Analysis
-
max time kernel
97s -
max time network
13s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
13-07-2021 12:57
Static task
static1
Behavioral task
behavioral1
Sample
5f70bb21955777e10ca01ead27d16b44.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
5f70bb21955777e10ca01ead27d16b44.exe
Resource
win10v20210408
General
-
Target
5f70bb21955777e10ca01ead27d16b44.exe
-
Size
1.0MB
-
MD5
5f70bb21955777e10ca01ead27d16b44
-
SHA1
2f7d8adfb506718346d94177103d1d976380a9b4
-
SHA256
84c1024292142c4d234701e830aedcbd865311693f0d8ac75596deee268c7db5
-
SHA512
69f55a7902a4241c008c745a8f3bbc261bf0f9698f0b0b93aafb6ab8ce47b4e0eba47879e32404d6c3cdfab14cf55f60d5de4c34050bcb377f7f92a5a1ed16f4
Malware Config
Signatures
-
A310logger
A310 Logger is a .NET stealer/logger targeting passwords from browsers and email clients.
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty Payload 3 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\NET4\PASSWORDSNET4.exe family_stormkitty C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\NET4\PASSWORDSNET4.exe family_stormkitty C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\NET4\PASSWORDSNET4.exe family_stormkitty -
A310logger Executable 3 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\NET4\PASSWORDSNET4.exe a310logger C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\NET4\PASSWORDSNET4.exe a310logger C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\NET4\PASSWORDSNET4.exe a310logger -
Executes dropped EXE 2 IoCs
Processes:
PASSWORDSNET4.exeCREDITCARDNET4.exepid process 1272 PASSWORDSNET4.exe 1620 CREDITCARDNET4.exe -
Loads dropped DLL 2 IoCs
Processes:
5f70bb21955777e10ca01ead27d16b44.exepid process 540 5f70bb21955777e10ca01ead27d16b44.exe 540 5f70bb21955777e10ca01ead27d16b44.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
5f70bb21955777e10ca01ead27d16b44.exedescription pid process target process PID 1092 set thread context of 540 1092 5f70bb21955777e10ca01ead27d16b44.exe 5f70bb21955777e10ca01ead27d16b44.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
PASSWORDSNET4.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 PASSWORDSNET4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier PASSWORDSNET4.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
5f70bb21955777e10ca01ead27d16b44.exepid process 540 5f70bb21955777e10ca01ead27d16b44.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
5f70bb21955777e10ca01ead27d16b44.exe5f70bb21955777e10ca01ead27d16b44.exedescription pid process target process PID 1092 wrote to memory of 540 1092 5f70bb21955777e10ca01ead27d16b44.exe 5f70bb21955777e10ca01ead27d16b44.exe PID 1092 wrote to memory of 540 1092 5f70bb21955777e10ca01ead27d16b44.exe 5f70bb21955777e10ca01ead27d16b44.exe PID 1092 wrote to memory of 540 1092 5f70bb21955777e10ca01ead27d16b44.exe 5f70bb21955777e10ca01ead27d16b44.exe PID 1092 wrote to memory of 540 1092 5f70bb21955777e10ca01ead27d16b44.exe 5f70bb21955777e10ca01ead27d16b44.exe PID 1092 wrote to memory of 540 1092 5f70bb21955777e10ca01ead27d16b44.exe 5f70bb21955777e10ca01ead27d16b44.exe PID 1092 wrote to memory of 540 1092 5f70bb21955777e10ca01ead27d16b44.exe 5f70bb21955777e10ca01ead27d16b44.exe PID 1092 wrote to memory of 540 1092 5f70bb21955777e10ca01ead27d16b44.exe 5f70bb21955777e10ca01ead27d16b44.exe PID 1092 wrote to memory of 540 1092 5f70bb21955777e10ca01ead27d16b44.exe 5f70bb21955777e10ca01ead27d16b44.exe PID 1092 wrote to memory of 540 1092 5f70bb21955777e10ca01ead27d16b44.exe 5f70bb21955777e10ca01ead27d16b44.exe PID 540 wrote to memory of 