Analysis
-
max time kernel
153s -
max time network
156s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
09-07-2021 15:55
Static task
static1
Behavioral task
behavioral1
Sample
7db01b21b6b4c6e977c8f96e204495b11d566c780c51198198195ec7045c7dce.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
7db01b21b6b4c6e977c8f96e204495b11d566c780c51198198195ec7045c7dce.exe
Resource
win10v20210408
General
-
Target
7db01b21b6b4c6e977c8f96e204495b11d566c780c51198198195ec7045c7dce.exe
-
Size
868KB
-
MD5
1c995e8f4af85982a6bd26019369ef62
-
SHA1
9cd0055ad7599440f852329e4ba3f2e6d7b76565
-
SHA256
7db01b21b6b4c6e977c8f96e204495b11d566c780c51198198195ec7045c7dce
-
SHA512
73a454656de2dbe2c402b750b9961f43184fa5c9670eba561bbf3d3126917fa3ee3f74e20c0f676d4536613ee3840fa63bda9f8ba12af2d1f1293938342aaf31
Malware Config
Signatures
-
A310logger
A310 Logger is a .NET stealer/logger targeting passwords from browsers and email clients.
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty Payload 2 IoCs
resource yara_rule behavioral1/memory/1928-71-0x0000000000400000-0x0000000000418000-memory.dmp family_stormkitty behavioral1/memory/1928-72-0x0000000000412452-mapping.dmp family_stormkitty -
A310logger Executable 5 IoCs
resource yara_rule behavioral1/memory/1928-71-0x0000000000400000-0x0000000000418000-memory.dmp a310logger behavioral1/memory/1928-72-0x0000000000412452-mapping.dmp a310logger behavioral1/files/0x000400000001312f-76.dat a310logger behavioral1/files/0x000400000001312f-78.dat a310logger behavioral1/files/0x000400000001312f-79.dat a310logger -
CustAttr .NET packer 1 IoCs
Detects CustAttr .NET packer in memory.
resource yara_rule behavioral1/memory/1656-62-0x0000000000300000-0x0000000000305000-memory.dmp CustAttr -
Executes dropped EXE 1 IoCs
pid Process 1568 MZ.exe -
Loads dropped DLL 1 IoCs
pid Process 1928 InstallUtil.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 6 icanhazip.com -
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1656 set thread context of 668 1656 7db01b21b6b4c6e977c8f96e204495b11d566c780c51198198195ec7045c7dce.exe 29 PID 668 set thread context of 1928 668 7db01b21b6b4c6e977c8f96e204495b11d566c780c51198198195ec7045c7dce.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 InstallUtil.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier InstallUtil.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1568 MZ.exe 1568 MZ.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 668 7db01b21b6b4c6e977c8f96e204495b11d566c780c51198198195ec7045c7dce.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1568 MZ.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 668 7db01b21b6b4c6e977c8f96e204495b11d566c780c51198198195ec7045c7dce.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 668 7db01b21b6b4c6e977c8f96e204495b11d566c780c51198198195ec7045c7dce.exe 668 7db01b21b6b4c6e977c8f96e204495b11d566c780c51198198195ec7045c7dce.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 1656 wrote to memory of 668 1656 7db01b21b6b4c6e977c8f96e204495b11d566c780c51198198195ec7045c7dce.exe 29 PID 1656 wrote to memory of 668 1656 7db01b21b6b4c6e977c8f96e204495b11d566c780c51198198195ec7045c7dce.exe 29 PID 1656 wrote to memory of 668 1656 7db01b21b6b4c6e977c8f96e204495b11d566c780c51198198195ec7045c7dce.exe 29 PID 1656 wrote to memory of 668 1656 7db01b21b6b4c6e977c8f96e204495b11d566c780c51198198195ec7045c7dce.exe 29 PID 1656 wrote to memory of 668 1656 7db01b21b6b4c6e977c8f96e204495b11d566c780c51198198195ec7045c7dce.exe 29 PID 1656 wrote to memory of 668 1656 7db01b21b6b4c6e977c8f96e204495b11d566c780c51198198195ec7045c7dce.exe 29 PID 1656 wrote to memory of 668 1656 7db01b21b6b4c6e977c8f96e204495b11d566c780c51198198195ec7045c7dce.exe 29 PID 1656 wrote to memory of 668 1656 7db01b21b6b4c6e977c8f96e204495b11d566c780c51198198195ec7045c7dce.exe 29 PID 1656 wrote to memory of 668 1656 7db01b21b6b4c6e977c8f96e204495b11d566c780c51198198195ec7045c7dce.exe 29 PID 668 wrote to memory of 1928 668 7db01b21b6b4c6e977c8f96e204495b11d566c780c51198198195ec7045c7dce.exe 30 PID 668 wrote to memory of 1928 668 7db01b21b6b4c6e977c8f96e204495b11d566c780c51198198195ec7045c7dce.exe 30 PID 668 wrote to memory of 1928 668 7db01b21b6b4c6e977c8f96e204495b11d566c780c51198198195ec7045c7dce.exe 30 PID 668 wrote to memory of 1928 668 7db01b21b6b4c6e977c8f96e204495b11d566c780c51198198195ec7045c7dce.exe 30 PID 668 wrote to memory of 1928 668 7db01b21b6b4c6e977c8f96e204495b11d566c780c51198198195ec7045c7dce.exe 30 PID 668 wrote to memory of 1928 668 7db01b21b6b4c6e977c8f96e204495b11d566c780c51198198195ec7045c7dce.exe 30 PID 668 wrote to memory of 1928 668 7db01b21b6b4c6e977c8f96e204495b11d566c780c51198198195ec7045c7dce.exe 30 PID 668 wrote to memory of 1928 668 7db01b21b6b4c6e977c8f96e204495b11d566c780c51198198195ec7045c7dce.exe 30 PID 668 wrote to memory of 1928 668 7db01b21b6b4c6e977c8f96e204495b11d566c780c51198198195ec7045c7dce.exe 30 PID 668 wrote to memory of 1928 668 7db01b21b6b4c6e977c8f96e204495b11d566c780c51198198195ec7045c7dce.exe 30 PID 668 wrote to memory of 1928 668 7db01b21b6b4c6e977c8f96e204495b11d566c780c51198198195ec7045c7dce.exe 30 PID 668 wrote to memory of 1928 668 7db01b21b6b4c6e977c8f96e204495b11d566c780c51198198195ec7045c7dce.exe 30 PID 1928 wrote to memory of 1568 1928 InstallUtil.exe 32 PID 1928 wrote to memory of 1568 1928 InstallUtil.exe 32 PID 1928 wrote to memory of 1568 1928 InstallUtil.exe 32 PID 1928 wrote to memory of 1568 1928 InstallUtil.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\7db01b21b6b4c6e977c8f96e204495b11d566c780c51198198195ec7045c7dce.exe"C:\Users\Admin\AppData\Local\Temp\7db01b21b6b4c6e977c8f96e204495b11d566c780c51198198195ec7045c7dce.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Users\Admin\AppData\Local\Temp\7db01b21b6b4c6e977c8f96e204495b11d566c780c51198198195ec7045c7dce.exe"C:\Users\Admin\AppData\Local\Temp\7db01b21b6b4c6e977c8f96e204495b11d566c780c51198198195ec7045c7dce.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:668 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\InstallUtil.exe"3⤵
- Loads dropped DLL
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\MZ.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\MZ.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1568
-
-
-