Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
31-03-2021 06:59
Static task
static1
Behavioral task
behavioral1
Sample
Ref150420190619A-B0270PEL. pdf.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
Ref150420190619A-B0270PEL. pdf.exe
Resource
win10v20201028
General
-
Target
Ref150420190619A-B0270PEL. pdf.exe
-
Size
1.0MB
-
MD5
5ed97211220671294ee925c64b1e3ebc
-
SHA1
22651d893883c0e0df19df33a31cb75ded09d102
-
SHA256
01bac3adf5b25f8dad0afe3fd753eefa5b31f2b3550e44069f594280e084f9b4
-
SHA512
73d7b53b0fe041d06f025842a57149e96aa9b6d52e2983c520ae52ea39c0bd617fd9341a32377bafe9e5d7da86807fbe062add794749f85e98f569dedb18c1a5
Malware Config
Signatures
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty Payload 1 IoCs
resource yara_rule behavioral2/memory/444-23-0x0000000009260000-0x000000000930C000-memory.dmp family_stormkitty -
Loads dropped DLL 1 IoCs
pid Process 4688 Ref150420190619A-B0270PEL. pdf.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 4688 set thread context of 3524 4688 Ref150420190619A-B0270PEL. pdf.exe 75 PID 3524 set thread context of 444 3524 Ref150420190619A-B0270PEL. pdf.exe 76 PID 3524 set thread context of 748 3524 Ref150420190619A-B0270PEL. pdf.exe 77 PID 3524 set thread context of 4176 3524 Ref150420190619A-B0270PEL. pdf.exe 78 PID 3524 set thread context of 1216 3524 Ref150420190619A-B0270PEL. pdf.exe 85 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 3 IoCs
pid pid_target Process procid_target 4076 444 WerFault.exe 76 4044 748 WerFault.exe 77 1280 1216 WerFault.exe 85 -
Suspicious behavior: EnumeratesProcesses 38 IoCs
pid Process 4688 Ref150420190619A-B0270PEL. pdf.exe 4688 Ref150420190619A-B0270PEL. pdf.exe 4688 Ref150420190619A-B0270PEL. pdf.exe 4688 Ref150420190619A-B0270PEL. pdf.exe 4688 Ref150420190619A-B0270PEL. pdf.exe 4688 Ref150420190619A-B0270PEL. pdf.exe 4688 Ref150420190619A-B0270PEL. pdf.exe 4688 Ref150420190619A-B0270PEL. pdf.exe 4076 WerFault.exe 4076 WerFault.exe 4076 WerFault.exe 4076 WerFault.exe 4076 WerFault.exe 4076 WerFault.exe 4076 WerFault.exe 4076 WerFault.exe 4076 WerFault.exe 4076 WerFault.exe 4076 WerFault.exe 4076 WerFault.exe 4076 WerFault.exe 4076 WerFault.exe 4076 WerFault.exe 4044 WerFault.exe 4044 WerFault.exe 4044 WerFault.exe 4044 WerFault.exe 4044 WerFault.exe 4044 WerFault.exe 4044 WerFault.exe 4044 WerFault.exe 4044 WerFault.exe 4044 WerFault.exe 4044 WerFault.exe 4044 WerFault.exe 4044 WerFault.exe 4044 WerFault.exe 4044 WerFault.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3524 Ref150420190619A-B0270PEL. pdf.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4688 Ref150420190619A-B0270PEL. pdf.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 4176 InstallUtil.exe Token: SeRestorePrivilege 4076 WerFault.exe Token: SeBackupPrivilege 4076 WerFault.exe Token: SeRestorePrivilege 4044 WerFault.exe Token: SeBackupPrivilege 4044 WerFault.exe Token: SeDebugPrivilege 4076 WerFault.exe Token: SeDebugPrivilege 4044 WerFault.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3524 Ref150420190619A-B0270PEL. pdf.exe 3524 Ref150420190619A-B0270PEL. pdf.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3524 Ref150420190619A-B0270PEL. pdf.exe 3524 Ref150420190619A-B0270PEL. pdf.exe 4176 InstallUtil.exe 4176 InstallUtil.exe -
Suspicious use of WriteProcessMemory 37 IoCs
