Analysis
-
max time kernel
101s -
max time network
14s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
12-07-2021 14:59
Static task
static1
Behavioral task
behavioral1
Sample
ebb56a6e94862c64dd204246376819f8.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
ebb56a6e94862c64dd204246376819f8.exe
Resource
win10v20210408
General
-
Target
ebb56a6e94862c64dd204246376819f8.exe
-
Size
933KB
-
MD5
ebb56a6e94862c64dd204246376819f8
-
SHA1
b4be3ca5db209dd913f9c07fa54578fcd5b45b32
-
SHA256
f66e5f355ec3477cc1be168b9fec2f85d2c58106460d988dd96855f8c78b3fe8
-
SHA512
e4c538a6063133485f13a1831eac86fd96eb689ba9fff8f0306402bdb6c9f013cdc8ac5a6f46fdf97397da679e1ee4c5af655582c9229192e88546e57b6e9926
Malware Config
Signatures
-
A310logger
A310 Logger is a .NET stealer/logger targeting passwords from browsers and email clients.
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty Payload 3 IoCs
resource yara_rule behavioral1/files/0x0003000000013102-71.dat family_stormkitty behavioral1/files/0x0003000000013102-73.dat family_stormkitty behavioral1/files/0x0003000000013102-74.dat family_stormkitty -
A310logger Executable 3 IoCs
resource yara_rule behavioral1/files/0x0003000000013102-71.dat a310logger behavioral1/files/0x0003000000013102-73.dat a310logger behavioral1/files/0x0003000000013102-74.dat a310logger -
Executes dropped EXE 3 IoCs
pid Process 528 PASSWORDSNET4.exe 1220 CREDITCARDNET4.exe 672 CONTACTSNET4.exe -
Loads dropped DLL 3 IoCs
pid Process 300 ebb56a6e94862c64dd204246376819f8.exe 300 ebb56a6e94862c64dd204246376819f8.exe 300 ebb56a6e94862c64dd204246376819f8.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 772 set thread context of 300 772 ebb56a6e94862c64dd204246376819f8.exe 29 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 PASSWORDSNET4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier PASSWORDSNET4.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 300 ebb56a6e94862c64dd204246376819f8.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 300 ebb56a6e94862c64dd204246376819f8.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 772 wrote to memory of 300 772 ebb56a6e94862c64dd204246376819f8.exe 29 PID 772 wrote to memory of 300 772 ebb56a6e94862c64dd204246376819f8.exe 29 PID 772 wrote to memory of 300 772 ebb56a6e94862c64dd204246376819f8.exe 29 PID 772 wrote to memory of 300 772 ebb56a6e94862c64dd204246376819f8.exe 29 PID 772 wrote to memory of 300 772 ebb56a6e94862c64dd204246376819f8.exe 29 PID 772 wrote to memory of 300 772 ebb56a6e94862c64dd204246376819f8.exe 29 PID 772 wrote to memory of 300 772 ebb56a6e94862c64dd204246376819f8.exe 29 PID 772 wrote to memory of 300 772 ebb56a6e94862c64dd204246376819f8.exe 29 PID 772 wrote to memory of 300 772 ebb56a6e94862c64dd204246376819f8.exe 29 PID 300 wrote to memory of 528 300 ebb56a6e94862c64dd204246376819f8.exe 30 PID 300 wrote to memory of 528 300 ebb56a6e94862c64dd204246376819f8.exe 30 PID 300 wrote to memory of 528 300 ebb56a6e94862c64dd204246376819f8.exe 30 PID 300 wrote to memory of 528 300 ebb56a6e94862c64dd204246376819f8.exe 30 PID 300 wrote to memory of 1220 300 ebb56a6e94862c64dd204246376819f8.exe 32 PID 300 wrote to memory of 1220 300 ebb56a6e94862c64dd204246376819f8.exe 32 PID 300 wrote to memory of 1220 300 ebb56a6e94862c64dd204246376819f8.exe 32 PID 300 wrote to memory of 1220 300 ebb56a6e94862c64dd204246376819f8.exe 32 PID 300 wrote to memory of 672 300 ebb56a6e94862c64dd204246376819f8.exe 33 PID 300 wrote to memory of 672 300 ebb56a6e94862c64dd204246376819f8.exe 33 PID 300 wrote to memory of 672 300 ebb56a6e94862c64dd204246376819f8.exe 33 PID 300 wrote to memory of 672 300 ebb56a6e94862c64dd204246376819f8.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\ebb56a6e94862c64dd204246376819f8.exe"C:\Users\Admin\AppData\Local\Temp\ebb56a6e94862c64dd204246376819f8.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:772 -
C:\Users\Admin\AppData\Local\Temp\ebb56a6e94862c64dd204246376819f8.exe"C:\Users\Admin\AppData\Local\Temp\ebb56a6e94862c64dd204246376819f8.exe"2⤵
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:300 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\NET4\PASSWORDSNET4.exeC:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\NET4\PASSWORDSNET4.exe3⤵
- Executes dropped EXE
- Checks processor information in registry
PID:528
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\NET4\CREDITCARDNET4.exeC:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\NET4\CREDITCARDNET4.exe3⤵
- Executes dropped EXE
PID:1220
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\NET4\CONTACTSNET4.exeC:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\NET4\CONTACTSNET4.exe3⤵
- Executes dropped EXE
PID:672
-
-