Analysis
-
max time kernel
122s -
max time network
170s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
14-07-2021 15:35
Static task
static1
Behavioral task
behavioral1
Sample
f99fd17cc305e25cae93a53c5d7b5741.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
f99fd17cc305e25cae93a53c5d7b5741.exe
Resource
win10v20210408
General
-
Target
f99fd17cc305e25cae93a53c5d7b5741.exe
-
Size
922KB
-
MD5
f99fd17cc305e25cae93a53c5d7b5741
-
SHA1
f02ba6a83b0b52301e4e6d5ce486abcc88ef0421
-
SHA256
463ace81e13b8db2ec0d6ee4182e27a7a91c9c65555006ad064cd1e27e92a46c
-
SHA512
63dfe798d9a93d236f05aebd25dce4679fa227c27bca381e1771dfc2788cd735eb6aa36b07fc2d2d2cec0576987b91dba8e459165d4676741e9f29d293389f59
Malware Config
Signatures
-
A310logger
A310 Logger is a .NET stealer/logger targeting passwords from browsers and email clients.
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty Payload 3 IoCs
resource yara_rule behavioral1/files/0x00030000000130f9-70.dat family_stormkitty behavioral1/files/0x00030000000130f9-72.dat family_stormkitty behavioral1/files/0x00030000000130f9-73.dat family_stormkitty -
A310logger Executable 3 IoCs
resource yara_rule behavioral1/files/0x00030000000130f9-70.dat a310logger behavioral1/files/0x00030000000130f9-72.dat a310logger behavioral1/files/0x00030000000130f9-73.dat a310logger -
Executes dropped EXE 2 IoCs
pid Process 1124 PASSWORDSNET4.exe 1548 CREDITCARDNET4.exe -
Loads dropped DLL 2 IoCs
pid Process 772 f99fd17cc305e25cae93a53c5d7b5741.exe 772 f99fd17cc305e25cae93a53c5d7b5741.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2024 set thread context of 772 2024 f99fd17cc305e25cae93a53c5d7b5741.exe 29 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 PASSWORDSNET4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier PASSWORDSNET4.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 772 f99fd17cc305e25cae93a53c5d7b5741.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2024 wrote to memory of 772 2024 f99fd17cc305e25cae93a53c5d7b5741.exe 29 PID 2024 wrote to memory of 772 2024 f99fd17cc305e25cae93a53c5d7b5741.exe 29 PID 2024 wrote to memory of 772 2024 f99fd17cc305e25cae93a53c5d7b5741.exe 29 PID 2024 wrote to memory of 772 2024 f99fd17cc305e25cae93a53c5d7b5741.exe 29 PID 2024 wrote to memory of 772 2024 f99fd17cc305e25cae93a53c5d7b5741.exe 29 PID 2024 wrote to memory of 772 2024 f99fd17cc305e25cae93a53c5d7b5741.exe 29 PID 2024 wrote to memory of 772 2024 f99fd17cc305e25cae93a53c5d7b5741.exe 29 PID 2024 wrote to memory of 772 2024 f99fd17cc305e25cae93a53c5d7b5741.exe 29 PID 2024 wrote to memory of 772 2024 f99fd17cc305e25cae93a53c5d7b5741.exe 29 PID 772 wrote to memory of 1124 772 f99fd17cc305e25cae93a53c5d7b5741.exe 30 PID 772 wrote to memory of 1124 772 f99fd17cc305e25cae93a53c5d7b5741.exe 30 PID 772 wrote to memory of 1124 772 f99fd17cc305e25cae93a53c5d7b5741.exe 30 PID 772 wrote to memory of 1124 772 f99fd17cc305e25cae93a53c5d7b5741.exe 30 PID 772 wrote to memory of 1548 772 f99fd17cc305e25cae93a53c5d7b5741.exe 32 PID 772 wrote to memory of 1548 772 f99fd17cc305e25cae93a53c5d7b5741.exe 32 PID 772 wrote to memory of 1548 772 f99fd17cc305e25cae93a53c5d7b5741.exe 32 PID 772 wrote to memory of 1548 772 f99fd17cc305e25cae93a53c5d7b5741.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\f99fd17cc305e25cae93a53c5d7b5741.exe"C:\Users\Admin\AppData\Local\Temp\f99fd17cc305e25cae93a53c5d7b5741.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Users\Admin\AppData\Local\Temp\f99fd17cc305e25cae93a53c5d7b5741.exe"C:\Users\Admin\AppData\Local\Temp\f99fd17cc305e25cae93a53c5d7b5741.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:772 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\NET4\PASSWORDSNET4.exeC:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\NET4\PASSWORDSNET4.exe3⤵
- Executes dropped EXE
- Checks processor information in registry
PID:1124
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\NET4\CREDITCARDNET4.exeC:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\NET4\CREDITCARDNET4.exe3⤵
- Executes dropped EXE
PID:1548
-
-