description pid Process procid_target PID 4688 wrote to memory of 3524 4688 Ref150420190619A-B0270PEL. pdf.exe 75 PID 4688 wrote to memory of 3524 4688 Ref150420190619A-B0270PEL. pdf.exe 75 PID 4688 wrote to memory of 3524 4688 Ref150420190619A-B0270PEL. pdf.exe 75 PID 4688 wrote to memory of 3524 4688 Ref150420190619A-B0270PEL. pdf.exe 75 PID 3524 wrote to memory of 444 3524 Ref150420190619A-B0270PEL. pdf.exe 76 PID 3524 wrote to memory of 444 3524 Ref150420190619A-B0270PEL. pdf.exe 76 PID 3524 wrote to memory of 444 3524 Ref150420190619A-B0270PEL. pdf.exe 76 PID 3524 wrote to memory of 444 3524 Ref150420190619A-B0270PEL. pdf.exe 76 PID 3524 wrote to memory of 444 3524 Ref150420190619A-B0270PEL. pdf.exe 76 PID 3524 wrote to memory of 444 3524 Ref150420190619A-B0270PEL. pdf.exe 76 PID 3524 wrote to memory of 444 3524 Ref150420190619A-B0270PEL. pdf.exe 76 PID 3524 wrote to memory of 444 3524 Ref150420190619A-B0270PEL. pdf.exe 76 PID 3524 wrote to memory of 748 3524 Ref150420190619A-B0270PEL. pdf.exe 77 PID 3524 wrote to memory of 748 3524 Ref150420190619A-B0270PEL. pdf.exe 77 PID 3524 wrote to memory of 748 3524 Ref150420190619A-B0270PEL. pdf.exe 77 PID 3524 wrote to memory of 748 3524 Ref150420190619A-B0270PEL. pdf.exe 77 PID 3524 wrote to memory of 748 3524 Ref150420190619A-B0270PEL. pdf.exe 77 PID 3524 wrote to memory of 748 3524 Ref150420190619A-B0270PEL. pdf.exe 77 PID 3524 wrote to memory of 748 3524 Ref150420190619A-B0270PEL. pdf.exe 77 PID 3524 wrote to memory of 748 3524 Ref150420190619A-B0270PEL. pdf.exe 77 PID 3524 wrote to memory of 4176 3524 Ref150420190619A-B0270PEL. pdf.exe 78 PID 3524 wrote to memory of 4176 3524 Ref150420190619A-B0270PEL. pdf.exe 78 PID 3524 wrote to memory of 4176 3524 Ref150420190619A-B0270PEL. pdf.exe 78 PID 3524 wrote to memory of 4176 3524 Ref150420190619A-B0270PEL. pdf.exe 78 PID 3524 wrote to memory of 4176 3524 Ref150420190619A-B0270PEL. pdf.exe 78 PID 3524 wrote to memory of 4176 3524 Ref150420190619A-B0270PEL. pdf.exe 78 PID 3524 wrote to memory of 4176 3524 Ref150420190619A-B0270PEL. pdf.exe 78 PID 3524 wrote to memory of 4176 3524 Ref150420190619A-B0270PEL. pdf.exe 78 PID 3524 wrote to memory of 1216 3524 Ref150420190619A-B0270PEL. pdf.exe 85 PID 3524 wrote to memory of 1216 3524 Ref150420190619A-B0270PEL. pdf.exe 85 PID 3524 wrote to memory of 1216 3524 Ref150420190619A-B0270PEL. pdf.exe 85 PID 3524 wrote to memory of 1216 3524 Ref150420190619A-B0270PEL. pdf.exe 85 PID 3524 wrote to memory of 1896 3524 Ref150420190619A-B0270PEL. pdf.exe 87 PID 3524 wrote to memory of 1896 3524 Ref150420190619A-B0270PEL. pdf.exe 87 PID 3524 wrote to memory of 1896 3524 Ref150420190619A-B0270PEL. pdf.exe 87 PID 1896 wrote to memory of 1868 1896 WinMail.exe 88 PID 1896 wrote to memory of 1868 1896 WinMail.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\Ref150420190619A-B0270PEL. pdf.exe"C:\Users\Admin\AppData\Local\Temp\Ref150420190619A-B0270PEL. pdf.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4688 -
C:\Users\Admin\AppData\Local\Temp\Ref150420190619A-B0270PEL. pdf.exe"C:\Users\Admin\AppData\Local\Temp\Ref150420190619A-B0270PEL. pdf.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3524 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵PID:444
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 444 -s 9844⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4076
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵PID:748
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 748 -s 9844⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4044
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4176
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"3⤵PID:1216
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1216 -s 884⤵
- Program crash
PID:1280
-
-
-
C:\Program Files (x86)\Windows Mail\WinMail.exe"C:\Program Files (x86)\Windows Mail\WinMail" OCInstallUserConfigOE3⤵
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Program Files\Windows Mail\WinMail.exe"C:\Program Files\Windows Mail\WinMail" OCInstallUserConfigOE4⤵PID:1868
-
-
-