General

  • Target

    SPS8623121050508150.docx

  • Size

    10KB

  • Sample

    210525-kq5xyxkmxx

  • MD5

    a9afdac1e8cbe1f1c65bc0794b38b4a1

  • SHA1

    7fc460104106e798537c2b8ddfbf1c21192eca78

  • SHA256

    82a250d066480fbade78fb2498bfd6cd26a5487705e82a2cc16c6b34627cdfb4

  • SHA512

    fd5247de795705aae434a20d9f63a746e6d62a4b92a39ce4cc74936587704bbace17d51ddd15663f880186f9e76981f9150b577a5f2b8a3d29b34e3f40975393

Malware Config

Extracted

Rule
Microsoft Office WebSettings Relationship
C2

https://stepup.pt/sugar6/ww/se.dot

Targets

    • Target

      SPS8623121050508150.docx

    • Size

      10KB

    • MD5

      a9afdac1e8cbe1f1c65bc0794b38b4a1

    • SHA1

      7fc460104106e798537c2b8ddfbf1c21192eca78

    • SHA256

      82a250d066480fbade78fb2498bfd6cd26a5487705e82a2cc16c6b34627cdfb4

    • SHA512

      fd5247de795705aae434a20d9f63a746e6d62a4b92a39ce4cc74936587704bbace17d51ddd15663f880186f9e76981f9150b577a5f2b8a3d29b34e3f40975393

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty Payload

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Abuses OpenXML format to download file from external location

    • Loads dropped DLL

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Uses the VBS compiler for execution

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Exploitation for Client Execution

1
T1203

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Credential Access

Credentials in Files

3
T1081

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Collection

Data from Local System

3
T1005

Tasks