Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220331-en -
submitted
05-04-2022 00:39
Static task
static1
Behavioral task
behavioral1
Sample
7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe
Resource
win7-20220331-en
General
-
Target
7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe
-
Size
170KB
-
MD5
7a43bf93d5c1df0289e57152105162c9
-
SHA1
3abb60159200859e3e22babcf12479766f7b0f78
-
SHA256
7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab
-
SHA512
4b8babe45c349cbcdaf7ec40d0a064f5b8f9a74dafc3a1d4583666b3fa857e148a4cdcc4a0851f73fa92b9cee8425a95413cf9833e7eca6bb0ab7ed0f91eb48f
Malware Config
Extracted
asyncrat
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
https://api.telegram.org/bot5247464974:AAE4nAxJ7vaD4mfWmY-bGuO23tZg_Mi9B4I/sendMessage?chat_id=736679240
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty Payload 1 IoCs
resource yara_rule behavioral2/memory/2652-124-0x0000000000AF0000-0x0000000000B20000-memory.dmp family_stormkitty -
suricata: ET MALWARE StormKitty Data Exfil via Telegram
suricata: ET MALWARE StormKitty Data Exfil via Telegram
-
Async RAT payload 1 IoCs
resource yara_rule behavioral2/memory/2652-124-0x0000000000AF0000-0x0000000000B20000-memory.dmp asyncrat -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 8 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\6abd23921e66a8f7404dfa03e0226015\Admin@JPOOYTSX_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\Saved Pictures\desktop.ini 7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe File created C:\Users\Admin\AppData\Local\6abd23921e66a8f7404dfa03e0226015\Admin@JPOOYTSX_en-US\Grabber\DRIVE-C\Users\Admin\Downloads\desktop.ini 7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe File opened for modification C:\Users\Admin\AppData\Local\6abd23921e66a8f7404dfa03e0226015\Admin@JPOOYTSX_en-US\Grabber\DRIVE-C\Users\Admin\Downloads\desktop.ini 7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe File created C:\Users\Admin\AppData\Local\6abd23921e66a8f7404dfa03e0226015\Admin@JPOOYTSX_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\desktop.ini 7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe File opened for modification C:\Users\Admin\AppData\Local\6abd23921e66a8f7404dfa03e0226015\Admin@JPOOYTSX_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\desktop.ini 7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe File created C:\Users\Admin\AppData\Local\6abd23921e66a8f7404dfa03e0226015\Admin@JPOOYTSX_en-US\Grabber\DRIVE-C\Users\Admin\Desktop\desktop.ini 7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe File created C:\Users\Admin\AppData\Local\6abd23921e66a8f7404dfa03e0226015\Admin@JPOOYTSX_en-US\Grabber\DRIVE-C\Users\Admin\Documents\desktop.ini 7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe File created C:\Users\Admin\AppData\Local\6abd23921e66a8f7404dfa03e0226015\Admin@JPOOYTSX_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\Camera Roll\desktop.ini 7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 10 icanhazip.com -
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 2652 7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe 2652 7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe 2652 7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe 2652 7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe 2652 7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe 2652 7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe 2652 7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe 2652 7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe 2652 7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe 2652 7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe 2652 7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe 2652 7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe 2652 7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe 2652 7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe 2652 7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe 2652 7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe 2652 7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe 2652 7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe 2652 7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe 2652 7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe 2652 7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe 2652 7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe 2652 7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2652 7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2652 wrote to memory of 1932 2652 7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe 80 PID 2652 wrote to memory of 1932 2652 7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe 80 PID 2652 wrote to memory of 1932 2652 7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe 80 PID 1932 wrote to memory of 3828 1932 cmd.exe 82 PID 1932 wrote to memory of 3828 1932 cmd.exe 82 PID 1932 wrote to memory of 3828 1932 cmd.exe 82 PID 1932 wrote to memory of 4536 1932 cmd.exe 83 PID 1932 wrote to memory of 4536 1932 cmd.exe 83 PID 1932 wrote to memory of 4536 1932 cmd.exe 83 PID 1932 wrote to memory of 3464 1932 cmd.exe 84 PID 1932 wrote to memory of 3464 1932 cmd.exe 84 PID 1932 wrote to memory of 3464 1932 cmd.exe 84 PID 2652 wrote to memory of 4328 2652 7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe 85 PID 2652 wrote to memory of 4328 2652 7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe 85 PID 2652 wrote to memory of 4328 2652 7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe 85 PID 4328 wrote to memory of 1184 4328 cmd.exe 87 PID 4328 wrote to memory of 1184 4328 cmd.exe 87 PID 4328 wrote to memory of 1184 4328 cmd.exe 87 PID 4328 wrote to memory of 1652 4328 cmd.exe 88 PID 4328 wrote to memory of 1652 4328 cmd.exe 88 PID 4328 wrote to memory of 1652 4328 cmd.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe"C:\Users\Admin\AppData\Local\Temp\7335f630871bdc94e06188a1f0fd432e62fda760498ba0cfbccfd3b2ec2626ab.exe"1⤵
- Drops desktop.ini file(s)
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All2⤵
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Windows\SysWOW64\chcp.comchcp 650013⤵PID:3828
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile3⤵PID:4536
-
-
C:\Windows\SysWOW64\findstr.exefindstr All3⤵PID:3464
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid2⤵
- Suspicious use of WriteProcessMemory
PID:4328 -
C:\Windows\SysWOW64\chcp.comchcp 650013⤵PID:1184
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid3⤵PID:1652
-
-