1272 540 5f70bb21955777e10ca01ead27d16b44.exe PASSWORDSNET4.exe PID 540 wrote to memory of 1272 540 5f70bb21955777e10ca01ead27d16b44.exe PASSWORDSNET4.exe PID 540 wrote to memory of 1272 540 5f70bb21955777e10ca01ead27d16b44.exe PASSWORDSNET4.exe PID 540 wrote to memory of 1272 540 5f70bb21955777e10ca01ead27d16b44.exe PASSWORDSNET4.exe PID 540 wrote to memory of 1620 540 5f70bb21955777e10ca01ead27d16b44.exe CREDITCARDNET4.exe PID 540 wrote to memory of 1620 540 5f70bb21955777e10ca01ead27d16b44.exe CREDITCARDNET4.exe PID 540 wrote to memory of 1620 540 5f70bb21955777e10ca01ead27d16b44.exe CREDITCARDNET4.exe PID 540 wrote to memory of 1620 540 5f70bb21955777e10ca01ead27d16b44.exe CREDITCARDNET4.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5f70bb21955777e10ca01ead27d16b44.exe"C:\Users\Admin\AppData\Local\Temp\5f70bb21955777e10ca01ead27d16b44.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Users\Admin\AppData\Local\Temp\5f70bb21955777e10ca01ead27d16b44.exe"C:\Users\Admin\AppData\Local\Temp\5f70bb21955777e10ca01ead27d16b44.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\NET4\PASSWORDSNET4.exeC:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\NET4\PASSWORDSNET4.exe3⤵
- Executes dropped EXE
- Checks processor information in registry
PID:1272
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\NET4\CREDITCARDNET4.exeC:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\NET4\CREDITCARDNET4.exe3⤵
- Executes dropped EXE
PID:1620
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
a451ff83e1e0b66af6a3f26ee38bf4ff
SHA15dc4535a7a059c3aaedf925093e9fbe5f27aae80
SHA256e654a9462d181c047534462ca3f13c1117886dbeded26cc1c0255328fd1046da
SHA5123d2722dd84783eb806e671fd611b03ea9851e8d266f182088e7e2a7af467ca2b6fd348461117cc7e547bd225be5f748b2c724ea0c7431a3d15d1291355f92a85
-
MD5
a451ff83e1e0b66af6a3f26ee38bf4ff
SHA15dc4535a7a059c3aaedf925093e9fbe5f27aae80
SHA256e654a9462d181c047534462ca3f13c1117886dbeded26cc1c0255328fd1046da
SHA5123d2722dd84783eb806e671fd611b03ea9851e8d266f182088e7e2a7af467ca2b6fd348461117cc7e547bd225be5f748b2c724ea0c7431a3d15d1291355f92a85
-
MD5
1e80e2c7dc321a0f48da92fdbdbd44eb
SHA14bcf3e9b2e0332e1428779254aaf0b7a1b07b08e
SHA2566dd7c673498c69240586a2344c16dcaefb1229e06fdf2b85b76cd91e5578e291
SHA512dde95e41feca1ac7fc3c86277a2eaa3ac7d96c0bbb31faaea6c8aae680fc1aff1cfbad849660457fdbf69479b4496906dea5edc9ca307625836f483f82b6ca62
-
MD5
1e80e2c7dc321a0f48da92fdbdbd44eb
SHA14bcf3e9b2e0332e1428779254aaf0b7a1b07b08e
SHA2566dd7c673498c69240586a2344c16dcaefb1229e06fdf2b85b76cd91e5578e291
SHA512dde95e41feca1ac7fc3c86277a2eaa3ac7d96c0bbb31faaea6c8aae680fc1aff1cfbad849660457fdbf69479b4496906dea5edc9ca307625836f483f82b6ca62
-
MD5
49a645e38f59784b7219b7f51b1fec6c
SHA1bc74ced2c2d195837bb5cee21af81b0e396137b3
SHA256b7f665c46d95c65f68a5ea6578d3b15c3ccfe3c9f6a7b4be3bad02ca496a2ba9
SHA51228dbfa66d7feb903946a1fdeafd3d6f51d1c743c90c7b2afc8d86b8a9f62109bb478be9d906ae25e1fa23fe70e78bec603584d94e684023f9ff74a88689cb69f
-
MD5
a451ff83e1e0b66af6a3f26ee38bf4ff
SHA15dc4535a7a059c3aaedf925093e9fbe5f27aae80
SHA256e654a9462d181c047534462ca3f13c1117886dbeded26cc1c0255328fd1046da
SHA5123d2722dd84783eb806e671fd611b03ea9851e8d266f182088e7e2a7af467ca2b6fd348461117cc7e547bd225be5f748b2c724ea0c7431a3d15d1291355f92a85
-
MD5
1e80e2c7dc321a0f48da92fdbdbd44eb
SHA14bcf3e9b2e0332e1428779254aaf0b7a1b07b08e
SHA2566dd7c673498c69240586a2344c16dcaefb1229e06fdf2b85b76cd91e5578e291
SHA512dde95e41feca1ac7fc3c86277a2eaa3ac7d96c0bbb31faaea6c8aae680fc1aff1cfbad849660457fdbf69479b4496906dea5edc9ca307625836f483f82b6ca62