Analysis

  • max time kernel
    149s
  • max time network
    100s
  • platform
    windows7_x64
  • resource
    win7-en-20210920
  • submitted
    25-10-2021 14:47

General

  • Target

    stub.bin.exe

  • Size

    561KB

  • MD5

    68260e77a8d3f9f51e06d351f9ec4a9a

  • SHA1

    11dad0b9986ed9f8da5b8021bf1fdcef7aeba159

  • SHA256

    fddde87baeb78e0cbd56e87bf6e27052c13a42b5c808331b39157a605851164e

  • SHA512

    7801cfdf9786d14c5386c900e42b8228c8242be13e5f6d3e8fd8b4c93f6796faec7caf0f93077ecc5933e912113ea6dfb735160b0289e34073a7f0a337ff66f1

Malware Config

Signatures

  • StormKitty

    StormKitty is an open source info stealer written in C#.

  • StormKitty Payload 5 IoCs
  • suricata: ET MALWARE Trojan Generic - POST To gate.php with no accept headers

    suricata: ET MALWARE Trojan Generic - POST To gate.php with no accept headers

  • suricata: ET MALWARE Trojan Generic - POST To gate.php with no referer

    suricata: ET MALWARE Trojan Generic - POST To gate.php with no referer

  • Loads dropped DLL 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 5 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Looks up geolocation information via web service

    Uses a legitimate geolocation service to find the infected system's geolocation info.

  • Program crash 1 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\stub.bin.exe
    "C:\Users\Admin\AppData\Local\Temp\stub.bin.exe"
    1⤵
    • Loads dropped DLL
    • Drops desktop.ini file(s)
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:572
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1912
      • C:\Windows\SysWOW64\chcp.com
        chcp 65001
        3⤵
          PID:680
        • C:\Windows\SysWOW64\netsh.exe
          netsh wlan show profile
          3⤵
            PID:1916
          • C:\Windows\SysWOW64\findstr.exe
            findstr All
            3⤵
              PID:1736
          • C:\Windows\SysWOW64\cmd.exe
            "cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:1992
            • C:\Windows\SysWOW64\chcp.com
              chcp 65001
              3⤵
                PID:1604
              • C:\Windows\SysWOW64\netsh.exe
                netsh wlan show networks mode=bssid
                3⤵
                  PID:1600
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 572 -s 2448
                2⤵
                • Loads dropped DLL
                • Program crash
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious behavior: GetForegroundWindowSpam
                • Suspicious use of AdjustPrivilegeToken
                PID:752

            Network

            MITRE ATT&CK Matrix ATT&CK v6

            Credential Access

            Credentials in Files

            1
            T1081

            Discovery

            Query Registry

            1
            T1012

            System Information Discovery

            1
            T1082

            Collection

            Data from Local System

            1
            T1005

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • \Users\Admin\AppData\Local\Temp\DotNetZip.dll
              MD5

              6d1c62ec1c2ef722f49b2d8dd4a4df16

              SHA1

              1bb08a979b7987bc7736a8cfa4779383cb0ecfa6

              SHA256

              00da1597d92235d3f84da979e2fa5dbf049bafb52c33bd6fc8ee7b29570c124c

              SHA512

              c0dce8eaa52eb6c319d4be2eec4622bb3380c65b659cfb77ff51a4ada7d3e591e791ee823dad67b5556ffac5c060ff45d09dd1cc21baaf70ba89806647cb3bd2

            • \Users\Admin\AppData\Local\Temp\DotNetZip.dll
              MD5

              6d1c62ec1c2ef722f49b2d8dd4a4df16

              SHA1

              1bb08a979b7987bc7736a8cfa4779383cb0ecfa6

              SHA256

              00da1597d92235d3f84da979e2fa5dbf049bafb52c33bd6fc8ee7b29570c124c

              SHA512

              c0dce8eaa52eb6c319d4be2eec4622bb3380c65b659cfb77ff51a4ada7d3e591e791ee823dad67b5556ffac5c060ff45d09dd1cc21baaf70ba89806647cb3bd2

