Analysis
-
max time kernel
151s -
max time network
110s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
14-04-2021 06:42
Static task
static1
Behavioral task
behavioral1
Sample
00909000870.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
00909000870.exe
Resource
win10v20210408
General
-
Target
00909000870.exe
-
Size
1.1MB
-
MD5
b6d292139cbd769bfa7c005cbc3a8202
-
SHA1
f12d48f3aa3a1910795a12fbc57b32d24145af73
-
SHA256
6e3816fe96ae72f3c7695e1a64225ed36ff8a7e61f0fb192447cb14d5736dcea
-
SHA512
3cde67951d45796bf76c7724db52cc2bf64d40cf55e5bb751c98a0028ea309549f0344f1c0e1adf32c384441a02507cbfbaf0476761bebc37f5816079472dc6a
Malware Config
Signatures
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty Payload 2 IoCs
resource yara_rule behavioral2/memory/3164-120-0x0000000000400000-0x00000000004B2000-memory.dmp family_stormkitty behavioral2/memory/3164-121-0x00000000004A734E-mapping.dmp family_stormkitty -
Loads dropped DLL 1 IoCs
pid Process 568 00909000870.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 568 set thread context of 3208 568 00909000870.exe 75 PID 3208 set thread context of 3164 3208 00909000870.exe 76 PID 3208 set thread context of 2956 3208 00909000870.exe 77 PID 3208 set thread context of 3032 3208 00909000870.exe 83 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 3968 3164 WerFault.exe 76 -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 3968 WerFault.exe 3968 WerFault.exe 3968 WerFault.exe 3968 WerFault.exe 3968 WerFault.exe 3968 WerFault.exe 3968 WerFault.exe 3968 WerFault.exe 3968 WerFault.exe 3968 WerFault.exe 3968 WerFault.exe 3968 WerFault.exe 3968 WerFault.exe 3968 WerFault.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3208 00909000870.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 568 00909000870.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeRestorePrivilege 3968 WerFault.exe Token: SeBackupPrivilege 3968 WerFault.exe Token: SeDebugPrivilege 3968 WerFault.exe Token: SeDebugPrivilege 3032 InstallUtil.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3208 00909000870.exe 3208 00909000870.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3208 00909000870.exe 3208 00909000870.exe 3032 InstallUtil.exe 3032 InstallUtil.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 568 wrote to memory of 3208 568 00909000870.exe 75 PID 568 wrote to memory of 3208 568 00909000870.exe 75 PID 568 wrote to memory of 3208 568 00909000870.exe 75 PID 568 wrote to memory of 3208 568 00909000870.exe 75 PID 3208 wrote to memory of 3164 3208 00909000870.exe 76 PID 3208 wrote to memory of 3164 3208 00909000870.exe 76 PID 3208 wrote to memory of 3164 3208 00909000870.exe 76 PID 3208 wrote to memory of 3164 3208 00909000870.exe 76 PID 3208 wrote to memory of 3164 3208 00909000870.exe 76 PID 3208 wrote to memory of 3164 3208 00909000870.exe 76 PID 3208 wrote to memory of 3164 3208 00909000870.exe 76 PID 3208 wrote to memory of 3164 3208 00909000870.exe 76 PID 3208 wrote to memory of 2956 3208 00909000870.exe 77 PID 3208 wrote to memory of 2956 3208 00909000870.exe 77 PID 3208 wrote to memory of 2956 3208 00909000870.exe 77 PID 3208 wrote to memory of 2956 3208 00909000870.exe 77 PID 3208 wrote to memory of 2956 3208 00909000870.exe 77 PID 3208 wrote to memory of 2956 3208 00909000870.exe 77 PID 3208 wrote to memory of 2956 3208 00909000870.exe 77 PID 3208 wrote to memory of 2956 3208 00909000870.exe 77 PID 3208 wrote to memory of 3032 3208 00909000870.exe 83 PID 3208 wrote to memory of 3032 3208 00909000870.exe 83 PID 3208 wrote to memory of 3032 3208 00909000870.exe 83 PID 3208 wrote to memory of 3032 3208 00909000870.exe 83 PID 3208 wrote to memory of 3032 3208 00909000870.exe 83 PID 3208 wrote to memory of 3032 3208 00909000870.exe 83 PID 3208 wrote to memory of 3032 3208 00909000870.exe 83 PID 3208 wrote to memory of 3032 3208 00909000870.exe 83 PID 3208 wrote to memory of 4000 3208 00909000870.exe 84 PID 3208 wrote to memory of 4000 3208 00909000870.exe 84 PID 3208 wrote to memory of 4000 3208 00909000870.exe 84 PID 4000 wrote to memory of 3856 4000 WinMail.exe 85 PID 4000 wrote to memory of 3856 4000 WinMail.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\00909000870.exe"C:\Users\Admin\AppData\Local\Temp\00909000870.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:568 -
C:\Users\Admin\AppData\Local\Temp\00909000870.exe"C:\Users\Admin\AppData\Local\Temp\00909000870.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3208 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵PID:3164
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3164 -s 9324⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3968
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"3⤵PID:2956
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3032
-
-
C:\Program Files (x86)\Windows Mail\WinMail.exe"C:\Program Files (x86)\Windows Mail\WinMail" OCInstallUserConfigOE3⤵
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Program Files\Windows Mail\WinMail.exe"C:\Program Files\Windows Mail\WinMail" OCInstallUserConfigOE4⤵PID:3856
-
-
-