1984 1684 Ref150420190619A-B0270PEL. pdf.exe 26 PID 1984 wrote to memory of 1932 1984 Ref150420190619A-B0270PEL. pdf.exe 27 PID 1984 wrote to memory of 1932 1984 Ref150420190619A-B0270PEL. pdf.exe 27 PID 1984 wrote to memory of 1932 1984 Ref150420190619A-B0270PEL. pdf.exe 27 PID 1984 wrote to memory of 1932 1984 Ref150420190619A-B0270PEL. pdf.exe 27 PID 1984 wrote to memory of 1932 1984 Ref150420190619A-B0270PEL. pdf.exe 27 PID 1984 wrote to memory of 1932 1984 Ref150420190619A-B0270PEL. pdf.exe 27 PID 1984 wrote to memory of 1932 1984 Ref150420190619A-B0270PEL. pdf.exe 27 PID 1984 wrote to memory of 1932 1984 Ref150420190619A-B0270PEL. pdf.exe 27 PID 1984 wrote to memory of 1932 1984 Ref150420190619A-B0270PEL. pdf.exe 27 PID 1984 wrote to memory of 1932 1984 Ref150420190619A-B0270PEL. pdf.exe 27 PID 1984 wrote to memory of 1932 1984 Ref150420190619A-B0270PEL. pdf.exe 27 PID 1984 wrote to memory of 1932 1984 Ref150420190619A-B0270PEL. pdf.exe 27 PID 1984 wrote to memory of 1900 1984 Ref150420190619A-B0270PEL. pdf.exe 28 PID 1984 wrote to memory of 1900 1984 Ref150420190619A-B0270PEL. pdf.exe 28 PID 1984 wrote to memory of 1900 1984 Ref150420190619A-B0270PEL. pdf.exe 28 PID 1984 wrote to memory of 1900 1984 Ref150420190619A-B0270PEL. pdf.exe 28 PID 1984 wrote to memory of 1900 1984 Ref150420190619A-B0270PEL. pdf.exe 28 PID 1984 wrote to memory of 1900 1984 Ref150420190619A-B0270PEL. pdf.exe 28 PID 1984 wrote to memory of 1900 1984 Ref150420190619A-B0270PEL. pdf.exe 28 PID 1984 wrote to memory of 1900 1984 Ref150420190619A-B0270PEL. pdf.exe 28 PID 1984 wrote to memory of 1900 1984 Ref150420190619A-B0270PEL. pdf.exe 28 PID 1984 wrote to memory of 1900 1984 Ref150420190619A-B0270PEL. pdf.exe 28 PID 1984 wrote to memory of 1900 1984 Ref150420190619A-B0270PEL. pdf.exe 28 PID 1984 wrote to memory of 1900 1984 Ref150420190619A-B0270PEL. pdf.exe 28 PID 1984 wrote to memory of 1732 1984 Ref150420190619A-B0270PEL. pdf.exe 29 PID 1984 wrote to memory of 1732 1984 Ref150420190619A-B0270PEL. pdf.exe 29 PID 1984 wrote to memory of 1732 1984 Ref150420190619A-B0270PEL. pdf.exe 29 PID 1984 wrote to memory of 1732 1984 Ref150420190619A-B0270PEL. pdf.exe 29 PID 1984 wrote to memory of 1732 1984 Ref150420190619A-B0270PEL. pdf.exe 29 PID 1984 wrote to memory of 1732 1984 Ref150420190619A-B0270PEL. pdf.exe 29 PID 1984 wrote to memory of 1732 1984 Ref150420190619A-B0270PEL. pdf.exe 29 PID 1984 wrote to memory of 1732 1984 Ref150420190619A-B0270PEL. pdf.exe 29 PID 1984 wrote to memory of 1732 1984 Ref150420190619A-B0270PEL. pdf.exe 29 PID 1984 wrote to memory of 1732 1984 Ref150420190619A-B0270PEL. pdf.exe 29 PID 1984 wrote to memory of 1732 1984 Ref150420190619A-B0270PEL. pdf.exe 29 PID 1984 wrote to memory of 1732 1984 Ref150420190619A-B0270PEL. pdf.exe 29 PID 1932 wrote to memory of 1356 1932 AppLaunch.exe 31 PID 1932 wrote to memory of 1356 1932 AppLaunch.exe 31 PID 1932 wrote to memory of 1356 1932 AppLaunch.exe 31 PID 1932 wrote to memory of 1356 1932 AppLaunch.exe 31 PID 1932 wrote to memory of 1356 1932 AppLaunch.exe 31 PID 1932 wrote to memory of 1356 1932 AppLaunch.exe 31 PID 1932 wrote to memory of 1356 1932 AppLaunch.exe 31 PID 1900 wrote to memory of 1268 1900 AppLaunch.exe 30 PID 1900 wrote to memory of 1268 1900 AppLaunch.exe 30 PID 1900 wrote to memory of 1268 1900 AppLaunch.exe 30 PID 1900 wrote to memory of 1268 1900 AppLaunch.exe 30 PID 1900 wrote to memory of 1268 1900 AppLaunch.exe 30 PID 1900 wrote to memory of 1268 1900 AppLaunch.exe 30 PID 1900 wrote to memory of 1268 1900 AppLaunch.exe 30 PID 1732 wrote to memory of 1568 1732 InstallUtil.exe 35 PID 1732 wrote to memory of 1568 1732 InstallUtil.exe 35 PID 1732 wrote to memory of 1568 1732 InstallUtil.exe 35 PID 1732 wrote to memory of 1568 1732 InstallUtil.exe 35 PID 1984 wrote to memory of 1792 1984 Ref150420190619A-B0270PEL. pdf.exe 36 PID 1984 wrote to memory of 1792 1984 Ref150420190619A-B0270PEL. pdf.exe 36 PID 1984 wrote to memory of 1792 1984 Ref150420190619A-B0270PEL. pdf.exe 36 PID 1984 wrote to memory of 1792 1984 Ref150420190619A-B0270PEL. pdf.exe 36 PID 1984 wrote to memory of 1792 1984 Ref150420190619A-B0270PEL. pdf.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\Ref150420190619A-B0270PEL. pdf.exe"C:\Users\Admin\AppData\Local\Temp\Ref150420190619A-B0270PEL. pdf.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Users\Admin\AppData\Local\Temp\Ref150420190619A-B0270PEL. pdf.exe"C:\Users\Admin\AppData\Local\Temp\Ref150420190619A-B0270PEL. pdf.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1932 -s 6604⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:1356
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1900 -s 6644⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:1268
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1732 -s 10564⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1568
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"3⤵PID:1792
-
-