Analysis
-
max time kernel
142s -
max time network
116s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
12-07-2021 14:59
Static task
static1
Behavioral task
behavioral1
Sample
ebb56a6e94862c64dd204246376819f8.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
ebb56a6e94862c64dd204246376819f8.exe
Resource
win10v20210408
General
-
Target
ebb56a6e94862c64dd204246376819f8.exe
-
Size
933KB
-
MD5
ebb56a6e94862c64dd204246376819f8
-
SHA1
b4be3ca5db209dd913f9c07fa54578fcd5b45b32
-
SHA256
f66e5f355ec3477cc1be168b9fec2f85d2c58106460d988dd96855f8c78b3fe8
-
SHA512
e4c538a6063133485f13a1831eac86fd96eb689ba9fff8f0306402bdb6c9f013cdc8ac5a6f46fdf97397da679e1ee4c5af655582c9229192e88546e57b6e9926
Malware Config
Signatures
-
A310logger
A310 Logger is a .NET stealer/logger targeting passwords from browsers and email clients.
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty Payload 2 IoCs
resource yara_rule behavioral2/files/0x000100000001ab4a-131.dat family_stormkitty behavioral2/files/0x000100000001ab4a-132.dat family_stormkitty -
A310logger Executable 2 IoCs
resource yara_rule behavioral2/files/0x000100000001ab4a-131.dat a310logger behavioral2/files/0x000100000001ab4a-132.dat a310logger -
Executes dropped EXE 3 IoCs
pid Process 972 PASSWORDSNET4.exe 2076 CREDITCARDNET4.exe 2148 CONTACTSNET4.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 804 set thread context of 412 804 ebb56a6e94862c64dd204246376819f8.exe 79 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 PASSWORDSNET4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier PASSWORDSNET4.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 804 ebb56a6e94862c64dd204246376819f8.exe 804 ebb56a6e94862c64dd204246376819f8.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 412 ebb56a6e94862c64dd204246376819f8.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 804 ebb56a6e94862c64dd204246376819f8.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 412 ebb56a6e94862c64dd204246376819f8.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 804 wrote to memory of 1676 804 ebb56a6e94862c64dd204246376819f8.exe 78 PID 804 wrote to memory of 1676 804 ebb56a6e94862c64dd204246376819f8.exe 78 PID 804 wrote to memory of 1676 804 ebb56a6e94862c64dd204246376819f8.exe 78 PID 804 wrote to memory of 412 804 ebb56a6e94862c64dd204246376819f8.exe 79 PID 804 wrote to memory of 412 804 ebb56a6e94862c64dd204246376819f8.exe 79 PID 804 wrote to memory of 412 804 ebb56a6e94862c64dd204246376819f8.exe 79 PID 804 wrote to memory of 412 804 ebb56a6e94862c64dd204246376819f8.exe 79 PID 804 wrote to memory of 412 804 ebb56a6e94862c64dd204246376819f8.exe 79 PID 804 wrote to memory of 412 804 ebb56a6e94862c64dd204246376819f8.exe 79 PID 804 wrote to memory of 412 804 ebb56a6e94862c64dd204246376819f8.exe 79 PID 804 wrote to memory of 412 804 ebb56a6e94862c64dd204246376819f8.exe 79 PID 412 wrote to memory of 972 412 ebb56a6e94862c64dd204246376819f8.exe 80 PID 412 wrote to memory of 972 412 ebb56a6e94862c64dd204246376819f8.exe 80 PID 412 wrote to memory of 2076 412 ebb56a6e94862c64dd204246376819f8.exe 82 PID 412 wrote to memory of 2076 412 ebb56a6e94862c64dd204246376819f8.exe 82 PID 412 wrote to memory of 2148 412 ebb56a6e94862c64dd204246376819f8.exe 83 PID 412 wrote to memory of 2148 412 ebb56a6e94862c64dd204246376819f8.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\ebb56a6e94862c64dd204246376819f8.exe"C:\Users\Admin\AppData\Local\Temp\ebb56a6e94862c64dd204246376819f8.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:804 -
C:\Users\Admin\AppData\Local\Temp\ebb56a6e94862c64dd204246376819f8.exe"C:\Users\Admin\AppData\Local\Temp\ebb56a6e94862c64dd204246376819f8.exe"2⤵PID:1676
-
-
C:\Users\Admin\AppData\Local\Temp\ebb56a6e94862c64dd204246376819f8.exe"C:\Users\Admin\AppData\Local\Temp\ebb56a6e94862c64dd204246376819f8.exe"2⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:412 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\NET4\PASSWORDSNET4.exeC:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\NET4\PASSWORDSNET4.exe3⤵
- Executes dropped EXE
- Checks processor information in registry
PID:972
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\NET4\CREDITCARDNET4.exeC:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\NET4\CREDITCARDNET4.exe3⤵
- Executes dropped EXE
PID:2076
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\NET4\CONTACTSNET4.exeC:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\NET4\CONTACTSNET4.exe3⤵
- Executes dropped EXE
PID:2148
-
-