            • \Users\Admin\AppData\Local\Temp\stub.bin.exe
              MD5

              68260e77a8d3f9f51e06d351f9ec4a9a

              SHA1

              11dad0b9986ed9f8da5b8021bf1fdcef7aeba159

              SHA256

              fddde87baeb78e0cbd56e87bf6e27052c13a42b5c808331b39157a605851164e

              SHA512

              7801cfdf9786d14c5386c900e42b8228c8242be13e5f6d3e8fd8b4c93f6796faec7caf0f93077ecc5933e912113ea6dfb735160b0289e34073a7f0a337ff66f1

            • \Users\Admin\AppData\Local\Temp\stub.bin.exe
              MD5

              68260e77a8d3f9f51e06d351f9ec4a9a

              SHA1

              11dad0b9986ed9f8da5b8021bf1fdcef7aeba159

              SHA256

              fddde87baeb78e0cbd56e87bf6e27052c13a42b5c808331b39157a605851164e

              SHA512

              7801cfdf9786d14c5386c900e42b8228c8242be13e5f6d3e8fd8b4c93f6796faec7caf0f93077ecc5933e912113ea6dfb735160b0289e34073a7f0a337ff66f1

            • \Users\Admin\AppData\Local\Temp\stub.bin.exe
              MD5

              68260e77a8d3f9f51e06d351f9ec4a9a

              SHA1

              11dad0b9986ed9f8da5b8021bf1fdcef7aeba159

              SHA256

              fddde87baeb78e0cbd56e87bf6e27052c13a42b5c808331b39157a605851164e

              SHA512

              7801cfdf9786d14c5386c900e42b8228c8242be13e5f6d3e8fd8b4c93f6796faec7caf0f93077ecc5933e912113ea6dfb735160b0289e34073a7f0a337ff66f1

            • \Users\Admin\AppData\Local\Temp\stub.bin.exe
              MD5

              68260e77a8d3f9f51e06d351f9ec4a9a

              SHA1

              11dad0b9986ed9f8da5b8021bf1fdcef7aeba159

              SHA256

              fddde87baeb78e0cbd56e87bf6e27052c13a42b5c808331b39157a605851164e

              SHA512

              7801cfdf9786d14c5386c900e42b8228c8242be13e5f6d3e8fd8b4c93f6796faec7caf0f93077ecc5933e912113ea6dfb735160b0289e34073a7f0a337ff66f1

            • \Users\Admin\AppData\Local\Temp\stub.bin.exe
              MD5

              68260e77a8d3f9f51e06d351f9ec4a9a

              SHA1

              11dad0b9986ed9f8da5b8021bf1fdcef7aeba159

              SHA256

              fddde87baeb78e0cbd56e87bf6e27052c13a42b5c808331b39157a605851164e

              SHA512

              7801cfdf9786d14c5386c900e42b8228c8242be13e5f6d3e8fd8b4c93f6796faec7caf0f93077ecc5933e912113ea6dfb735160b0289e34073a7f0a337ff66f1

            • memory/572-62-0x0000000005655000-0x0000000005666000-memory.dmp
              Filesize

              68KB

            • memory/572-54-0x0000000000070000-0x0000000000071000-memory.dmp
              Filesize

              4KB

            • memory/572-56-0x0000000005650000-0x0000000005651000-memory.dmp
              Filesize

              4KB

            • memory/572-69-0x0000000005710000-0x0000000005711000-memory.dmp
              Filesize

              4KB

            • memory/680-58-0x0000000000000000-mapping.dmp
            • memory/752-70-0x0000000000000000-mapping.dmp
            • memory/752-76-0x0000000000220000-0x0000000000221000-memory.dmp
              Filesize

              4KB

            • memory/1600-65-0x0000000000000000-mapping.dmp
            • memory/1604-64-0x0000000000000000-mapping.dmp
            • memory/1736-60-0x0000000000000000-mapping.dmp
            • memory/1912-57-0x0000000000000000-mapping.dmp
            • memory/1916-61-0x00000000765A1000-0x00000000765A3000-memory.dmp
              Filesize

              8KB

            • memory/1916-59-0x0000000000000000-mapping.dmp
            • memory/1992-63-0x0000000000000000-mapping.dmp