Analysis
-
max time kernel
143s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20220331-en -
submitted
05-04-2022 00:39
Static task
static1
Behavioral task
behavioral1
Sample
7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe
Resource
win7-20220331-en
General
-
Target
7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe
-
Size
170KB
-
MD5
7a43bf93d5c1df0289e57152105162c9
-
SHA1
3abb60159200859e3e22babcf12479766f7b0f78
-
SHA256
7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab
-
SHA512
4b8babe45c349cbcdaf7ec40d0a064f5b8f9a74dafc3a1d4583666b3fa857e148a4cdcc4a0851f73fa92b9cee8425a95413cf9833e7eca6bb0ab7ed0f91eb48f
Malware Config
Extracted
asyncrat
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
https://api.telegram.org/bot5247464974:AAE4nAxJ7vaD4mfWmY-bGuO23tZg_Mi9B4I/sendMessage?chat_id=736679240
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty Payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1484-54-0x0000000000A90000-0x0000000000AC0000-memory.dmp family_stormkitty -
Async RAT payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1484-54-0x0000000000A90000-0x0000000000AC0000-memory.dmp asyncrat -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 8 IoCs
Processes:
7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Local\3df838aefe075dbae5ce6066918015bc\Admin@VFSHTLAO_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\desktop.ini 7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe File created C:\Users\Admin\AppData\Local\3df838aefe075dbae5ce6066918015bc\Admin@VFSHTLAO_en-US\Grabber\DRIVE-C\Users\Admin\Desktop\desktop.ini 7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe File opened for modification C:\Users\Admin\AppData\Local\3df838aefe075dbae5ce6066918015bc\Admin@VFSHTLAO_en-US\Grabber\DRIVE-C\Users\Admin\Desktop\desktop.ini 7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe File created C:\Users\Admin\AppData\Local\3df838aefe075dbae5ce6066918015bc\Admin@VFSHTLAO_en-US\Grabber\DRIVE-C\Users\Admin\Downloads\desktop.ini 7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe File created C:\Users\Admin\AppData\Local\3df838aefe075dbae5ce6066918015bc\Admin@VFSHTLAO_en-US\Grabber\DRIVE-C\Users\Admin\Documents\desktop.ini 7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe File opened for modification C:\Users\Admin\AppData\Local\3df838aefe075dbae5ce6066918015bc\Admin@VFSHTLAO_en-US\Grabber\DRIVE-C\Users\Admin\Downloads\desktop.ini 7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe File opened for modification C:\Users\Admin\AppData\Local\3df838aefe075dbae5ce6066918015bc\Admin@VFSHTLAO_en-US\Grabber\DRIVE-C\Users\Admin\Documents\desktop.ini 7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe File created C:\Users\Admin\AppData\Local\3df838aefe075dbae5ce6066918015bc\Admin@VFSHTLAO_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\desktop.ini 7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 3 icanhazip.com -
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exepid process 1484 7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe 1484 7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe 1484 7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exedescription pid process Token: SeDebugPrivilege 1484 7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.execmd.execmd.exedescription pid process target process PID 1484 wrote to memory of 1104 1484 7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe cmd.exe PID 1484 wrote to memory of 1104 1484 7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe cmd.exe PID 1484 wrote to memory of 1104 1484 7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe cmd.exe PID 1484 wrote to memory of 1104 1484 7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe cmd.exe PID 1104 wrote to memory of 1308 1104 cmd.exe chcp.com PID 1104 wrote to memory of 1308 1104 cmd.exe chcp.com PID 1104 wrote to memory of 1308 1104 cmd.exe chcp.com PID 1104 wrote to memory of 1308 1104 cmd.exe chcp.com PID 1104 wrote to memory of 1272 1104 cmd.exe netsh.exe PID 1104 wrote to memory of 1272 1104 cmd.exe netsh.exe PID 1104 wrote to memory of 1272 1104 cmd.exe netsh.exe PID 1104 wrote to memory of 1272 1104 cmd.exe netsh.exe PID 1104 wrote to memory of 1816 1104 cmd.exe findstr.exe PID 1104 wrote to memory of 1816 1104 cmd.exe findstr.exe PID 1104 wrote to memory of 1816 1104 cmd.exe findstr.exe PID 1104 wrote to memory of 1816 1104 cmd.exe findstr.exe PID 1484 wrote to memory of 1716 1484 7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe cmd.exe PID 1484 wrote to memory of 1716 1484 7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe cmd.exe PID 1484 wrote to memory of 1716 1484 7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe cmd.exe PID 1484 wrote to memory of 1716 1484 7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe cmd.exe PID 1716 wrote to memory of 1904 1716 cmd.exe chcp.com PID 1716 wrote to memory of 1904 1716 cmd.exe chcp.com PID 1716 wrote to memory of 1904 1716 cmd.exe chcp.com PID 1716 wrote to memory of 1904 1716 cmd.exe chcp.com PID 1716 wrote to memory of 1700 1716 cmd.exe netsh.exe PID 1716 wrote to memory of 1700 1716 cmd.exe netsh.exe PID 1716 wrote to memory of 1700 1716 cmd.exe netsh.exe PID 1716 wrote to memory of 1700 1716 cmd.exe netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe"C:\Users\Admin\AppData\Local\Temp\7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe"1⤵
- Drops desktop.ini file(s)
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All2⤵
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Windows\SysWOW64\chcp.comchcp 650013⤵PID:1308
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile3⤵PID:1272
-
-
C:\Windows\SysWOW64\findstr.exefindstr All3⤵PID:1816
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid2⤵
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Windows\SysWOW64\chcp.comchcp 650013⤵PID:1904
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid3⤵PID:1700
-
-