Analysis
-
max time kernel
155s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
30-03-2022 12:09
Static task
static1
Behavioral task
behavioral1
Sample
View.exe
Resource
win7-20220311-en
Behavioral task
behavioral2
Sample
View.exe
Resource
win10v2004-en-20220113
General
-
Target
View.exe
-
Size
170KB
-
MD5
f1a98f35102de03ade78f77b4d32672c
-
SHA1
7c10c2784119e89e71ef22900ded48cfaaef7401
-
SHA256
7526ce309a80adea50423093cb6bba5c13ee1a3b9e6b4317e6c7f02569aa48cd
-
SHA512
9a51ddc114286946d823ac36af7b4f56307123d152854e1410d263bae3f7c7b520286b193901710f6be5bc9380e2d1ad79dea2060a8211d5dc006392fb6bc667
Malware Config
Signatures
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/1188-130-0x0000000000880000-0x00000000008B0000-memory.dmp family_stormkitty -
Async RAT payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/1188-130-0x0000000000880000-0x00000000008B0000-memory.dmp asyncrat -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 8 IoCs
Processes:
View.exedescription ioc process File created C:\Users\Admin\AppData\Local\ec4e00ac638823ff74e5ecafd1a65338\Admin@JDQPXOPR_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\Camera Roll\desktop.ini View.exe File created C:\Users\Admin\AppData\Local\ec4e00ac638823ff74e5ecafd1a65338\Admin@JDQPXOPR_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\Saved Pictures\desktop.ini View.exe File created C:\Users\Admin\AppData\Local\ec4e00ac638823ff74e5ecafd1a65338\Admin@JDQPXOPR_en-US\Grabber\DRIVE-C\Users\Admin\Downloads\desktop.ini View.exe File opened for modification C:\Users\Admin\AppData\Local\ec4e00ac638823ff74e5ecafd1a65338\Admin@JDQPXOPR_en-US\Grabber\DRIVE-C\Users\Admin\Downloads\desktop.ini View.exe File created C:\Users\Admin\AppData\Local\ec4e00ac638823ff74e5ecafd1a65338\Admin@JDQPXOPR_en-US\Grabber\DRIVE-C\Users\Admin\Documents\desktop.ini View.exe File opened for modification C:\Users\Admin\AppData\Local\ec4e00ac638823ff74e5ecafd1a65338\Admin@JDQPXOPR_en-US\Grabber\DRIVE-C\Users\Admin\Documents\desktop.ini View.exe File created C:\Users\Admin\AppData\Local\ec4e00ac638823ff74e5ecafd1a65338\Admin@JDQPXOPR_en-US\Grabber\DRIVE-C\Users\Admin\Desktop\desktop.ini View.exe File created C:\Users\Admin\AppData\Local\ec4e00ac638823ff74e5ecafd1a65338\Admin@JDQPXOPR_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\desktop.ini View.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 24 icanhazip.com -
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
View.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 View.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier View.exe -
Suspicious behavior: EnumeratesProcesses 29 IoCs
Processes:
View.exepid process 1188 View.exe 1188 View.exe 1188 View.exe 1188 View.exe 1188 View.exe 1188 View.exe 1188 View.exe 1188 View.exe 1188 View.exe 1188 View.exe 1188 View.exe 1188 View.exe 1188 View.exe 1188 View.exe 1188 View.exe 1188 View.exe 1188 View.exe 1188 View.exe 1188 View.exe 1188 View.exe 1188 View.exe 1188 View.exe 1188 View.exe 1188 View.exe 1188 View.exe 1188 View.exe 1188 View.exe 1188 View.exe 1188 View.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
View.exedescription pid process Token: SeDebugPrivilege 1188 View.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
View.execmd.execmd.exedescription pid process target process PID 1188 wrote to memory of 3976 1188 View.exe cmd.exe PID 1188 wrote to memory of 3976 1188 View.exe cmd.exe PID 1188 wrote to memory of 3976 1188 View.exe cmd.exe PID 3976 wrote to memory of 3028 3976 cmd.exe chcp.com PID 3976 wrote to memory of 3028 3976 cmd.exe chcp.com PID 3976 wrote to memory of 3028 3976 cmd.exe chcp.com PID 3976 wrote to memory of 3808 3976 cmd.exe netsh.exe PID 3976 wrote to memory of 3808 3976 cmd.exe netsh.exe PID 3976 wrote to memory of 3808 3976 cmd.exe netsh.exe PID 3976 wrote to memory of 3172 3976 cmd.exe findstr.exe PID 3976 wrote to memory of 3172 3976 cmd.exe findstr.exe PID 3976 wrote to memory of 3172 3976 cmd.exe findstr.exe PID 1188 wrote to memory of 4180 1188 View.exe cmd.exe PID 1188 wrote to memory of 4180 1188 View.exe cmd.exe PID 1188 wrote to memory of 4180 1188 View.exe cmd.exe PID 4180 wrote to memory of 216 4180 cmd.exe chcp.com PID 4180 wrote to memory of 216 4180 cmd.exe chcp.com PID 4180 wrote to memory of 216 4180 cmd.exe chcp.com PID 4180 wrote to memory of 324 4180 cmd.exe netsh.exe PID 4180 wrote to memory of 324 4180 cmd.exe netsh.exe PID 4180 wrote to memory of 324 4180 cmd.exe netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\View.exe"C:\Users\Admin\AppData\Local\Temp\View.exe"1⤵
- Drops desktop.ini file(s)
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All2⤵
- Suspicious use of WriteProcessMemory
PID:3976 -
C:\Windows\SysWOW64\chcp.comchcp 650013⤵PID:3028
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile3⤵PID:3808
-
-
C:\Windows\SysWOW64\findstr.exefindstr All3⤵PID:3172
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid2⤵
- Suspicious use of WriteProcessMemory
PID:4180 -
C:\Windows\SysWOW64\chcp.comchcp 650013⤵PID:216
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid3⤵PID:324
-
-