Analysis
-
max time kernel
89s -
max time network
70s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
13-07-2021 12:57
Static task
static1
Behavioral task
behavioral1
Sample
5f70bb21955777e10ca01ead27d16b44.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
5f70bb21955777e10ca01ead27d16b44.exe
Resource
win10v20210408
General
-
Target
5f70bb21955777e10ca01ead27d16b44.exe
-
Size
1.0MB
-
MD5
5f70bb21955777e10ca01ead27d16b44
-
SHA1
2f7d8adfb506718346d94177103d1d976380a9b4
-
SHA256
84c1024292142c4d234701e830aedcbd865311693f0d8ac75596deee268c7db5
-
SHA512
69f55a7902a4241c008c745a8f3bbc261bf0f9698f0b0b93aafb6ab8ce47b4e0eba47879e32404d6c3cdfab14cf55f60d5de4c34050bcb377f7f92a5a1ed16f4
Malware Config
Signatures
-
A310logger
A310 Logger is a .NET stealer/logger targeting passwords from browsers and email clients.
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty Payload 2 IoCs
resource yara_rule behavioral2/files/0x000100000001ab56-131.dat family_stormkitty behavioral2/files/0x000100000001ab56-132.dat family_stormkitty -
A310logger Executable 2 IoCs
resource yara_rule behavioral2/files/0x000100000001ab56-131.dat a310logger behavioral2/files/0x000100000001ab56-132.dat a310logger -
Executes dropped EXE 2 IoCs
pid Process 3504 PASSWORDSNET4.exe 3244 CREDITCARDNET4.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 740 set thread context of 8 740 5f70bb21955777e10ca01ead27d16b44.exe 78 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 PASSWORDSNET4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier PASSWORDSNET4.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 8 5f70bb21955777e10ca01ead27d16b44.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 740 wrote to memory of 8 740 5f70bb21955777e10ca01ead27d16b44.exe 78 PID 740 wrote to memory of 8 740 5f70bb21955777e10ca01ead27d16b44.exe 78 PID 740 wrote to memory of 8 740 5f70bb21955777e10ca01ead27d16b44.exe 78 PID 740 wrote to memory of 8 740 5f70bb21955777e10ca01ead27d16b44.exe 78 PID 740 wrote to memory of 8 740 5f70bb21955777e10ca01ead27d16b44.exe 78 PID 740 wrote to memory of 8 740 5f70bb21955777e10ca01ead27d16b44.exe 78 PID 740 wrote to memory of 8 740 5f70bb21955777e10ca01ead27d16b44.exe 78 PID 740 wrote to memory of 8 740 5f70bb21955777e10ca01ead27d16b44.exe 78 PID 8 wrote to memory of 3504 8 5f70bb21955777e10ca01ead27d16b44.exe 79 PID 8 wrote to memory of 3504 8 5f70bb21955777e10ca01ead27d16b44.exe 79 PID 8 wrote to memory of 3244 8 5f70bb21955777e10ca01ead27d16b44.exe 81 PID 8 wrote to memory of 3244 8 5f70bb21955777e10ca01ead27d16b44.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\5f70bb21955777e10ca01ead27d16b44.exe"C:\Users\Admin\AppData\Local\Temp\5f70bb21955777e10ca01ead27d16b44.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:740 -
C:\Users\Admin\AppData\Local\Temp\5f70bb21955777e10ca01ead27d16b44.exe"C:\Users\Admin\AppData\Local\Temp\5f70bb21955777e10ca01ead27d16b44.exe"2⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:8 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\NET4\PASSWORDSNET4.exeC:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\NET4\PASSWORDSNET4.exe3⤵
- Executes dropped EXE
- Checks processor information in registry
PID:3504
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\NET4\CREDITCARDNET4.exeC:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\NET4\CREDITCARDNET4.exe3⤵
- Executes dropped EXE
PID:3244
-
-