Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220331-en -
submitted
05-04-2022 00:39
Static task
static1
Behavioral task
behavioral1
Sample
7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe
Resource
win7-20220331-en
General
-
Target
7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe
-
Size
170KB
-
MD5
7a43bf93d5c1df0289e57152105162c9
-
SHA1
3abb60159200859e3e22babcf12479766f7b0f78
-
SHA256
7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab
-
SHA512
4b8babe45c349cbcdaf7ec40d0a064f5b8f9a74dafc3a1d4583666b3fa857e148a4cdcc4a0851f73fa92b9cee8425a95413cf9833e7eca6bb0ab7ed0f91eb48f
Malware Config
Extracted
asyncrat
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
https://api.telegram.org/bot5247464974:AAE4nAxJ7vaD4mfWmY-bGuO23tZg_Mi9B4I/sendMessage?chat_id=736679240
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/2652-124-0x0000000000AF0000-0x0000000000B20000-memory.dmp family_stormkitty -
suricata: ET MALWARE StormKitty Data Exfil via Telegram
suricata: ET MALWARE StormKitty Data Exfil via Telegram
-
Async RAT payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/2652-124-0x0000000000AF0000-0x0000000000B20000-memory.dmp asyncrat -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 8 IoCs
Processes:
7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exedescription ioc process File created C:\Users\Admin\AppData\Local\6abd23921e66a8f7404dfa03e0226015\Admin@JPOOYTSX_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\Saved Pictures\desktop.ini 7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe File created C:\Users\Admin\AppData\Local\6abd23921e66a8f7404dfa03e0226015\Admin@JPOOYTSX_en-US\Grabber\DRIVE-C\Users\Admin\Downloads\desktop.ini 7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe File opened for modification C:\Users\Admin\AppData\Local\6abd23921e66a8f7404dfa03e0226015\Admin@JPOOYTSX_en-US\Grabber\DRIVE-C\Users\Admin\Downloads\desktop.ini 7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe File created C:\Users\Admin\AppData\Local\6abd23921e66a8f7404dfa03e0226015\Admin@JPOOYTSX_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\desktop.ini 7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe File opened for modification C:\Users\Admin\AppData\Local\6abd23921e66a8f7404dfa03e0226015\Admin@JPOOYTSX_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\desktop.ini 7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe File created C:\Users\Admin\AppData\Local\6abd23921e66a8f7404dfa03e0226015\Admin@JPOOYTSX_en-US\Grabber\DRIVE-C\Users\Admin\Desktop\desktop.ini 7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe File created C:\Users\Admin\AppData\Local\6abd23921e66a8f7404dfa03e0226015\Admin@JPOOYTSX_en-US\Grabber\DRIVE-C\Users\Admin\Documents\desktop.ini 7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe File created C:\Users\Admin\AppData\Local\6abd23921e66a8f7404dfa03e0226015\Admin@JPOOYTSX_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\Camera Roll\desktop.ini 7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 10 icanhazip.com -
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
Processes:
7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exepid process 2652 7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe 2652 7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe 2652 7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe 2652 7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe 2652 7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe 2652 7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe 2652 7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe 2652 7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe 2652 7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe 2652 7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe 2652 7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe 2652 7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe 2652 7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe 2652 7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe 2652 7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe 2652 7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe 2652 7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe 2652 7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe 2652 7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe 2652 7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe 2652 7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe 2652 7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe 2652 7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exedescription pid process Token: SeDebugPrivilege 2652 7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.execmd.execmd.exedescription pid process target process PID 2652 wrote to memory of 1932 2652 7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe cmd.exe PID 2652 wrote to memory of 1932 2652 7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe cmd.exe PID 2652 wrote to memory of 1932 2652 7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe cmd.exe PID 1932 wrote to memory of 3828 1932 cmd.exe chcp.com PID 1932 wrote to memory of 3828 1932 cmd.exe chcp.com PID 1932 wrote to memory of 3828 1932 cmd.exe chcp.com PID 1932 wrote to memory of 4536 1932 cmd.exe netsh.exe PID 1932 wrote to memory of 4536 1932 cmd.exe netsh.exe PID 1932 wrote to memory of 4536 1932 cmd.exe netsh.exe PID 1932 wrote to memory of 3464 1932 cmd.exe findstr.exe PID 1932 wrote to memory of 3464 1932 cmd.exe findstr.exe PID 1932 wrote to memory of 3464 1932 cmd.exe findstr.exe PID 2652 wrote to memory of 4328 2652 7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe cmd.exe PID 2652 wrote to memory of 4328 2652 7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe cmd.exe PID 2652 wrote to memory of 4328 2652 7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe cmd.exe PID 4328 wrote to memory of 1184 4328 cmd.exe chcp.com PID 4328 wrote to memory of 1184 4328 cmd.exe chcp.com PID 4328 wrote to memory of 1184 4328 cmd.exe chcp.com PID 4328 wrote to memory of 1652 4328 cmd.exe netsh.exe PID 4328 wrote to memory of 1652 4328 cmd.exe netsh.exe PID 4328 wrote to memory of 1652 4328 cmd.exe netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe"C:\Users\Admin\AppData\Local\Temp\7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe"1⤵
- Drops desktop.ini file(s)
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All2⤵
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Windows\SysWOW64\chcp.comchcp 650013⤵PID:3828
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile3⤵PID:4536
-
-
C:\Windows\SysWOW64\findstr.exefindstr All3⤵PID:3464
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid2⤵
- Suspicious use of WriteProcessMemory
PID:4328 -
C:\Windows\SysWOW64\chcp.comchcp 650013⤵PID:1184
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid3⤵PID:1652
-
-