Analysis

  • max time kernel
    151s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    12-04-2021 06:13

General

  • Target

    00000998880.exe

  • Size

    1.1MB

  • MD5

    b75196ccea3a4ed66a87e7a98595b27f

  • SHA1

    db65efb2c2f426165479a6b9f70700d61f56b6e2

  • SHA256

    7a15a21c229fd3f9a2a18f2bb13bf2845a76a3822914c751174b1aa98303b8e8

  • SHA512

    2b23d1b83ecf18cc7ca5cb581691e17704f48320d43e849a527ce5079082c048a35eabb00cc40bf9fd1f207ea1f870de560b283742e8d47228666ed2aa4d49a1

Malware Config

Signatures

  • StormKitty

    StormKitty is an open source info stealer written in C#.

  • StormKitty Payload 3 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 52 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\00000998880.exe
    "C:\Users\Admin\AppData\Local\Temp\00000998880.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:1908
    • C:\Users\Admin\AppData\Local\Temp\00000998880.exe
      "C:\Users\Admin\AppData\Local\Temp\00000998880.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1504
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1432
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1432 -s 636
          4⤵
          • Program crash
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of AdjustPrivilegeToken
          PID:1748
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
        3⤵
          PID:1960
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:328
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 328 -s 1060
            4⤵
            • Program crash
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1612

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/328-88-0x0000000000660000-0x0000000000661000-memory.dmp

      Filesize

      4KB

    • memory/1432-79-0x0000000000A00000-0x0000000000A01000-memory.dmp

      Filesize

      4KB

    • memory/1432-66-0x0000000000400000-0x00000000004B2000-memory.dmp

      Filesize

      712KB

    • memory/1432-71-0x0000000000400000-0x00000000004B2000-memory.dmp

      Filesize

      712KB

    • memory/1504-63-0x0000000000400000-0x00000000004CF000-memory.dmp

      Filesize

      828KB

    • memory/1504-81-0x0000000000770000-0x0000000000771000-memory.dmp

      Filesize

      4KB

    • memory/1612-90-0x0000000000200000-0x0000000000201000-memory.dmp

      Filesize

      4KB

    • memory/1748-80-0x0000000000320000-0x0000000000338000-memory.dmp

      Filesize

      96KB

    • memory/1908-59-0x0000000075781000-0x0000000075783000-memory.dmp

      Filesize

      8KB

    • memory/1960-72-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/1960-69-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB