Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
21-07-2021 16:43
Static task
static1
Behavioral task
behavioral1
Sample
TT000900_989990.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
TT000900_989990.exe
Resource
win10v20210410
General
-
Target
TT000900_989990.exe
-
Size
894KB
-
MD5
f343cb0399d345b279de6d50d99f4be9
-
SHA1
6983c9557f3ab79b9a78f069599080d6988fd0c1
-
SHA256
451e257b591ad6beacf73a6ff2dc67942fa68cdd453da2784e084d790e66d3df
-
SHA512
109ab328298c9945aafabe0c306b4ba4534171e40d7ef966ed5e5e14fcc4a87d3ebbc3ff4800fd42fcc78c2d9211b37d37461538f8c79ee3e79fdd5fc429fb19
Malware Config
Signatures
-
A310logger
A310 Logger is a .NET stealer/logger targeting passwords from browsers and email clients.
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty Payload 4 IoCs
resource yara_rule behavioral2/memory/188-128-0x0000000000400000-0x0000000000418000-memory.dmp family_stormkitty behavioral2/memory/188-129-0x0000000000412452-mapping.dmp family_stormkitty behavioral2/memory/1700-136-0x0000000000412452-mapping.dmp family_stormkitty behavioral2/memory/2220-145-0x0000000000412452-mapping.dmp family_stormkitty -
A310logger Executable 10 IoCs
resource yara_rule behavioral2/memory/188-128-0x0000000000400000-0x0000000000418000-memory.dmp a310logger behavioral2/memory/188-129-0x0000000000412452-mapping.dmp a310logger behavioral2/files/0x000200000001ab82-132.dat a310logger behavioral2/files/0x000200000001ab82-133.dat a310logger behavioral2/memory/1700-136-0x0000000000412452-mapping.dmp a310logger behavioral2/files/0x000300000001ab8b-140.dat a310logger behavioral2/files/0x000300000001ab8b-141.dat a310logger behavioral2/memory/2220-145-0x0000000000412452-mapping.dmp a310logger behavioral2/files/0x000400000001ab8b-148.dat a310logger behavioral2/files/0x000400000001ab8b-149.dat a310logger -
Executes dropped EXE 3 IoCs
pid Process 2104 MZ.exe 3536 MZ.exe 2168 MZ.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 12 icanhazip.com -
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1852 set thread context of 4020 1852 TT000900_989990.exe 78 PID 4020 set thread context of 188 4020 TT000900_989990.exe 79 PID 4020 set thread context of 1700 4020 TT000900_989990.exe 84 PID 4020 set thread context of 2220 4020 TT000900_989990.exe 86 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier InstallUtil.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 InstallUtil.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier InstallUtil.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 InstallUtil.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier InstallUtil.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 InstallUtil.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1852 TT000900_989990.exe 1852 TT000900_989990.exe 1852 TT000900_989990.exe 1852 TT000900_989990.exe 2104 MZ.exe 2104 MZ.exe 3536 MZ.exe 3536 MZ.exe 2168 MZ.exe 2168 MZ.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4020 TT000900_989990.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 1852 TT000900_989990.exe Token: SeDebugPrivilege 188 InstallUtil.exe Token: SeDebugPrivilege 2104 MZ.exe Token: SeDebugPrivilege 1700 InstallUtil.exe Token: SeDebugPrivilege 3536 MZ.exe Token: SeDebugPrivilege 2220 InstallUtil.exe Token: SeDebugPrivilege 2168 MZ.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4020 TT000900_989990.exe 4020 TT000900_989990.exe -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 1852 wrote to memory of 2704 1852 TT000900_989990.exe 76 PID 1852 wrote to memory of 2704 1852 TT000900_989990.exe 76 PID 1852 wrote to memory of 2704 1852 TT000900_989990.exe 76 PID 1852 wrote to memory of 1928 1852 TT000900_989990.exe 77 PID 1852 wrote to memory of 1928 1852 TT000900_989990.exe 77 PID 1852 wrote to memory of 1928 1852 TT000900_989990.exe 77 PID 1852 wrote to memory of 4020 1852 TT000900_989990.exe 78 PID 1852 wrote to memory of 4020 1852 TT000900_989990.exe 78 PID 1852 wrote to memory of 4020 1852 TT000900_989990.exe 78 PID 1852 wrote to memory of 4020 1852 TT000900_989990.exe 78 PID 1852 wrote to memory of 4020 1852 TT000900_989990.exe 78 PID 1852 wrote to memory of 4020 1852 TT000900_989990.exe 78 PID 1852 wrote to memory of 4020 1852 TT000900_989990.exe 78 PID 1852 wrote to memory of 4020 1852 TT000900_989990.exe 78 PID 4020 wrote to memory of 188 4020 TT000900_989990.exe 79 PID 4020 wrote to memory of 188 4020 TT000900_989990.exe 79 PID 4020 wrote to memory of 188 4020 TT000900_989990.exe 79 PID 4020 wrote to memory of 188 4020 TT000900_989990.exe 79 PID 4020 wrote to memory of 188 4020 TT000900_989990.exe 79 PID 4020 wrote to memory of 188 4020 TT000900_989990.exe 79 PID 4020 wrote to memory of 188 4020 TT000900_989990.exe 79 PID 4020 wrote to memory of 188 4020 TT000900_989990.exe 79 PID 188 wrote to memory of 2104 188 InstallUtil.exe 82 PID 188 wrote to memory of 2104 188 InstallUtil.exe 82 PID 4020 wrote to memory of 1700 4020 TT000900_989990.exe 84 PID 4020 wrote to memory of 1700 4020 TT000900_989990.exe 84 PID 4020 wrote to memory of 1700 4020 TT000900_989990.exe 84 PID 4020 wrote to memory of 1700 4020 TT000900_989990.exe 84 PID 4020 wrote to memory of 1700 4020 TT000900_989990.exe 84 PID 4020 wrote to memory of 1700 4020 TT000900_989990.exe 84 PID 4020 wrote to memory of 1700 4020 TT000900_989990.exe 84 PID 4020 wrote to memory of 1700 4020 TT000900_989990.exe 84 PID 1700 wrote to memory of 3536 1700 InstallUtil.exe 85 PID 1700 wrote to memory of 3536 1700 InstallUtil.exe 85 PID 4020 wrote to memory of 2220 4020 TT000900_989990.exe 86 PID 4020 wrote to memory of 2220 4020 TT000900_989990.exe 86 PID 4020 wrote to memory of 2220 4020 TT000900_989990.exe 86 PID 4020 wrote to memory of 2220 4020 TT000900_989990.exe 86 PID 4020 wrote to memory of 2220 4020 TT000900_989990.exe 86 PID 4020 wrote to memory of 2220 4020 TT000900_989990.exe 86 PID 4020 wrote to memory of 2220 4020 TT000900_989990.exe 86 PID 4020 wrote to memory of 2220 4020 TT000900_989990.exe 86 PID 2220 wrote to memory of 2168 2220 InstallUtil.exe 87 PID 2220 wrote to memory of 2168 2220 InstallUtil.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\TT000900_989990.exe"C:\Users\Admin\AppData\Local\Temp\TT000900_989990.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Users\Admin\AppData\Local\Temp\TT000900_989990.exe"C:\Users\Admin\AppData\Local\Temp\TT000900_989990.exe"2⤵PID:2704
-
-
C:\Users\Admin\AppData\Local\Temp\TT000900_989990.exe"C:\Users\Admin\AppData\Local\Temp\TT000900_989990.exe"2⤵PID:1928
-
-
C:\Users\Admin\AppData\Local\Temp\TT000900_989990.exe"C:\Users\Admin\AppData\Local\Temp\TT000900_989990.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4020 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\InstallUtil.exe"3⤵
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:188 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\MZ.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\MZ.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2104
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\InstallUtil.exe"3⤵
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\MZ.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\MZ.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3536
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\InstallUtil.exe"3⤵
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\MZ.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\MZ.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2168
-
-
-