Analysis
-
max time kernel
93s -
max time network
112s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
13-07-2021 17:54
Static task
static1
Behavioral task
behavioral1
Sample
can.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
can.exe
Resource
win10v20210410
General
-
Target
can.exe
-
Size
1.0MB
-
MD5
5f70bb21955777e10ca01ead27d16b44
-
SHA1
2f7d8adfb506718346d94177103d1d976380a9b4
-
SHA256
84c1024292142c4d234701e830aedcbd865311693f0d8ac75596deee268c7db5
-
SHA512
69f55a7902a4241c008c745a8f3bbc261bf0f9698f0b0b93aafb6ab8ce47b4e0eba47879e32404d6c3cdfab14cf55f60d5de4c34050bcb377f7f92a5a1ed16f4
Malware Config
Signatures
-
A310logger
A310 Logger is a .NET stealer/logger targeting passwords from browsers and email clients.
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty Payload 2 IoCs
resource yara_rule behavioral2/files/0x000100000001ab31-132.dat family_stormkitty behavioral2/files/0x000100000001ab31-133.dat family_stormkitty -
A310logger Executable 2 IoCs
resource yara_rule behavioral2/files/0x000100000001ab31-132.dat a310logger behavioral2/files/0x000100000001ab31-133.dat a310logger -
Executes dropped EXE 2 IoCs
pid Process 3968 PASSWORDSNET4.exe 296 CREDITCARDNET4.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 508 set thread context of 1972 508 can.exe 79 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 PASSWORDSNET4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier PASSWORDSNET4.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1972 can.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 508 wrote to memory of 1972 508 can.exe 79 PID 508 wrote to memory of 1972 508 can.exe 79 PID 508 wrote to memory of 1972 508 can.exe 79 PID 508 wrote to memory of 1972 508 can.exe 79 PID 508 wrote to memory of 1972 508 can.exe 79 PID 508 wrote to memory of 1972 508 can.exe 79 PID 508 wrote to memory of 1972 508 can.exe 79 PID 508 wrote to memory of 1972 508 can.exe 79 PID 1972 wrote to memory of 3968 1972 can.exe 80 PID 1972 wrote to memory of 3968 1972 can.exe 80 PID 1972 wrote to memory of 296 1972 can.exe 82 PID 1972 wrote to memory of 296 1972 can.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\can.exe"C:\Users\Admin\AppData\Local\Temp\can.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:508 -
C:\Users\Admin\AppData\Local\Temp\can.exe"C:\Users\Admin\AppData\Local\Temp\can.exe"2⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\NET4\PASSWORDSNET4.exeC:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\NET4\PASSWORDSNET4.exe3⤵
- Executes dropped EXE
- Checks processor information in registry
PID:3968
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\NET4\CREDITCARDNET4.exeC:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\NET4\CREDITCARDNET4.exe3⤵
- Executes dropped EXE
PID:296
-
-